Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1384049%22%20slang%3D%22en-US%22%3E3%20takeaways%20and%20on-demand%20webinar%20from%20Security%20Awareness%20Virtual%20Summit%202020%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1384049%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EOn%20Tuesday%2C%20May%205th%2C%20at%2012%3A00%20pm%20ET%2C%20I%20opened%20up%20my%20laptop%2C%20poured%20some%20coffee%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eand%20joined%20hun%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Edreds%20of%20security%20awareness%20professionals%20at%20the%20Security%20Awareness%20Virtual%20Summit%2C%202020%2C%20hosted%20by%20Terranova%20Security%20and%20sponsored%20by%20Microsoft.%20The%20next%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E3%20hours%20were%20chockfull%20of%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Epresentations%2C%20expert%20advice%2C%20a%20hands-on%20workshop%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eand%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ea%20deep%20dive%20into%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3ETerranova%20Security%20training%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335551550%26quot%3B%3A6%2C%26quot%3B335551620%26quot%3B%3A6%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3ESpeak%20the%20language%20of%20business%20by%20using%20data%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335551550%26quot%3B%3A6%2C%26quot%3B335551620%26quot%3B%3A6%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EBrian%20Reed%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20Senior%20Director%20at%20Gartner%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ekicked%20off%20the%20day%20with%20his%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20keynote%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Espeech%3A%20%E2%80%9CThree%20Ways%20to%20Gain%20Support%20for%20your%20Security%20Awareness%20Program.%E2%80%9D%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EBrian%3C%2FSPAN%3E%20%3CSPAN%20data-contrast%3D%22auto%22%3Efocused%20on%20a%20problem%20many%20security%20awareness%20professionals%20struggle%20with%20%E2%80%93%20how%20to%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Esecure%20executive%20buy-in%20for%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ean%20organization%E2%80%99s%20security%20awareness%20program%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20Demonstrating%20ROI%20can%20be%20hard%20in%20the%20absence%20of%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Estandard%20metrics%2C%20and%20behavior%20change%20is%20diff%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eicult%20to%20measure.%20Brian%20advised%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20professionals%20to%3C%2FSPAN%3E%20%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%E2%80%9Cspeak%20the%20language%20of%20business%E2%80%9D%20translating%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ethe%20outcomes%20of%20security%20awareness%20programs%20into%20business%20outcomes%20and%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20drill%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eing%20down%20into%20the%20financial%20implications%20of%20improved%20awareness.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3ELater%20in%20the%20day%2C%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3ETerranova%20Security%20CISO%2C%20Theo%20Zafirakos%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ealso%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ehighlighted%20the%20importance%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eof%20measuring%20total%20cost%20of%20breach.%20Designing%20and%20deploying%20a%20security%20awareness%20training%20will%20incur%20some%20cost%2C%20but%20if%20done%20well%2C%20it%20will%20save%20far%20more%20in%20lost%20productivity%2C%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eremediation%20expense%20and%20downtime.%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EStorytelling%20is%20%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eyour%20secret%20superpower%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20to%20boost%20engagement%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAn%20important%20takeaway%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efrom%20Brian%E2%80%99s%20speech%20was%20the%20power%20of%20storytelling%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20in%20improving%20engagement%20and%20participation%20in%20security%20awareness%20training%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EBrian%20urged%20security%20awareness%20professionals%20to%20harness%20the%20power%20of%20stories%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eto%20build%20emotional%20connection%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%20Humans%20are%20hardwired%20to%20respond%20to%20stories%E2%80%94with%20elements%20like%20character%2C%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eobstacle%20or%20challenge%20and%20eventual%20triumph.%20Usually%2C%20Brian%20said%2C%20we%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Euse%20a%20traditional%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ecrime%20or%20spy%20story%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ein%20the%20realm%20of%20risk%20and%20security%2C%20but%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efor%20awareness%20program%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Es%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20and%20he%20encouraged%20the%20audience%20to%20think%20outside%20the%20box%20and%20experiment%20with%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20adventure%20or%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20humor%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eous%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20narratives%20to%20increase%20engagement.%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAdopt%20an%20Attacker%20mindset%20%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ethrough%20phish%20simulation%20to%20detect%20and%20quantify%20risk%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EMicrosoft%20PM%20Lead%2C%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F2898%22%20target%3D%22_blank%22%3E%40Brandon%20Koeller%3C%2FA%3E%26nbsp%3B%20discussed%20the%20importance%20of%20simulated%20phishing%20to%20your%20training%20program.%20As%20Brandon%20said%2C%20%E2%80%9CPhishing%20is%20THE%20risk%2C%20capital%20T-H-E%E2%80%9D%20when%20it%20comes%20to%20people%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22RukmaSen_0-1589315351747.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F191083i90A907B9F3F2076E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22RukmaSen_0-1589315351747.png%22%20alt%3D%22RukmaSen_0-1589315351747.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EUsing%20phish%20simulations%20that%20accurately%20simulate%20your%20threat%20environment%20will%20help%20you%20establish%20a%20baseline%20of%20awareness%2C%20detect%20vulnerable%20users%2C%20quantify%20behavior%20change%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20and%20demonstrate%20the%20effectiveness%20of%20training.%20Koeller%20reminded%20us%20that%20as%20security%20professionals%20we%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Etend%20to%20inhabit%20a%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Edefender%20mindset%20but%20to%20truly%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eprepare%20and%20protect%20your%20employees%2C%20you%20need%20to%20inhabit%20an%20attacker%20mindset.%20Phish%20simulation%20that%20mimics%20real%20threats%20in%20your%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eenvironment%20%E2%80%93%20using%20context-specific%20lures%20and%20the%20types%20of%20emails%20most%20likely%20to%20land%20in%20your%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eemployees%E2%80%99%20inboxes.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EThe%20expert%20panel%2C%20featuring%20Lise%20Lapointe%2C%20CEO%20of%20Terranova%20Security%2C%20Erin%20Csonaki%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20and%20Blythe%20Price%2C%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EProgram%20Managers%20for%20CyberSecurity%20Awareness%20and%20Education%20at%20Microsoft%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eand%20Bill%20Dunnion%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20Director%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eof%20the%20Cyber%20Resilience%20Office%20at%20Calian%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ehighlighted%20the%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%20organizational%20behavior%20axis%20of%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Esecurity%20awareness%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%E2%80%93%20they%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ereminded%20listeners%20that%20their%20security%20awareness%20programs%20are%20not%20merely%20compliance%20checklists%20but%20a%20key%20component%20of%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Esecurity%20culture.%20T%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ehey%20urged%20the%20audience%20to%20frame%20security%20awareness%20training%20as%20a%20key%20tool%20in%20elevating%20the%20importance%20of%20s%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eecurity%20and%20cy%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eb%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eer%3C%2FSPAN%3E%20%3CSPAN%20data-contrast%3D%22auto%22%3Ehygiene%20in%20the%20minds%20of%20their%20employees.%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EIf%20you%20missed%20out%20on%20signing%20up%20for%20the%20virtual%20summit%20and%20want%20to%20catch%20up%20on%20the%20learning%2C%20best%20practices%2C%20tips%20and%20advice%2C%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eyou%E2%80%99re%20in%20luck.%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fterranovasecurity.com%252Fsecurity-awareness-virtual-summit-2020%252F%253Futm_campaign%253DEN_OnDemand_VSummit_2021%2526utm_medium%253D-%2526utm_source%253DMicrosoft%26amp%3Bdata%3D02%257C01%257CRukma.Sen%2540microsoft.com%257C34f0e37733004db2b1c908d7f82a4ecd%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637250732909586843%26amp%3Bsdata%3DLQ6bZJJGVyj2OBjKyuvi0%252FS8IzZFI4ECbZpIdtmy1zA%253D%26amp%3Breserved%3D0%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3EThe%20recorded%20Virtual%20Summit%20is%20available%20to%20watch%20here%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3Bfrom%20Terranova%20Security%3C%2FSPAN%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3ELet%20us%20know%20what%20you%20think%20in%20the%20comments!%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335551550%26quot%3B%3A6%2C%26quot%3B335551620%26quot%3B%3A6%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1384049%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EOffice%20365%20ATP%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ETraining%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

