SlideShare a Scribd company logo
CYBER RESILIENCE:
ARE YOUR PEOPLE YOUR
MOST EFFECTIVE DEFENCE?
100 EXECUTIVES QUESTIONED
ALL RESPONSIBLE FOR SECURITY TRAINING
IN ORGANIZATIONS WITH 500+ EMPLOYEES
HERE’S WHAT THEY
TOLD US...
?
!BELIEVE AWARENESS
LEARNING IS IMPORTANT TO MINIMIZE
THE RISK OF SECURITY BREACHES
33%
RATE THEIR
AWARENESS
LEARNING AS
‘VERY EFFECTIVE’
WHERE ARE THE MAIN RISKS COMING FROM?
WHAT SHOULD THIS TRAINING LOOK LIKE?
BELIEVE INTENTIONAL
ATTACK BY EXTERNAL
HACKERS, CRIMINALS,
TERRORISTS OR ACTIVISTS
49%
45%
BELIEVE
UNINTENTIONAL
ERROR BY EMPLOYEES
OR CONTRACTORS
PROVIDING EFFECTIVE AWARENESS
LEARNING IS PARAMOUNT TO
AVOIDING ‘UNINTENTIONAL ERROR’!
ONGOING
AND
REGULAR
ONLY 46%OF ORGANIZATIONS
PROVIDE INFORMATION SECURITY AWARENESS
LEARNING BEYOND NEW STARTER INDUCTION
OR ANNUAL E-LEARNING COURSES
LEARNING
FOR ALL
ONLY HALF OF THE STAFF BODY HAVE
COMPLETED AN INFORMATION SECURITY
AWARENESS PROGRAM IN A QUARTER OF
UK ORGANIZATIONS
ENGAGING AND USE
MODERN TECHNIQUES
82%OF ORGANIZATIONS
STILL RELY ON COMPUTER
BASED E-LEARNING RATHER
THAN ENGAGING
TECHNIQUES SUCH AS
GAMES, SIMULATIONS
AND ANIMATIONS
RELEVANT AND
PERSONALIZED
LESS THAN HALF OF
ORGANIZATIONS
TAILOR TRAINING TO THE
INDIVIDUAL’S JOB ROLE
THE RESILIA AWARENESS LEARNING PROGRAM FOR ALL STAFF HELPS TO FILL CRITICAL KNOWLEDGE AND SKILLS
GAPS ACROSS ALL STAFF, ENABLING THEM TO MAKE THE RIGHT DECISIONS AT THE RIGHT TIME TO BETTER
PROTECT THEIR ORGANIZATION’S MOST VALUABLE AND SENSITIVE INFORMATION AND SYSTEMS
AXELOS, the AXELOS logo, the AXELOS swirl logo and RESILIATM
are registered trademarks of AXELOS Limited
99%
BUT ONLY
IN REDUCING THE CHANCE OF AN
INFORMATION SECURITY BREACH –
THE MINIMUM IT SHOULD BE
IN THE FACE OF CYBER THREATS
Find out more at axelos.com/RESILIA
CYBER
AWARE
EMPLOYEES
A WORKFORCE WHO HAVE
THE AWARENESS AND SKILLS TO
BETTER PROTECT ORGANIZATIONS’
MOST SENSITIVE AND VALUABLE
INFORMATION AND SYSTEMS
ALMOST HALF
BELIEVE IT
IS BECAUSE
OF HUMAN
ERROR
Research conducted by IPSOS MORI in Jan 2016

More Related Content

Viewers also liked

spring bed nomor 1
spring bed nomor 1spring bed nomor 1
spring bed nomor 1
surabaya spring
 
Seachefs Crew Appraisal
Seachefs Crew AppraisalSeachefs Crew Appraisal
Seachefs Crew AppraisalLukas Bader
 
Pig - Processing XML data
Pig - Processing XML dataPig - Processing XML data
Pig - Processing XML data
Ram Kedem
 
Zaini 2016 ph_d_journey_dynamics_template
Zaini 2016 ph_d_journey_dynamics_templateZaini 2016 ph_d_journey_dynamics_template
Zaini 2016 ph_d_journey_dynamics_template
Raafat Zaini
 
[FOSS4G KOREA 2014]Hadoop 상에서 MapReduce를 이용한 Spatial Big Data 집계와 시스템 구축
[FOSS4G KOREA 2014]Hadoop 상에서 MapReduce를 이용한 Spatial Big Data 집계와 시스템 구축[FOSS4G KOREA 2014]Hadoop 상에서 MapReduce를 이용한 Spatial Big Data 집계와 시스템 구축
[FOSS4G KOREA 2014]Hadoop 상에서 MapReduce를 이용한 Spatial Big Data 집계와 시스템 구축
Kwang Woo NAM
 
