Stage02 02 Example SecurityAwarenessPolicy
Stage02 02 Example SecurityAwarenessPolicy
Stage02 02 Example SecurityAwarenessPolicy
1. Overview
We recognize human risk as one of the top risks our organization faces. We define human risk
as including accidental threats (trusted individuals making simple mistakes), negligence (trusted
individuals deliberately not following policies), and deliberate threats (the malicious targeting of
our workforce by cyber attackers). In addition, leadership values not only secure behaviors but
ultimately establishing a strong security culture that contributes to the overall security and
mental health of our workforce.
2. Purpose
To effectively manage our human risk, our security team (in collaboration with other
departments) will provide continuous outreach, engagement, and security training to our
workforce throughout the year. The end goal is to ensure our workforce is actively exhibiting
expected secure behaviors to reduce our human risk to an acceptable level. In addition, we
intend to build a strong security culture that contributes to, enables, and encourages our
workforce to build security into their everyday actions and priorities.
3. Scope
This policy is applicable to all individuals (senior leadership, employees, and contractors) who
have an organization email address and/or access to organizational systems or information.
4. Training Policy
4.1 Annual Training
All employees are required to take and successfully complete security training, usually in the
form of online computer-based training (CBT) or instructor-led training (ILT), within the first 30
days of employment. They are then required to retake and complete the training on an annual
basis. All contractors or vendors with an organization email address or access to company data
are required to take the same training (or equivalent) before they can gain access to our data or
our systems and to continue to train on an annual basis if they are retained for longer than 1
year.
Training completion and results are maintained in personnel files as part of the permanent
record. Certain passing requirements and/or additional training may be required for specific
personnel based on their work roles and/or risk profiles.
1. Compliance Metrics: These measure the training and engagement activities to include
workforce completion rates. These metrics are used primarily for compliance purposes.
2. Impact Metrics: These measure actual changes of the workforce, to include assessing
their knowledge, tracking their behaviors, and measuring their attitudes and beliefs about
cybersecurity. These metrics are key to tracking impact to risk.
3. Strategic Metrics: These metrics track overall reduction in risk, to include reduction in
incidents, attacker dwell time, policy violations and overall costs.
5. Enforcement
Any individual who fails to take the required training, who continually fails periodic assessments,
or consistently demonstrates a risk to the organization may be interviewed by the individual’s
supervisor or security team to help better understand why. Additional training or security
controls may be required. In rare or exceptional cases, the individual could be subject to
disciplinary action, up to and including termination of employment.
8. Revision History
December 2023 Security Awareness Separated out from the Acceptable Use Policy
Team (AUP) and converted to new format.