Should corporate security training be tailored based on a users' job role?Security Manager job...

Limit involving inverse functions

Why Third *Reich*? Why is "reich" not translated when "Dritten" is? What is the English synonym of reich? Realm?

Does an increasing sequence of reals converge if the difference of consecutive terms approaches zero?

Why is the collector current I_c for a normal common collector BJT circuit LARGER than that of the Darlington transistor circuit configuration?

Someone wants me to use my credit card at a card-only gas/petrol pump in return for cash

Why don't hotels offer ≥ 1 kitchen that must be booked?

Would life expectancy increase if we replaced healthy organs with artificial ones?

Bitcoin automatically diverted to bech32 address

Should corporate security training be tailored based on a users' job role?

Why would you use 2 alternate layout buttons instead of 1, when only one can be selected at once

Why there is square in MSE (mean squared error)?

Why does Python copy numpy arrays where the length of the dimensions are the same?

Why are recumbent bicycles and velomobiles illegal in UCI bicycle racing?

Why do most space probes survive for far longer than they were designed for?

What have we got?

Show about 5 teens who all have elemental powers and turn into different humanoid creatures

Mathematica seems confused about Kilograms vs KilogramsForce

Can "so" express a reason not a result?

Is it appropriate to give a culturally-traditional gift to a female coworker?

Taking an academic pseudonym?

if else in jq is not giving expected output

A dragon's soul trapped in a ring of mind shielding wants a new body; what magic could enable her to do so?

Headless horseman claims new head

How to properly launch tmux on terminal startup?



Should corporate security training be tailored based on a users' job role?


Security Manager job descriptionSecurity Training for corporate Facebook usersLooking for a presentation about information security for corporate employeesResources fo Security Awareness trainingSecurity coding training best approachWhat are good proof-of-concept implementations for general security awareness training?Prompt/Notify Users before connecting to PC - Corporate PolicyUK or EU regulations that require Security Awareness TrainingIs online security training effective?Which topics should a security training for non-IT persons contain?













9















I work in the Information Security team at my workplace. We work in the insurance and healthcare industry and work frequently with customer credit card, financial, and private health data.



Today I was meeting with security management to plan for this year's annual security training curriculum. We are thinking about customizing the training modules for end users depending on their job role. As examples:




  • Additional, and customized training modules for privileged users such as domain admins

  • A training module for customized for non IT employees working in customer facing roles

  • A separate training module for developers, perhaps with a heavier focus on defensive coding and software development vulnerabilities - e.g: SQL injection


As the security risk associated with an IT domain admin level user is obviously very different from a non - IT customer-facing employee, it seems customizing the security training to the specific needs of the type of employee is reasonable. What may be important and relevant to an IT employee may not be so to a customer service representative working in a call center, so it seems a one size fits all approach is just ineffective.



However, I can also see the downsides of a customized approach. An end user could possibly reason that because they were not provided a specific module, that training module is not meaningful or important. In other words, it is possible to encourage end user employees to be more lax in their security habits as they associate only what they see in training as important. We want to avoid this perception.



Is customizing corporate IT security training based on job roles and the differing inherent risks associated with those roles a good practice?



What are some possible downsides to such a customized approach, other than described above?










share|improve this question





























    9















    I work in the Information Security team at my workplace. We work in the insurance and healthcare industry and work frequently with customer credit card, financial, and private health data.



    Today I was meeting with security management to plan for this year's annual security training curriculum. We are thinking about customizing the training modules for end users depending on their job role. As examples:




    • Additional, and customized training modules for privileged users such as domain admins

    • A training module for customized for non IT employees working in customer facing roles

    • A separate training module for developers, perhaps with a heavier focus on defensive coding and software development vulnerabilities - e.g: SQL injection


    As the security risk associated with an IT domain admin level user is obviously very different from a non - IT customer-facing employee, it seems customizing the security training to the specific needs of the type of employee is reasonable. What may be important and relevant to an IT employee may not be so to a customer service representative working in a call center, so it seems a one size fits all approach is just ineffective.



    However, I can also see the downsides of a customized approach. An end user could possibly reason that because they were not provided a specific module, that training module is not meaningful or important. In other words, it is possible to encourage end user employees to be more lax in their security habits as they associate only what they see in training as important. We want to avoid this perception.



    Is customizing corporate IT security training based on job roles and the differing inherent risks associated with those roles a good practice?



