Page 65 - Cyber Defense eMagazine - September 2017
P. 65
much serious consequences such are the business collapse or terrorist diversion, they would
undoubtedly see themselves as some kind of heroes saving the nation’s strategic asset or some
financial institution. Everyone would like to be a hero and if you use such a fact within your
training and try to motivate your staffs to think like so, they would definitely turn into your secret
weapon.
In other words, in case of the phishing attacks – it’s so important to make the right approach to
your knowledge transfer. The point is to try to motivate people to think in a positive way and get
proud on themselves any time they report any suspicious email. In addition, we would notice
that it’s quite significant to invoke the researchers to your training program because they could
support you with a plenty of useful information and in such a case – your task would be to
encourage people to think positively about their role in that organization and to realize how they
are important in terms of asset’s secret weapon. On the other hand, the current marketplace
would offer many software solutions to any kind of cyber defense challenge. Even in such a
case, it’s so significant to get your researcher’s community involved because those guys could
make many innovations to developer’s projects. On the other hand, if your staffs are using some
software in order to prevent the certain cyber situation, they should get a feeling through the
training that they are doing
the great job and they should
get proud on themselves. In
other words, today’s
education and training
sessions are good, but we
would need that little piece of
motivation suggesting to
people they are the secret
weapon to their
surroundings. We would also
want to advise the trainers
delivering the courses to do
that in a simple manner,
because in case of the
phishing – many people
dealing with such a
terminology for the first time
may believe their employer is inviting them to some catching the fish occurrence. So, just try to
put your training on a basic level attempting to explain the things so simply. You would see that
your audience would be so thankful for such an approach and above all, they would get that gut
that they are somehow important to their environment. The fact is that the employees should not
get overconfident about their skills for a reason it’s quite trickery to manage such staffs. They
should be with the realistic confidence being aware of their purpose in their organization and
significance of their responsible behavior within a cyberspace.
Finally, we would recommend to training developers to prepare their outcomes for the
charismatic trainers that would deal with such an energy that would definitely reflect itself so
positively to the audience. The preparation of training is not an easy task – it takes a lot of
research skills and if you want to make something useful – make it simple. At the end, the
transformation of people from the weakest link in a chain to your secret weapon is a quite
challenging process, but it’s definitely worth that.
65 Cyber Defense eMagazine – September 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide.