Implementing Effective Cyber Security Training for End Users of Computer Networks


IT Cognizant of Attack Types Alert to User Errors  Knowledgeable of Learning Gaps  Contribute to Learning Content I-O


Download 0.78 Mb.
Pdf ko'rish
bet6/14
Sana06.05.2023
Hajmi0.78 Mb.
#1434991
1   2   3   4   5   6   7   8   9   ...   14
Bog'liq
SHRM-SIOP Role of Human Resources in Cyber Security

IT
Cognizant of Attack Types
Alert to User Errors 
Knowledgeable of Learning Gaps 
Contribute to Learning
Content
I-O
Trained in Job Analysis
Able to Identifiy Competencies
Skilled at Competency Assessment
Adept at Training Effectiveness and Outcomes
Measurement
HR
Grasp Role of Trained Employees
Adept at Mediating Solutions
Convenor of Stakeholder Support 
Broker Integrated Solutions
Effective 
Cyber 
Security 
Training 
tra 



Competencies Users Need
The nature of employee cyber security roles varies. Required competencies may 
range from basic awareness to business process skills (Wilson, Stine & Bowen, 2011). 
These may include skills to mitigate technical risks, capacity to develop policies and 
governance, and specific practices to achieve regulatory compliance. To evaluate and 
strengthen cyber defense, SMEs must define roles within the job and security 
architecture. Once defined, it is possible to evaluate training needs and advance cyber 
security in the broader system (Brummel et al., in press). 
Targeted training programs are designed to achieve goals that meet instructional 
needs. It is counterproductive to launch training without thorough assessment of role-
relevant tasks, behaviors and environment (Goldstein & Ford, 2001). Ascertaining 
workforce capabilities is an essential step in identifying areas that require behavioral 
and attitudinal change. Training needs analyses involve asking questions that reveal 
current organizational end user strengths and development needs. This information 
allows for appropriate learning objectives to be created for the training. One-size-fits-
all training is unwise, given the array of user dispositions and skill levels. Armed with 
knowledge of employee capabilities and vulnerabilities, organizations can design and 
implement role-based training that equips users with the requisite skills to elude cyber 
deception. Role-specific training provides the foundation upon which human 
countermeasures are built.

Download 0.78 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   14




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling