SlideShare a Scribd company logo
1 of 37
© Terranova Worldwide Corporation 2019. All rights reserved.
Security Awareness Objectives & Metrics
An Overview and Discussion
Theo Zafirakos | CISO / Professional Services
© Terranova Worldwide Corporation 2019. All rights reserved.
Discussion Topics
• Strategic Goals
• Objectives, KPIs & Metrics
• Reporting & Optimizing
© Terranova Worldwide Corporation 2019. All rights reserved.
KPI
A key performance indicator is used to measure program performance and success.
They should be aligned to the objectives of the program.
Metric
A metric is a number within a KPI that helps track the progress and performance of
the program.
All KPIs are metrics, but not all metrics are KPIs.
Definitions – KPI vs Metric
© Terranova Worldwide Corporation 2019. All rights reserved.
Strategic Goals
© Terranova Worldwide Corporation 2019. All rights reserved.
Implementing a Measurement Framework
© Terranova Worldwide Corporation 2018. All rights reserved.
5
Increase Awareness
Structured Learning
Testing and Verifications
Continuous Awareness
Measure
Ad hoc
messages
Newsletters
Fliers
Mandatory
CBTs
Role Based
Risk Based
Phishing
Simulations
Quiz
Audits
Reinforcement
Lunch-n-Learn
Micro- and
Nano-learnings
Objectives
KPIs
Metrics
© Terranova Worldwide Corporation 2019. All rights reserved.
Why are you deploying a security awareness program?
What are you trying to achieve?
• Strategic goals must clearly identify what you aim to achieve.
• Goals must be identified so a plan can be laid out with all the steps required get
there.
• Goals must be aligned with the Information Security program and even the business
strategy of the organization.
• Clearly defined goals will help decision makers approve and support your program.
Introduction
© Terranova Worldwide Corporation 2019. All rights reserved.
Have you defined security awareness strategic goals for your program?
• Yes, as part of the Information Security strategic goals
• Yes
• No
• I don't know
Poll Question 1
© Terranova Worldwide Corporation 2019. All rights reserved.
Your security awareness goals could be in
any or all of these three categories:
• Risks and Behaviors
• to reduce risk and foster behavioral
changes
• Security Culture
• to instill or reinforce a culture of
security
• Compliance Obligations
• to ensure compliance with your
organization’s security obligations
Strategic Goals
© Terranova Worldwide Corporation 2019. All rights reserved.
• Reduce human errors
• Encourage everyone at your organization
to adopt security best practices
• Reduce human-related security incidents
• Address the rapid changes in your
organization’s threat landscape
Strategic Goals – Risks and Behaviors
© Terranova Worldwide Corporation 2019. All rights reserved.
Risks and Behaviors
Minimize enterprise risks and costs from cybersecurity threats by empowering employees
with the motivation and knowledge they need to employ good behaviors.
Strategic Goals – Example 1
© Terranova Worldwide Corporation 2019. All rights reserved.
Strategic Goals – Security Culture
• Demonstrate the importance of
information security
• Mobilize managers to become security
and awareness ambassadors
• Change attitudes about towards security
• Get people to consider the security
implications of their actions
Opinions Beliefs
Views Feelings
Culture
© Terranova Worldwide Corporation 2019. All rights reserved.
Security Culture
Enable employees in making safe cyber security decisions in their day to day activities by
creating a security-aware culture.
Strategic Goals – Example 2
© Terranova Worldwide Corporation 2019. All rights reserved.
• Meet legal, regulatory, or industry awareness compliance obligations
• Fulfill contractual agreements regarding security and privacy awareness clauses
• Enforce organizational security policies and standards
Strategic Goals – Compliance Obligations
© Terranova Worldwide Corporation 2019. All rights reserved.
Compliance Obligations
Minimize corporate liability, risks and costs arising from non-compliance for the protection
of personal information or other regulated information.
Strategic Goals – Example 3
© Terranova Worldwide Corporation 2019. All rights reserved.
Clearly defined and concrete goals are essential.
They will allow you to plan strategically and to
develop an awareness program that is focused on
producing tangible results.
© Terranova Worldwide Corporation 2019. All rights reserved.
Objectives, KPIs & Metrics Program/ Campaign Results
Participation Rates
Metrics and KPIs DataMetrics and KPIsMetrics and KPIs
Participation RatesParticipation Rates
DataData
Program/ Campaign ResultsProgram/ Campaign Results
