Time
1 hour 53 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:09
Lesson three measure. What matters?
00:18
How do we know when we're winning?
00:20
When we first started this course, I said that the overall objective of any security education program should be focused on one thing.
00:29
Building the threat recognition capabilities of our colleagues throughout the organization. So how do we know when we are winning at this?
00:39
You probably thought, while it's about being able to measure, whether we're traveling in the right direction in order to meet our objective
00:46
and you'd be correct. And it's the subject of this lesson designing and capturing metrics that provide assurance that our security education program is delivering on the objectives that we set for it.
01:00
This is more than just capturing attendant statistics.
01:04
It's about metrics that create actionable intelligence
01:10
Metrics that create actionable intelligence. Enable us to make informed decisions about our organization's training programs based on measurable outcomes related to the behaviors that are being adopted on the skills and no hell that is demonstrably present in our organization.
01:33
Gathering meaningful metrics from our security education program requires more than measuring the level of participation in scheduled security education sessions or how many colleagues clicked on a fake phishing email there are many ways in which metrics like these can be misleading. For example,
01:52
measuring employee participation in security education sessions just gives an indication of who turned up on who did not.
02:00
It provides no indication of whether or not they actually learned anything much less whether or not they can actually apply that learning on a day to day basis,
02:09
fishing tests can be compromised on several levels.
02:14
Using the number reviews is who clicked on a fake email versus the number of e mails sent can be highly misleading. Firstly, the email may have been ignored by the majority of people in the organization for any number of reasons.
02:29
I would if the one person who did click on a phony email then alerted dozens of their colleagues along the lines of Hey, guys in for second. Added again with those phony emails,
02:40
users often don't learn much from fishing tests.
02:44
Think about one happens to someone who does click through on a link in one of these phony emails.
02:51
First, they hit a landing page that tells them they have been caught by a fake phishing e mail.
02:55
On often, they then have to click on a link to involving further training.
03:01
What did they learn from this?
03:04
Not much. In my experience. The initial landing page contains no information about where the red flags were in the email that was clicked on by that user
03:15
on. Then the user is further directed away to enroll in remedial training. The experience has taught them very little.
03:23
When we designed metrics for a program, any program, we need to make sure that the metrics we gather our representative of the objectives that we're aiming for.
03:34
So we need to be sure that the metrics we capture are not ambiguous in the context of information security education. We need to ensure that our metrics are giving an unambiguous picture of two things. Al colleague's behavior
03:51
by capturing metrics that capture the actions they take
03:54
on their threat recognition capability by measuring what they really know.
04:01
Measuring actions taken on a day to day basis gives a powerful insight into the way in which our colleagues are behaving.
04:08
Remember. One of our key aims for security education is to encourage safe behaviors amongst their colleagues,
04:15
measuring things like reports of potential phishing emails and attempts at social engineering. Give a really insight into what people are actually doing.
04:25
It shows two things. Firstly, it shows that they can actually recognize a threat when it manifests itself.
04:32
Secondly, it shows that they know how to select the right response when they see the threat.
04:39
This is one way in which you can obtain meaningful metrics from a simulated phishing attack.
04:44
Rather than focusing on the users who click on the fake email, why not measure the number of reports you get from this exercise?
04:51
This is a much more meaningful measure because it shows your colleagues can recognize the threat and know what to do when they see it.
05:00
When combined with the micro learning schedule, which was designed to reinforce the recognition capabilities, you have a powerful set of metrics. The exponential learning approach provides any environment. Toe home your colleagues for recognition skills and keep them appraised of current threats
05:19
on by using your simulated phishing attack tall, you have the basis to measure that your colleagues are likely to take the correct action when they do encounter a threat.
05:31
In this topic, I want to discuss how we can get metrics that measure the threat recognition capability of our colleagues so that we can assess our overall vulnerability to cyber threats where end users are the chosen attack vector
05:46
metrics like these give us an organizational vulnerability assessment to specific threats. Moving is way beyond statistics based on training course attendants. On taking us towards actionable intelligence
06:00
in Lesson two of this module, we looked at the concept of reinforcement, small interventions that reinforce the knowledge and principles covered in the main security education content
06:11
We can capture the metrics we need from these micro learning reinforces drawing actionable intelligence about the capabilities of our colleagues on their organization as a whole.
06:21
We can also adapt our use of simulated phishing attack platforms to generate complimentary metrics.
06:32
Let's now take a walk through on this topic of metrics first, using a quick reprieves of our micro learning exercises to show our journey from providing an experiential learning exercise to generating meaningful metrics from it.
06:47
Here we're sending out an e mail to our colleagues with a link to an exercise that we have created, or it may have been based on some new threat intelligence that we have acquired.
06:58
When the user receives the email, they participate in the short learning exercise and in the case, shown identifying red flags in the simulated email.
07:08
At the back end, we capture the overall results of the exercise.
07:12
As you can see, we've captured the results of our colleagues interaction with the exercise on. We have a view of who recognized the red flags with their own skill on who needed some help in this area. By capturing these metrics, we can generate an accurate picture of our colleagues capability to recognize cyber threats.
07:31
Let's turn now to a rather different use for a simulated phishing attack platform. So instead of focusing on those colleagues who clicked on a link in one of thes e mails, why don't measure who did the right thing?
07:44
So we construct and distribute a fake email in the normal way.
07:49
But what we are concerning ourselves with is how many of our colleagues recognized the email of spurious on dhe, then use the fishing reporting. But
07:59
the matrix we gain from this are again highly relevant to our objective of measuring the intrinsic threat recognition capability within our organization. The metrics that we gather from this approach tell us how many of our colleagues recognize the threat when they see it
08:15
on Dhe, then a dot the correct response.
08:20
Okay, now just a quick post assessment question on the topics that we've covered in this lesson.
08:26
What are the two key metrics that we use to measure cyber security capabilities of end users?
08:37
That's right. Threat, recognition and response.
08:41
Let's now move on to the lesson summary.
08:46
In this lesson, we have covered the metrics that we need to generate so that we can obtain assurance that our colleagues are capable of recognizing and responding correctly to cyber threats when they encounter them.
09:00
We looked at leveraging our experiential learning approach to maintain use of skills and knowledge on to help them recognize emerging threats.
09:09
In the next video, we're going to look at some practical steps that you can take to embed security consciousness in the culture of your organization.
09:22
That's it for this lesson of making it stick.
09:26
Thank you for watching, and I'll look forward to seeing you in lesson for

Up Next

Creating Effective User Awareness Training

Creating Effective User Awareness Training is based on educational principles that result in learning and skills retention. End users and information security professionals need a better approach than what is currently out there in the market place at the moment.

Instructed By

Instructor Profile Image
Steve Dance
Instructor