The Biggest Secrets of Security Awareness

  • View
    1.411

  • Download
    0

  • Category

    Business

Preview:

DESCRIPTION

Learn five secrets that will help you improve security awareness within your organization. These tips give you practical advice on how to spread the word about security and instill security best practices in more meaningful and memorable ways. When used on a daily basis, these proven learning techniques teach employees how to protect the company's data assets and why security is important to business success.

Citation preview

1

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

The Biggest Secretsof Security Awareness

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Chief Inspiration OfficerNative Intelligence, Inc.

Storyteller

Educator

Creator of awareness courses andaward-winning materials used worldwide

K Rudolph, CISSP

2

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Secret 1: Prevention Is Better Than Cure

Why do we invest in security awareness?

What amount of security incidents arepreventable?

What does this mean to securityawareness practitioners?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

- Don’t share your password- Don’t discuss confidential information in public- Don’t install a personal modem at work- Create long, strong passwords- Report actual or suspected incidents- Delete e-mail chain messages- Don’t take sensitive data home without permission

How many of these awarenessmessages are common sense?

3

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Why do we need to remind people?

What are these messages?

Do we remember what it’s likenot to know about security?

What’s not common knowledge at the IRS?

1

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

___ of the 102 employees did as requested?

Managers were ___ % more lax than employees.

A follow-up survey found:

___ believed what they had been told.

___ % said that they thought thatchanging their password to one providedby the caller was not the same asdisclosing it, which they knew wasagainst the rules.

4

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Prevention beats cure. Securityawareness turns your messages intocommon knowledge.

Does common knowledge set thestage for common sense?

How do we make messages compellingso that they become commonknowledge?

1Take Awayfrom Secret

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Secret 2: Security Is Everywhere

5

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Powering off yourcomputer withoutclosing theprograms you’reusing is like kickingaway the ladderwhile the painter ison the third story.

How can this housepainter help usexplain propercomputer use?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What has this cat gotto do with securityawareness?

6

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

What about a car door, adraw bridge, or a wide gate?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

7

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Your Data

8

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Your Data

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Accelerate learning with analogies.2Take Awayfrom Secret

What Wizard of Oztheme applies tobuilding effectivesecurity awarenesscontent?

9

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Secret 3:Work with the Brain to Capture Attention

What are somebrain-compatiblestrategies forgetting attention?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How successful is asales representativewho gets thrownout of the decisionmaker’s office?

10

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How can we get the brain’s attention?

What are brains wired to respond to?

(hint)

Why do warning signals have flashing lights?

Why are sirens two or more tones?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How can we apply this to awareness?

Use expectation failure.

Break a pattern. Break a schema.

11

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Schema

• Group of generic properties

• Pre-recorded informationstored in our memories

What’s your schema for “sports car” ?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How should we use schemas?

• Communicate complex topics bylayering simple ones (e.g., pomelo)

• Capture attention by breaking them

12

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Would you agree that most people expectinformation on our country’s nuclearweapons designs to be well-guarded?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

“Potentiallythe greatestbreach ofnationalsecurityin decades.”

Fall 2006

13

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

We expect people not to click onan Internet ad for a free virus.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

We expect that the best way to get managementexcited about a disaster recovery plan is to burndown the building across the street.

14

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

We expectmedicine totaste bad.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What do staffexpect ofsecurity

awareness?

Will this beboring?

15

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Does it have to be that way?

Should it be that way?

What if yourawarenessmaterials leftyour audiencewanting more?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Sourcefire Security Calendar

16

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Daily Tips

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Daily Tips

17

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Daily Tips

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What do brains consider important?

Brains pay attention tothings that are unusual,unexpected, out of theordinary, interesting,strange, eye-catching…

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

18

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Does empathy get the brain involved?Liz had a very bad day at the office.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

3Take Awayfrom Secret

Use content thatmakes your audiencefeel something.

Capture attention with changes, the unexpected,by breaking a schema, using empathy, and by involvingthe emotions.

19

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What causesdeeper learning?

Secret 4: Work with the Brain to Make Learning Stick

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

More connections means …The more neurons that fire means …Ways, contexts, intelligences…

Plastics, sponges, sieves, or …?

20

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Is a picture worth 1,024 words?

Recall and transfer studies show___ % more than words alone?

What should we do to makepictures more effective?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

21

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Why?

What does this causethe brain to do?

How much do words withinpictures improve a learner’sability to solve problemsrelated to content?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Which is better, a conversational, personal,casual language style or a more and directbusiness-like style? ___ %

Is conversation“learning by doing”?

What if your boss,manager, trainingdepartment, or anyof the PTB wantsyou to…

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

22

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

23

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

24

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

25

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

Should we ask questionsthat don’t have a clear answer?

What do themost accessiblescience writershave in common?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How does emotionalcontent affect memory?

Where were you when...

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

26

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Don’t Tell When You Can Show

What did trial attorneyGerry Spence say about words?

How can we visually explainan abstract concept such asvulnerability or threat?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

----------------------------What would happen if

someone changedyour data?

----------------------------Whet would happen if

someone chongedyoor deta?

27

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

----------------------------What would happen

if your datadisappeared?

----------------------------What would happen

if your datadisappeared?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

4Take Awayfrom Secret

What’s another technique forshowing rather than telling?

Show a choice of actions…Bad choices result in…

What 1980’s commercial did this?

Use as much of the brain as possible, in as many ways asyou can (multiple methods). Also, use images with wordsin them, use mystery, and aim for visceral reactions. Showwith visuals, simulations, and demonstrations, and extremeconsequences.

28

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Secret 5: Use Strategic Stories

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Stories have enormous powers of recall, andthey communicate priorities effectively.

29

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

Do this ______. Don’t do that ______.

Which would you prefer…

How are stories like flight simulators?

Does mental simulation work?

Why are stories powerful?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Which is better, instructing people not toforward chain e-mail or telling them aboutRose Lambert?

30

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

How does telling a story differ frommaking a reasoned argument?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

The way you deliver a message to peopleis a clue to how they should react.

If you make an argument …

They will …

But stories …

31

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

Do you haveto be creative to

come up withgood stories?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What do 9 out of 10ophthalmologistsrecommend forstory spotting?

What’s a NewsHawk Program?

32

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How many surprising elements?

Does it have to be true?

What length should it be?

Can it have more than one message?

What tense should the story be told in?

How many characters should it have?

What makes a story memorable?

What Makes A Useful Story?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Stories are simulations. They can inspire action.You don’t have to be creative to spot and use stories.

5Take Awayfrom Secret

Have you recently delivered any messages thathaven’t been effective?

Learn the craft of storytelling for business.

Develop a bucket of stories for trigger events.

Using Strategic Stories

Create a story to redeliver them.

33

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

1. Prevention is better than cure.

2. Use analogies to accelerate learning.

3. Work with the brain to capture attention.

4. Work with the brain to maintain interest.

5. Use strategic stories.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Recommended