<p><b>Make security a priority on your team</b> </p> <p>Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every <i>37 seconds. </i>Since security programs are only as effective as a team’s willingness to follow their rules and protocols, it’s increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. <i>Security Awareness For Dummies</i> gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization. </p> <p>Written by one of the world’s most influential security professionals—and an Information Systems Security Association Hall of Famer—this pragmatic and easy-to-follow book provides a framework for creating new and highly effective awareness programs from scratch, as well as steps to take to improve on existing ones. It also covers how to measure and evaluate the success of your program and highlight its value to management. </p> <ul style="margin-bottom: 0in; margin-top: 0in; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; cursor: text; overflow: visible;" type="disc"> <li>Customize and create your own program </li> <li>Make employees aware of the importance of security </li> <li>Develop metrics for success </li> <li>Follow industry-specific sample programs </li> </ul> <p>Cyberattacks aren’t going away anytime soon: get this smart, friendly guide on how to get a workgroup on board with their role in security and save your organization big money in the long run. </p> <p> </p>
<p>Introduction 1</p> <p><b>Part 1: Getting to Know Security Awareness 5</b></p> <p>Chapter 1: Knowing How Security Awareness Programs Work 7</p> <p>Chapter 2: Starting On the Right Foot: Avoiding What Doesn’t Work 19</p> <p>Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33</p> <p><b>Part 2: Building a Security Awareness Program 51</b></p> <p>Chapter 4: Creating a Security Awareness Strategy 53</p> <p>Chapter 5: Determining Culture and Business Drivers 61</p> <p>Chapter 6: Choosing What to Tell The Users 75</p> <p>Chapter 7: Choosing the Best Tools for the Job 89</p> <p>Chapter 8: Measuring Performance 107</p> <p><b>Part 3: Putting Your Security Awareness Program Into Action 119</b></p> <p>Chapter 9: Assembling Your Security Awareness Program 121</p> <p>Chapter 10: Running Your Security Awareness Program 143</p> <p>Chapter 11: Implementing Gamification 165</p> <p>Chapter 12: Running Phishing Simulation Campaigns 181</p> <p><b>Part 4: The Part of Tens 207</b></p> <p>Chapter 13: Ten Ways to Win Support for Your Awareness Program 209</p> <p>Chapter 14: Ten Ways to Make Friends and Influence People 215</p> <p>Chapter 15: Ten Fundamental Awareness Topics 221</p> <p>Chapter 16: Ten Helpful Security Awareness Resources 227</p> <p>Appendix: Sample Questionnaire 233</p> <p>Index 253</p>