 

On Tuesday, May 5th, at 12:00 pm ET, I opened up my laptop, poured some coffee and joined hundreds of security awareness professionals at the Security Awareness Virtual Summit, 2020, hosted by Terranova Security and sponsored by Microsoft. The next 3 hours were chockfull of presentations, expert advice, a hands-on workshop and a deep dive into Terranova Security training 

 

Speak the language of business by using data  

Brian Reed, Senior Director at Gartner kicked off the day with his keynote speech: “Three Ways to Gain Support for your Security Awareness Program.” Brian focused on a problem many security awareness professionals struggle with – how to secure executive buy-in for an organization’s security awareness program. Demonstrating ROI can be hard in the absence of standard metrics, and behavior change is difficult to measure. Brian advised professionals to  “speak the language of business” translating the outcomes of security awareness programs into business outcomes and drilling down into the financial implications of improved awareness.

 

Later in the day, Terranova Security CISO, Theo Zafirakos also highlighted the importance of measuring total cost of breach. Designing and deploying a security awareness training will incur some cost, but if done well, it will save far more in lost productivity, remediation expense and downtime.  

 

Storytelling is your secret superpower to boost engagement  

An important takeaway from Brian’s speech was the power of storytelling in improving engagement and participation in security awareness training. Brian urged security awareness professionals to harness the power of stories to build emotional connection. Humans are hardwired to respond to stories—with elements like character, obstacle or challenge and eventual triumph. Usually, Brian said, we use a traditional crime or spy story in the realm of risk and security, but for awareness programs, and he encouraged the audience to think outside the box and experiment with adventure or humorous narratives to increase engagement.  

 

Adopt an Attacker mindset through phish simulation to detect and quantify risk  

Microsoft PM Lead, @Brandon Koeller  discussed the importance of simulated phishing to your training program. As Brandon said, “Phishing is THE risk, capital T-H-E” when it comes to people. 

  

RukmaSen_0-1589315351747.png

 

 

Using phish simulations that accurately simulate your threat environment will help you establish a baseline of awareness, detect vulnerable users, quantify behavior change, and demonstrate the effectiveness of training. Koeller reminded us that as security professionals we tend to inhabit a defender mindset but to truly prepare and protect your employees, you need to inhabit an attacker mindset. Phish simulation that mimics real threats in your environment – using context-specific lures and the types of emails most likely to land in your employees’ inboxes. 

 

The expert panel, featuring Lise Lapointe, CEO of Terranova Security, Erin Csonaki and Blythe Price, Program Managers for CyberSecurity Awareness and Education at Microsoft and Bill Dunnion, Director of the Cyber Resilience Office at Calian highlighted the organizational behavior axis of security awareness – they reminded listeners that their security awareness programs are not merely compliance checklists but a key component of security culture. They urged the audience to frame security awareness training as a key tool in elevating the importance of security and cyber hygiene in the minds of their employees.  

 

If you missed out on signing up for the virtual summit and want to catch up on the learning, best practices, tips and advice, you’re in luck. The recorded Virtual Summit is available to watch here from Terranova Security

 

Let us know what you think in the comments!