Information Security Outreach: Conversations & Conversions OHECC 2009 Thursday March 26, 2009. Agenda. Overview Modifying User Behavior Technology is [not] the Answer Targeted Dialogues Designing a Security Communication Plan Audiences Case Study References.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Information Security Outreach:Conversations & Conversions
March 26, 2009
Overlap of information security policy, procedure, standards development
High risk environment with long-term solutions
2 Unrelated Security Incidents led to:
Consolidation of information security messages
Focused project/policy efforts
Reduce highest risk areas with short-term & long-term solutionsOverview
“No plan survives contact with the enemy” Helmuth von Moltke the Elder
Target your communications to match the audience and you get not only a better impact but better understanding of the people you are protecting