employee skills
play

EMPLOYEE SKILLS TRAINING PLATFORM On-access skills training and - PowerPoint PPT Presentation

EMPLOYEE SKILLS TRAINING PLATFORM On-access skills training and measurement for all employees 1 HUMAN MISTAKES AS THE BIGGEST CYBERRISK FOR ENTERPRISES TODAY $865,000 up to $400 $861,000 $86,500 per employee per year per breach per


  1. EMPLOYEE SKILLS TRAINING PLATFORM On-access skills training and measurement – for all employees 1

  2. HUMAN MISTAKES AS THE BIGGEST CYBERRISK FOR ENTERPRISES TODAY $865,000 up to $400 $861,000 $86,500 per employee per year per breach per enterprise per SMB company average financial impact of average financial impact of average financial impact of an average cost of phishing a single data breach and a single data breach and incident involving careless attacks alone*** attack vector* attack vector* actions of employees** * Report: “ Measuring the Financial Impact of IT Security on Businesses ” , Kaspersky Lab, 2016. ** “Business Perception of IT Security: In The Face of an Inevitable Compromise”, Kaspersky Lab, 2016. 2 *** Calculations based on Ponemon Institute, “Cost of Phishing and Value of Employee Training”, August 2015.

  3. WHAT IS EMPLOYEE SKILLS TRAINING PLATFORM  SaaS platform to deliver online training modules to For all employees employees  One integrated platform for assessments, training and reporting:  Easy to spot trends  Easy to show vulnerabilities and risks  Easy to show improvements  Easy to manage from one place  Developed in partnership with Wombat Security Technologies and built on its award-winning training software 3

  4. EMPLOYEE SKILLS TRAINING PLATFORM For all employees Interactive training Simulated phishing Knowledge Reporting & modules attacks assessment analytics Fun and short 3 types of phishing attacks of Includes predefined or random Provides statistics for the various difficulty, all based on assessments, customer- organization as a whole or Based on exercises with a real-life cases defined questions, and by department, location, knock-on effect customizable length position, as well as on Teachable moments appear individual level Auto-enrollment reinforces every time employees open Covers various security skills Monitors employees’ level phishing emails domains of skills and its dynamics 20+ modules covering all Customizable templates Vast questions library and security domains randomization exclude Supports data export to a Auto-assignment in training cheating number of formats or to customer’s LMS modules for those who failed the simulated attack Demo: https://www.kaspersky.com/demo-sa 4

  5. EMPLOYEE SKILLS TRAINING PLATFORM FOR GLOBAL ENTERPRISE For all employees Employee Skills Training Platform is available in 27 languages, and this count is growing. 5

  6. SECURITY DOMAINS COVERED (LIST OF INTERACTIVE MODULES) Email Security Mobile App Security Mobile Device Security Data Protection and PII Destruction Learn to identify phishing emails, Learn how to judge the safety of Use important physical and technical Protect confidential information about dangerous attachments, and other mobile apps safeguards to protect your devices yourself, your employer and your Use portable storage safety and email scams and your data customers properly discard sensitive data Passwords Physical Security Protected Health Protecting Against PCI DSS Information (PHI) Ransomware Learn how to create and manage Learn how to protect people and Recognize warning signs and property strong passwords improve security of credit card data Learn why and how you should safe- Learn to recognize and prevent ransomware attacks guard Protected Health Information Security Essentials – Safe Social Networks Safer Web Browsing Security Beyond the Security Essentials Office Executives Learn how to use social networks Stay safe on the Internet by avoiding Recognize security issues commonly safely and responsibly risky behavior and common traps encountered in daily job Avoid common security mistakes Recognize and avoid threats met by while working at home or on the road senior managers at work and at home Social Engineering URL Training USB Device Safety Anti-Phishing Phil Anti-Phishing Phyllis Recognize and avoid social Learn how to spot fraudulent URLs Protect yourself, data, and systems Learn how to spot phishing attacks Learn how to recognize phishing engineering scams when using USB devices by identifying fraudulent URLs emails by identifying red flags 6