© Terranova Worldwide Corporation 2019. All rights reserved.
An LMS can be used to measure the participation rate to online training activities and to
determine the percentage of users who have completed the courses successfully.
Examples of metrics
• % of participation per course
• % completion per course
• % failed by course
• % not completed by course
• % not started by course
Online Training
© Terranova Worldwide Corporation 2019. All rights reserved.
• The only metric we need to capture is how many persons completed the
mandatory on-line training.
Most Common Mistake
This does not demonstrate whether or
not the students understand the
materials, or if they are putting what
they learned into practice.
© Terranova Worldwide Corporation 2019. All rights reserved.
• Once the program’s long-term strategic goals have been defined, specific objectives for
each of the campaigns must be determined.
• A program consists of several smaller campaigns, each designed to meet its own set of
objectives.
• Enough time to measure campaign success and implement an action plan if objectives
and goals are not met.
Campaign Objectives
© Terranova Worldwide Corporation 2019. All rights reserved.
Objective – Training Participation
© Terranova Worldwide Corporation 2018. All rights reserved.
20
KPI Metric Effectiveness Indicator
Users are aware of cyber
security risks and controls
Percentage of participants
who have completed
training
Increase in attendance
© Terranova Worldwide Corporation 2019. All rights reserved.
© Terranova Worldwide Corporation 2019. All rights reserved.
How often do you track online course participation statistics?
• Several times throughout the campaign.
• Only at the end of the campaign.
• When management requests participation reports.
• Once a year.
• We don't track or capture participation statistics.
Poll Question 2
© Terranova Worldwide Corporation 2019. All rights reserved.
Measures are identified in three areas:
• Compliance: Report on how many users have assisted in awareness activities to
demonstrate that the program is being followed by the users.
• Behavior/Knowledge: Report on what knowledge the users have retained as a result of
awareness activities.
• Culture: Report on whether users are applying what they learned in the awareness
activities.
KPIs
© Terranova Worldwide Corporation 2019. All rights reserved.
Objective – Defend Against Phishing
© Terranova Worldwide Corporation 2018. All rights reserved.
24
Users are aware of cyber
security risks and controls
Percentage of participants
who have completed
training
Increase in attendance
Compliance Behavior Culture
KPI
Metric
Effectiveness
Indicator
All employees have
received training on the
Phishing attack method
Training participation
rates
Increase in the number of
users that participate to
online training
Reduction in the number
of incidents that result
from an email attack
Recorded malware
infections or other
incidents as a result of
phishing
Reduction in the number
of users that opened
attachments in real or
simulated phishing
attempts
Increase in number of
employees report
phishing activity to the
Service Desk
Reported phishing attacks
(e.g. simulations)
Increase in the number of
users who reported real
or simulated phishing
attempts
© Terranova Worldwide Corporation 2019. All rights reserved.
Objective – Comply with Privacy Regulations
© Terranova Worldwide Corporation 2018. All rights reserved.
25
Users are aware of cyber
security risks and controls
Percentage of participants
who have completed
training
Increase in attendance
Compliance Behavior Culture
KPI
Metric
Effectiveness
Indicator
Employees are informed
on privacy principles,
laws and regulations
Number of employees
who have completed the
training on time
Decrease in the number
of follow-ups required
to achieve 100%
participation
Personal information is
handled in accordance to
privacy principles, laws
and regulations
Number of violations
related to privacy
regulations
Decrease in the number
of incidents or complaints
Employees take
responsibility for the
protection of personal
data
Number of
questions/notifications
that may have prevented
a data breach
Increase in the number of
inquiries related to the
proper protection of
regulated data
© Terranova Worldwide Corporation 2019. All rights reserved.
• Time required to recover an infected computer
• Time spent handling security incident related calls handled by the Service Desk or Security
Operations
• Unproductive time spent waiting for a computer to be recovered
• Time required to recover an infected server
• Productivity impact and revenue loss if a critical server is infected
• Time required to restore an encrypted file share
