Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Sorry State Of Cybersecurity Awareness Training
Newest First  |  Oldest First  |  Threaded View
KatherineM394
50%
50%
KatherineM394,
User Rank: Apprentice
6/14/2017 | 6:28:24 PM
Cybersecurity Awareness Training for U.S.
Great point! CyberTraining 365 is my recommendation for U.S. based companies. They're accredited and aligned with NICE (framework outlined by the National Institute of Standards and Technology) as well as accredited by EC-Council and partnerships with industry experts. They do both technical and awareness training.  https://www.cybertraining365.com/cybertraining/Home 
LindsayCybSafe
50%
50%
LindsayCybSafe,
User Rank: Strategist
5/24/2017 | 9:08:48 AM
Mouse clicks = sword of Damocles
Joe makes the good point - there needs to be audit-friendly, quantifiable evidence of employee cyber training to cover the CIO. Prefeferably, the most accrediated entreprise training package on offer. 

For the UK, Cybsafe does this - but for the US market I'm less sure. 
tfdj
50%
50%
tfdj,
User Rank: Apprentice
1/27/2017 | 5:23:13 PM
Re: Don't flog the peasantry.
PMerry,

Thanks for the feedback.

You are correct, the Board of Directors as well as senior management need to be held accountable as well.  Unfortunately, this is a "top down" initiative and must have senior level support in order for it to be successful. 

Again, thanks for the post, it is most appreciated.

Cheers.
tfdj
50%
50%
tfdj,
User Rank: Apprentice
1/27/2017 | 5:17:21 PM
Re: Great Article and spot on
ZSCHULER,

Thank you for the kind words, much appreciated!

Cheers!
tfdj
50%
50%
tfdj,
User Rank: Apprentice
1/23/2017 | 5:29:05 PM
Re: Don't flog the peasantry.
Joe,

Thanks for your reply!  I appreciate the feedback!

To be clear, I'm not suggesting that the only way that things can be done is by "flogging the peasantry", quite the contrary.  What I'm suggesting is that companies place the same amount of emphasis on ensuring that information security training is taking place as they do, with say, their office supply policy.  I've seen companies where an employee is taken to task for violating the office supply policy, yet when they don't complete their information security training, there's no consequence.

You are correct in that it needs to start at the top, because without C-Suite backing, the training program is more than likely going to falter and fail out of the gate.  Further, if the employees see that there are no repercussions from senior management then, by proxy, they are given carte blanche to ignore the training.

Cheers,

Tom 
pmerry
50%
50%
pmerry,
User Rank: Apprentice
1/19/2017 | 9:13:19 PM
Re: Don't flog the peasantry.
You're right. It's about accountability. If the leaders don't hold themselves accountable, they can't expect the rest of the organization to. A top down approach is needed for a successful cyber security training program and proper implementation and practice of policy.
zschuler
50%
50%
zschuler,
User Rank: Author
1/17/2017 | 8:20:09 PM
Great Article and spot on
The Author clearly knows what he is talking about.  There is actually a 3rd party service called NINJIO that seems to meet all of his requirements.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
1/14/2017 | 2:51:36 PM
Don't flog the peasantry.
Well put, but let me counter:

1) If something is everybody's job, it's nobody's job.  If employees whose primary tasks are to answer telephones or to do data entry or construct marketing plans or whatever engage in a cybersecurity failing, while there should be some remediation, instead of flogging the peasants, I propose punishing the generals -- and calling the CIO/CISO/etc. on the carpet -- because, ultimately, it's their failing.  If the front-line employees aren't properly trained and properly acting on that training, it's the trainers' fault and the fault of the people responsible for that training to begin with.

2) In a heavy-handed "flog-the-peasants" environment, employees -- even managers -- will be reluctant at best to come forward if they violate a policy that then results in a potential data compromise.  Consequently, there needs to be appropriate policy for this that doesn't use the stick so much as the carrot.  (I've written on this, for example, here: enterprisenetworkingplanet.com/netsysm/minimize-shadow-it-damage-by-encouraging-self-reporting.html ).


COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10737
PUBLISHED: 2020-05-27
A race condition was found in the mkhomedir tool shipped with the oddjob package in versions before 0.34.5 and 0.34.6 wherein, during the home creation, mkhomedir copies the /etc/skel directory into the newly created home and changes its ownership to the home's user without properly checking the hom...
CVE-2020-13622
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
CVE-2020-13623
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation.
CVE-2020-13616
PUBLISHED: 2020-05-26
The boost ASIO wrapper in net/asio.cpp in Pichi before 1.3.0 lacks TLS hostname verification.
CVE-2020-13614
PUBLISHED: 2020-05-26
An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification.