Organizations must be sure to take steps to measure the effectiveness of their security education efforts and justify the investment of resources in these programs. In this video, learn about surveys and other means that can be used to measure the effectiveness of security and compliance training programs.
- [Instructor] Security education is an important component…of any organization's information security program.…If employees don't know their security responsibilities,…you can't depend upon them to do their part…to protect information and systems.…It's important that organizations take steps…to measure the effectiveness…of their security education efforts.…In an earlier video we looked at one way…to measure security awareness…through the use of simulated phishing campaigns.…
That certainly is a valid way to measure…the effectiveness of anti-phishing education programs,…but you don't need to go to those great lengths…to measure the effectiveness of your…security education program.…Security awareness measuring efforts…don't need to be complicated.…One easy way to measure the effectiveness of your program…is simply to ask users how they feel about…security education in a survey.…You might simply ask, how well do you think…our organization prepares you to deal…with information security threats?…Or, do you know your information security responsibilities?…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- The security triad: confidentiality, integrity, and availability
- Security principles
- Resource security
- Data security
- Security controls
- Assessing security controls
- Security policy
- Physical security
Skill Level Intermediate
Q: This course was updated on 05/18/2018. What changed?
A: New videos were added that cover software licensing. In addition, the following topics were updated: integrity, leveraging industry standards, data encryption, security control selection and implementation, audits and assessments, security policy framework, security policy training and procedures, and ethics.
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. The Security Triad
2. Security Principles
3. Resource Security
4. Data Security
5. Data Security Controls
6. Security Controls
Control frameworks3m 55s
7. Assessing Security Controls
8. Security Policy
9. Awareness and Training
10. Physical Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.