Professional Documents
Culture Documents
Cipawarenessvideo
Cipawarenessvideo
Cybersecurity Awareness
Keeping your audience engaged and aware
1
5/11/2016
Agenda
• Creating a Strategy
• Instructional Design – ADDIE Model
• Adult Learner Characteristics
• Measuring Effectiveness of Program
Create a Strategy
• Topics and Themes
• Frequency
2
5/11/2016
Design
Develop
Implement
Evaluate
Analyze
• Who needs to be trained? (Identify
Roles)
– Audience Characteristics
– Prior knowledges and skills
• Learning Environment
– Class size, Type of instruction etc.
– Timeline
3
5/11/2016
4
5/11/2016
Time limits
Break presentations into a series of 5
minute experiences
Solve a Problem
• Use real examples
5
5/11/2016
Earn Respect
“Seek respect, not attention. It lasts
longer.”
― Ziad K. Abdelnour
Lighten up
“No one will ever claim that they
experienced Death By
PowerPoint because they felt like
dying due to excessive fun during a
presentation”
- Leslie Belnap
6
5/11/2016
Remember
Do not read your slides verbatim!
7
5/11/2016
8
5/11/2016
Examples:
• Protect the confidentiality, integrity and availability of BES Cyber Systems and related
Information.
• The human factor – ensure every employee knows that security is their responsibility.
Design
• Determine instructional methods
• Create “Storyboards”/Prototypes
– Narratives – Scenarios – Stories
– Abstract Concepts
– Parts and Components
– Motion and Paths
– Maps, Charts and Statistical Data
– Concrete Ideas
– Metaphors
9
5/11/2016
Design
• Communicate Policy/Regulations
– Entertain
– Engage
– Reward
10
5/11/2016
Develop
• Create the syllabus
Expert Knowledge
• FBI, US-CERT
• Cybersecurity Product Demos/Blogs
• Professional groups
– ASIS
– ISACA
– ISC2
– IASAP
11
5/11/2016
In the News
Source: www.informationisbeautiful.net
12
5/11/2016
Implement
• Launch Course
Evaluation
Formative Evaluation Summative Evaluation
• Monitors learning to provide feedback • Evaluate student learning at the end
– point in time of the course
13
5/11/2016
Measuring Effectiveness
How do you measure
effectiveness?
Internal Controls
• The policies, procedures, practices and organizational structures
designed to provide reasonable assurance that business objectives
will be achieved and undesired events will be prevented or
detected and corrected.
14
5/11/2016
15
5/11/2016
16
5/11/2016
In closing…
MAKE IT INTERESTING.
17
5/11/2016
Questions
18
5/11/2016
Addendum
The following slides are examples from BPU’s Cybersecurity Awareness
Program
19
5/11/2016
Phishing
October 13-16 - Connected Communities and Families: Staying Protected While We Are Always Connected
We will share simple ways we can protect ourselves and those around us along with what we can do if impacted by a breach,
cybercrime or other issue.
20
5/11/2016
21