Difference between revisions of "Security Practitioner Conversation"
Jump to navigation
Jump to search
(Created page with "Session: Call to all information security trainers and capacity builders at DevSummit 19! Let's make a list of all the sessions and discussions we want to have! Beyond traini...") |
|||
Line 20: | Line 20: | ||
How to set and manage expectations when providing information security | How to set and manage expectations when providing information security | ||
training? | training? | ||
+ | |||
+ | ---- | ||
+ | * Go around of why this session was chosen. | ||
+ | ** Concerned about quality of training provided to orgs on the ground. | ||
+ | * Follow up interested in is | ||
+ | ** What do you do collect feedback. What was useful? | ||
+ | *** Want to have a long term engagement. how to continue being in touch | ||
+ | * Need to help members be secure. Hold workshops on various digital security topics for older adults. | ||
+ | * Ongoing support for orgs improving their security | ||
+ | |||
+ | * One off training is a start instead of a finish. | ||
+ | |||
+ | * Pre-training: Be intentional on what you train on. | ||
+ | ** Is it important? | ||
+ | ** Does the org have capacity to take on changes? | ||
+ | ** What are the highest priority risks that org is facing? | ||
+ | ** Is the content of the training actionable? | ||
+ | |||
+ | * After training | ||
+ | ** Clear tech support process. | ||
+ | *** Who to go to if there's a problem or need question answered, especially true of security. | ||
+ | **** Written materials are great for that | ||
+ | **** Having a person is important. | ||
+ | **** People doing practices need time to practice them. | ||
+ | **** Possible to have a peer champion. An internal champion who can potentially field answers to questions and if not, escalate. | ||
+ | **** Building more knowledge into the org. | ||
+ | |||
+ | * There were plans to do training in secure comms. | ||
+ | ** Training was going to be a DIY online training. | ||
+ | ** It sounded fishy, a "check the box" action. | ||
+ | ** There was never a follow up. No check up if someone remembered what to do. How do we know if people learn anything from it? | ||
+ | ** How do you know if training is contextualized to needs fo audience. | ||
+ | ** Creates a false sense of security. | ||
+ | ** What's the intentionality of this type of training? | ||
+ | ** What outcomes are they looking for and for whom? | ||
+ | |||
+ | * Issues: | ||
+ | ** Not enough hours in the day. | ||
+ | ** No time for people to participate in follow up. | ||
+ | ** Trainers need time as well as trainees. | ||
+ | ** Need time to plan for relationship. | ||
+ | ** Sometimes difficult to find trainers who also speak the language. | ||
+ | |||
+ | * How can we build more capacity in the field? Security trainers who take a long term relationship approach. | ||
+ | |||
+ | * In person follow is valuable. | ||
+ | * May be easier to obtain time with program vs entire org. | ||
+ | |||
+ | * Evaluation of training | ||
+ | ** What would you change? | ||
+ | ** How are tools used, type of evaluation form. | ||
+ | ** Would be good to see more practical and consistent tools for training evaluations. | ||
+ | ** What are some things that have changed in this area? | ||
+ | |||
+ | * If outcomes are clear on what is wanted from training, it's easy to ask if XXX tool is being used. | ||
+ | * Ongoing relationship helps trainer obtain feedback. | ||
+ | * How do you make them long term/nurture them? | ||
+ | * Say no to 1 time training. Offer long term support in place of 1 time training. | ||
+ | |||
+ | * Orgs have specific requests for trainings, specific times to have everyone in the room. | ||
+ | * What would be most effective format to provide training? | ||
+ | * Work with org to determine if outcome is worth it. | ||
+ | * If orgs are only willing to only invest 2 hours then how important is security to them? | ||
+ | ** An org wanted 3 1hour trainings so training was crafted to lay the groundwork. | ||
+ | * Identify what group is already good at. | ||
+ | * What does safety and security mean in your community? | ||
+ | ** A framework is important that's based in harm reduction. | ||
+ | ** Can't eliminate every threat. | ||
+ | ** Physical, emotional, mental well being as well as digital. | ||
+ | ** Stress that it's an ongoing process that needs to be repeated. | ||
+ | |||
+ | * Data assessment: What is the data? Where is it stored? | ||
+ | * Then risk assessment: ID what people are going to get at. | ||
+ | * After is a report of analysis. | ||
+ | * Then implementation. | ||
+ | |||
+ | * Grounding session is a training but training is done during implementation. | ||
+ | * Identify needs. e.g. VPN, anti-doxing, etc. | ||
+ | |||
+ | * How is follow up done? | ||
+ | * Getting password management and enforced 2FA is achievable. | ||
+ | * Follow up can be as friendly/simple as "How are you?" | ||
+ | |||
+ | * An email is circulated every 3 months as a reminder that the ED will NOT ask for you for money. | ||
+ | * For phone scams, people are trained to state they will call the institution (bank, etc) back. | ||
+ | * What does evaluation mean or is it more meaningful to have a long term relationship? |
Latest revision as of 08:38, 30 December 2019
Session: Call to all information security trainers and capacity builders at DevSummit 19! Let's make a list of all the sessions and discussions we want to have!