    What are some possible downsides to such a customized approach, other than described above?










    share|improve this question



























      9












      9








      9








      I work in the Information Security team at my workplace. We work in the insurance and healthcare industry and work frequently with customer credit card, financial, and private health data.



      Today I was meeting with security management to plan for this year's annual security training curriculum. We are thinking about customizing the training modules for end users depending on their job role. As examples:




      • Additional, and customized training modules for privileged users such as domain admins

      • A training module for customized for non IT employees working in customer facing roles

      • A separate training module for developers, perhaps with a heavier focus on defensive coding and software development vulnerabilities - e.g: SQL injection


      As the security risk associated with an IT domain admin level user is obviously very different from a non - IT customer-facing employee, it seems customizing the security training to the specific needs of the type of employee is reasonable. What may be important and relevant to an IT employee may not be so to a customer service representative working in a call center, so it seems a one size fits all approach is just ineffective.



      However, I can also see the downsides of a customized approach. An end user could possibly reason that because they were not provided a specific module, that training module is not meaningful or important. In other words, it is possible to encourage end user employees to be more lax in their security habits as they associate only what they see in training as important. We want to avoid this perception.



      Is customizing corporate IT security training based on job roles and the differing inherent risks associated with those roles a good practice?



      What are some possible downsides to such a customized approach, other than described above?










      share|improve this question
















      I work in the Information Security team at my workplace. We work in the insurance and healthcare industry and work frequently with customer credit card, financial, and private health data.



      Today I was meeting with security management to plan for this year's annual security training curriculum. We are thinking about customizing the training modules for end users depending on their job role. As examples:




      • Additional, and customized training modules for privileged users such as domain admins

      • A training module for customized for non IT employees working in customer facing roles

      • A separate training module for developers, perhaps with a heavier focus on defensive coding and software development vulnerabilities - e.g: SQL injection


      As the security risk associated with an IT domain admin level user is obviously very different from a non - IT customer-facing employee, it seems customizing the security training to the specific needs of the type of employee is reasonable. What may be important and relevant to an IT employee may not be so to a customer service representative working in a call center, so it seems a one size fits all approach is just ineffective.



      However, I can also see the downsides of a customized approach. An end user could possibly reason that because they were not provided a specific module, that training module is not meaningful or important. In other words, it is possible to encourage end user employees to be more lax in their security habits as they associate only what they see in training as important. We want to avoid this perception.



      Is customizing corporate IT security training based on job roles and the differing inherent risks associated with those roles a good practice?



      What are some possible downsides to such a customized approach, other than described above?







      corporate-policy awareness






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 5 hours ago









      schroeder

      75.9k29168201




      75.9k29168201










      asked 11 hours ago









      AnthonyAnthony

      682413




      682413






















          3 Answers
          3






          active

          oldest

          votes


















          13














          The idea of customising the training to meet user requirements is in fact a very good approach. However, there will have to be certain additions to this approach which will then suit everyone in your organisation.



          With that being said, it is very correct when you say that the training required for an application developer will not be the same as an HR person.



          However, when you look at structure of ISO 27001, you will see that it has many aspects which will be applicable to all departments, such as access control, asset management and disposal, Intellectual property rights management, Business continuity procedures, Employment procedures, Incident handling, Acceptable use guidelines, Clear desk and Clear screen and much more. You will see that each of these items which I have listed above will be applicable to everyone.



          Your training approach should take all these into account while also making the training role-specific. I have been taking an approach that is department-specific. Some modules have been exclusively reserved for certain departments, while most modules are applicable to all departments. Your training schedule should list out all these.



          Finally the topics that you impart to your employees should actually be within the limits of your organisation's Information security management system (ISMS). So, if you have a well defined ISMS, look through all the policies and procedures that have been defined for your organisation. This will give you a good starting point to define all your topics.






          share|improve this answer





















          • 2





            Important to note that security training is not ISO 27k specific and it is completely reasonable to have training even if the org is not even considering ISO 27k. A well-defined ISMS should be designed to address the org's risks, which means that the more generic approach for training design is to train based on risk rather than policy. And that's true both for procedural training as well for awareness training.

            – schroeder
            5 hours ago





















          4














          Security Awareness expert here (awards, best-selling book).



          Absolutely, you should/need to customise training to the role/risks.



          Many international bodies actually call this out as important:





          • NIST CSF (PR.AT)

          • NIST SP 800-16

          • SANS

          • FBI/DHS

          • Jonathan Steenland, COO of the National Cyber Center


          Those were just what I could recall off the top of my head.



