The Biggest Secrets of Security Awareness

33
1 K Rudolph The Biggest Secrets of Security Awareness A1, April 27, 2008 Native Intelligence, Inc. The Biggest Secrets of Security Awareness K Rudolph The Biggest Secrets of Security Awareness A1, April 27, 2008 Native Intelligence, Inc. Chief Inspiration Officer Native Intelligence, Inc. Storyteller Educator Creator of awareness courses and award-winning materials used worldwide K Rudolph, CISSP

description

Learn five secrets that will help you improve security awareness within your organization. These tips give you practical advice on how to spread the word about security and instill security best practices in more meaningful and memorable ways. When used on a daily basis, these proven learning techniques teach employees how to protect the company's data assets and why security is important to business success.

Transcript of The Biggest Secrets of Security Awareness

Page 1: The Biggest Secrets of Security Awareness

1

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

The Biggest Secretsof Security Awareness

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Chief Inspiration OfficerNative Intelligence, Inc.

Storyteller

Educator

Creator of awareness courses andaward-winning materials used worldwide

K Rudolph, CISSP

Page 2: The Biggest Secrets of Security Awareness

2

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Secret 1: Prevention Is Better Than Cure

Why do we invest in security awareness?

What amount of security incidents arepreventable?

What does this mean to securityawareness practitioners?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

- Don’t share your password- Don’t discuss confidential information in public- Don’t install a personal modem at work- Create long, strong passwords- Report actual or suspected incidents- Delete e-mail chain messages- Don’t take sensitive data home without permission

How many of these awarenessmessages are common sense?

Page 3: The Biggest Secrets of Security Awareness

3

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Why do we need to remind people?

What are these messages?

Do we remember what it’s likenot to know about security?

What’s not common knowledge at the IRS?

1

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

___ of the 102 employees did as requested?

Managers were ___ % more lax than employees.

A follow-up survey found:

___ believed what they had been told.

___ % said that they thought thatchanging their password to one providedby the caller was not the same asdisclosing it, which they knew wasagainst the rules.

Page 4: The Biggest Secrets of Security Awareness

4

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Prevention beats cure. Securityawareness turns your messages intocommon knowledge.

Does common knowledge set thestage for common sense?

How do we make messages compellingso that they become commonknowledge?

1Take Awayfrom Secret

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Secret 2: Security Is Everywhere

Page 5: The Biggest Secrets of Security Awareness

5

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Powering off yourcomputer withoutclosing theprograms you’reusing is like kickingaway the ladderwhile the painter ison the third story.

How can this housepainter help usexplain propercomputer use?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What has this cat gotto do with securityawareness?

Page 6: The Biggest Secrets of Security Awareness

6

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

What about a car door, adraw bridge, or a wide gate?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Page 7: The Biggest Secrets of Security Awareness

7

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Your Data

Page 8: The Biggest Secrets of Security Awareness

8

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Your Data

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Accelerate learning with analogies.2Take Awayfrom Secret

What Wizard of Oztheme applies tobuilding effectivesecurity awarenesscontent?

Page 9: The Biggest Secrets of Security Awareness

9

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Secret 3:Work with the Brain to Capture Attention

What are somebrain-compatiblestrategies forgetting attention?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How successful is asales representativewho gets thrownout of the decisionmaker’s office?

Page 10: The Biggest Secrets of Security Awareness

10

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How can we get the brain’s attention?

What are brains wired to respond to?

(hint)

Why do warning signals have flashing lights?

Why are sirens two or more tones?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How can we apply this to awareness?

Use expectation failure.

Break a pattern. Break a schema.

Page 11: The Biggest Secrets of Security Awareness

11

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Schema

• Group of generic properties

• Pre-recorded informationstored in our memories

What’s your schema for “sports car” ?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How should we use schemas?

• Communicate complex topics bylayering simple ones (e.g., pomelo)

• Capture attention by breaking them

Page 12: The Biggest Secrets of Security Awareness

12

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Would you agree that most people expectinformation on our country’s nuclearweapons designs to be well-guarded?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

“Potentiallythe greatestbreach ofnationalsecurityin decades.”

Fall 2006

Page 13: The Biggest Secrets of Security Awareness

13

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

We expect people not to click onan Internet ad for a free virus.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

We expect that the best way to get managementexcited about a disaster recovery plan is to burndown the building across the street.

Page 14: The Biggest Secrets of Security Awareness

14

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

We expectmedicine totaste bad.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What do staffexpect ofsecurity

awareness?

Will this beboring?

Page 15: The Biggest Secrets of Security Awareness

15

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Does it have to be that way?

Should it be that way?

