Security Awareness Program – Execution Plan Last Updated: August 2, 2013 Table of Contents 1. Executive Summary ...................................................................................................................... 3 2. Steering Committee ...................................................................................................................... 3 3. Who .................................................................................................................................................... 3 4. What ................................................................................................................................................... 4 5. How .................................................................................................................................................... 5 5.1 New Hires ..................................................................................................................................................... 5 5.2 Training......................................................................................................................................................... 5 5.3 Closing Accounts ........................................................................................................................................ 6 6. Feedback and Improve ................................................................................................................ 6 7. Testing & Metrics .......................................................................................................................... 6 8. Key Dates and Milestones........................................................................................................... 7 Security Awareness Program – Execution Plan 1. Executive Summary Our organization has an impressive track record preventing and responding to security threats. A large portion of the credit for that success comes from employees and how they have adapted their behavior over time, in part, due to previous security awareness efforts. To continue that success, we need to evolve the current ad hoc program into a formal effort that ensures all users of the system are covered—not just those willing to show up for a free lunch. A more mature awareness program organized by the training group, enforced as a business process by HR, and overseen by IT security will promote better decision making and serve as a vehicle for compliance training in other areas, such as the FCPA and SBU project data protection. Sessions will be available live, in recorded format and, in some cases, using professionally designed videos. This will allow flexibility, the opportunity to ask questions and improved engagement with the content. 2. Steering Committee Our organization has formed a Security Awareness Steering Committee (SC) made up of various members from the organization. The role of the SC is to assist the Security Awareness Officer, with planning, executing and maintaining a successful and engaging program. Current committee members are: M. P. J. J. A. W. C. M. M. A. The committee will also include 2 rotating members from among the learning coordinators in each office. 3. Who All employees, contractors, interns and joint-venture employees (RME) will be required to participate in the training program and assessments. This is the same target population as the current program, but with a formal tracking mechanism for completion. Security Awareness Program – Execution Plan 4. What The following is the training content that we recommend for the initial year of the newly formalized program. This training was selected by completing a risk analysis of all humanbased risks to our organization, including those risks based on the top human attack vectors. We then prioritized the topics and selected those topics that reduce the greatest amount of risk to our organization. New topics may be introduced and others retired in subsequent years. Training Modules Description The goal of this module is to teach employees how to Think Before You Click Sensitive But Unclassified (SBU) recognize common attack techniques delivered online and how to evaluate them in context of an email, webpage, instant message or other electronic format. The employee should be able to demonstrate knowledge of PBS order 3490.1A and its requirements, as well as the precautions for working on need-to-know projects. Financial Frauds Foreign Corrupt Practices Act The employee should be aware of common financial frauds including phishing sites, ATM/Gas pump Skimmers and malicious software that legitimate financial sites. hijacks communications with Understand the legal requirements of the Foreign Corrupt Practices Act (FCPA). Hacked - Recognizing Signs of Infection Have employees identify and report suspicious behavior on their systems. Safe Browsing Employees will learn safe web browsing habits for home and office use. Employees will understand how to use passphrases, the Picking a Better Password importance of not reusing passwords across sites and what two-factor authentication is. Employees will understand the immense amount of data Mobile Devices Security Awareness Program – Execution Plan available from their mobile devices and how to report their loss in a timely fashion. Protecting Your Home Computer Employees will learn good security practices for their home computers. Employees will learn techniques to allow their children to Protecting Your Kids Online learn from the Internet while limiting exposure to inappropriate content and people they should not interact with. 5. How Our focus will be on how the training not only protects people at work, but protects them at home. This engages more interest in the program than merely focusing on behaviors in the workplace, and helps reinforce good security habits when using any computer. 5.1 New Hires All new employees and contractors are required to complete the online version of the security awareness training course within 15 days following their start date. This process will be monitored by HR as part of the standard onboarding process. Exceptions will be referred to the person’s manager and IT. Accounts in violation may be placed in a security group with extremely restricted access to the Internet. 5.2 Training Annual Training: The primary method we will use to communicate our program is annual in person or online video training through our internal Learning Management System. For inperson training, attendees can take an assessment and turn it in with their course evaluations. During online training, all users will take an online quiz to test comprehension of each module. This annual training will take place in the office during the scheduled hardware refresh and anyone unable to attend will be required to make up the course using the online version. The learning manager will schedule the in person classes and notify anyone who does not sign-in about their requirement to attend the online version within 30 days. The Learning Management System can track both types of courses as required continuing education and provide warnings if training is not completed. Reinforcement Training: Throughout the rest of the year we will provide infrequent updates to staff on novel threats. Since many staff will ignore an email newsletter, we will provide more frequent updates on the IT security page that employees may choose to follow if they wish. Security Awareness Program – Execution Plan 5.3 Closing Accounts All access to our Learning Management System requires a valid corporate account. Once an account is disabled it can no longer be used for federated access. 6. Feedback and Improvement Our security awareness and education program is a long term project. As such we need a process to continuously update and improve our program. Feedback Evaluations: Every in-person training session provides an evaluation form for providing feedback on both the content and presenter. For users of the online version, the Learning Management System can collect feedback as part of the end of module quiz. Steering Committee Meetings: The steering committee will meet twice a year to review the program, including any content updates that are needed. The current modules will be reviewed for out-of-date content and updates to meet new compliance requirements. New modules may be introduced and others retired as needed. 7. Testing & Metrics As we move to a more mature security awareness program we are identifying metrics that will show the progress we are having in improving decision making. collection will start with the new required assessment. Our primary data Previously, no testing has been required and employees have only been counseled after an incident. These new assessments may allow us to identify users in advance who do not understand the concepts presented. As the program continues we would like to test a phishing assessment with a pilot group of users randomly selected from the user population. This assessment will entice a user to follow a link to a website and provide their logon credentials and other information. As this is an experimental portion of the program, the results will remain confidential other than the user being notified after providing their information. Should this prove to be a valuable technique, we will recommend expanding it to the entire user base along with recommendations for how to educate users who disclose this personal information. Security Awareness Program – Execution Plan 8. Key Dates and Milestones Below are the timeline and key milestones for the rollout of the new awareness program. 1. August: a. Project Approval b. Initial steering committee meeting for implementation 2. August-October: a. Development of custom curriculum and assessments b. Acquisition of licenses for appropriate online modules 3. November 1 – Initial email from CEO to all staff officially announcing updated security awareness program and new mandatory assessments. New hires starting after this date will need to fulfill the requirements. 4. November – First delivery of in-person training during a scheduled hardware refresh trip. All employees in that office will start their 30 day timer for completing the assessment in person or online. The steering committee will reconvene to review the effectiveness of all processes. 5. December – The program should be fully up and running with each office being visited at least once during every calendar year. Security Awareness Program – Execution Plan