Build a Security Awareness and Training Program

Your weakest link is between the keyboard and the chair.

Onsite Workshop

A poor or non-existent security awareness and training program will result in:

  • An increase of data breaches and security exploits caused by your employees.
  • Intellectual property and sensitive data being removed by threat actors and hackers.
  • Malware that will continue to proliferate on your devices and networks.

A formal and strategic security awareness and training program will result in:

  • A proactive workforce that keeps security as one of its top concerns.
  • A decrease in breaches of sensitive data exposed as a result of employee negligence.
  • Changed behavior to identify security threats and appropriately report them.

Module 1: Determine Your Security Awareness and Training Program Appropriateness

The Purpose

  • Identify your organization’s rationale for building an awareness and training program and articulate this in terms of appropriateness.
  • Build project support through documented benefits and objectives.
  • Determine what the business thinks of security.

Key Benefits Achieved

  • Identified contributing factors towards developing a security awareness and training program.
  • Gained program support.
  • Understanding of what the business thinks of security.

Activities: Outputs:
1.1 Assess your program appropriateness.
  • Defined program rationale and appropriateness
1.2 Document your need for a program.
1.3 Define your benefits and objectives for a program.
1.4 Gain an executive champion.
  • Executive Champion
1.5 Measure the business satisfaction with security.
  • Determined current business satisfaction with security

Module 2: Identify Your Content for Your Program

The Purpose

  • Evaluate your existing security policy suite as a basis for your awareness and training program.
  • Identify any missing security policies needed to provide a foundation and credibility to your program.
  • Identify any unique security topics that need to be addressed. 

Key Benefits Achieved

  • Developed a complete security policy suite to support your program.
  • Prioritized security topics to be trained on. 

Activities: Outputs:
2.1 Identify existing security topics and policies.
  • Identified and prioritized security policies and topics to be covered in the program
2.2 Identify missing security policies.
2.3 Identify unique security topics.
2.4 Prioritize your security topics.

Module 3: Determine How to Execute Your Plan

The Purpose

  • Develop program governing structures to ensure efficient program creation and maintenance.
  • Identify what your target state for security awareness and training is.
  • Identify and customize multiple communication methods for your program. 

Key Benefits Achieved

  • Effective program governance.
  • Defined program purpose.
  • Identified current and target state of end-user security awareness levels.
  • Customized communication methods that are unique to your organization’s needs. 

Activities: Outputs:
3.1 Develop program governance.
  • Project Charter
3.2 Perform a current state assessment of your end users.
3.3 Determine your target state.
  • Identified target state
3.4 Develop your communication methods.
  • Customized communication methods

Module 4: Implement Your Program

The Purpose

  • Implement the program in a controlled agile methodology.

Key Benefits Achieved

  • Effective rollout of security awareness program.
  • Identify potential issues early on. 

Activities: Outputs:
4.1 Create an implementation timeline.
  • Implementation timeline
4.2 Run a pilot program.
  • Pilot program
4.3 Develop a review and update process.
  • Completed planning

Workshop icon Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book a Workshop View Blueprint
GET HELP Contact Us
VL Methodology