          But your questions at the end seem to show a misunderstanding about how the materials would be created.



          Set a baseline standard



          Your organisation needs to set a minimum standard for awareness that meets the risk profile of your organisation. That means that everyone gets the same basic foundations. On top of that is the role-specific material.



          Same material, role-specific examples



          But it can go deeper than that to be more effective. I advocate creating material that is role-specific using the same base material, but having the examples be role-specific. Don't show an HR example to the Shipping department. Keep the examples specific to the role, where practical, but cover the same material so that the foundations are the same. This helps to show why the material is important to the employee.



          Train to meet the risks



          In addition, different roles in your organisation are going to experience different risks, and those unique risks should be addressed in training. Finance and HR experience different risks and need different tools/procedures to meet those risks. The Shipping department is going to have a completely different set of risks. Training should most definitely be customised to the risks.



          Yes, that is going to look daunting to anyone who is not a dedicated security awareness curriculum designer. That is a lot of work. And that's why most organisations do not do it. But they should.



          Easy mode: Champions



          One way to make it easier is to employ a "Champions" programme where selected individuals in each department/risk area are trained and supported to help design, deliver and be a point of contact for the department/risk-specific material. This has been shown to be extremely effective in many organisations. You should then take the custom material that has been shown to work and roll that into your learning program to make it more consistent and repeatable.



          Next step: not just role-specific but audience-specific



          In addition, I also advocate having different material for the different technological and demographic groups in your organisation. "How to spot a phish" training needs to look different for people who have never heard of the concept before than for IT experts. And the language and concepts used need to be understood by the various demographic groups in your organisation. For example, ask different people whether they know what a "browser" is. You might be shocked to see who has not heard of the term. That means your "How to spot a phish" material needs to either not use the term or train people on it.



          Graduated materials



          In my materials, I graduate them so that there is a rising skill and knowledge level. People unlock the higher levels when they have shown to be proficient in the lower levels. This means that the IT experts only have to deal with the basic material once, but are challenged by the brand-new techniques in the high levels. New people can grow with the material.






          share|improve this answer

































            1














            This is more of a communication question than a security one, but I must acknowledge that the result has a strong impact on the global security practices. What matters here is that all employees can think that their activity is considered as important and that their poor practices would have serious effects.



            If you present it that way:




            • IT admins will follow a module dedicated to their job

            • IT developpers will follow a module dedicated to their job

            • non IT fellows will follow a generalist module


            The risk is high that non IT staff members think that security is not their concern.



            As one of my previous jobs was not IT focused, I think that non IT staff members could feel more concerned with the following presentation:




            • one generalist module for everybody so that the base is shared among all employees, whatever their specific activity

            • one additional module for every group


            The content of the additional module is trivial for the IT groups, admins and developpers.



            For non IT members, you will have to find examples related to their actual activity. Social attacks are a primary concern for the financial team, confidentiality is a primary concern for the customer service representative teams, etc. That way, you show every group that you have considered their activity and that lack of good security practices in their activity will have serious consequences.



            The actual content will not be much different than the first approach, but it could be seen differently.






            share|improve this answer























              Your Answer








              StackExchange.ready(function() {
              var channelOptions = {
              tags: "".split(" "),
              id: "162"
              };
              initTagRenderer("".split(" "), "".split(" "), channelOptions);

              StackExchange.using("externalEditor", function() {
              // Have to fire editor after snippets, if snippets enabled
              if (StackExchange.settings.snippets.snippetsEnabled) {
              StackExchange.using("snippets", function() {
              createEditor();
              });
              }
              else {
              createEditor();
              }
              });

              function createEditor() {
              StackExchange.prepareEditor({
              heartbeatType: 'answer',
              autoActivateHeartbeat: false,
              convertImagesToLinks: false,
              noModals: true,
              showLowRepImageUploadWarning: true,
              reputationToPostImages: null,
              bindNavPrevention: true,
              postfix: "",
              imageUploader: {
              brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
              contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
              allowUrls: true
              },
              noCode: true, onDemand: true,
              discardSelector: ".discard-answer"
              ,immediatelyShowMarkdownHelp:true
              });


              }
              });














              draft saved

              draft discarded


















              StackExchange.ready(
              function () {
              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f203797%2fshould-corporate-security-training-be-tailored-based-on-a-users-job-role%23new-answer', 'question_page');
              }
              );

              Post as a guest















              Required, but never shown

























              3 Answers
              3






              active

              oldest

              votes








              3 Answers
              3






              active

              oldest

              votes









              active

              oldest

              votes






              active

              oldest

              votes









              13














              The idea of customising the training to meet user requirements is in fact a very good approach. However, there will have to be certain additions to this approach which will then suit everyone in your organisation.



