Artwork

Player FM - Internet Radio Done Right
Checked 1M ago
Added eight weeks ago
Content provided by Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
icon Daily Deals

Episode 216: User Guidance and Training (Part 1) (Domain 5)

8:44
 
Share
 

Manage episode 489039990 series 3671917
Content provided by Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how to develop and distribute effective security handbooks, integrate policies into onboarding, and require digital acknowledgment for compliance tracking. We also highlight the value of situational awareness training—helping users recognize when something feels off, such as unexpected emails, strange device behavior, or suspicious requests. Well-informed users make better security decisions and are more likely to report anomalies before they escalate into incidents. Training isn’t just a checkbox—it’s a mindset shift, and it starts with accessible, relevant, and engaging resources.

  continue reading

221 episodes

Artwork
iconShare
 
Manage episode 489039990 series 3671917
Content provided by Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how to develop and distribute effective security handbooks, integrate policies into onboarding, and require digital acknowledgment for compliance tracking. We also highlight the value of situational awareness training—helping users recognize when something feels off, such as unexpected emails, strange device behavior, or suspicious requests. Well-informed users make better security decisions and are more likely to report anomalies before they escalate into incidents. Training isn’t just a checkbox—it’s a mindset shift, and it starts with accessible, relevant, and engaging resources.

  continue reading

221 episodes

All episodes

×
 
Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss how to incorporate phishing simulations, microlearning modules, video training, and role-specific content to meet learners where they are. Execution involves not just delivery, but reinforcement through regular communication, gamification, and leadership engagement. We also cover program measurement—tracking participation, testing knowledge, and adjusting campaigns based on results. A strong awareness program turns passive users into active defenders, extending your security posture across every click, login, and decision.…
 
A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing metrics or training completion rates—can help monitor the effectiveness of your awareness program and adjust content accordingly. Beyond individual reports, monitoring systems track broader trends in user behavior, risk exposure, and incident volume, providing insight into where further training may be needed. Reporting and monitoring aren’t just reactive tools—they’re indicators of a healthy security culture. The more people contribute, the stronger your human firewall becomes.…
 
Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections. We then discuss endpoint hardening for laptops and mobile devices, including encryption, screen locking, and secure backup practices. Hybrid workers also need guidance on physical security—like preventing shoulder surfing in public places or securing devices during commutes. Training should also cover secure transitions between environments, cloud data handling, and how to report incidents while working remotely. As the office perimeter disappears, awareness becomes the frontline.…
 
Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. We also explore how cables, chargers, and other seemingly harmless peripherals can be weaponized to deliver malware or steal data. Social engineering training teaches users how to resist psychological manipulation—whether it’s through pretexting, impersonation, or urgency tactics. Finally, we dive into OPSEC, helping employees understand how casual conversations, unsecured devices, or oversharing on social media can inadvertently expose sensitive operations. This part of training connects behavior to consequence—turning security into a daily awareness practice, not just a quarterly presentation.…
 
Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also cover password management best practices: creating complex passphrases, using password managers, and understanding why reuse is dangerous. Many incidents begin with a weak or compromised password—making training a top defense. Finally, we emphasize tailoring training for different roles, with higher emphasis on privileged users who have elevated access to sensitive systems and data. The more your users understand the risks tied to their behavior, the better positioned they are to act as allies in defense.…
 
Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how to develop and distribute effective security handbooks, integrate policies into onboarding, and require digital acknowledgment for compliance tracking. We also highlight the value of situational awareness training—helping users recognize when something feels off, such as unexpected emails, strange device behavior, or suspicious requests. Well-informed users make better security decisions and are more likely to report anomalies before they escalate into incidents. Training isn’t just a checkbox—it’s a mindset shift, and it starts with accessible, relevant, and engaging resources.…
 
Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this episode, we explore how to identify risky, unexpected, or unintentional actions that may indicate insider threats, compromised accounts, or social engineering in progress. Examples include unusual file transfers, logins at strange hours, elevated privilege requests, or repeated access to sensitive resources outside normal job roles. We discuss how behavior-based tools like User and Entity Behavior Analytics (UEBA) establish baselines and detect deviations without relying solely on predefined rules. We also touch on the importance of cultural awareness, since not all anomalies are malicious—some reflect confusion, poor training, or misunderstood policy. Recognizing anomalies early can stop breaches before they escalate—and create opportunities for education and prevention.…
 
Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program that trains employees to recognize and report suspicious messages before damage is done. We discuss how simulated phishing campaigns help reinforce training through experiential learning, and how metrics such as click rates and report rates can guide program improvement. Key indicators of phishing—like mismatched sender addresses, urgent language, fake login pages, or unexpected attachments—must be taught clearly and revisited often. We also cover response strategies when phishing is suspected, including internal reporting procedures, containment, and incident escalation. Awareness isn’t a one-time presentation—it’s a continuous process of vigilance, reinforcement, and empowerment that helps turn your workforce into your first line of defense.…
 
Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques used by ethical hackers and adversaries alike. Passive recon relies on publicly available data, such as DNS records, social media, job postings, WHOIS data, or open-source intelligence (OSINT), to build a picture of a target without direct interaction. Active recon, by contrast, involves probing systems through port scans, service enumeration, or banner grabbing to uncover exploitable information. We explore how to identify when recon is taking place through network monitoring, anomaly detection, and early-warning alerts. By understanding recon techniques, defenders can better identify precursors to attack—and attackers can refine their assessments before launching a payload. Knowledge is power—and in recon, it’s the first move.…
 
The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them to focus on deep technical vulnerabilities. In partially known or gray-box testing, the tester has limited information, simulating an internal threat or a moderately informed attacker. Unknown, or black-box testing, simulates an external attacker with no insider knowledge, relying on reconnaissance and brute-force discovery to find weak points. We discuss how each testing type serves different goals—technical validation, operational readiness, or exposure modeling—and how to select the right approach based on budget, risk, and maturity. The environment you choose defines what you learn—and how far your testers can go.…
 
Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundational concepts of penetration testing, starting with physical tests that assess physical security through social engineering, badge cloning, or simulated intrusions. We then differentiate offensive testing—where testers proactively look for exploitable flaws—and defensive testing, which focuses on hardening systems in response. Integrated penetration testing combines both, offering a holistic view of security from multiple perspectives, often aligned with red, blue, or purple team exercises. These assessments measure not just technical exposure, but procedural response and detection capabilities. A well-scoped, well-executed pen test is one of the most valuable security assessments an organization can perform—it reveals not only what can go wrong, but how prepared you are when it does.…
 
External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In this episode, we explore different types of external audits and assessments, starting with regulatory audits that evaluate adherence to laws like HIPAA, PCI-DSS, or SOX. We also cover independent third-party assessments—often required by customers or investors—which validate security controls, governance structures, and risk management practices. Examinations may focus on financial systems, operational resilience, or specific security domains such as encryption or incident response. We highlight how to prepare for audits, including document collection, control testing, and walkthrough interviews with staff. While audits can be stressful, they also provide an opportunity to uncover blind spots, demonstrate accountability, and strengthen trust with external stakeholders.…
 
The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams responsible for planning, conducting, and overseeing internal audits to ensure objectivity and alignment with organizational goals. We discuss how committees bring together expertise from IT, legal, risk, and operations, and how regular meetings, defined charters, and reporting mechanisms support transparency and accountability. We also explore self-assessments, which allow teams to proactively evaluate their own processes using standardized checklists or maturity models. While self-assessments can’t replace formal audits, they provide an early-warning system and help teams stay prepared. Internal audit structures must balance independence with collaboration—ensuring that controls are tested without alienating those responsible for executing them.…
 
Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declarations that certify compliance with policies, procedures, or external frameworks. Attestations are used in vendor contracts, employee training, and system certifications, and they provide legally binding statements of accountability. We then examine the role of internal audits, which assess whether security policies are properly implemented and identify areas of improvement. These audits evaluate technical controls, review documentation, and verify that daily practices match official standards. Unlike external audits, internal audits allow organizations to self-correct and build maturity over time. Attestation proves intent, but audits test execution—and together, they build confidence inside and outside the organization.…
 
Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s stored, and how long it’s retained. We begin with the concept of data ownership—assigning clear accountability for specific datasets to ensure someone is responsible for access controls, accuracy, and compliance with privacy policies. We then examine how inventories support transparency and help enforce controls, particularly in identifying sensitive data like health records or financial transactions. Retention strategies are also addressed, emphasizing the need for clear schedules that meet legal obligations without overexposing the organization to unnecessary data risk. Finally, we unpack the “right to be forgotten,” a principle in many privacy laws that allows individuals to request deletion of their personal data—and what it takes to fulfill such requests across systems and backups. Compliance starts with knowing your data—and managing it responsibly.…
 
Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operate at local, national, and international levels—highlighting frameworks like GDPR in Europe and CCPA in California, and exploring how they shape data collection, processing, and sharing practices. We also delve into the legal responsibilities of different roles in the data ecosystem, including data subjects, data controllers, and data processors, each with specific duties and liabilities. Understanding these roles helps clarify who must do what to stay compliant, especially in incident response, vendor management, and breach notification scenarios. We discuss practical examples of compliance failures, such as unauthorized data transfer or retention violations, and the penalties that followed. Legal compliance is no longer just an IT concern—it’s a shared responsibility between security, legal, and operations.…
 
Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build and maintain a data inventory that tracks types of data collected, processing activities, access permissions, and storage locations. We also discuss retention policies that define how long different categories of data must be kept to satisfy legal, business, or regulatory requirements—balanced against the need to minimize risk and reduce unnecessary data storage. Central to privacy compliance is honoring data subject rights, including the right to be forgotten, which allows individuals to request deletion of their personal data under laws like GDPR. Implementing these rights requires technical and procedural coordination to ensure timely, complete, and verified data removal across systems and backups. Done correctly, data governance becomes not only a compliance tool—but a demonstration of respect and transparency to users and stakeholders.…
 
Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and transferred. These laws define roles like data controller and data processor, outline user rights such as data access or deletion, and impose significant penalties for non-compliance. We also explain how organizations can align with multiple frameworks through data mapping, retention controls, breach notification protocols, and privacy-by-design principles. Global compliance requires a coordinated effort across legal, technical, and operational teams to respect regional boundaries while supporting a global business model. Ignoring privacy regulations isn’t just risky—it’s unsustainable in today’s data-driven world.…
 
Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we explain how attestation involves signing a formal statement that certifies understanding or adherence—used in contexts like security training, policy acceptance, or vendor contract obligations. Acknowledgement, often required in policy rollouts or onboarding, verifies that a user has received and read a required document, even if no certification is implied. These processes are especially important in regulated industries where proving that staff are aware of their obligations is as important as the policies themselves. We explore how digital signatures, audit trails, and centralized records make these acknowledgments trackable and legally defensible. They may seem administrative, but in a legal or compliance investigation, properly captured attestations often serve as critical evidence of due diligence.…
 
Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break down the real-world impacts of non-compliance—including fines, sanctions, lawsuits, contract termination, and loss of certifications or business licenses. We examine examples where organizations were penalized for data breaches, late disclosures, weak encryption, or improper record retention, showing how these failures often stemmed from neglect, misunderstanding, or poor implementation of controls. Reputational damage from publicized failures can be even more costly, driving away customers and investors. We also discuss the ripple effects, such as increased insurance premiums, restricted market access, and closer scrutiny in future audits. Non-compliance isn’t just a legal problem—it’s a business risk that must be managed with the same attention as cyber threats.…
 
Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractual, and internal security requirements—and in this episode, we explore how to make it both accurate and efficient. We cover internal reporting practices, such as monthly compliance dashboards and policy enforcement summaries, as well as external reports prepared for auditors, regulators, and industry certifying bodies. Good compliance reporting requires structured data collection, documentation of control implementation, and clear alignment with standards like HIPAA, PCI-DSS, or ISO 27001. We discuss how automated compliance tools can streamline evidence gathering, track control status, and generate audit-ready outputs. Ultimately, compliance reporting is not just about passing an audit—it’s about validating that security is functioning as designed and continuously improving. When done right, compliance becomes a driver for security maturity rather than just a checkbox.…
 
Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship management are critical for maintaining visibility and accountability. In this episode, we explore how organizations track vendor performance through periodic assessments, SLA reviews, compliance reports, and security questionnaires. We highlight how to use continuous monitoring tools and threat intelligence feeds to detect vulnerabilities in vendor software or public disclosures of breaches. Rules of engagement must be defined upfront to allow for security audits, breach reporting, and real-time notifications about changes to services or infrastructure. We also discuss the importance of communication—building trusted, transparent relationships with vendors helps ensure faster incident coordination and better mutual security outcomes. Managing vendors is not just risk control—it’s partnership stewardship.…
 
Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this episode, we break down the types of agreements that define roles, responsibilities, and expectations with external parties. We cover Service-Level Agreements (SLAs), which outline performance and availability targets; Memorandums of Understanding (MOUs) and Memorandums of Agreement (MOAs), which define intent and responsibilities without legal enforceability; and Master Service Agreements (MSAs), which set the groundwork for vendor relationships. We also discuss Statements of Work (SOWs), Non-Disclosure Agreements (NDAs), and Business Partner Agreements (BPAs), each of which addresses specific aspects of engagement, confidentiality, or collaboration. Effective agreements must include security provisions—like data handling, breach notification, encryption requirements, and audit rights—to ensure accountability and compliance. Security isn’t just a technical implementation—it’s a contractual obligation that must be written, signed, and enforced.…
 
