rel="nofollow" href="#ulink_282d62c9-c2f7-569f-87b2-32355a493808">Looking for Similar Programs Chapter 14: Ten Ways to Make Friends and Influence People Garnering Active Executive Support Courting the Organization’s Influencers Supporting Another Project That Has Support Choosing Topics Important to Individuals Having Some Fun Events Don’t Promise Perfection Don’t Overdo the FUD Factor Scoring an Early Win Using Real Gamification Integrating the Organization’s Mission Statement Chapter 15: Ten Fundamental Awareness Topics Phishing Business Email Compromise Mobile Device Security Home Network and Computer Security Password Security Social Media Security Physical Security Malware and Ransomware Social Engineering It Can Happen to You Chapter 16: Ten Helpful Security Awareness Resources Security Awareness Special Interest Group CybSafe Research Library Cybersecurity Culture Guidelines RSA Conference Library You Can Stop Stupid The Work of Sydney Dekker Human Factors Knowledge Area People-Centric Security Human Security Engineering Consortium How to Run a Security Awareness Program Course
9 Appendix: Sample Questionnaire Questions for the CISO or Similar Position Questions for All Employees Questions for the HR Department Questions for the Legal Department Questions for the Communications Department Questions Regarding the Appropriate Person for Physical Security
10 Index
List of Illustrations
1 Chapter 3FIGURE 3-1: The ABCs of awareness.FIGURE 3-2: The ABCs of behavioral science.FIGURE 3-3: The Forgetting Curve.
2 Chapter 9FIGURE 9-1: A sample quarterly awareness program interspersing topics.
3 Chapter 10FIGURE 10-1: Consolidated metrics dashboard.FIGURE 10-2: Mobile device loss.FIGURE 10-3: Phishing results bar graph.
Guide
1 Cover
4 Table of Contents
6 Appendix: Sample Questionnaire
7 Index
Pages
1 i
2 ii
3 1
4 2
5 3
6 4
7 5
8 6
9 7
10 8
11 9
12 10