              With that being said, it is very correct when you say that the training required for an application developer will not be the same as an HR person.



              However, when you look at structure of ISO 27001, you will see that it has many aspects which will be applicable to all departments, such as access control, asset management and disposal, Intellectual property rights management, Business continuity procedures, Employment procedures, Incident handling, Acceptable use guidelines, Clear desk and Clear screen and much more. You will see that each of these items which I have listed above will be applicable to everyone.



              Your training approach should take all these into account while also making the training role-specific. I have been taking an approach that is department-specific. Some modules have been exclusively reserved for certain departments, while most modules are applicable to all departments. Your training schedule should list out all these.



              Finally the topics that you impart to your employees should actually be within the limits of your organisation's Information security management system (ISMS). So, if you have a well defined ISMS, look through all the policies and procedures that have been defined for your organisation. This will give you a good starting point to define all your topics.






              share|improve this answer





















              • 2





                Important to note that security training is not ISO 27k specific and it is completely reasonable to have training even if the org is not even considering ISO 27k. A well-defined ISMS should be designed to address the org's risks, which means that the more generic approach for training design is to train based on risk rather than policy. And that's true both for procedural training as well for awareness training.

                – schroeder
                5 hours ago


















              13














              The idea of customising the training to meet user requirements is in fact a very good approach. However, there will have to be certain additions to this approach which will then suit everyone in your organisation.



              With that being said, it is very correct when you say that the training required for an application developer will not be the same as an HR person.



              However, when you look at structure of ISO 27001, you will see that it has many aspects which will be applicable to all departments, such as access control, asset management and disposal, Intellectual property rights management, Business continuity procedures, Employment procedures, Incident handling, Acceptable use guidelines, Clear desk and Clear screen and much more. You will see that each of these items which I have listed above will be applicable to everyone.



              Your training approach should take all these into account while also making the training role-specific. I have been taking an approach that is department-specific. Some modules have been exclusively reserved for certain departments, while most modules are applicable to all departments. Your training schedule should list out all these.



              Finally the topics that you impart to your employees should actually be within the limits of your organisation's Information security management system (ISMS). So, if you have a well defined ISMS, look through all the policies and procedures that have been defined for your organisation. This will give you a good starting point to define all your topics.






              share|improve this answer





















              • 2





                Important to note that security training is not ISO 27k specific and it is completely reasonable to have training even if the org is not even considering ISO 27k. A well-defined ISMS should be designed to address the org's risks, which means that the more generic approach for training design is to train based on risk rather than policy. And that's true both for procedural training as well for awareness training.

                – schroeder
                5 hours ago
















              13












              13








              13







              The idea of customising the training to meet user requirements is in fact a very good approach. However, there will have to be certain additions to this approach which will then suit everyone in your organisation.



              With that being said, it is very correct when you say that the training required for an application developer will not be the same as an HR person.



              However, when you look at structure of ISO 27001, you will see that it has many aspects which will be applicable to all departments, such as access control, asset management and disposal, Intellectual property rights management, Business continuity procedures, Employment procedures, Incident handling, Acceptable use guidelines, Clear desk and Clear screen and much more. You will see that each of these items which I have listed above will be applicable to everyone.



              Your training approach should take all these into account while also making the training role-specific. I have been taking an approach that is department-specific. Some modules have been exclusively reserved for certain departments, while most modules are applicable to all departments. Your training schedule should list out all these.



              Finally the topics that you impart to your employees should actually be within the limits of your organisation's Information security management system (ISMS). So, if you have a well defined ISMS, look through all the policies and procedures that have been defined for your organisation. This will give you a good starting point to define all your topics.






              share|improve this answer















              The idea of customising the training to meet user requirements is in fact a very good approach. However, there will have to be certain additions to this approach which will then suit everyone in your organisation.



              With that being said, it is very correct when you say that the training required for an application developer will not be the same as an HR person.



