February 18, 2013 by Alison Wright Like Tweet +1 Pin Share StumbleUpon Tumblr Reddit I thought since it was President’s Day I would share some quotes from past Presidents that maybe will inspire you still today!
Alison Porter is a Business Psychologist with 20 years experience in coaching, consultancy, HR and executive search, specialising in senior level assessment and development.
As a coach Alison designs tailored programmes to facilitate change, combining the use of psychometrics with a variety of coaching methodologies. An essential part of Alisona€™s model is the development of greater self awareness around perceptions, motivations and preferences. Level A & B qualified, Alison uses a wide range of psychometric instruments and 360A° tools in her work, including the Hogan Assessments and the Leadership Versatility Index.
Security awareness training is pivotal to your organizationa€™s information security posture, and, now, ita€™s more important than ever before.
In many ways, security awareness training exemplifies the way information security is seen and tackled by senior management. A once-a-year, classroom-based approach may be traditional, with security updates and warnings posted on walls and the Intranet, but it is also a sign of a tick-box, compliance-driven approach to security. The information security industry has recognized this, calling for an end to prevention-focused defenses, and more focus on response. Therea€™s a debate to be had on how seriously Chief Information Security Officers (CISO) or Chief Security Officers (CSO) are taking security training a€“ and how well theya€™re doing it. One study, commissioned by ClubCISO last year, found that 21 percent of CISOs had a€?nevera€™ given security training, with a further 21 percent indicating that they only did so when new staff joined the company. More than half (52 percent) of the surveyed CISOs admitted that their security awareness training programs had a€?no measure of effectiveness', while 24 percent said that they relied on online testing.
Pete Wood, CEO of infosec consultancy First Base Technologies, says training programs have to change, top-down. Stu Sjouwerman, CEO of security awareness training provider KnowBe4 a€“ Kevin Mitnicka€™s company, agrees that this a€?old-school, compliance check-boxa€? training, usually done over PowerPoint, is fading out. Wood says that it is pivotal to establishing a security culture to get training right, while independent pen tester and social engineering expert Richard De Vere calls for a more direct approach.
Some take bolder steps; one company sent simulated email attacks to board members before presenting to them on the same topic. Others, however, are not so forthcoming, and it goes back to the importance of CEO-CISO communication.


Wood says proactive companies should first do red teaming exercises to work out their potential areas of compromise, so they can shape the program and address the specific risks to the business.
He tells CSO Online the story of one UK-based life sciences company, whose head of information sector hired First Base to build a a€?storyboarda€™ of an attack. That sort of imaginative approach to the problem is whata€™s needed, rather than taking a classroom-based approach.
Sjouwerman says its three-step process from establishing a baseline test, finding the results and training a€?everyone from the mailroom to the boardroom.a€? Tests, he says, must be done on a regular basis to keep employees interested and learning. Next year his firm is working with a UK charity to build red teaming exercises into their annual conferences. Wood admits that the biggest challenge is continuing the program, making it year round, something he says requires time and money. Media reports can be used to keep a buzz around security, especially if breaches are local or industry-relevant. Sjouwerman sees advantages to both the a€?carrota€™ and a€?the stick approacha€™, but advises CISOs to enlighten employees on how this knowledge can be used at home for their own personal security. Richard Starnes, CISO at the Kentucky Health Cooperative, agrees and tells CSO: a€?In my companya€™s awareness program, we break down the skills and relate them to things you would do to protect yourself at home.
Starnes, who urges CISOs to establish KPIs to establish training effectiveness, adds: a€?There cannot be a culture of blame.
Earlier in her career Alison spent seven years with Baring Asset Management where her responsibilities included developing and implementing selection processes, leadership development and career management.
She works with clients to assess and clarify expectations for future growth, supporting them through a review of their aims, values and overall vision. Her clientsa€™ understanding of how these factors influence thinking styles and drive patterns of behaviour directly increase effectiveness and improve work performance. A Certified Master Coach of the Behavioural Coaching Institute, Alison also holds a Diploma in Management Coaching and Mentoring from the Institute of Leadership & Management. It is often done to appease industry regulators, PCI and data protection authorities, and the training can offer relatively basic a€“ arguably condescending- advice. The threat landscape is growing with the arrival of millions of mobiles and wearables, each with their own IP address, while organized crime and nation-state APT groups are looking at new ways of compromising victims. Thirty-seven percent said they carried out training on an annual basis and another 21 percent agreed that this was carried out a€?frequentlya€?.


A further 14 percent said they had an after-training test, with a well-prepared 10 percent measuring incident and support call volumes before and after training. Several of the board clicked on the links, and the bold CISO got his approval to send these links to end users - and provide follow-up training as required. Wooda€™s pen testers researched the company, found out that one threat actor would be organized crime, and discovered how these hackers would try and get information. Sjouwerman says that phishing games between departments can drive lower click rates, but Wood stresses that it must not be a gimmick, and must be joined up with an existing program. In the ideal world, he says each business should have security evangelists keeping up with the threats, and thinking creatively how training should take place. Some say if you use aA phishing reporting tool, or have some other way of measuring end-user security awareness; you could award top employees with a gift at a company gathering. Following this she moved into consultancy with an Occupational Psychology practice working in both the public & private sectors. Alisona€™s approach helps clients identify factors that hinder performance while making the necessary behavioural and attitudinal changes required to deliver desired outcomes. On a technical level, her approach is underpinned by the use of methodologies that draw from solution focused, cognitive behavioural and multi-modal schools of thought.
Her academic qualifications include an MSc in Occupational Psychology from Birkbeck, University of London, a BSc in Psychology and a BA in Hispanic Studies.
From exploit kits and Trojans to ransomware, phishing and social engineering scams a€“ the criminal game has moved on. From phishing emails and malware to on-site attacks via USB dongles, Wood says there were numerous weak points in the organization.
Staff have a hard enough task as it is learning all the ways in which they pose a risk to security without misinformation or gaping holes in knowledge. She has been a member of the British Psychological Society since 1998 and is a founder member of the Special Group in Coaching Psychology (2004).



Law of attraction love at first sight
Customer service excellence training ppt
Change book files


Comments

  1. 08.02.2016 at 17:49:37


    Millions of people buy lottery tickets every overall health Coach Certification.

    Author: 000000
  2. 08.02.2016 at 11:53:30


    Asked for and received via the Law belief that WE are.

    Author: Ayan