SlideShare a Scribd company logo
1 of 11
The Anatomy 
of a 
Security Culture Campaign 
The Security Culture Framework: https://scf.roer.com
Security Culture Campaign 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com 
Security 
Culture
The Security Culture Framework: https://scf.roer.com 
Security 
Culture 
The ideas, customs, and social 
behavior of a particular people or 
society that allows them to be free 
from danger or threats. 
Kai Roer, author
The Security Culture Framework: https://scf.roer.com 
Security 
Culture 
Knowing accepted use of technology, understanding 
why the policies are needed, and accepting to follow 
the rules in place. 
Rules and regulations in place to regulate how 
technology is being used. Creates a common frame 
of accepted use, and incentives to follow the rules. 
Must be trained, and supported by technology. 
Business enabler, as well as threat level increaser. 
Technology use should be regulated by policies, and 
staff must be trained.
People are different. 
Adapt to 
their 
needs! 
The Security Culture Framework: https://scf.roer.com
Your Goal! 
The Security Culture Framework: https://scf.roer.com
Security Culture Campaign 
Plan Execute Measure 
The Security Culture Framework: https://scf.roer.com
Security Culture Campaign 
Plan Execute Measure 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com
Feedback from the Campaign is fed back into 
the next campaign to build on the results. 
As culture is changed, the new culture emerges 
and feeds back into the program, creating a 
stronger culture each time. 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com 
1 
2
Security Culture Campaign 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com 
Security 
Culture
Download templates and join the 
community to discuss security culture 
https://scf.roer.com 
The Security Culture Framework: https://scf.roer.com

More Related Content

Similar to The Security culture campaign explained in 5 minutes

Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 
OL 325 Milestone One Guidelines and Rubric The Stra.docx
OL 325 Milestone One Guidelines and Rubric  The Stra.docxOL 325 Milestone One Guidelines and Rubric  The Stra.docx
OL 325 Milestone One Guidelines and Rubric The Stra.docxcherishwinsland
 
Most Effective Information Security and Risk Management Training
Most Effective Information Security and Risk Management TrainingMost Effective Information Security and Risk Management Training
Most Effective Information Security and Risk Management TrainingBryan Len
 
C2.0 2010 d lacallade presentation version
C2.0 2010 d lacallade presentation versionC2.0 2010 d lacallade presentation version
C2.0 2010 d lacallade presentation versionDawn Lacallade
 
MyData2018 - Making Responsible Technology the New normal
MyData2018 - Making Responsible Technology the New normalMyData2018 - Making Responsible Technology the New normal
MyData2018 - Making Responsible Technology the New normalLaura James
 
Content strategy in Technical Communications
Content strategy in Technical CommunicationsContent strategy in Technical Communications
Content strategy in Technical CommunicationsScriptorium Publishing
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Strategic Foresight From theory to practice in the MENA region Iran Focus
Strategic ForesightFrom theory to practice in the MENA region Iran FocusStrategic ForesightFrom theory to practice in the MENA region Iran Focus
Strategic Foresight From theory to practice in the MENA region Iran FocusVictor Motti
 
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...leonardjonh145
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)Seungjoo Kim
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 InviteJohn Weeks
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship jostiSandy Munnell
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Decisions
 
Software Engineering The Current Practice helps you learn bas.docx
Software Engineering The Current Practice helps you learn bas.docxSoftware Engineering The Current Practice helps you learn bas.docx
Software Engineering The Current Practice helps you learn bas.docxrronald3
 
SOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestSOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestCyber Security Academy
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterMichael Pranikoff
 
Jobs of the future
Jobs of the future Jobs of the future
Jobs of the future Oscar Ayala
 

Similar to The Security culture campaign explained in 5 minutes (20)

Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
OL 325 Milestone One Guidelines and Rubric The Stra.docx
OL 325 Milestone One Guidelines and Rubric  The Stra.docxOL 325 Milestone One Guidelines and Rubric  The Stra.docx
OL 325 Milestone One Guidelines and Rubric The Stra.docx
 
Bright future ahead in Cybersecurity
Bright future ahead in CybersecurityBright future ahead in Cybersecurity
Bright future ahead in Cybersecurity
 
Most Effective Information Security and Risk Management Training
Most Effective Information Security and Risk Management TrainingMost Effective Information Security and Risk Management Training
Most Effective Information Security and Risk Management Training
 
C2.0 2010 d lacallade presentation version
C2.0 2010 d lacallade presentation versionC2.0 2010 d lacallade presentation version
C2.0 2010 d lacallade presentation version
 
MyData2018 - Making Responsible Technology the New normal
MyData2018 - Making Responsible Technology the New normalMyData2018 - Making Responsible Technology the New normal
MyData2018 - Making Responsible Technology the New normal
 
Content strategy in Technical Communications
Content strategy in Technical CommunicationsContent strategy in Technical Communications
Content strategy in Technical Communications
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Strategic Foresight From theory to practice in the MENA region Iran Focus
Strategic ForesightFrom theory to practice in the MENA region Iran FocusStrategic ForesightFrom theory to practice in the MENA region Iran Focus
Strategic Foresight From theory to practice in the MENA region Iran Focus
 
