We're All Winners--Gamification and Security Awareness

Security awareness expert | Content strategist | Professor | Introverted leadership mentor, coach | Speaker | Writer
Oct. 4, 2019
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
1 of 35

More Related Content

More from Ben Woelk, CISSP, CPTC

Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxCreating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxBen Woelk, CISSP, CPTC
Saying "Yes, and...?" to Leadership OpportunitiesSaying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesBen Woelk, CISSP, CPTC
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesBen Woelk, CISSP, CPTC
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessBen Woelk, CISSP, CPTC
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBen Woelk, CISSP, CPTC
Harnessing Your Innate Strengths--Introverted LeadershipHarnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipBen Woelk, CISSP, CPTC

More from Ben Woelk, CISSP, CPTC(20)

Recently uploaded

1. Introduction to human body.pptx1. Introduction to human body.pptx
1. Introduction to human body.pptxAbhiDabra
UNIT 2.pptxUNIT 2.pptx
UNIT 2.pptxPallawiBulakh1
Structured Query Language (SQL) _ Edu4Sure Training.pptxStructured Query Language (SQL) _ Edu4Sure Training.pptx
Structured Query Language (SQL) _ Edu4Sure Training.pptxEdu4Sure
The Parts of The SpeechPP.pdfThe Parts of The SpeechPP.pdf
The Parts of The SpeechPP.pdfNetziValdelomar1
WGPC Scoring Rubric TechSoup.pdfWGPC Scoring Rubric TechSoup.pdf
WGPC Scoring Rubric TechSoup.pdfTechSoup
Mass spectrometry- full lecture Mass spectrometry- full lecture
Mass spectrometry- full lecture DRZIAMUHAMMAD2

We're All Winners--Gamification and Security Awareness

Editor's Notes

  1. https://youtu.be/cRTaksvIpUg
  2. the application of typical elements of game playing (e.g. point scoring, competition with others, rules of play) to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service
  3. programmatic approach  not enough to communicate only about specific cyberattacks (gusts) as they occur