What if yourawarenessmaterials leftyour audiencewanting more?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Sourcefire Security Calendar

Page 16: The Biggest Secrets of Security Awareness

16

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Daily Tips

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Daily Tips

Page 17: The Biggest Secrets of Security Awareness

17

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Daily Tips

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What do brains consider important?

Brains pay attention tothings that are unusual,unexpected, out of theordinary, interesting,strange, eye-catching…

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

Page 18: The Biggest Secrets of Security Awareness

18

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Does empathy get the brain involved?Liz had a very bad day at the office.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

3Take Awayfrom Secret

Use content thatmakes your audiencefeel something.

Capture attention with changes, the unexpected,by breaking a schema, using empathy, and by involvingthe emotions.

Page 19: The Biggest Secrets of Security Awareness

19

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What causesdeeper learning?

Secret 4: Work with the Brain to Make Learning Stick

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

More connections means …The more neurons that fire means …Ways, contexts, intelligences…

Plastics, sponges, sieves, or …?

Page 20: The Biggest Secrets of Security Awareness

20

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Is a picture worth 1,024 words?

Recall and transfer studies show___ % more than words alone?

What should we do to makepictures more effective?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Page 21: The Biggest Secrets of Security Awareness

21

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Why?

What does this causethe brain to do?

How much do words withinpictures improve a learner’sability to solve problemsrelated to content?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Which is better, a conversational, personal,casual language style or a more and directbusiness-like style? ___ %

Is conversation“learning by doing”?

What if your boss,manager, trainingdepartment, or anyof the PTB wantsyou to…

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

Page 22: The Biggest Secrets of Security Awareness

22

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Page 23: The Biggest Secrets of Security Awareness

23

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Page 24: The Biggest Secrets of Security Awareness

24

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Page 25: The Biggest Secrets of Security Awareness

25

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

Should we ask questionsthat don’t have a clear answer?

What do themost accessiblescience writershave in common?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How does emotionalcontent affect memory?

Where were you when...

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

Page 26: The Biggest Secrets of Security Awareness

26

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Don’t Tell When You Can Show

What did trial attorneyGerry Spence say about words?

How can we visually explainan abstract concept such asvulnerability or threat?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

----------------------------What would happen if

someone changedyour data?

----------------------------Whet would happen if

someone chongedyoor deta?

Page 27: The Biggest Secrets of Security Awareness

27

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

----------------------------What would happen

if your datadisappeared?

----------------------------What would happen

if your datadisappeared?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

4Take Awayfrom Secret

What’s another technique forshowing rather than telling?

Show a choice of actions…Bad choices result in…

What 1980’s commercial did this?

Use as much of the brain as possible, in as many ways asyou can (multiple methods). Also, use images with wordsin them, use mystery, and aim for visceral reactions. Showwith visuals, simulations, and demonstrations, and extremeconsequences.

Page 28: The Biggest Secrets of Security Awareness

28

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Secret 5: Use Strategic Stories

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Stories have enormous powers of recall, andthey communicate priorities effectively.

Page 29: The Biggest Secrets of Security Awareness

29

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

Do this ______. Don’t do that ______.

Which would you prefer…

How are stories like flight simulators?

Does mental simulation work?

Why are stories powerful?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Which is better, instructing people not toforward chain e-mail or telling them aboutRose Lambert?

Page 30: The Biggest Secrets of Security Awareness

30

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

How does telling a story differ frommaking a reasoned argument?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

The way you deliver a message to peopleis a clue to how they should react.

If you make an argument …

They will …

But stories …

Page 31: The Biggest Secrets of Security Awareness

31

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008

Do you haveto be creative to

come up withgood stories?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

What do 9 out of 10ophthalmologistsrecommend forstory spotting?

What’s a NewsHawk Program?

Page 32: The Biggest Secrets of Security Awareness

32

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

How many surprising elements?

Does it have to be true?

What length should it be?

Can it have more than one message?

What tense should the story be told in?

How many characters should it have?

What makes a story memorable?

What Makes A Useful Story?

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

Stories are simulations. They can inspire action.You don’t have to be creative to spot and use stories.

5Take Awayfrom Secret

Have you recently delivered any messages thathaven’t been effective?

Learn the craft of storytelling for business.

Develop a bucket of stories for trigger events.

Using Strategic Stories

Create a story to redeliver them.

Page 33: The Biggest Secrets of Security Awareness

33

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.

1. Prevention is better than cure.

2. Use analogies to accelerate learning.

3. Work with the brain to capture attention.

4. Work with the brain to maintain interest.

5. Use strategic stories.

K RudolphThe Biggest Secrets of Security Awareness

A1, April 27, 2008Native Intelligence, Inc.