              However, when you look at structure of ISO 27001, you will see that it has many aspects which will be applicable to all departments, such as access control, asset management and disposal, Intellectual property rights management, Business continuity procedures, Employment procedures, Incident handling, Acceptable use guidelines, Clear desk and Clear screen and much more. You will see that each of these items which I have listed above will be applicable to everyone.



              Your training approach should take all these into account while also making the training role-specific. I have been taking an approach that is department-specific. Some modules have been exclusively reserved for certain departments, while most modules are applicable to all departments. Your training schedule should list out all these.



              Finally the topics that you impart to your employees should actually be within the limits of your organisation's Information security management system (ISMS). So, if you have a well defined ISMS, look through all the policies and procedures that have been defined for your organisation. This will give you a good starting point to define all your topics.







              share|improve this answer














              share|improve this answer



              share|improve this answer








              edited 5 hours ago









              schroeder

              75.9k29168201




              75.9k29168201










              answered 9 hours ago









              VikasVikas

              15510




              15510








              • 2





                Important to note that security training is not ISO 27k specific and it is completely reasonable to have training even if the org is not even considering ISO 27k. A well-defined ISMS should be designed to address the org's risks, which means that the more generic approach for training design is to train based on risk rather than policy. And that's true both for procedural training as well for awareness training.

                – schroeder
                5 hours ago
















              • 2





                Important to note that security training is not ISO 27k specific and it is completely reasonable to have training even if the org is not even considering ISO 27k. A well-defined ISMS should be designed to address the org's risks, which means that the more generic approach for training design is to train based on risk rather than policy. And that's true both for procedural training as well for awareness training.

                – schroeder
                5 hours ago










              2




              2





              Important to note that security training is not ISO 27k specific and it is completely reasonable to have training even if the org is not even considering ISO 27k. A well-defined ISMS should be designed to address the org's risks, which means that the more generic approach for training design is to train based on risk rather than policy. And that's true both for procedural training as well for awareness training.

              – schroeder
              5 hours ago







              Important to note that security training is not ISO 27k specific and it is completely reasonable to have training even if the org is not even considering ISO 27k. A well-defined ISMS should be designed to address the org's risks, which means that the more generic approach for training design is to train based on risk rather than policy. And that's true both for procedural training as well for awareness training.

              – schroeder
              5 hours ago















              4














              Security Awareness expert here (awards, best-selling book).



              Absolutely, you should/need to customise training to the role/risks.



              Many international bodies actually call this out as important:





              • NIST CSF (PR.AT)

              • NIST SP 800-16

              • SANS

              • FBI/DHS

              • Jonathan Steenland, COO of the National Cyber Center


              Those were just what I could recall off the top of my head.



              But your questions at the end seem to show a misunderstanding about how the materials would be created.



              Set a baseline standard



              Your organisation needs to set a minimum standard for awareness that meets the risk profile of your organisation. That means that everyone gets the same basic foundations. On top of that is the role-specific material.



              Same material, role-specific examples



              But it can go deeper than that to be more effective. I advocate creating material that is role-specific using the same base material, but having the examples be role-specific. Don't show an HR example to the Shipping department. Keep the examples specific to the role, where practical, but cover the same material so that the foundations are the same. This helps to show why the material is important to the employee.



              Train to meet the risks



              In addition, different roles in your organisation are going to experience different risks, and those unique risks should be addressed in training. Finance and HR experience different risks and need different tools/procedures to meet those risks. The Shipping department is going to have a completely different set of risks. Training should most definitely be customised to the risks.



              Yes, that is going to look daunting to anyone who is not a dedicated security awareness curriculum designer. That is a lot of work. And that's why most organisations do not do it. But they should.



              Easy mode: Champions



              One way to make it easier is to employ a "Champions" programme where selected individuals in each department/risk area are trained and supported to help design, deliver and be a point of contact for the department/risk-specific material. This has been shown to be extremely effective in many organisations. You should then take the custom material that has been shown to work and roll that into your learning program to make it more consistent and repeatable.



              Next step: not just role-specific but audience-specific



              In addition, I also advocate having different material for the different technological and demographic groups in your organisation. "How to spot a phish" training needs to look different for people who have never heard of the concept before than for IT experts. And the language and concepts used need to be understood by the various demographic groups in your organisation. For example, ask different people whether they know what a "browser" is. You might be shocked to see who has not heard of the term. That means your "How to spot a phish" material needs to either not use the term or train people on it.