• Reputation and client confidence loss
Return on Investment (ROI)
© Terranova Worldwide Corporation 2019. All rights reserved.
Which subjective indicators are useful in observing that security behaviors are improving?
• Office chatter about the security awareness program
• Local information security representatives start to surface in various regions or departments
• Informal discussions are occurring about topics within the security awareness program
• Senior management supports information security program
• None of the above
Poll Question 3
© Terranova Worldwide Corporation 2019. All rights reserved.
Compare results to objectives
Goal
Objective
Measure
Activities Activities Activities
Measure
Activities Activities
Objective
Measure
Activities Activities
Unexpected
Positive or
Negative effect
© Terranova Worldwide Corporation 2019. All rights reserved.
• Associate a specific objective with each KPI
• Allow some time to measure progress (positive or negative)
• Do not select KPIs that require significant effort to implement or collect
• Focus on metrics to measure that are the most relevant
• Report and act on the results
Considerations
© Terranova Worldwide Corporation 2019. All rights reserved.
• How often do you report program KPIs and metrics?
• To who do you report program performance?
• How often do you adjust selected KPIs and target objectives?
Considerations
© Terranova Worldwide Corporation 2019. All rights reserved.
Typical activities:
• Analyze metrics
• Compare results with campaign objectives and program goals
• Identify improvement opportunities
• Identify new objectives
• Conduct a post-mortem meeting
Optimize – How do you optimize your program?
© Terranova Worldwide Corporation 2019. All rights reserved.
• Metrics and KPIs should be tracked prior to program/campaign deployment
to set a baseline against which future results will be compared.
• Participation rates should be monitored as soon as online training is
launched, and on an ongoing basis to track progress and trends.
• Give your program enough time to track culture and behavior improvements
(1 year or more).
Summary
© Terranova Worldwide Corporation 2019. All rights reserved.
Example metrics 1
© Terranova Worldwide Corporation 2018. All rights reserved.
33
Topic Objectives Metrics Mode of Measure
xx% of employees that acquired
the required knowledge during the
introduction (score > xx%)
Post-training Quiz
xx% of employees who completed
the course within the time limit
LMS reports
xx% of employees satisfied with
course content (satisfaction rating
> x)
Satisfaction Survey
Email
Reduce the risk of information leakage
/ data breach through email
Decrease the number of
occurrences of business messages
sent to a personal email (Gmail,
Yahoo, etc.) (baseline vs post-
training)
Survey
Audits
xx% of employees that know how
to create passwords that follow
the guidelines
Survey
xx% of employees that create
passwords that follow the
guidelines
Audits
Introductions to Information Security
Introduction
Employees have a basic understanding
of information security
Passwords
Ensure access to business information
and technology is secured with strong
passwords
© Terranova Worldwide Corporation 2019. All rights reserved.
Example metrics 2
© Terranova Worldwide Corporation 2018. All rights reserved.
34
Topic Objectives Metrics Mode of Measure
Reduction in the number of
instances employees use the
Internet for personal purposes
Audit
HTTP Logs
Reduction in the number of
instances employees download
files from the Internet for personal
purposes
Audit
HTTP Logs
Reduction in the number of
employees who post proprietary,
personal content or sensitive
information on the web
Audit
Reported incidents
Reduction in corporate bandwidth
usage by employees streaming
media online
Survey
Audit (network traffic)
Confidentiality on the Web
Reduce the number of corporate
system or data compromises as a
result of unsafe web surfing behaviors
% of sample employees know
features of a secure web page
when conducting financial
transactions or posting personal or
confidential information
Phishing simulations
Survey
Internet
Responsible Use of the Internet at Work
Reduce the number of policy
violations related to acceptable use of
the corporate Internet service
© Terranova Worldwide Corporation 2019. All rights reserved.
HOW DOES YOUR CLICK RATE STACK UP?
Register for The Gone Phishing Tournament
today to find out.
October 2019
FREE REGISTRATION (Tournament will take place on week of October 21st)
TerranovaSecurity.com/GonePhishingTournament
© Terranova Worldwide Corporation 2019. All rights reserved.
Questions
© Terranova Worldwide Corporation 2019. All rights reserved.