Beyond trainings: What is needed to support organizations sustainably and in the long term beyond trainings?
Entering the training practice: How to access knowledge and who does have access to it?
How can information security trainers support each other? Let's make a list of shared efforts that can help us all
How to shift education culture to improve digital security in organizations
How can information security trainers establish standards, boundaries, no-harm approach in their practice?
How to set and manage expectations when providing information security training?
- Go around of why this session was chosen.
- Concerned about quality of training provided to orgs on the ground.
- Follow up interested in is
- What do you do collect feedback. What was useful?
- Want to have a long term engagement. how to continue being in touch
- What do you do collect feedback. What was useful?
- Need to help members be secure. Hold workshops on various digital security topics for older adults.
- Ongoing support for orgs improving their security
- One off training is a start instead of a finish.
- Pre-training: Be intentional on what you train on.
- Is it important?
- Does the org have capacity to take on changes?
- What are the highest priority risks that org is facing?
- Is the content of the training actionable?
- After training
- Clear tech support process.
- Who to go to if there's a problem or need question answered, especially true of security.
- Written materials are great for that
- Having a person is important.
- People doing practices need time to practice them.
- Possible to have a peer champion. An internal champion who can potentially field answers to questions and if not, escalate.
- Building more knowledge into the org.
- Who to go to if there's a problem or need question answered, especially true of security.
- Clear tech support process.
- There were plans to do training in secure comms.
- Training was going to be a DIY online training.
- It sounded fishy, a "check the box" action.
- There was never a follow up. No check up if someone remembered what to do. How do we know if people learn anything from it?
- How do you know if training is contextualized to needs fo audience.
- Creates a false sense of security.
- What's the intentionality of this type of training?
- What outcomes are they looking for and for whom?
- Issues:
- Not enough hours in the day.
- No time for people to participate in follow up.
- Trainers need time as well as trainees.
- Need time to plan for relationship.
- Sometimes difficult to find trainers who also speak the language.
- How can we build more capacity in the field? Security trainers who take a long term relationship approach.
- In person follow is valuable.
- May be easier to obtain time with program vs entire org.
- Evaluation of training
- What would you change?
- How are tools used, type of evaluation form.
- Would be good to see more practical and consistent tools for training evaluations.
- What are some things that have changed in this area?
- If outcomes are clear on what is wanted from training, it's easy to ask if XXX tool is being used.
- Ongoing relationship helps trainer obtain feedback.
- How do you make them long term/nurture them?
- Say no to 1 time training. Offer long term support in place of 1 time training.
- Orgs have specific requests for trainings, specific times to have everyone in the room.
- What would be most effective format to provide training?
- Work with org to determine if outcome is worth it.
- If orgs are only willing to only invest 2 hours then how important is security to them?
- An org wanted 3 1hour trainings so training was crafted to lay the groundwork.
- Identify what group is already good at.
- What does safety and security mean in your community?
- A framework is important that's based in harm reduction.
- Can't eliminate every threat.
- Physical, emotional, mental well being as well as digital.
- Stress that it's an ongoing process that needs to be repeated.
- Data assessment: What is the data? Where is it stored?
- Then risk assessment: ID what people are going to get at.
- After is a report of analysis.
- Then implementation.
- Grounding session is a training but training is done during implementation.
- Identify needs. e.g. VPN, anti-doxing, etc.
- How is follow up done?
- Getting password management and enforced 2FA is achievable.
- Follow up can be as friendly/simple as "How are you?"
- An email is circulated every 3 months as a reminder that the ED will NOT ask for you for money.
- For phone scams, people are trained to state they will call the institution (bank, etc) back.
- What does evaluation mean or is it more meaningful to have a long term relationship?