SlideShare a Scribd company logo
The Anatomy 
of a 
Security Culture Campaign 
The Security Culture Framework: https://scf.roer.com
Security Culture Campaign 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com 
Security 
Culture
The Security Culture Framework: https://scf.roer.com 
Security 
Culture 
The ideas, customs, and social 
behavior of a particular people or 
society that allows them to be free 
from danger or threats. 
Kai Roer, author
The Security Culture Framework: https://scf.roer.com 
Security 
Culture 
Knowing accepted use of technology, understanding 
why the policies are needed, and accepting to follow 
the rules in place. 
Rules and regulations in place to regulate how 
technology is being used. Creates a common frame 
of accepted use, and incentives to follow the rules. 
Must be trained, and supported by technology. 
Business enabler, as well as threat level increaser. 
Technology use should be regulated by policies, and 
staff must be trained.
People are different. 
Adapt to 
their 
needs! 
The Security Culture Framework: https://scf.roer.com
Your Goal! 
The Security Culture Framework: https://scf.roer.com
Security Culture Campaign 
Plan Execute Measure 
The Security Culture Framework: https://scf.roer.com
Security Culture Campaign 
Plan Execute Measure 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com
Feedback from the Campaign is fed back into 
the next campaign to build on the results. 
As culture is changed, the new culture emerges 
and feeds back into the program, creating a 
stronger culture each time. 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com 
1 
2
Security Culture Campaign 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com 
Security 
Culture
Download templates and join the 
community to discuss security culture 
https://scf.roer.com 
The Security Culture Framework: https://scf.roer.com

More Related Content

Similar to The Security culture campaign explained in 5 minutes

Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
E Hacking
 
OL 325 Milestone One Guidelines and Rubric The Stra.docx
OL 325 Milestone One Guidelines and Rubric  The Stra.docxOL 325 Milestone One Guidelines and Rubric  The Stra.docx
OL 325 Milestone One Guidelines and Rubric The Stra.docx
cherishwinsland
 
Bright future ahead in Cybersecurity
Bright future ahead in CybersecurityBright future ahead in Cybersecurity
Bright future ahead in Cybersecurity
Vaughan Olufemi ACIB, AICEN, ANIM
 
Most Effective Information Security and Risk Management Training
Most Effective Information Security and Risk Management TrainingMost Effective Information Security and Risk Management Training
Most Effective Information Security and Risk Management Training
Bryan Len
 
C2.0 2010 d lacallade presentation version
C2.0 2010 d lacallade presentation versionC2.0 2010 d lacallade presentation version
C2.0 2010 d lacallade presentation version
Dawn Lacallade
 
MyData2018 - Making Responsible Technology the New normal
MyData2018 - Making Responsible Technology the New normalMyData2018 - Making Responsible Technology the New normal
MyData2018 - Making Responsible Technology the New normal
Laura James
 
Content strategy in Technical Communications
Content strategy in Technical CommunicationsContent strategy in Technical Communications
Content strategy in Technical Communications
Scriptorium Publishing
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
 
Strategic Foresight From theory to practice in the MENA region Iran Focus
Strategic ForesightFrom theory to practice in the MENA region Iran FocusStrategic ForesightFrom theory to practice in the MENA region Iran Focus
Strategic Foresight From theory to practice in the MENA region Iran Focus
Victor Motti
 
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...
leonardjonh145
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)
Seungjoo Kim
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 InviteJohn Weeks
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship jostiSandy Munnell
 
Caravan Studios Update for TechSoup Global Staff
Caravan Studios Update for TechSoup Global StaffCaravan Studios Update for TechSoup Global Staff
Caravan Studios Update for TechSoup Global Staff
Caravan Studios, a division of TechSoup
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Decisions
 
Software Engineering The Current Practice helps you learn bas.docx
Software Engineering The Current Practice helps you learn bas.docxSoftware Engineering The Current Practice helps you learn bas.docx
Software Engineering The Current Practice helps you learn bas.docx
rronald3
 
SOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestSOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | Best
Cyber Security Academy
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and Water
Michael Pranikoff
 
Culture of Security
Culture of SecurityCulture of Security
Culture of Security
Flevy.com Best Practices
 
Jobs of the future
Jobs of the future Jobs of the future
Jobs of the future
Oscar Ayala
 

Similar to The Security culture campaign explained in 5 minutes (20)

Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
OL 325 Milestone One Guidelines and Rubric The Stra.docx
OL 325 Milestone One Guidelines and Rubric  The Stra.docxOL 325 Milestone One Guidelines and Rubric  The Stra.docx
OL 325 Milestone One Guidelines and Rubric The Stra.docx
 
Bright future ahead in Cybersecurity
Bright future ahead in CybersecurityBright future ahead in Cybersecurity
Bright future ahead in Cybersecurity
 
Most Effective Information Security and Risk Management Training
Most Effective Information Security and Risk Management TrainingMost Effective Information Security and Risk Management Training
Most Effective Information Security and Risk Management Training
 
C2.0 2010 d lacallade presentation version
C2.0 2010 d lacallade presentation versionC2.0 2010 d lacallade presentation version
C2.0 2010 d lacallade presentation version
 
MyData2018 - Making Responsible Technology the New normal
MyData2018 - Making Responsible Technology the New normalMyData2018 - Making Responsible Technology the New normal
MyData2018 - Making Responsible Technology the New normal
 
Content strategy in Technical Communications
Content strategy in Technical CommunicationsContent strategy in Technical Communications
Content strategy in Technical Communications
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Strategic Foresight From theory to practice in the MENA region Iran Focus
Strategic ForesightFrom theory to practice in the MENA region Iran FocusStrategic ForesightFrom theory to practice in the MENA region Iran Focus
Strategic Foresight From theory to practice in the MENA region Iran Focus
 