More Related Content

What's hot

Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills AuditVilius Benetis
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterTuan Phan
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Cobit 5 for Information Security
Cobit 5 for Information SecurityCobit 5 for Information Security
Cobit 5 for Information SecuritySeto Joseles
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCPECB
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
Bcm Framework PowerPoint Presentation Slides
Bcm Framework PowerPoint Presentation SlidesBcm Framework PowerPoint Presentation Slides
Bcm Framework PowerPoint Presentation SlidesSlideTeam
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationPriyanka Aash
 
Intelligent security operations a staffing guide
Intelligent security operations   a staffing guideIntelligent security operations   a staffing guide
Intelligent security operations a staffing guideColleen Johnson
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
 

What's hot (20)

Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
 
CompTIA Security+.pptx
CompTIA Security+.pptxCompTIA Security+.pptx
CompTIA Security+.pptx
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Cobit 5 for Information Security
Cobit 5 for Information SecurityCobit 5 for Information Security
Cobit 5 for Information Security
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRC
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Bcm Framework PowerPoint Presentation Slides
Bcm Framework PowerPoint Presentation SlidesBcm Framework PowerPoint Presentation Slides
Bcm Framework PowerPoint Presentation Slides
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
Intelligent security operations a staffing guide
Intelligent security operations   a staffing guideIntelligent security operations   a staffing guide
Intelligent security operations a staffing guide
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 

Similar to How To Set Security Awareness Strategic Goals, KPIs and Metrics

Beijaflore inc. white paper IT compliance program v1.0
Beijaflore inc. white paper   IT compliance program v1.0Beijaflore inc. white paper   IT compliance program v1.0
Beijaflore inc. white paper IT compliance program v1.0Maxime de Jabrun
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
Building safety from compliance to culture: How can railroads make the digita...
Building safety from compliance to culture: How can railroads make the digita...Building safety from compliance to culture: How can railroads make the digita...
Building safety from compliance to culture: How can railroads make the digita...CloudMoyo
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance MonitoringControlCase
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...DVV Solutions Third Party Risk Management
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliantTrustArc
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-managementAmit Bhargava
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1ControlCase
 
wkshp26mar19_presentation.pdf
wkshp26mar19_presentation.pdfwkshp26mar19_presentation.pdf
wkshp26mar19_presentation.pdfMeirZushnov1
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud SureCloud
 
CISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programsCISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programsCISOSHARE
 
Hey Nineteen: Procurement’s Playbook for 2019
Hey Nineteen: Procurement’s Playbook for 2019Hey Nineteen: Procurement’s Playbook for 2019
Hey Nineteen: Procurement’s Playbook for 2019Zycus
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceChristian F. Nissen
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate PresentationInvestorSymantec
 
2014 Navvia ITSM Survey Industry Results
2014 Navvia ITSM Survey Industry Results2014 Navvia ITSM Survey Industry Results
2014 Navvia ITSM Survey Industry ResultsNavvia
 

Similar to How To Set Security Awareness Strategic Goals, KPIs and Metrics (20)

Beijaflore inc. white paper IT compliance program v1.0
Beijaflore inc. white paper   IT compliance program v1.0Beijaflore inc. white paper   IT compliance program v1.0
Beijaflore inc. white paper IT compliance program v1.0
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
Building safety from compliance to culture: How can railroads make the digita...
Building safety from compliance to culture: How can railroads make the digita...Building safety from compliance to culture: How can railroads make the digita...
Building safety from compliance to culture: How can railroads make the digita...
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
wkshp26mar19_presentation.pdf
wkshp26mar19_presentation.pdfwkshp26mar19_presentation.pdf
wkshp26mar19_presentation.pdf
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud How to Centre your PCI Programme Around your Business Objective - SureCloud
How to Centre your PCI Programme Around your Business Objective - SureCloud
 
CISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programsCISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programs
 
2020 IIS global concerns report
2020 IIS global concerns report2020 IIS global concerns report
2020 IIS global concerns report
 
Hey Nineteen: Procurement’s Playbook for 2019
Hey Nineteen: Procurement’s Playbook for 2019Hey Nineteen: Procurement’s Playbook for 2019
Hey Nineteen: Procurement’s Playbook for 2019
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate Presentation
 
2014 Navvia ITSM Survey Industry Results
2014 Navvia ITSM Survey Industry Results2014 Navvia ITSM Survey Industry Results
2014 Navvia ITSM Survey Industry Results
 

Recently uploaded

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 

Recently uploaded (20)

