250 likes | 422 Views
Security Training. How to detect good and effective training. Auditors and Security Professionals, Oh My. Auditors. Security. Provide a basic guideline of what should be present Provide an idea of what periodic training should look like
E N D
Security Training How to detect good and effective training
Auditors and Security Professionals, Oh My Auditors Security Provide a basic guideline of what should be present Provide an idea of what periodic training should look like Provide some ideas that may or may not work in our environment Provide some creative ideas to improve effectiveness • Provide a review of what we are looking for when reviewing security training • Provide ideas for those cases when our opinion is requested • Ensure that the evaluation process is three dimensional
First, What is good training? • Good training meets the requirements of Regulation. • Good training ideally meets the recommendations of Regulation. • Good training covers all areas of the security policy. • Good training is periodic.
Regulations • HIPAA places the Security Training into the addressable category. (§164.308 (a)(5)(i)) • The Training is to be periodic • The Training is to cover the security policy • PCI requires training directly (12.6.1) • The Training is to be at least annual • The Training is to cover the security policy • The Training is to be diverse
Regulations Continued • NERC-CIP requires security training (CIP – 004-5) • The frequency is based on the Impact level of the Systems. • The content is based on the Impact level of the Systems. • FISMA requires reports regarding training • The content is role-based • The training is required annually
Good Training • Password Complexity • Incident Reporting • Observational Training • Reviewed and Updated • Email • Internet Use • Privacy • Social Engineering • Encryption • Data Handling • Locking Workstations Covers the Requirements
But What Makes Training Effective? • Consistent • Involved • Verified • Evaluated • Maintained
Consistent How can Management expect the staff to adhere to the policy when the enforcement of that policy is ad hoc? How can Management expect the Security Training to be useful, when the training is unreliable?
Involved • Many times we treat security using the top two of the Learning Pyramid • Occasionally, we will include audiovisual tools. • Demonstration, and Discussion are key. • Computer training can open the door for the 75% retention range. • Students retain differently than Employees
Verified • We get a receipt when we buy a donut. • We should be verifying attendance and retention. • Many CPE courses now contain tests at the end for this very reason.
Evaluated • Getting feedback from the trainees is the best way to improve retention. • Tailored training to the culture of the environment is ideal
Maintained Modern Ancient Complicated
Which leads to the question … As long as the security training is effective, why do we care if it is good?
Password or Passphrase • There is a power in the words we choose, Password inherently limits the minds of many. Passphrase opens the door to more complex, and more effective passwords. • Which is more effective? 30SeNpl or I_likew@lks in the rain! • Choose words that are more likely to modify the behavior.
Location, Location, Location • The golden rule of Real Estate also applies to Office Layout.
Appeal to a Sense of Normalcy • When we get out of our cars, we lock the doors. • When we leave our homes we lock the doors. • So when leaving our machines we should lock the screens. • Instead of telling them to do something, make the case for why it is logical, and normal.
Stigmatize the Unusual • When something out of the ordinary happens, the default response is suspicion. This should be encouraged.
Last, but not Least Unsolicited Email Links Unsolicited Attachments
Questions? QA?