A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and offboarding. We explore how to evaluate vendors based on their security policies, compliance certifications, breach history, and contract terms—especially service-level agreements (SLAs) and right-to-audit clauses. Supply chain security goes beyond software and hardware providers—it includes contractors, cloud services, and even logistics partners whose failure could impact business operations. We also cover how to tier vendors by criticality, apply targeted controls, and track third-party risks through assessments and questionnaires. When you extend your network to a vendor, you extend your risk—and smart organizations manage it proactively.…
 
System resilience depends not only on planning but on measurable performance—and in this episode, we explore four key metrics that define how systems behave under failure: Mean Time to Repair (MTTR), Mean Time Between Failures (MTBF), Mean Time to Detect (MTTD), and Mean Time to Respond (MTTR—the other one). MTTR (repair) reflects how long it takes to fix a failed system, while MTBF gives insight into overall reliability by measuring the average time between those failures. MTTD and MTTR (response) are especially critical in security, measuring how fast threats are detected and acted upon once an alert is triggered. These values help organizations benchmark their operational readiness, drive investment decisions, and evaluate vendor performance. Tracking them over time allows teams to assess whether improvements are working—or whether resiliency is just assumed, not proven. In security and continuity, time isn’t just money—it’s exposure.…
 
Recovery objectives define how quickly and how completely a system must return to functionality after a disruption—and in this episode, we explore two of the most critical metrics: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO sets the maximum allowable downtime before business operations suffer unacceptable consequences, while RPO defines how much data loss an organization can tolerate, typically measured as the time between the last backup and the disruption. These values influence not just backup frequency, but also infrastructure design, failover mechanisms, staffing models, and contractual SLAs with service providers. We discuss how to determine RTO and RPO through Business Impact Analysis (BIA), and how these objectives drive recovery prioritization in disaster recovery and continuity plans. Getting them right ensures that recovery efforts are both realistic and aligned to business needs—because not all systems need to be restored instantly, but the right ones must be restored on time.…
 
Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planning, helping organizations understand which processes matter most and how downtime affects operations. In this episode, we break down how BIAs identify critical systems, estimate recovery time objectives (RTOs) and recovery point objectives (RPOs), and assess financial, operational, and reputational impacts of disruptions. We explore how BIA data feeds into decisions about backup strategies, failover architecture, and vendor selection. We also discuss how to conduct a BIA through interviews, process mapping, and dependency analysis—highlighting that the value of a BIA lies in its accuracy and how well it's aligned to real-world workflows. A strong BIA ensures that during a crisis, priorities are clear and recovery efforts are focused where they matter most.…
 
Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how risk reporting bridges the gap between technical findings and business leadership. We explore how to craft reports that align with the audience: dashboards and trend lines for executives, technical remediation plans for IT, and regulatory compliance summaries for auditors. Effective risk communication translates complex concepts into business-relevant impact, using clear visuals, prioritized lists, and defined action steps. We also cover risk heat maps, scoring tables, and narrative explanations that bring clarity to decision-makers who may not have security backgrounds. Regular reporting builds credibility, supports strategic planning, and ensures that security is seen as a contributor to business success—not just a cost center. Clear communication turns risk data into risk decisions.…
 
Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring risk often involves insurance or outsourcing functions to vendors with specialized capabilities and contractual safeguards. Acceptance applies when the cost of mitigation outweighs the threat, provided the risk is well understood and formally acknowledged. Avoidance means choosing not to engage in high-risk activities—like decommissioning an exposed legacy system or not storing certain types of sensitive data. Lastly, we discuss exemptions: documented decisions to temporarily defer action on a known risk, typically under specific conditions or deadlines. Strategic risk management isn’t just technical—it’s financial, operational, and cultural.…
 
Every organization must decide how much risk it is willing to accept in pursuit of its goals—and this decision informs every security investment, policy, and control. In this episode, we break down the concepts of risk appetite (what you’re willing to pursue), risk tolerance (what you’re willing to withstand), and risk thresholds (the hard lines that should not be crossed). We explore how these values differ across business units and change over time depending on market conditions, leadership decisions, or regulatory pressure. Risk appetite must be clearly defined and communicated, or else teams may act inconsistently—either over-securing low-risk areas or underestimating critical vulnerabilities. Establishing and enforcing thresholds allows organizations to trigger alerts, escalate decisions, or automatically block risky activity when limits are breached. When risk acceptance is guided by strategy—not guesswork—security becomes aligned, efficient, and defensible.…
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play