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

How To Set Security Awareness Strategic Goals, KPIs and Metrics

  • 1. © Terranova Worldwide Corporation 2019. All rights reserved. Security Awareness Objectives & Metrics An Overview and Discussion Theo Zafirakos | CISO / Professional Services
  • 2. © Terranova Worldwide Corporation 2019. All rights reserved. Discussion Topics • Strategic Goals • Objectives, KPIs & Metrics • Reporting & Optimizing
  • 3. © Terranova Worldwide Corporation 2019. All rights reserved. KPI A key performance indicator is used to measure program performance and success. They should be aligned to the objectives of the program. Metric A metric is a number within a KPI that helps track the progress and performance of the program. All KPIs are metrics, but not all metrics are KPIs. Definitions – KPI vs Metric
  • 4. © Terranova Worldwide Corporation 2019. All rights reserved. Strategic Goals
  • 5. © Terranova Worldwide Corporation 2019. All rights reserved. Implementing a Measurement Framework © Terranova Worldwide Corporation 2018. All rights reserved. 5 Increase Awareness Structured Learning Testing and Verifications Continuous Awareness Measure Ad hoc messages Newsletters Fliers Mandatory CBTs Role Based Risk Based Phishing Simulations Quiz Audits Reinforcement Lunch-n-Learn Micro- and Nano-learnings Objectives KPIs Metrics
  • 6. © Terranova Worldwide Corporation 2019. All rights reserved. Why are you deploying a security awareness program? What are you trying to achieve? • Strategic goals must clearly identify what you aim to achieve. • Goals must be identified so a plan can be laid out with all the steps required get there. • Goals must be aligned with the Information Security program and even the business strategy of the organization. • Clearly defined goals will help decision makers approve and support your program. Introduction
  • 7. © Terranova Worldwide Corporation 2019. All rights reserved. Have you defined security awareness strategic goals for your program? • Yes, as part of the Information Security strategic goals • Yes • No • I don't know Poll Question 1
  • 8. © Terranova Worldwide Corporation 2019. All rights reserved. Your security awareness goals could be in any or all of these three categories: • Risks and Behaviors • to reduce risk and foster behavioral changes • Security Culture • to instill or reinforce a culture of security • Compliance Obligations • to ensure compliance with your organization’s security obligations Strategic Goals
  • 9. © Terranova Worldwide Corporation 2019. All rights reserved. • Reduce human errors • Encourage everyone at your organization to adopt security best practices • Reduce human-related security incidents • Address the rapid changes in your organization’s threat landscape Strategic Goals – Risks and Behaviors
  • 10. © Terranova Worldwide Corporation 2019. All rights reserved. Risks and Behaviors Minimize enterprise risks and costs from cybersecurity threats by empowering employees with the motivation and knowledge they need to employ good behaviors. Strategic Goals – Example 1
  • 11. © Terranova Worldwide Corporation 2019. All rights reserved. Strategic Goals – Security Culture • Demonstrate the importance of information security • Mobilize managers to become security and awareness ambassadors • Change attitudes about towards security • Get people to consider the security implications of their actions Opinions Beliefs Views Feelings Culture
  • 12. © Terranova Worldwide Corporation 2019. All rights reserved. Security Culture Enable employees in making safe cyber security decisions in their day to day activities by creating a security-aware culture. Strategic Goals – Example 2
  • 13. © Terranova Worldwide Corporation 2019. All rights reserved. • Meet legal, regulatory, or industry awareness compliance obligations • Fulfill contractual agreements regarding security and privacy awareness clauses • Enforce organizational security policies and standards Strategic Goals – Compliance Obligations
  • 14. © Terranova Worldwide Corporation 2019. All rights reserved. Compliance Obligations Minimize corporate liability, risks and costs arising from non-compliance for the protection of personal information or other regulated information. Strategic Goals – Example 3
  • 15. © Terranova Worldwide Corporation 2019. All rights reserved. Clearly defined and concrete goals are essential. They will allow you to plan strategically and to develop an awareness program that is focused on producing tangible results.
  • 16. © Terranova Worldwide Corporation 2019. All rights reserved. Objectives, KPIs & Metrics Program/ Campaign Results Participation Rates Metrics and KPIs DataMetrics and KPIsMetrics and KPIs Participation RatesParticipation Rates DataData Program/ Campaign ResultsProgram/ Campaign Results
  • 17. © Terranova Worldwide Corporation 2019. All rights reserved. An LMS can be used to measure the participation rate to online training activities and to determine the percentage of users who have completed the courses successfully. Examples of metrics • % of participation per course • % completion per course • % failed by course • % not completed by course • % not started by course Online Training
  • 18. © Terranova Worldwide Corporation 2019. All rights reserved. • The only metric we need to capture is how many persons completed the mandatory on-line training. Most Common Mistake This does not demonstrate whether or not the students understand the materials, or if they are putting what they learned into practice.
  • 19. © Terranova Worldwide Corporation 2019. All rights reserved. • Once the program’s long-term strategic goals have been defined, specific objectives for each of the campaigns must be determined. • A program consists of several smaller campaigns, each designed to meet its own set of objectives. • Enough time to measure campaign success and implement an action plan if objectives and goals are not met. Campaign Objectives
  • 20. © Terranova Worldwide Corporation 2019. All rights reserved. Objective – Training Participation © Terranova Worldwide Corporation 2018. All rights reserved. 20 KPI Metric Effectiveness Indicator Users are aware of cyber security risks and controls Percentage of participants who have completed training Increase in attendance
  • 21. © Terranova Worldwide Corporation 2019. All rights reserved.
  • 22. © Terranova Worldwide Corporation 2019. All rights reserved. How often do you track online course participation statistics? • Several times throughout the campaign. • Only at the end of the campaign. • When management requests participation reports. • Once a year. • We don't track or capture participation statistics. Poll Question 2
  • 23. © Terranova Worldwide Corporation 2019. All rights reserved. Measures are identified in three areas: • Compliance: Report on how many users have assisted in awareness activities to demonstrate that the program is being followed by the users. • Behavior/Knowledge: Report on what knowledge the users have retained as a result of awareness activities. • Culture: Report on whether users are applying what they learned in the awareness activities. KPIs