High Speed Continuous & Reliable Data Ingest into Hadoop
High Speed Continuous & Reliable Data Ingest into HadoopHigh Speed Continuous & Reliable Data Ingest into Hadoop
High Speed Continuous & Reliable Data Ingest into Hadoop
DataWorks Summit
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
Dr. Rajesh P Barnwal
 
MapReduce: A useful parallel tool that still has room for improvement
MapReduce: A useful parallel tool that still has room for improvementMapReduce: A useful parallel tool that still has room for improvement
MapReduce: A useful parallel tool that still has room for improvement
Kyong-Ha Lee
 
KIISE:SIGDB Workshop presentation.
KIISE:SIGDB Workshop presentation.KIISE:SIGDB Workshop presentation.
KIISE:SIGDB Workshop presentation.
Kyong-Ha Lee
 
Centralized logging with Flume
Centralized logging with FlumeCentralized logging with Flume
Centralized logging with Flume
Ratnakar Pawar
 

Viewers also liked (12)

spring bed nomor 1
spring bed nomor 1spring bed nomor 1
spring bed nomor 1
 
Seachefs Crew Appraisal
Seachefs Crew AppraisalSeachefs Crew Appraisal
Seachefs Crew Appraisal
 
Pig - Processing XML data
Pig - Processing XML dataPig - Processing XML data
Pig - Processing XML data
 
Zaini 2016 ph_d_journey_dynamics_template
Zaini 2016 ph_d_journey_dynamics_templateZaini 2016 ph_d_journey_dynamics_template
Zaini 2016 ph_d_journey_dynamics_template
 
[FOSS4G KOREA 2014]Hadoop 상에서 MapReduce를 이용한 Spatial Big Data 집계와 시스템 구축
[FOSS4G KOREA 2014]Hadoop 상에서 MapReduce를 이용한 Spatial Big Data 집계와 시스템 구축[FOSS4G KOREA 2014]Hadoop 상에서 MapReduce를 이용한 Spatial Big Data 집계와 시스템 구축
[FOSS4G KOREA 2014]Hadoop 상에서 MapReduce를 이용한 Spatial Big Data 집계와 시스템 구축
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 
High Speed Continuous & Reliable Data Ingest into Hadoop
High Speed Continuous & Reliable Data Ingest into HadoopHigh Speed Continuous & Reliable Data Ingest into Hadoop
High Speed Continuous & Reliable Data Ingest into Hadoop
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
RESEARCH PROPASAL
RESEARCH PROPASALRESEARCH PROPASAL
RESEARCH PROPASAL
 
MapReduce: A useful parallel tool that still has room for improvement
MapReduce: A useful parallel tool that still has room for improvementMapReduce: A useful parallel tool that still has room for improvement
MapReduce: A useful parallel tool that still has room for improvement
 
KIISE:SIGDB Workshop presentation.
KIISE:SIGDB Workshop presentation.KIISE:SIGDB Workshop presentation.
KIISE:SIGDB Workshop presentation.
 
Centralized logging with Flume
Centralized logging with FlumeCentralized logging with Flume
Centralized logging with Flume
 

Similar to Cyber Resilience - Are your people your most effective defence? - Infographic

The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
Scalar Decisions
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
Accenture Insurance
 
Women Safety in Corporates
Women Safety in CorporatesWomen Safety in Corporates
Women Safety in Corporates
vishal saurav
 
Women safety in corporates
Women safety in corporatesWomen safety in corporates
Women safety in corporates
vishal saurav
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016
Bryan Smith
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
Seqrite
 
Information Management: An Oxymoron
Information Management: An OxymoronInformation Management: An Oxymoron
Information Management: An Oxymoron
John Mancini
 
Insider threats
Insider threatsInsider threats
Insider threats
izoologic
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
Craig McGill
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
accenture
 
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdftrellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
w2sdvzdjtz
 
Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ? Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ?
Positive Hack Days
 
Cyber-Attack and Security: Putting the Audit Committee on High Alert
Cyber-Attack and Security: Putting the Audit Committee on High AlertCyber-Attack and Security: Putting the Audit Committee on High Alert
Cyber-Attack and Security: Putting the Audit Committee on High Alert
Symptai Consulting Limited
 
