Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

2/28/2020
07:00 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Educating Educators: Microsoft's Tips for Security Awareness Training

Microsoft's director of security education and awareness shares his approach to helping train employees in defensive practices.

RSA Conference 2020 - San Francisco - The process of developing and implementing a cybersecurity awareness program is tricky. How do you enforce regular trainings? How do you convince employees to change their behaviors? How do you teach best security practices when the people in your organization are using more applications and services on a daily basis?

"We're asked to do a lot of things; we're pulled in many directions," said Ken Sexsmith, who heads up security education and awareness at Microsoft, in a session at this week's RSA Conference. "We're using the same technology, but we're busy doing multiple things. We have to find ways to get people interested and motivated to do things differently than they've done."

It's no small task for a company with 250,000 employees and vendors, and 441,000 Intune-managed devices hitting the network. Microsoft handles 630 billion authentication requests each month and hosts 1.04 million monthly Teams meetings, in addition to 1.23 million monthly Teams calls. It generates a terabyte of supply chain Internet of Things (IoT) data in a day and processes 128,000 Helpdesk chats.

"Ultimately what we're trying to do is protect our data," Sexsmith explained. "It's no different from any other company."

Microsoft started with a "digital security strategy" to give a sense of how education affected the organization. "Employees want to know how their work relates to the broader strategy," he said. The approach covers assurance, identity management, device health, data and telemetry, information protection, and risk management, where education and awareness come into play.

"Humans are the firewall – the last line of defense for what we're doing," he added. Today's attacks have shifted to the individual, with a stronger focus on credential phishing and identity-based threats. The adversaries' level of sophistication has evolved, said Sexsmith, and the days of receiving emails with poor spelling and grammatical errors are over. "The attackers are getting smart just as we're increasing our technology and becoming smarter," he noted. 

Sexsmith took a deep dive into three aspects of Microsoft's education and awareness program: role-based security and compliance training, awareness campaigns, and information platforms where best practices, education, information, and protection are shared via company intranets.

Employees across the business are required to take three internal training courses: Standards of Business Conduct, Security Foundations, and Privacy 101. Some trainings are role-dependent; for example, engineers are required to take a technical security training course called Strike.

Motivation Is Key
The key challenge is creating an engaging, relatable training course that effectively teaches employees the concepts they need to know, Sexsmith said.

Sexsmith pointed to a few tricks he uses in his programs. One of these is the "Social Proof Theory," a social and psychological concept that describes how people copy other people's behavior – if your colleagues are doing a training, you'll do it, too. Gamification also helps: "People want to learn; people want to master skills, but there's also a competitive nature around that," he said. Some trainings use videos that make security concepts more accessible.

One problem, he said, is lessons that aren't reinforced aren't retained. Humans forget half of new information learned within an hour and 70% of new information within a day. "By lunchtime, you're going to forget 50% of the stuff I'm up here saying," he joked to his morning audience.

To fight this, Microsoft uses a training reinforcement platform called Elephants Don't Forget to help employees build muscle memory around new concepts. During the gap between trainings, the program sends participants two daily emails with a link to questions tailored to the course. They have 60 seconds to respond to each question; if they get it wrong, they're given more information on the topic. A customized dashboard shows their scores and progress over time.

"It's all about the engagement and staying with that until you master it, and that's when you become the most efficient," said Sexsmith.

Then there is the application of concepts, which is done through phishing simulations. "This is where the rubber meets the road," he added. Fake emails, designed to appear as though they come from Microsoft, give employees a chance to apply their new knowledge. They could click on an email and still have a chance to report it, or follow through and share their credentials.

In these test campaigns, Sexsmith blends personal and professional by creating themed awareness campaigns around Tax Day, spring cleaning, cybersecurity awareness month, and Black Friday. Cybercriminals do the same, and this helps employees gain a sense of different types of phishing emails they might see.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "Tense Talk About Supply Chain Risk Yields Few Answers."

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.