  • 24. © Terranova Worldwide Corporation 2019. All rights reserved. Objective – Defend Against Phishing © Terranova Worldwide Corporation 2018. All rights reserved. 24 Users are aware of cyber security risks and controls Percentage of participants who have completed training Increase in attendance Compliance Behavior Culture KPI Metric Effectiveness Indicator All employees have received training on the Phishing attack method Training participation rates Increase in the number of users that participate to online training Reduction in the number of incidents that result from an email attack Recorded malware infections or other incidents as a result of phishing Reduction in the number of users that opened attachments in real or simulated phishing attempts Increase in number of employees report phishing activity to the Service Desk Reported phishing attacks (e.g. simulations) Increase in the number of users who reported real or simulated phishing attempts
  • 25. © Terranova Worldwide Corporation 2019. All rights reserved. Objective – Comply with Privacy Regulations © Terranova Worldwide Corporation 2018. All rights reserved. 25 Users are aware of cyber security risks and controls Percentage of participants who have completed training Increase in attendance Compliance Behavior Culture KPI Metric Effectiveness Indicator Employees are informed on privacy principles, laws and regulations Number of employees who have completed the training on time Decrease in the number of follow-ups required to achieve 100% participation Personal information is handled in accordance to privacy principles, laws and regulations Number of violations related to privacy regulations Decrease in the number of incidents or complaints Employees take responsibility for the protection of personal data Number of questions/notifications that may have prevented a data breach Increase in the number of inquiries related to the proper protection of regulated data
  • 26. © Terranova Worldwide Corporation 2019. All rights reserved. • Time required to recover an infected computer • Time spent handling security incident related calls handled by the Service Desk or Security Operations • Unproductive time spent waiting for a computer to be recovered • Time required to recover an infected server • Productivity impact and revenue loss if a critical server is infected • Time required to restore an encrypted file share • Reputation and client confidence loss Return on Investment (ROI)
  • 27. © Terranova Worldwide Corporation 2019. All rights reserved. Which subjective indicators are useful in observing that security behaviors are improving? • Office chatter about the security awareness program • Local information security representatives start to surface in various regions or departments • Informal discussions are occurring about topics within the security awareness program • Senior management supports information security program • None of the above Poll Question 3
  • 28. © Terranova Worldwide Corporation 2019. All rights reserved. Compare results to objectives Goal Objective Measure Activities Activities Activities Measure Activities Activities Objective Measure Activities Activities Unexpected Positive or Negative effect
  • 29. © Terranova Worldwide Corporation 2019. All rights reserved. • Associate a specific objective with each KPI • Allow some time to measure progress (positive or negative) • Do not select KPIs that require significant effort to implement or collect • Focus on metrics to measure that are the most relevant • Report and act on the results Considerations
  • 30. © Terranova Worldwide Corporation 2019. All rights reserved. • How often do you report program KPIs and metrics? • To who do you report program performance? • How often do you adjust selected KPIs and target objectives? Considerations
  • 31. © Terranova Worldwide Corporation 2019. All rights reserved. Typical activities: • Analyze metrics • Compare results with campaign objectives and program goals • Identify improvement opportunities • Identify new objectives • Conduct a post-mortem meeting Optimize – How do you optimize your program?
  • 32. © Terranova Worldwide Corporation 2019. All rights reserved. • Metrics and KPIs should be tracked prior to program/campaign deployment to set a baseline against which future results will be compared. • Participation rates should be monitored as soon as online training is launched, and on an ongoing basis to track progress and trends. • Give your program enough time to track culture and behavior improvements (1 year or more). Summary
  • 33. © Terranova Worldwide Corporation 2019. All rights reserved. Example metrics 1 © Terranova Worldwide Corporation 2018. All rights reserved. 33 Topic Objectives Metrics Mode of Measure xx% of employees that acquired the required knowledge during the introduction (score > xx%) Post-training Quiz xx% of employees who completed the course within the time limit LMS reports xx% of employees satisfied with course content (satisfaction rating > x) Satisfaction Survey Email Reduce the risk of information leakage / data breach through email Decrease the number of occurrences of business messages sent to a personal email (Gmail, Yahoo, etc.) (baseline vs post- training) Survey Audits xx% of employees that know how to create passwords that follow the guidelines Survey xx% of employees that create passwords that follow the guidelines Audits Introductions to Information Security Introduction Employees have a basic understanding of information security Passwords Ensure access to business information and technology is secured with strong passwords
  • 34. © Terranova Worldwide Corporation 2019. All rights reserved. Example metrics 2 © Terranova Worldwide Corporation 2018. All rights reserved. 34 Topic Objectives Metrics Mode of Measure Reduction in the number of instances employees use the Internet for personal purposes Audit HTTP Logs Reduction in the number of instances employees download files from the Internet for personal purposes Audit HTTP Logs Reduction in the number of employees who post proprietary, personal content or sensitive information on the web Audit Reported incidents Reduction in corporate bandwidth usage by employees streaming media online Survey Audit (network traffic) Confidentiality on the Web Reduce the number of corporate system or data compromises as a result of unsafe web surfing behaviors % of sample employees know features of a secure web page when conducting financial transactions or posting personal or confidential information Phishing simulations Survey Internet Responsible Use of the Internet at Work Reduce the number of policy violations related to acceptable use of the corporate Internet service
  • 35. © Terranova Worldwide Corporation 2019. All rights reserved. HOW DOES YOUR CLICK RATE STACK UP? Register for The Gone Phishing Tournament today to find out. October 2019 FREE REGISTRATION (Tournament will take place on week of October 21st) TerranovaSecurity.com/GonePhishingTournament
  • 36. © Terranova Worldwide Corporation 2019. All rights reserved. Questions
  • 37. © Terranova Worldwide Corporation 2019. All rights reserved.

