Advanced persistent training : take your security awareness program to the next level /: take your security awareness program to the next level. (2017)
- Record Type:
- Book
- Title:
- Advanced persistent training : take your security awareness program to the next level /: take your security awareness program to the next level. (2017)
- Main Title:
- Advanced persistent training : take your security awareness program to the next level
- Further Information:
- Note: Jordan Schroeder.
- Authors:
- Schroeder, Jordan
- Contents:
- At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System. Chapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks. CopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; SupportAt a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System. Chapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks. CopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; Support the Volunteers; Volunteers Draft the Plan; Tell Their Stories; Rinse, Repeat; Will It Work?; Accelerate; Storebrand Case Study; Security Operation Center Case Study; Chapter 8: Take Your Program to the Next Level; Appendix A: Lessons from the Masters. Wombat Security TechnologiesPhishLine; Rapid7; Curricula; How to Implement Third-Party Training; Wombat Security Technologies' Joe Ferrara; PhishLine's Mark Chapman; Rapid7's Todd Lefkowitz; Curricula's Nick Santora; References; Index. … (more)
- Publisher Details:
- United States : Apress
- Publication Date:
- 2017
- Copyright Date:
- 2017
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer science
Computer security
Computer networks -- Security measures
Computer networks -- Security measures
Computer security
Computer Science
Security
Computer Applications
Systems and Data Security
Computers -- Data Processing
Computers -- Security -- General
Information technology: general issues
Computer security
Data protection
Electronic books - Languages:
- English
- ISBNs:
- 9781484228357
1484228359
1484228340
9781484228340 - Related ISBNs:
- 9781484228340
- Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (Ebsco; title viewed on June 20, 2017). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.359933
- Ingest File:
- 02_340.xml