How do you take your program from non-existent to promoting a robust metrics framework? Or, on a realistic scale, what actions should be taken to simply move your program up to the next level, such as going from having a compliance-focused security awareness program to promoting awareness and behavior change? The steps outlined within this poster download serve as a roadmap to effectively maturing your security awareness program to the different levels as described in the Maturity Model.
As an executive, how does your role affect the development and maturation of a security awareness program? Do you wish your leadership provided stronger support on your awareness program efforts? This poster provides an outline of what your program might be missing and how executives can be the leader in a program's performance.
Looking to identify which awareness program vendor's solutions are best aligned to your organization's specific needs? Get the SANS Security Awareness Poster to start making the best-informed decision possible. Here are the 5 Things to Ask When Evaluating a Security Awareness Training Vendor.
Download this poster, Top Five Lessons from the 2018 Security Awareness Report, which examines the challenges in managing human risk and the ways even the most mature awareness programs work to overcome those challenges.
Do you know where your organization falls on the Maturity Model? Download this complimentary poster, The Anatomy of a Successful Awareness Program, to identify the seven key steps toward building, maintaining, and measuring a mature security awareness program.
Every device you are connected to makes you increasingly more vulnerable to a cyber attack. Cyber criminals can quickly target you and your valuable information for their personal gain if given the opportunity. Review this poster to educate you, your organization, and even your family members to better understand the methods a cyber criminal may take to hack into your mobile device or computer. The information in this poster could provide you with the steps to become less vulnerable in the future and actively engage people in your security awareness program. This poster is based on the original work of Brian Krebs.
This poster teaches people how to identify phishing and spear phishing emails. It provides an example of a common phishing email and the most common indicators that it is an attack. This poster was created as a community project based on input from numerous individuals and organizations.
This poster walks families through the five key steps on how to create a cyber secure home. What makes this poster so powerful, is these are also the very same secure behaviors that most organizations want employees to exihibit at work.
This poster identifies and explains different reasons why and how cyber attackers will target Industrial Control Systems / SCADA networks. This is an excellent awareness resource for critical infrastructure.