Editor's Notes

  1. Behavior/Knowledge: Culture: Compliance:
  2. It is important to note whether your target audiences require both compliance and security awareness training: Compliance-specific awareness covers training on the policies and procedures required by a regulation with respect to protected information. Security awareness covers standard security policies and procedures to prevent, detect, contain and resolve security incidents.
  3. Poll Title: How often do you track online course participation statistics? https://www.polleverywhere.com/multiple_choice_polls/OeZTNUuD7OSbaKq
  4. Compliance: These metrics help organizations follow user participation and demonstrate that the awareness program is followed to internal and external stakeholders. Behavior/Knowledge: These metrics help determine if awareness activities are affective and adjust topics, format or frequency. Culture: These metrics help determine if users are motivated to apply what they have learned and helps organizations determine what communications or processes are required to emphasize the importance of information security.
  5. A security awareness program will not reduce the costs associated with an incident but will significantly reduce the likelihood of occurrence and increase the speed of detection.
  6. Practices, activities that we do Outputs, products provided Outcomes, results of usage of products by users Impacts, proof that outputs caused the outcomes
  7. Terranova Security has example metrics in all the categories, to help organizations select the ones most suitable for their objectives.
  8. The Gone Phishing TournamentTM is an annual, cyber security event open to security and risk management leaders The phishing tournament will provide true benchmarking statistics related to phishing simulations. Free Phishing Simulation Complimentary Global Benchmarking Report Personalized Click Rate Report