How to Secure Your Small Business from Cyber Threats
How to Secure Your Small Business from Cyber ThreatsHow to Secure Your Small Business from Cyber Threats
How to Secure Your Small Business from Cyber Threats
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior Analytics
Veriato
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
Accenture Insurance
 

Similar to Cyber Resilience - Are your people your most effective defence? - Infographic (16)

The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
Women Safety in Corporates
Women Safety in CorporatesWomen Safety in Corporates
Women Safety in Corporates
 
Women safety in corporates
Women safety in corporatesWomen safety in corporates
Women safety in corporates
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
 
Information Management: An Oxymoron
Information Management: An OxymoronInformation Management: An Oxymoron
Information Management: An Oxymoron
 
Insider threats
Insider threatsInsider threats
Insider threats
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
 
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdftrellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
 
Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ? Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ?
 
Cyber-Attack and Security: Putting the Audit Committee on High Alert
Cyber-Attack and Security: Putting the Audit Committee on High AlertCyber-Attack and Security: Putting the Audit Committee on High Alert
Cyber-Attack and Security: Putting the Audit Committee on High Alert
 
How to Secure Your Small Business from Cyber Threats
How to Secure Your Small Business from Cyber ThreatsHow to Secure Your Small Business from Cyber Threats
How to Secure Your Small Business from Cyber Threats
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior Analytics
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 

More from AXELOS Global Best Practice

AXELOS Facts & Figures
AXELOS Facts & FiguresAXELOS Facts & Figures
AXELOS Facts & Figures
AXELOS Global Best Practice
 
ITIL in India Infographic
ITIL in India InfographicITIL in India Infographic
ITIL in India Infographic
AXELOS Global Best Practice
 
PRINCE2 - White House Infographic
PRINCE2 - White House InfographicPRINCE2 - White House Infographic
PRINCE2 - White House Infographic
AXELOS Global Best Practice
 
Discover how agile can enhance your organization’s project delivery
Discover how agile can enhance your organization’s project deliveryDiscover how agile can enhance your organization’s project delivery
Discover how agile can enhance your organization’s project delivery
AXELOS Global Best Practice
 
The Principles of Effective P3 Governance - AXELOS Webinar
The Principles of Effective P3 Governance - AXELOS WebinarThe Principles of Effective P3 Governance - AXELOS Webinar
The Principles of Effective P3 Governance - AXELOS Webinar
AXELOS Global Best Practice
 
Project Manager - Skills Analysis
Project Manager - Skills AnalysisProject Manager - Skills Analysis
Project Manager - Skills Analysis
AXELOS Global Best Practice
 
Programme, Project & Portfolio Coordinator - Skills Analysis
Programme, Project & Portfolio Coordinator - Skills AnalysisProgramme, Project & Portfolio Coordinator - Skills Analysis
Programme, Project & Portfolio Coordinator - Skills Analysis
AXELOS Global Best Practice
 
Programme Manager/Director - Skills Analysis
Programme Manager/Director - Skills AnalysisProgramme Manager/Director - Skills Analysis
Programme Manager/Director - Skills Analysis
AXELOS Global Best Practice
 
IT Operations Manager - Skills Analysis
IT Operations Manager - Skills AnalysisIT Operations Manager - Skills Analysis
IT Operations Manager - Skills Analysis
AXELOS Global Best Practice
 
Chief Information Officer - Skills Analysis
Chief Information Officer - Skills AnalysisChief Information Officer - Skills Analysis
Chief Information Officer - Skills Analysis
AXELOS Global Best Practice
 
he Principles of Effective Project, Programme and Portfolio Management Govern...
he Principles of Effective Project, Programme and Portfolio Management Govern...he Principles of Effective Project, Programme and Portfolio Management Govern...
he Principles of Effective Project, Programme and Portfolio Management Govern...
AXELOS Global Best Practice
 
SIAM and ITIL® - AXELOS Webinar
SIAM and ITIL® - AXELOS WebinarSIAM and ITIL® - AXELOS Webinar
SIAM and ITIL® - AXELOS Webinar
AXELOS Global Best Practice
 
ITIL® and SIAM: An Example ITIL-based Model for Effective Service Integration...
ITIL® and SIAM: An Example ITIL-based Model for Effective Service Integration...ITIL® and SIAM: An Example ITIL-based Model for Effective Service Integration...
ITIL® and SIAM: An Example ITIL-based Model for Effective Service Integration...
AXELOS Global Best Practice
 
