Download
tips to manage information security with training n.
Skip this Video
Loading SlideShow in 5 Seconds..
Tips to Manage Information Security with Training PowerPoint Presentation
Download Presentation
Tips to Manage Information Security with Training

Tips to Manage Information Security with Training

140 Views Download Presentation
Download Presentation

Tips to Manage Information Security with Training

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Tips to Manage Information Security with Training

  2. DID YOU KNOW?

  3. 93% of organizations in UK faced a security breach in 2012 Estimated losses: £450K to £850K Source: Source: Information Security Breaches Survey (2013)

  4. Source: Ponemon Institute Research Report 85% of organizations in US were victims of security breaches in 2012 Estimated losses; $1.4 to $46 million

  5. How Does Security Breach Happen?

  6. How Does Security Breach Happen? • Viruses, malwares, trojansetc • Intentional or unintentional breaches by employees • Loss of mobile devices containing data • SQL injection • Phishing • Cyber terrorism or espionage • Social engineering

  7. $ $ $ $ $ $ Billions are spent towards internet security technology by organizations… Human element is generally overlooked.

  8. 75% of security breaches are “inside jobs”

  9. (Source: Ponemon Institute Research Report) 39% of data breach is due to employee negligence

  10. What can organizations do to avert this adversity?

  11. Information Security Training Program

  12. Data loss Reduces Information Security Loss by 75%

  13. Safeguards employee interests as well as organizational interests

  14. Ensures regular positive reinforcement of the need for IT Security

  15. Elicits commitment towards information security from the employees

  16. Key topics to be covered during training

  17. Key topics to be covered during training • Physical security

  18. Key topics to be covered during training • Physical security • Desktop security

  19. Key topics to be covered during training • Physical security • Desktop security • Password security

  20. Key topics to be covered during training • Physical security • Desktop security • Password security • Wireless networks security

  21. Key topics to be covered during training • Physical security • Desktop security • Password security • Wireless networks security • Phishing

  22. Key topics to be covered during training • Physical security • Desktop security • Password security • Wireless networks security • Phishing • File sharing and copyright

  23. Key topics to be covered during training • Physical security • Desktop security • Password security • Wireless networks security • Phishing • File sharing and copyright • Steps to be taken in case of a threat

  24. Modes of Training

  25. Modes of Training •  Web-based training

  26. Modes of Training • Web-based training • Classroom training & workshops

  27. Modes of Training • Web-based training • Classroom training & workshops • Online resources on security policies

  28. Modes of Training • Web-based training • Classroom training & workshops • Online resources on security policies • Articles/posters/booklets/flyers Source: nie.edu.sg

  29. Modes of Training • Web-based training • Classroom training & workshops • Online resources on security policies • Articles/posters/booklets/flyers • Pop-up reminders on network/LMS

  30. Tips for IT Security training program

  31. Tips for IT Security training program Tip 1: Identification of threats

  32. Tips for IT Security training program Tip 2: • Ease of comprehension

  33. Tips for IT Security training program Tip 3: • Anecdotes, Real-Instances and Case studies

  34. Tips for IT Security training program Tip 4: • Management buy-in

  35. Tips for IT Security training program Tip 5: • Collective responsibility

  36. Conclusion

  37. Conclusion Lack of information and employee awareness is a major threat to Information Security. Well-thought out training program is the key to ensure that your organization’s data is protected and secured at all times.

  38. To read articles on similar topics, please visit blog.commlabindia.com