              Graduated materials



              In my materials, I graduate them so that there is a rising skill and knowledge level. People unlock the higher levels when they have shown to be proficient in the lower levels. This means that the IT experts only have to deal with the basic material once, but are challenged by the brand-new techniques in the high levels. New people can grow with the material.






              share|improve this answer






























                4














                Security Awareness expert here (awards, best-selling book).



                Absolutely, you should/need to customise training to the role/risks.



                Many international bodies actually call this out as important:





                • NIST CSF (PR.AT)

                • NIST SP 800-16

                • SANS

                • FBI/DHS

                • Jonathan Steenland, COO of the National Cyber Center


                Those were just what I could recall off the top of my head.



                But your questions at the end seem to show a misunderstanding about how the materials would be created.



                Set a baseline standard



                Your organisation needs to set a minimum standard for awareness that meets the risk profile of your organisation. That means that everyone gets the same basic foundations. On top of that is the role-specific material.



                Same material, role-specific examples



                But it can go deeper than that to be more effective. I advocate creating material that is role-specific using the same base material, but having the examples be role-specific. Don't show an HR example to the Shipping department. Keep the examples specific to the role, where practical, but cover the same material so that the foundations are the same. This helps to show why the material is important to the employee.



                Train to meet the risks



                In addition, different roles in your organisation are going to experience different risks, and those unique risks should be addressed in training. Finance and HR experience different risks and need different tools/procedures to meet those risks. The Shipping department is going to have a completely different set of risks. Training should most definitely be customised to the risks.



                Yes, that is going to look daunting to anyone who is not a dedicated security awareness curriculum designer. That is a lot of work. And that's why most organisations do not do it. But they should.



                Easy mode: Champions



                One way to make it easier is to employ a "Champions" programme where selected individuals in each department/risk area are trained and supported to help design, deliver and be a point of contact for the department/risk-specific material. This has been shown to be extremely effective in many organisations. You should then take the custom material that has been shown to work and roll that into your learning program to make it more consistent and repeatable.



                Next step: not just role-specific but audience-specific



                In addition, I also advocate having different material for the different technological and demographic groups in your organisation. "How to spot a phish" training needs to look different for people who have never heard of the concept before than for IT experts. And the language and concepts used need to be understood by the various demographic groups in your organisation. For example, ask different people whether they know what a "browser" is. You might be shocked to see who has not heard of the term. That means your "How to spot a phish" material needs to either not use the term or train people on it.



                Graduated materials



                In my materials, I graduate them so that there is a rising skill and knowledge level. People unlock the higher levels when they have shown to be proficient in the lower levels. This means that the IT experts only have to deal with the basic material once, but are challenged by the brand-new techniques in the high levels. New people can grow with the material.






                share|improve this answer




























                  4












                  4








                  4







                  Security Awareness expert here (awards, best-selling book).



                  Absolutely, you should/need to customise training to the role/risks.



                  Many international bodies actually call this out as important:





                  • NIST CSF (PR.AT)

                  • NIST SP 800-16

                  • SANS

                  • FBI/DHS

                  • Jonathan Steenland, COO of the National Cyber Center


                  Those were just what I could recall off the top of my head.



                  But your questions at the end seem to show a misunderstanding about how the materials would be created.



                  Set a baseline standard



                  Your organisation needs to set a minimum standard for awareness that meets the risk profile of your organisation. That means that everyone gets the same basic foundations. On top of that is the role-specific material.



                  Same material, role-specific examples



                  But it can go deeper than that to be more effective. I advocate creating material that is role-specific using the same base material, but having the examples be role-specific. Don't show an HR example to the Shipping department. Keep the examples specific to the role, where practical, but cover the same material so that the foundations are the same. This helps to show why the material is important to the employee.



                  Train to meet the risks



                  In addition, different roles in your organisation are going to experience different risks, and those unique risks should be addressed in training. Finance and HR experience different risks and need different tools/procedures to meet those risks. The Shipping department is going to have a completely different set of risks. Training should most definitely be customised to the risks.



                  Yes, that is going to look daunting to anyone who is not a dedicated security awareness curriculum designer. That is a lot of work. And that's why most organisations do not do it. But they should.



                  Easy mode: Champions



                  One way to make it easier is to employ a "Champions" programme where selected individuals in each department/risk area are trained and supported to help design, deliver and be a point of contact for the department/risk-specific material. This has been shown to be extremely effective in many organisations. You should then take the custom material that has been shown to work and roll that into your learning program to make it more consistent and repeatable.