PRINCE2 Agile® - Why is Another Project Management Guide Needed? - Webinar
PRINCE2 Agile® - Why is Another Project Management Guide Needed? - WebinarPRINCE2 Agile® - Why is Another Project Management Guide Needed? - Webinar
PRINCE2 Agile® - Why is Another Project Management Guide Needed? - Webinar
AXELOS Global Best Practice
 
Newcastle University ITIL® Case Study - AXELOS Webinar
Newcastle University ITIL® Case Study - AXELOS WebinarNewcastle University ITIL® Case Study - AXELOS Webinar
Newcastle University ITIL® Case Study - AXELOS Webinar
AXELOS Global Best Practice
 
IT Service Management and Cloud Computing - AXELOS Webinar
IT Service Management and Cloud Computing - AXELOS WebinarIT Service Management and Cloud Computing - AXELOS Webinar
IT Service Management and Cloud Computing - AXELOS Webinar
AXELOS Global Best Practice
 
How to Drive Good Cars Badly---in the Wrong Direction - AXELOS Webinar
How to Drive Good Cars Badly---in the Wrong Direction - AXELOS WebinarHow to Drive Good Cars Badly---in the Wrong Direction - AXELOS Webinar
How to Drive Good Cars Badly---in the Wrong Direction - AXELOS Webinar
AXELOS Global Best Practice
 
Essex County Council's Journey to ITIL Maturity - Case Study
Essex County Council's Journey to ITIL Maturity - Case StudyEssex County Council's Journey to ITIL Maturity - Case Study
Essex County Council's Journey to ITIL Maturity - Case Study
AXELOS Global Best Practice
 

More from AXELOS Global Best Practice (18)

AXELOS Facts & Figures
AXELOS Facts & FiguresAXELOS Facts & Figures
AXELOS Facts & Figures
 
ITIL in India Infographic
ITIL in India InfographicITIL in India Infographic
ITIL in India Infographic
 
PRINCE2 - White House Infographic
PRINCE2 - White House InfographicPRINCE2 - White House Infographic
PRINCE2 - White House Infographic
 
Discover how agile can enhance your organization’s project delivery
Discover how agile can enhance your organization’s project deliveryDiscover how agile can enhance your organization’s project delivery
Discover how agile can enhance your organization’s project delivery
 
The Principles of Effective P3 Governance - AXELOS Webinar
The Principles of Effective P3 Governance - AXELOS WebinarThe Principles of Effective P3 Governance - AXELOS Webinar
The Principles of Effective P3 Governance - AXELOS Webinar
 
Project Manager - Skills Analysis
Project Manager - Skills AnalysisProject Manager - Skills Analysis
Project Manager - Skills Analysis
 
Programme, Project & Portfolio Coordinator - Skills Analysis
Programme, Project & Portfolio Coordinator - Skills AnalysisProgramme, Project & Portfolio Coordinator - Skills Analysis
Programme, Project & Portfolio Coordinator - Skills Analysis
 
Programme Manager/Director - Skills Analysis
Programme Manager/Director - Skills AnalysisProgramme Manager/Director - Skills Analysis
Programme Manager/Director - Skills Analysis
 
IT Operations Manager - Skills Analysis
IT Operations Manager - Skills AnalysisIT Operations Manager - Skills Analysis
IT Operations Manager - Skills Analysis
 
Chief Information Officer - Skills Analysis
Chief Information Officer - Skills AnalysisChief Information Officer - Skills Analysis
Chief Information Officer - Skills Analysis
 
he Principles of Effective Project, Programme and Portfolio Management Govern...
he Principles of Effective Project, Programme and Portfolio Management Govern...he Principles of Effective Project, Programme and Portfolio Management Govern...
he Principles of Effective Project, Programme and Portfolio Management Govern...
 
SIAM and ITIL® - AXELOS Webinar
SIAM and ITIL® - AXELOS WebinarSIAM and ITIL® - AXELOS Webinar
SIAM and ITIL® - AXELOS Webinar
 
ITIL® and SIAM: An Example ITIL-based Model for Effective Service Integration...
ITIL® and SIAM: An Example ITIL-based Model for Effective Service Integration...ITIL® and SIAM: An Example ITIL-based Model for Effective Service Integration...
ITIL® and SIAM: An Example ITIL-based Model for Effective Service Integration...
 