  7. FLEXIBLE ONLINE PLATFORM: ASSIGNING TASKS TO EMPLOYEES On-site training manager can assign specific training modules to employees, based on their profile, department, results of previous assessments or time passed since other training. 7

  8. SHORT MODULES TO ENSURE SMOOTH INTEGRATION INTO WORKING PROCESS Every training module integrates teaching with exercises and learning- by-doing In short ~15 minutes sessions 8

  9. LEARNING PRINCIPLES Combining explanations, tests and “do -it-yourself ” with hints and feedback … … to ensure people learn effectively with exercises and learning-by-doing 9

  10. BUILDING SAFE BEHAVIOR STEP BY STEP Training module guides students through the topic from basics to advanced knowledge 10

  11. SECURITY POLICY SIGN-OFF On-site training manager can add security policy details, links, IT Security team contacts to the end of training modules. 11

  12. CERTIFICATES TO AWARD EFFORTS User can get customer certificate after the training is completed 12

  13. CERTIFICATES TO AWARD EFFORTS Define length and domains to assess employees and organization’s cybersafety as a whole 13

  14. INTERACTIVE QUESTIONS TO CHECK LEVEL OF COMPETENCE 14

  15. INTERACTIVE QUESTIONS TO CHECK LEVEL OF COMPETENCE 15

  16. SIMULATED PHISHING ATTACKS: READY-TO-GO TEMPLATES 16

  17. SIMULATED PHISHING ATTACKS: RELEVANCE AND VARIETY Based on the real-life phishing Various difficulty 17

  18. SIMULATED PHISHING ATTACKS: EASILY CUSTOMIZABLE BY YOU 18

  19. SIMULATED PHISHING ATTACKS: EMPLOYEE RECEIVES PHISHING AND CLICKS… Learning experience obtained by shocking (while actually safe) aftermaths of clicking to artificial phishing email 19

  20. SIMULATED PHISHING ATTACKS: EMPLOYEE RECEIVES PHISHING AND CLICKS…  Landing page = Teachable moment  Auto-assignment of training (employee is redirected to the relevant training module after he/she reacted to the simulated attack)  Statistics 20

  21. ONLINE TRAINING PLATFORM: ANALYTICS AND REPORTS Assignment Details For Simulated phishing attacks: Most Missed Report Module Performance Archived Campaigns Module Completion Summary Campaigns Report Policy Acknowledgement Contact Groups User Report Cards Device Type User Record Export Repeat Offenders CyberStrength Risk Twelve Month Trend 21

  22. ONLINE TRAINING PLATFORM: ANALYTICS AND REPORTS Know security skills strength in particular domains from summary down to individual level 22

  23. DELIVERY AND SET-UP KASPERSKY LAB WILL PROVIDE CUSTOMER IS RESPONSIBLE FOR   User Account for the Online Platform Loading the employee emails into the platform  Training for Administrators  Creating:  Technical support Simulated attacks Assessments Training Programs  Groups assignments  Analyzing the results 23

  24. TRY OUT THE INTERACTIVE DEMO AND ASK US FOR DETAILS! www.kaspersky.com /demo-sa – free interactive demo of training modules and simulated phishing attacks Contact your local Kaspersky Lab office or our partners for more information (including administrative features’ demo, pricing, etc.) 24

  25. ALL KASPERSKY SECURITY AWARENESS TRAINING PRODUCTS  93% likelihood to apply knowledge  90% decrease in the number of incidents 50-60% reduction * of the  cyber risk monetary volume  30x ROI  Measurable security awareness program results * Aberdeen Group. Research as of 2014 Technical training programs for IT Security professionals are also available. 25

  26. WE PROTECT WHAT MATTERS MOST www.kaspersky.com/awareness 26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend