2.1 Making Content Relevant to the Audience

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

2 hours 23 minutes
Video Transcription
before we take our first step in looking at incorporating experiential learning into your training content, I'm first going to ask you a question.
What makes you pay attention to something?
It's not an easy question to answer in words. It's more like a feeling that the subject matter has some relevance to you, perhaps because it's helpful or beneficial. Closely related to this is the familiarity on developments of the context in which you received the message.
Maybe it relates to part of your environment
somewhere you live or work. For instance,
what might also grab your attention is not just that message. It's the messenger. It may be someone you respect on recognize or an authority figure. This is the concept of credible messages from credible people on its used extensively by the advertising industry,
using Olympians to endorse health products, for instance,
on Olympian because of their achievements, become credible messages on this subject matter. And if you're the type of person that values fitness, maybe or in training for a specific type of sport, their message becomes very relevant to you. So basically, the answer to the question
is relevance and credibility. That's what grabs our attention
on this is the subject off this first module building a bridge of relevance between you and your audience.
The learning objectives for this lesson are focused on creating content that builds a bridge of relevance for your program participants.
In this lesson, I will come for approaches that are designed to engage your audience by making your program content appear relevant. Attention worthy and focused on the education needs of the audience.
There are five basic steps involved in building a bridge of relevance.
First, the content looks like it belongs to your organization, following the same style as any other corporate communications.
Second, introductory messages come from credible authority figures who will be familiar on instantly recognizable to participants on your course.
Be human showed that there were real people behind the security education program. Be memorable you short messages and logos to brand and reinforce the security education program
and finally be relevant. Remember, we're trying to build a threat recognition capability for the end user, so make sure your content is focused on the threats that we would expect users to encounter standards and highly technical case Studies might be interesting to you,
but your colleagues may not share the same passion for this subject matter.
Always keep the needs of the audience on the end in mind,
We like things that are familiar on fit into our accepted order of things. When things are presented in formats that are familiar to us, we feel comfortable with, um, because we recognize them under spared the mental effort of fitting the unfamiliar into our existing paradigms.
So the first step in incorporating experiential techniques into your existing content
is to make them look like they belong in your organization. On that they have been developed by your organization. It's important that the format and style of your content conforms to accepted norms and standards. Things like language
terminology and court put logos and stylization come together to send a message to the participant
that this stuff was developed here and is authentic to your organization. Even more importantly, familiarity ensures that there are no subliminal resistance from the part of the participants, as they unconsciously struggled to accept content delivered in an unfamiliar format.
In the introduction to this module,
we mentioned the principle of credible messages from credible people. A good example is where advertisers of health products used athletes as spokespersons for their products. Athletes have generally considered as paradigms of healthy living on Olympians, in particular, because of their success
make highly credible ambassadors for health products.
The objective here is to incorporate this principle into our security education program.
The first step is to get a senior management figure to say a few words at the very beginning of your training. Content, for instance, the CEO will be a good place to start.
The CEO is likely to be the most well known person in your organization. Everyone knows who the CEO of their organization is there an authority figure who is known to make big decisions and lead the company in a particular direction.
And in the majority of organizations, they are instantly recognizable. They are the credible person
delivering the credible message.
So spend some time making sure this part of your content creates impact by providing the executive with a good script like the one that's just appeared above on using media that has the greatest impact. Ah, photo of the CEO with the message in text. Above is good,
but a video with a voiceover
create significantly more impact. It creates a personal touch because it seems that the CEO is talking directly to each participant on a video with sound humanizes the delivery.
So using a video clip of your CEO delivering the introductory message for your course creates credibility.
But it also sends out several other highly supportive messages.
It shows that the CEO is on board with the security education program. After all, they took the time to make a video on that. The leader of the organization is supporting the cyber security team's efforts on. Remember, we discussed the importance of familiarity a few moments ago.
We're using a highly familiar figure to introduce your calls
reinforces the familiarity, putting another plank in your *** of relevance.
When things are faceless, they become difficult to engage with and easy to ignore because they don't seem to be part of our world.
Within your existing security education program, you're likely to have use the phrase the intercept team are here to help. But just who is there to help? Try looking at this from the perspective of a participant.
They may well be using some browser based text orientated content or running through a power point presentation. It's really difficult for them to imagine that there are real people behind the Intersect function on even more difficult to imagine having a working relationship with them.
So is part off the security education program. Why not introduce the Intersect team, show some photographs offthe, um, or maybe even some video clips, so that they could be introduced as riel people? This approach
personalizes the introduction from the intercept team.
Humanizes Thumb on also sends out a really positive message that they have bothered to make the effort to reach out to their colleagues.
Logos and strap lines. Help you create thematic reminders of key concepts within your security education program.
They help you summarize what your program is about in a few words that can easily be committed to memory. On the logo helps to create a visual cue for the strap line, so that even if the words aren't we called exactly, the meaning remains evident.
I've included some examples of struck blinds and associate ID logos above
the sacre look at them in a little more detail. First, the words on the logo complement one another. The image reflects a visual ization of an activity mentioned in the security education program and service is as a visual reminder of that message.
Getting this right is really important in giving your security education program
on easily recognizable identity that everyone can recognize seeing it serves as a reminder of the principles within the security education program
aiding memory recall.
But even more important, is it role going forward to support the more advanced aspects, which will be covering a module two
and finally, to conclude this first lesson,
keep your content relevant to the audience on. In this case, it's the end users in your organization. People become cyber security specialists because they're interested in it. But just bear in mind, your passion for the subject may not be shared by your colleagues.
So while standards the latest products best practice, emerging regulations
might be interesting to you, it may not be quite so exciting to your colleagues in the wider organisation. Remember what the overarching objective of security education in this context is, which is to develop threat recognition capabilities for everyone throughout your organization.
So, for instance, your colleagues don't necessarily need to know when an advanced, persistent threat is
or indeed what it does to make itself persistent. But what they do need to know is how to recognize a threat when it manifest itself during their day to day activities on what they should do about him keeping content. Melvin keeps your audience onboard, and it also sends out an important message
that you've bolted to think about their needs
before we go to the end of less and recap,
Can you now recall three of the five pillars of the Bridge of Relevance?
Okay, let's now move on to the lesson recap
in this module. We took the first steps to incorporate experiential learning techniques into your current security education program. We've covered some of the basic approaches to create an initial bridge of relevance to your colleagues to bring them on board, such as familiarity of style,
credible messages from credible people
making the Intersect team human and recognizable, inaccessible, creating logos and strap lines to develop memory hooks and finally making content relevant to the audience. Your nail ready to continue your journey
module to is next and deals with the concept of visualization
compared to text and spoken word on how it improves the learning experience.
Okay, That's it for the first lesson off. Making it stick. Thanks for watching, and I'll look forward to seeing you in Lesson two.
Up Next