PRINCE2 Agile® - Why is Another Project Management Guide Needed? - Webinar
PRINCE2 Agile® - Why is Another Project Management Guide Needed? - WebinarPRINCE2 Agile® - Why is Another Project Management Guide Needed? - Webinar
PRINCE2 Agile® - Why is Another Project Management Guide Needed? - Webinar
 
Newcastle University ITIL® Case Study - AXELOS Webinar
Newcastle University ITIL® Case Study - AXELOS WebinarNewcastle University ITIL® Case Study - AXELOS Webinar
Newcastle University ITIL® Case Study - AXELOS Webinar
 
IT Service Management and Cloud Computing - AXELOS Webinar
IT Service Management and Cloud Computing - AXELOS WebinarIT Service Management and Cloud Computing - AXELOS Webinar
IT Service Management and Cloud Computing - AXELOS Webinar
 
How to Drive Good Cars Badly---in the Wrong Direction - AXELOS Webinar
How to Drive Good Cars Badly---in the Wrong Direction - AXELOS WebinarHow to Drive Good Cars Badly---in the Wrong Direction - AXELOS Webinar
How to Drive Good Cars Badly---in the Wrong Direction - AXELOS Webinar
 
Essex County Council's Journey to ITIL Maturity - Case Study
Essex County Council's Journey to ITIL Maturity - Case StudyEssex County Council's Journey to ITIL Maturity - Case Study
Essex County Council's Journey to ITIL Maturity - Case Study
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Cyber Resilience - Are your people your most effective defence? - Infographic

  • 1. CYBER RESILIENCE: ARE YOUR PEOPLE YOUR MOST EFFECTIVE DEFENCE? 100 EXECUTIVES QUESTIONED ALL RESPONSIBLE FOR SECURITY TRAINING IN ORGANIZATIONS WITH 500+ EMPLOYEES HERE’S WHAT THEY TOLD US... ? !BELIEVE AWARENESS LEARNING IS IMPORTANT TO MINIMIZE THE RISK OF SECURITY BREACHES 33% RATE THEIR AWARENESS LEARNING AS ‘VERY EFFECTIVE’ WHERE ARE THE MAIN RISKS COMING FROM? WHAT SHOULD THIS TRAINING LOOK LIKE? BELIEVE INTENTIONAL ATTACK BY EXTERNAL HACKERS, CRIMINALS, TERRORISTS OR ACTIVISTS 49% 45% BELIEVE UNINTENTIONAL ERROR BY EMPLOYEES OR CONTRACTORS PROVIDING EFFECTIVE AWARENESS LEARNING IS PARAMOUNT TO AVOIDING ‘UNINTENTIONAL ERROR’! ONGOING AND REGULAR ONLY 46%OF ORGANIZATIONS PROVIDE INFORMATION SECURITY AWARENESS LEARNING BEYOND NEW STARTER INDUCTION OR ANNUAL E-LEARNING COURSES LEARNING FOR ALL ONLY HALF OF THE STAFF BODY HAVE COMPLETED AN INFORMATION SECURITY AWARENESS PROGRAM IN A QUARTER OF UK ORGANIZATIONS ENGAGING AND USE MODERN TECHNIQUES 82%OF ORGANIZATIONS STILL RELY ON COMPUTER BASED E-LEARNING RATHER THAN ENGAGING TECHNIQUES SUCH AS GAMES, SIMULATIONS AND ANIMATIONS RELEVANT AND PERSONALIZED LESS THAN HALF OF ORGANIZATIONS TAILOR TRAINING TO THE INDIVIDUAL’S JOB ROLE THE RESILIA AWARENESS LEARNING PROGRAM FOR ALL STAFF HELPS TO FILL CRITICAL KNOWLEDGE AND SKILLS GAPS ACROSS ALL STAFF, ENABLING THEM TO MAKE THE RIGHT DECISIONS AT THE RIGHT TIME TO BETTER PROTECT THEIR ORGANIZATION’S MOST VALUABLE AND SENSITIVE INFORMATION AND SYSTEMS AXELOS, the AXELOS logo, the AXELOS swirl logo and RESILIATM are registered trademarks of AXELOS Limited 99% BUT ONLY IN REDUCING THE CHANCE OF AN INFORMATION SECURITY BREACH – THE MINIMUM IT SHOULD BE IN THE FACE OF CYBER THREATS Find out more at axelos.com/RESILIA CYBER AWARE EMPLOYEES A WORKFORCE WHO HAVE THE AWARENESS AND SKILLS TO BETTER PROTECT ORGANIZATIONS’ MOST SENSITIVE AND VALUABLE INFORMATION AND SYSTEMS ALMOST HALF BELIEVE IT IS BECAUSE OF HUMAN ERROR Research conducted by IPSOS MORI in Jan 2016