to understand corporate policy - company and
customer
to understand their individual
responsibility/liability
to understand their responsibility for the
protection and integrity of assets under their control
to understand their responsibility to promote
Information Security Awareness
obligation to see that unauthorized access
violation reports are reviewed and resolved
obligation to investigate and correct known
exposures
responsibility to ensure that information
security personnel are informed of all personnel transfers and terminations
responsibility to ensure that material is
disposed of properly
responsibility to incorporate the segregation of
duties concept where it makes good business sense
responsibility to ensure that the overall work
environment is secure, and that information is protected during all phases of
testing, and that the test and production environments are kept separate
perform periodic random reviews of employee
activities and datasets to act as a deterrent against non-business use of
company resources
responsible for compliance with all corporate
policy, especially Information Security and Business Continuity.
responsibility
to ensure each users access is limited to the minimum transaction and command
sets necessary to accomplish assigned tasks
Employee Responsibilities
Audience: The entire company
Needs/Concerns:
to understand corporate policy
to understand their individual responsibility
to realize their ethical responsibility
to educate them of corporate and local policies
to make them aware of proper material disposal
methods
to make them aware of their responsibility for
the protection and integrity of assets under their control
to apprise them of good password habits
responsibility to ensure their individual work
areas are secure
responsibility for their own individual business
continuity compliance
responsibility for physical security
ethics as it pertains to knowledge of customer
plans and information
to understand the importance of good
housekeeping in the work environment
Get certified in Risk Management through our completely on-line training system. Study at your own pace.
to understand proper mitigation/prevention
procedures
to understand proper backup, offsite storage,
and recovery procedures
to understand need for alternate processing
strategy
to understand need for a network recovery
strategy
to understand need to document disaster recovery
plans
to understand need to assist in development of
customer reaction plan
to understand need to do disaster recovery plan
testing
to understand benefit of continuous improvement
of plans
Crisis Management Issues
Audience: The entire company
Needs/Concerns:
to understand corporate policy
to understand their individual responsibility
to understand the need for evacuation, severe
weather, and bomb threat plans
to understand what to do; where to go; who to
contact
Information Retention, Disposal, and Handling
Issues
Audience: The entire company
Needs/Concerns:
to understand corporate policy
to understand their individual responsibility
to understand need to identify sensitive
information
to understand need to classify sensitive
information
to provide advice concerning printing of
sensitive information
to provide advice concerning faxing of sensitive
information
to understand concerns with voice transmissions
and cellular phones
to understand proper distribution techniques
regarding sensitive information
to provide advice concerning the reproduction of
sensitive information
to provide advice on proper disposal techniques
for sensitive information
TrainingKeeper Software. Keep, organize and plan all your employees' training and activities. Software includes multi-user support with reports, certs, and calendars.
Communication opportunities to
reach the appropriate audience may include, but are not limited to the following:
Leadership meetings
Team meetings
Planned series of desired messages using an
available media type from above.
Support Definition
Materials that may be available
from outside companies, or may need to be internally generated:
Newsletter
Brochures
Standardized presentations
Videos
Posters
Security bulletin board
Security guidelines
Supporting publications
Courses
Measurement/Evaluation
To measure and evaluate the effectiveness of our awareness
program, we will do the following:
The MAIN method we will use to measure the
success of our program will be to conduct mini-audits, consisting of five to
ten observable items, which will be conducted before and after each main
message of our program, to determine whether or not there has been any behavior
change as the result of our Information Security Awareness Training program.
Track the number of audit comments related to
the issues covered by our awareness program to determine if there was a
decrease.
Track the number of viruses encountered to
determine if there was a decrease.
Conduct surveys regarding the effectiveness of
our awareness program.
Request feedback regarding our awareness program
for continuous improvement.
8D Manager Software with 8D, 9D, 5Y and 4M report generator. Your corrective action software for managing, measuring, and reporting issues.
Program Construction for Information Security Awareness Training
Program Schedule
The Master schedule/calendar of Information
Security Awareness materials development, materials acquisition, and materials
and message distribution.
Materials
Develop or obtain the necessary materials from an outside
resource.
Communications Development
Develop communications for needs that are unique to the
local organization to supplement the overall program.
Implementation
Implement the Information Security Awareness Training Program
according to the schedule developed in Program Construction Section I Program
Schedule. Be flexible and adjust the schedule to the immediate needs that may
occur within the organization. Promote Information Security Awareness at events
and opportunities as they become available.
Review/Revise Program
I. Effectiveness Measurement
Measure the effectiveness of the Information Security
Awareness Training Program utilizing the activities designed in Program Design Part VI
Measurement/Evaluation.
II. Feedback Review
Analyze the feedback from the measurements/evaluations and
incorporate the analysis into future planning for the Information Security Awareness Training Program.
III. Revision Strategy
Review and revise materials periodically to keep them
current. It is recommended this be done by building the review process into the
continuing master calendar/schedule planning process.
IV. Continuous Improvement
Information Security Awareness Training is a perpetual process, it is
not a "quick fix". As the Program unfolds, and feedback is received,
begin performance planning for the ongoing Program. Information Security
related behaviors and knowledge can always be improved.
Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.
This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.
Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.
This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.
This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security
This article discusses concernts that you may not think about when it comes to small business internet security. Learn about voicemail, toll fraud, fax machine, and cell phone security issues.
Take these actions to prevent attacks on computer security. Article covers laptop issues, encryption, offsite storage, managing a clean desk, computer disposal, and dumpster divers.
Enjoy this page? Please pay it forward. Here's how...
Would you prefer to share this page with others by linking to it?
Click on the HTML link code below.
Copy and paste it, adding a note of your own, into your blog, a Web page, forums, a blog comment,
your Facebook account, or anywhere that someone would find this page valuable.