Verified Document

Implementing Security Research Paper

Security Implementation Identity Management and Security Awareness Training Plan Strategy

all departments.

Duration and frequency: three sessions of one hour each. Technology developments that are used in permanently updating the company's security features must be communicated to employees. Update training sessions of two hours must be performed every three months in order to keep up with technology improvements.

The training program must inform employees on the company's security guidelines. The administrative, technical, or physical safeguards intended to protect the personal information of clients and employees must be communicated and explained to all department members. In addition to this, the company must identify current attitudes towards information security that employees have (Winkler & Manke, 2013). The training material will be structured in accordance with these attitudes.

Trainer selection:

In this case, the question is whether to select an in-house or an outside trainer. An outside trainer could have more experience on security awareness and better training skills. However, the in-house trainer knows best the company's current situation and needs.

Training material:

It is important to hand out printed material to employees. This material refers to internal security rules and guidelines, contact information in case they have a security issue, and the documentation of the training program.

Management involvement:

It is necessary that the company's CEO and department managers offer their...

This is because if managers do not offer their support employees might think the training program is not important. In addition to attending the training sessions, the department managers must ensure that their subordinates have all the resources for applying the security guidelines and principles.
Current state assessment:

In order to develop a successful training strategy, it is important to evaluate the current situation of the company. Current state assessment allows to establish measurable objectives that mu be met.

Performance measures

Performance related to security of information must be defined and connected to the training plan. A system of rewards and punishments must also be established in order to motivate employees into following information security guidelines.

Implementation

A person or department must be delegated for implementing the training plan strategy. In this case it is the human resources departments' responsibility to develop and implement the training plan strategy.

Reference list:

1. Winkler, I. & Manke, S. (2013). The 7 elements of a successful security awareness program. CSO Online. Retrieved February 14, 2015 from

2"

http://www.csoonline.com/article/2133408/network-security/the-7-elements-of-a-successful-security-awareness-program.html.

2

. Gerzon, J. (2011). What makes an organization's training plan strategic? Organization and employee development. MIT…

Sources used in this document:
Reference list:

1. Winkler, I. & Manke, S. (2013). The 7 elements of a successful security awareness program. CSO Online. Retrieved February 14, 2015 from

2"

http://www.csoonline.com/article/2133408/network-security/the-7-elements-of-a-successful-security-awareness-program.html.

2
. Gerzon, J. (2011). What makes an organization's training plan strategic? Organization and employee development. MIT Human Resources. Retrieved February 14, 2015 from http://web.mit.edu/training/trainers/resources/strategic.html.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Security Management Is a Process That Functions
Words: 694 Length: 2 Document Type: Essay

Security Management is a process that functions systematically to identify and evaluate risks-posing threats whilst taking appropriate actions and resolutions aimed at safeguarding the company. Some security managers have the perception that risk is the future possibility of an occurrence that is bound to cause a negative impact, while keeping in mind that risk has also the possibility of providing future opportunities. In the course of taking up risks,

Security Management Security Measures Risk Management
Words: 1552 Length: 5 Document Type: Essay

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Security Policy Document: Global Distributions, Inc. The
Words: 1891 Length: 7 Document Type: White Paper

Security Policy Document: Global Distributions, Inc. The purpose of this document is to establish key security parameters and guidelines for Global Distributions, Inc. (GDI) in order to protect the interests of the company and its clients. Scope These policies apply to all operations managed by GDI, including interactions and interfaces with client companies that are managed by GDI. All communication networks, database systems, and servers full under the purview of this policy. Policies Definition of

Security Monitoring Strategies Creating a Unified, Enterprise-Wide...
Words: 1131 Length: 3 Document Type: Essay

Security Monitoring Strategies Creating a unified, enterprise-wide security monitoring strategy for any organization must be based on a series of strategic goals and objectives that encompass every functional area and system of a business. The intent of this analysis is to define the objectives that must anchor a security monitoring strategy to ensure its success, followed by specific recommendations for security monitoring of each major functional area. Defining Security Monitoring Strategies For an

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now