                  Next step: not just role-specific but audience-specific



                  In addition, I also advocate having different material for the different technological and demographic groups in your organisation. "How to spot a phish" training needs to look different for people who have never heard of the concept before than for IT experts. And the language and concepts used need to be understood by the various demographic groups in your organisation. For example, ask different people whether they know what a "browser" is. You might be shocked to see who has not heard of the term. That means your "How to spot a phish" material needs to either not use the term or train people on it.



                  Graduated materials



                  In my materials, I graduate them so that there is a rising skill and knowledge level. People unlock the higher levels when they have shown to be proficient in the lower levels. This means that the IT experts only have to deal with the basic material once, but are challenged by the brand-new techniques in the high levels. New people can grow with the material.






                  share|improve this answer















                  Security Awareness expert here (awards, best-selling book).



                  Absolutely, you should/need to customise training to the role/risks.



                  Many international bodies actually call this out as important:





                  • NIST CSF (PR.AT)

                  • NIST SP 800-16

                  • SANS

                  • FBI/DHS

                  • Jonathan Steenland, COO of the National Cyber Center


                  Those were just what I could recall off the top of my head.



                  But your questions at the end seem to show a misunderstanding about how the materials would be created.



                  Set a baseline standard



                  Your organisation needs to set a minimum standard for awareness that meets the risk profile of your organisation. That means that everyone gets the same basic foundations. On top of that is the role-specific material.



                  Same material, role-specific examples



                  But it can go deeper than that to be more effective. I advocate creating material that is role-specific using the same base material, but having the examples be role-specific. Don't show an HR example to the Shipping department. Keep the examples specific to the role, where practical, but cover the same material so that the foundations are the same. This helps to show why the material is important to the employee.



                  Train to meet the risks



                  In addition, different roles in your organisation are going to experience different risks, and those unique risks should be addressed in training. Finance and HR experience different risks and need different tools/procedures to meet those risks. The Shipping department is going to have a completely different set of risks. Training should most definitely be customised to the risks.



                  Yes, that is going to look daunting to anyone who is not a dedicated security awareness curriculum designer. That is a lot of work. And that's why most organisations do not do it. But they should.



                  Easy mode: Champions



                  One way to make it easier is to employ a "Champions" programme where selected individuals in each department/risk area are trained and supported to help design, deliver and be a point of contact for the department/risk-specific material. This has been shown to be extremely effective in many organisations. You should then take the custom material that has been shown to work and roll that into your learning program to make it more consistent and repeatable.



                  Next step: not just role-specific but audience-specific



                  In addition, I also advocate having different material for the different technological and demographic groups in your organisation. "How to spot a phish" training needs to look different for people who have never heard of the concept before than for IT experts. And the language and concepts used need to be understood by the various demographic groups in your organisation. For example, ask different people whether they know what a "browser" is. You might be shocked to see who has not heard of the term. That means your "How to spot a phish" material needs to either not use the term or train people on it.



                  Graduated materials



                  In my materials, I graduate them so that there is a rising skill and knowledge level. People unlock the higher levels when they have shown to be proficient in the lower levels. This means that the IT experts only have to deal with the basic material once, but are challenged by the brand-new techniques in the high levels. New people can grow with the material.







                  share|improve this answer














                  share|improve this answer



                  share|improve this answer








                  edited 5 hours ago

























                  answered 5 hours ago









                  schroederschroeder

                  75.9k29168201




                  75.9k29168201























                      1














                      This is more of a communication question than a security one, but I must acknowledge that the result has a strong impact on the global security practices. What matters here is that all employees can think that their activity is considered as important and that their poor practices would have serious effects.



                      If you present it that way:




                      • IT admins will follow a module dedicated to their job

                      • IT developpers will follow a module dedicated to their job

                      • non IT fellows will follow a generalist module


                      The risk is high that non IT staff members think that security is not their concern.



                      As one of my previous jobs was not IT focused, I think that non IT staff members could feel more concerned with the following presentation:




                      • one generalist module for everybody so that the base is shared among all employees, whatever their specific activity

                      • one additional module for every group


                      The content of the additional module is trivial for the IT groups, admins and developpers.



                      For non IT members, you will have to find examples related to their actual activity. Social attacks are a primary concern for the financial team, confidentiality is a primary concern for the customer service representative teams, etc. That way, you show every group that you have considered their activity and that lack of good security practices in their activity will have serious consequences.



