SlideShare a Scribd company logo
Security Awareness
The Challenge of Security Awareness Why? Nobody cares about Security… And how do we get their attention and support?
Types of Risk Prof. John Adams, University College London UK risk expert Direct – directly perceived – obvious Scientific – determined via science Virtual Risk – everything else!
Types of Risk Virtual Risk What we are all involved in! Project risk/Operational risk Physical/Data security risk Terrorism/Homeland Security Weather
Virtual Risk Virtual Risk Difficult to “prove” Experts don’t know or do not agree We don’t know what we don’t know
Issues Security viewed as a negative Avoidance v. “risk” Delays Cost Extra work “ Gotchas”
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS…
 
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9.  Have a Mascot
 
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9.  Have a Mascot 8.  Dress Up
 
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9.  Have a Mascot 8.  Dress Up 7.  1-on-1 Executive Briefings
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9.  Have a Mascot 8.  Dress Up 7.  1-on-1 Executive Briefings 6.  The Screensaver
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day – comics and greeting cards
 
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day 4.  Publish or Perish
 
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day 4.  Publish or Perish 3.  Continually reinvent
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day 4.  Publish or Perish 3.  Continually reinvent 2.  Get others to play
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day 4.  Publish or Perish 3.  Continually reinvent 2.  Get others to play 1.  Have Fun!

More Related Content

PPT
Safe choices
PPT
Accident Prevention
PDF
Information Security Awareness Training (En)_Information Security Awareness F...
PDF
Raising information security awareness
PDF
Information Security Awareness Training
PPT
Employee Security Training[1]@
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PPTX
Information Security Lecture #1 ppt
Safe choices
Accident Prevention
Information Security Awareness Training (En)_Information Security Awareness F...
Raising information security awareness
Information Security Awareness Training
Employee Security Training[1]@
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Information Security Lecture #1 ppt

Similar to Elements of an Information Security Awareness Program (20)

PPT
Made to stick: the science of adult learning.
PPTX
Psychology understanding individuals and teams v4
PDF
Psychological Safety and Remote Work by Matthew Philip
PDF
How to Make Sense of Any Mess
PDF
SG Module #188 - Technology and Happiness.pdf
PDF
Integrated Security, Safety and Surveillance Solution i3S
PPTX
People Committed to Solving our Information Security Language Problem
PPTX
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
PPTX
How To face Crowds
PDF
Explaining Persuasion API
PPT
Presentation Skills instructions Millie-1-1.ppt
PPTX
Harrisburg BSides Presentation - 100219
PDF
Helping technologists communicate - pyramid principle and personal impact
PPTX
WANTED – People Committed to Solving our Information Security Language Problem
PPT
Ignite your possibilities ppt
PDF
Making Sense Of Cybersecurity 1 Converted Thomas Kranz
PPTX
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
PDF
Zero Privilege Architectures v1.1_for distribution.pdf
PPTX
Keynote @ ISC2 Cyber Aware Dallas
Made to stick: the science of adult learning.
Psychology understanding individuals and teams v4
Psychological Safety and Remote Work by Matthew Philip
How to Make Sense of Any Mess
SG Module #188 - Technology and Happiness.pdf
Integrated Security, Safety and Surveillance Solution i3S
People Committed to Solving our Information Security Language Problem
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
How To face Crowds
Explaining Persuasion API
Presentation Skills instructions Millie-1-1.ppt
Harrisburg BSides Presentation - 100219
Helping technologists communicate - pyramid principle and personal impact
WANTED – People Committed to Solving our Information Security Language Problem
Ignite your possibilities ppt
Making Sense Of Cybersecurity 1 Converted Thomas Kranz
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Zero Privilege Architectures v1.1_for distribution.pdf
Keynote @ ISC2 Cyber Aware Dallas
Ad

More from Barry Caplin (20)

PPTX
Healing healthcare security
PPTX
It’s not If but When 20160503
PPTX
Dreaded Embedded sec360 5-17-16
PPTX
It’s not if but when 20160503
PPT
Wearing Your Heart On Your Sleeve - Literally!
PPTX
CISOs are from Mars, CIOs are from Venus
PPTX
Online Self Defense - Passwords
PPT
The CISO Guide – How Do You Spell CISO?
PPT
Bullying and Cyberbullying
PPT
3 factors of fail sec360 5-15-13
PPT
Tech smart preschool parent 2 13
PPT
Embracing the IT Consumerization Imperative NG Security
PPT
Online Self Defense
PPT
Embracing the IT Consumerization Imperitive
PPT
Embracing the IT Consumerization Imperitive
PPTX
Stuff my ciso says
PPTX
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
PPT
Toys in the office 11
PPT
Accidental Insider
PPT
Teens 2.0 - Teens and Social Networks
Healing healthcare security
It’s not If but When 20160503
Dreaded Embedded sec360 5-17-16
It’s not if but when 20160503
Wearing Your Heart On Your Sleeve - Literally!
CISOs are from Mars, CIOs are from Venus
Online Self Defense - Passwords
The CISO Guide – How Do You Spell CISO?
Bullying and Cyberbullying
3 factors of fail sec360 5-15-13
Tech smart preschool parent 2 13
Embracing the IT Consumerization Imperative NG Security
Online Self Defense
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Stuff my ciso says
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Toys in the office 11
Accidental Insider
Teens 2.0 - Teens and Social Networks
Ad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPTX
1. Introduction to Computer Programming.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Tartificialntelligence_presentation.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Empathic Computing: Creating Shared Understanding
1. Introduction to Computer Programming.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Programs and apps: productivity, graphics, security and other tools
Per capita expenditure prediction using model stacking based on satellite ima...
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Tartificialntelligence_presentation.pptx
A comparative analysis of optical character recognition models for extracting...
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Elements of an Information Security Awareness Program

  • 2. The Challenge of Security Awareness Why? Nobody cares about Security… And how do we get their attention and support?
  • 3. Types of Risk Prof. John Adams, University College London UK risk expert Direct – directly perceived – obvious Scientific – determined via science Virtual Risk – everything else!
  • 4. Types of Risk Virtual Risk What we are all involved in! Project risk/Operational risk Physical/Data security risk Terrorism/Homeland Security Weather
  • 5. Virtual Risk Virtual Risk Difficult to “prove” Experts don’t know or do not agree We don’t know what we don’t know
  • 6. Issues Security viewed as a negative Avoidance v. “risk” Delays Cost Extra work “ Gotchas”
  • 7. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS…
  • 8.  
  • 9. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9. Have a Mascot
  • 10.  
  • 11. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9. Have a Mascot 8. Dress Up
  • 12.  
  • 13. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9. Have a Mascot 8. Dress Up 7. 1-on-1 Executive Briefings
  • 14. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9. Have a Mascot 8. Dress Up 7. 1-on-1 Executive Briefings 6. The Screensaver
  • 15. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day – comics and greeting cards
  • 16.  
  • 17. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day 4. Publish or Perish
  • 18.  
  • 19. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day 4. Publish or Perish 3. Continually reinvent
  • 20. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day 4. Publish or Perish 3. Continually reinvent 2. Get others to play
  • 21. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day 4. Publish or Perish 3. Continually reinvent 2. Get others to play 1. Have Fun!