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship josti
 
Caravan Studios Update for TechSoup Global Staff
Caravan Studios Update for TechSoup Global StaffCaravan Studios Update for TechSoup Global Staff
Caravan Studios Update for TechSoup Global Staff
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
 
Software Engineering The Current Practice helps you learn bas.docx
Software Engineering The Current Practice helps you learn bas.docxSoftware Engineering The Current Practice helps you learn bas.docx
Software Engineering The Current Practice helps you learn bas.docx
 
SOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestSOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | Best
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and Water
 
Culture of Security
Culture of SecurityCulture of Security
Culture of Security
 
Jobs of the future
Jobs of the future Jobs of the future
Jobs of the future
 

More from Kai Roer

Measuring security culture is different from counting employees
Measuring security culture is different from counting employeesMeasuring security culture is different from counting employees
Measuring security culture is different from counting employeesKai Roer
 
GDPR and Security Culture: Measuring effectiveness
GDPR and Security Culture: Measuring effectivenessGDPR and Security Culture: Measuring effectiveness
GDPR and Security Culture: Measuring effectivenessKai Roer
 
The Security Culture Conference 2016
The Security Culture Conference 2016 The Security Culture Conference 2016
The Security Culture Conference 2016 Kai Roer
 
Hacking You Mind - How you are being exploited by hackers of all sorts!
Hacking You Mind - How you are being exploited by hackers of all sorts!Hacking You Mind - How you are being exploited by hackers of all sorts!
Hacking You Mind - How you are being exploited by hackers of all sorts!Kai Roer
 
Selling security - understanding how mental patterns and bias impacts your me...
Selling security - understanding how mental patterns and bias impacts your me...Selling security - understanding how mental patterns and bias impacts your me...
Selling security - understanding how mental patterns and bias impacts your me...Kai Roer
 
The Active Listening Cheat Sheet
The Active Listening Cheat SheetThe Active Listening Cheat Sheet
The Active Listening Cheat SheetKai Roer
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security RulesKai Roer
 
Jci Viking Weekend 2009
Jci Viking Weekend 2009Jci Viking Weekend 2009
Jci Viking Weekend 2009Kai Roer
 

More from Kai Roer (8)

Measuring security culture is different from counting employees
Measuring security culture is different from counting employeesMeasuring security culture is different from counting employees
Measuring security culture is different from counting employees
 
GDPR and Security Culture: Measuring effectiveness
GDPR and Security Culture: Measuring effectivenessGDPR and Security Culture: Measuring effectiveness
GDPR and Security Culture: Measuring effectiveness
 
The Security Culture Conference 2016
The Security Culture Conference 2016 The Security Culture Conference 2016
The Security Culture Conference 2016
 
Hacking You Mind - How you are being exploited by hackers of all sorts!
Hacking You Mind - How you are being exploited by hackers of all sorts!Hacking You Mind - How you are being exploited by hackers of all sorts!
Hacking You Mind - How you are being exploited by hackers of all sorts!
 
Selling security - understanding how mental patterns and bias impacts your me...
Selling security - understanding how mental patterns and bias impacts your me...Selling security - understanding how mental patterns and bias impacts your me...
Selling security - understanding how mental patterns and bias impacts your me...
 
The Active Listening Cheat Sheet
The Active Listening Cheat SheetThe Active Listening Cheat Sheet
The Active Listening Cheat Sheet
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
 
Jci Viking Weekend 2009
Jci Viking Weekend 2009Jci Viking Weekend 2009
Jci Viking Weekend 2009
 

Recently uploaded

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 

Recently uploaded (20)

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 

The Security culture campaign explained in 5 minutes

  • 1. The Anatomy of a Security Culture Campaign The Security Culture Framework: https://scf.roer.com
  • 2. Security Culture Campaign Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com Security Culture
  • 3. The Security Culture Framework: https://scf.roer.com Security Culture The ideas, customs, and social behavior of a particular people or society that allows them to be free from danger or threats. Kai Roer, author
  • 4. The Security Culture Framework: https://scf.roer.com Security Culture Knowing accepted use of technology, understanding why the policies are needed, and accepting to follow the rules in place. Rules and regulations in place to regulate how technology is being used. Creates a common frame of accepted use, and incentives to follow the rules. Must be trained, and supported by technology. Business enabler, as well as threat level increaser. Technology use should be regulated by policies, and staff must be trained.
  • 5. People are different. Adapt to their needs! The Security Culture Framework: https://scf.roer.com
  • 6. Your Goal! The Security Culture Framework: https://scf.roer.com
  • 7. Security Culture Campaign Plan Execute Measure The Security Culture Framework: https://scf.roer.com
  • 8. Security Culture Campaign Plan Execute Measure Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com
  • 9. Feedback from the Campaign is fed back into the next campaign to build on the results. As culture is changed, the new culture emerges and feeds back into the program, creating a stronger culture each time. Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com 1 2
  • 10. Security Culture Campaign Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com Security Culture
  • 11. Download templates and join the community to discuss security culture https://scf.roer.com The Security Culture Framework: https://scf.roer.com