                      The actual content will not be much different than the first approach, but it could be seen differently.






                      share|improve this answer




























                        1














                        This is more of a communication question than a security one, but I must acknowledge that the result has a strong impact on the global security practices. What matters here is that all employees can think that their activity is considered as important and that their poor practices would have serious effects.



                        If you present it that way:




                        • IT admins will follow a module dedicated to their job

                        • IT developpers will follow a module dedicated to their job

                        • non IT fellows will follow a generalist module


                        The risk is high that non IT staff members think that security is not their concern.



                        As one of my previous jobs was not IT focused, I think that non IT staff members could feel more concerned with the following presentation:




                        • one generalist module for everybody so that the base is shared among all employees, whatever their specific activity

                        • one additional module for every group


                        The content of the additional module is trivial for the IT groups, admins and developpers.



                        For non IT members, you will have to find examples related to their actual activity. Social attacks are a primary concern for the financial team, confidentiality is a primary concern for the customer service representative teams, etc. That way, you show every group that you have considered their activity and that lack of good security practices in their activity will have serious consequences.



                        The actual content will not be much different than the first approach, but it could be seen differently.






                        share|improve this answer


























                          1












                          1








                          1







                          This is more of a communication question than a security one, but I must acknowledge that the result has a strong impact on the global security practices. What matters here is that all employees can think that their activity is considered as important and that their poor practices would have serious effects.



                          If you present it that way:




                          • IT admins will follow a module dedicated to their job

                          • IT developpers will follow a module dedicated to their job

                          • non IT fellows will follow a generalist module


                          The risk is high that non IT staff members think that security is not their concern.



                          As one of my previous jobs was not IT focused, I think that non IT staff members could feel more concerned with the following presentation:




                          • one generalist module for everybody so that the base is shared among all employees, whatever their specific activity

                          • one additional module for every group


                          The content of the additional module is trivial for the IT groups, admins and developpers.



                          For non IT members, you will have to find examples related to their actual activity. Social attacks are a primary concern for the financial team, confidentiality is a primary concern for the customer service representative teams, etc. That way, you show every group that you have considered their activity and that lack of good security practices in their activity will have serious consequences.



                          The actual content will not be much different than the first approach, but it could be seen differently.






                          share|improve this answer













                          This is more of a communication question than a security one, but I must acknowledge that the result has a strong impact on the global security practices. What matters here is that all employees can think that their activity is considered as important and that their poor practices would have serious effects.



                          If you present it that way:




                          • IT admins will follow a module dedicated to their job

                          • IT developpers will follow a module dedicated to their job

                          • non IT fellows will follow a generalist module


                          The risk is high that non IT staff members think that security is not their concern.



                          As one of my previous jobs was not IT focused, I think that non IT staff members could feel more concerned with the following presentation:




                          • one generalist module for everybody so that the base is shared among all employees, whatever their specific activity

                          • one additional module for every group


                          The content of the additional module is trivial for the IT groups, admins and developpers.



                          For non IT members, you will have to find examples related to their actual activity. Social attacks are a primary concern for the financial team, confidentiality is a primary concern for the customer service representative teams, etc. That way, you show every group that you have considered their activity and that lack of good security practices in their activity will have serious consequences.



                          The actual content will not be much different than the first approach, but it could be seen differently.







                          share|improve this answer












                          share|improve this answer



                          share|improve this answer










                          answered 6 hours ago









                          Serge BallestaSerge Ballesta

                          16.7k32661




                          16.7k32661






























                              draft saved

                              draft discarded




















































                              Thanks for contributing an answer to Information Security Stack Exchange!


                              • Please be sure to answer the question. Provide details and share your research!

                              But avoid



                              • Asking for help, clarification, or responding to other answers.

                              • Making statements based on opinion; back them up with references or personal experience.


                              To learn more, see our tips on writing great answers.




                              draft saved


                              draft discarded














                              StackExchange.ready(
                              function () {
                              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f203797%2fshould-corporate-security-training-be-tailored-based-on-a-users-job-role%23new-answer', 'question_page');
                              }
                              );

                              Post as a guest















                              Required, but never shown





















































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown

































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown







                              Popular posts from this blog

                              ORA-01691 (unable to extend lob segment) even though my tablespace has AUTOEXTEND onORA-01692: unable to...

                              Always On Availability groups resolving state after failover - Remote harden of transaction...

                              Circunscripción electoral de Guipúzcoa Referencias Menú de navegaciónLas claves del sistema electoral en...