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...
 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship josti
 
Caravan Studios Update for TechSoup Global Staff
Caravan Studios Update for TechSoup Global StaffCaravan Studios Update for TechSoup Global Staff
Caravan Studios Update for TechSoup Global Staff
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
 
Software Engineering The Current Practice helps you learn bas.docx
Software Engineering The Current Practice helps you learn bas.docxSoftware Engineering The Current Practice helps you learn bas.docx
Software Engineering The Current Practice helps you learn bas.docx
 
SOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestSOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | Best
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and Water
 
Culture of Security
Culture of SecurityCulture of Security
Culture of Security
 
Jobs of the future
Jobs of the future Jobs of the future
Jobs of the future
 

More from Kai Roer

Measuring security culture is different from counting employees
Measuring security culture is different from counting employeesMeasuring security culture is different from counting employees
Measuring security culture is different from counting employees
Kai Roer
 
GDPR and Security Culture: Measuring effectiveness
GDPR and Security Culture: Measuring effectivenessGDPR and Security Culture: Measuring effectiveness
GDPR and Security Culture: Measuring effectiveness
Kai Roer
 
The Security Culture Conference 2016
The Security Culture Conference 2016 The Security Culture Conference 2016
The Security Culture Conference 2016
Kai Roer
 
Hacking You Mind - How you are being exploited by hackers of all sorts!
Hacking You Mind - How you are being exploited by hackers of all sorts!Hacking You Mind - How you are being exploited by hackers of all sorts!
Hacking You Mind - How you are being exploited by hackers of all sorts!
Kai Roer
 
Selling security - understanding how mental patterns and bias impacts your me...
Selling security - understanding how mental patterns and bias impacts your me...Selling security - understanding how mental patterns and bias impacts your me...
Selling security - understanding how mental patterns and bias impacts your me...Kai Roer
 
The Active Listening Cheat Sheet
The Active Listening Cheat SheetThe Active Listening Cheat Sheet
The Active Listening Cheat Sheet
Kai Roer
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
Kai Roer
 
Jci Viking Weekend 2009
Jci Viking Weekend 2009Jci Viking Weekend 2009
Jci Viking Weekend 2009
Kai Roer
 

More from Kai Roer (8)

Measuring security culture is different from counting employees
Measuring security culture is different from counting employeesMeasuring security culture is different from counting employees
Measuring security culture is different from counting employees
 
GDPR and Security Culture: Measuring effectiveness
GDPR and Security Culture: Measuring effectivenessGDPR and Security Culture: Measuring effectiveness
GDPR and Security Culture: Measuring effectiveness
 
The Security Culture Conference 2016
The Security Culture Conference 2016 The Security Culture Conference 2016
The Security Culture Conference 2016
 
Hacking You Mind - How you are being exploited by hackers of all sorts!
Hacking You Mind - How you are being exploited by hackers of all sorts!Hacking You Mind - How you are being exploited by hackers of all sorts!
Hacking You Mind - How you are being exploited by hackers of all sorts!
 
Selling security - understanding how mental patterns and bias impacts your me...
Selling security - understanding how mental patterns and bias impacts your me...Selling security - understanding how mental patterns and bias impacts your me...
Selling security - understanding how mental patterns and bias impacts your me...
 
The Active Listening Cheat Sheet
The Active Listening Cheat SheetThe Active Listening Cheat Sheet
The Active Listening Cheat Sheet
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
 
Jci Viking Weekend 2009
Jci Viking Weekend 2009Jci Viking Weekend 2009
Jci Viking Weekend 2009
 

Recently uploaded

一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Examining the Effect of Customer Services Quality and Online Reviews in Unive...Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Adam Smith
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 

Recently uploaded (20)

一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Examining the Effect of Customer Services Quality and Online Reviews in Unive...Examining the Effect of Customer Services Quality and Online Reviews in Unive...
Examining the Effect of Customer Services Quality and Online Reviews in Unive...
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 

The Security culture campaign explained in 5 minutes

  • 1. The Anatomy of a Security Culture Campaign The Security Culture Framework: https://scf.roer.com
  • 2. Security Culture Campaign Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com Security Culture
  • 3. The Security Culture Framework: https://scf.roer.com Security Culture The ideas, customs, and social behavior of a particular people or society that allows them to be free from danger or threats. Kai Roer, author
  • 4. The Security Culture Framework: https://scf.roer.com Security Culture Knowing accepted use of technology, understanding why the policies are needed, and accepting to follow the rules in place. Rules and regulations in place to regulate how technology is being used. Creates a common frame of accepted use, and incentives to follow the rules. Must be trained, and supported by technology. Business enabler, as well as threat level increaser. Technology use should be regulated by policies, and staff must be trained.
  • 5. People are different. Adapt to their needs! The Security Culture Framework: https://scf.roer.com
  • 6. Your Goal! The Security Culture Framework: https://scf.roer.com
  • 7. Security Culture Campaign Plan Execute Measure The Security Culture Framework: https://scf.roer.com
  • 8. Security Culture Campaign Plan Execute Measure Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com
  • 9. Feedback from the Campaign is fed back into the next campaign to build on the results. As culture is changed, the new culture emerges and feeds back into the program, creating a stronger culture each time. Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com 1 2
  • 10. Security Culture Campaign Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com Security Culture
  • 11. Download templates and join the community to discuss security culture https://scf.roer.com The Security Culture Framework: https://scf.roer.com