0% found this document useful (0 votes)
95 views34 pages

PowerPoint PresentationsBSBXCS402 - PPT V1.1

This document discusses promoting cyber security awareness and best practices in the workplace. It covers topics like understanding cyber threats, developing an awareness program, implementing policies and procedures, reviewing practices, and improving security over time. Employees are encouraged to work as a cyber security team to develop an awareness program, support effective practices, and regularly review cyber security. Videos and external articles are referenced for additional information on topics like the anatomy of attacks, policy making, effective communication and training, and emerging threats.

Uploaded by

Farhan Aslam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views34 pages

PowerPoint PresentationsBSBXCS402 - PPT V1.1

This document discusses promoting cyber security awareness and best practices in the workplace. It covers topics like understanding cyber threats, developing an awareness program, implementing policies and procedures, reviewing practices, and improving security over time. Employees are encouraged to work as a cyber security team to develop an awareness program, support effective practices, and regularly review cyber security. Videos and external articles are referenced for additional information on topics like the anatomy of attacks, policy making, effective communication and training, and emerging threats.

Uploaded by

Farhan Aslam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 34

BSBXCS402

Promote workplace cyber security awareness and best practices


Cyber Security Awareness
Topic 1: Cyber Security Awareness

Cyber Security in the Workplace

Protecting a company’s information, data, assets, knowledge and


systems, networks and business continuity, requires putting in
effective measures to ensure that digital access is secure.
Topic 1: Cyber Security Awareness

Activity: Watch

The following video shows the anatomy of a cyberattack


unfolding
https://www.cisco.com/c/en/us/products/security/what-is-cybersec
urity.html
(04:14)
Topic 1: Cyber Security Awareness

How Much Do Employees Know?

Promoting workplace cyber security awareness and supporting


effective practices can support the success of a business’ cyber
security strategy.
Topic 1: Cyber Security Awareness

Activity: Watch

Watch this Tedtalk by Mark Burnette: The humanity behind


cybersecurity attacks
https://www.youtube.com/watch?v=pnADP41earI (18:22)
Topic 1: Cyber Security Awareness

How Much Do Employees Know?

As part of your job role in promoting cyber security the main


question to always ask is:

ARE YOU DOING ENOUGH?


Topic 1: Cyber Security Awareness

How Much Do Employees Know?

Developing awareness, supporting policies, procedures and best


practices will be part of helping to ensure that you are doing your
best to minimise the cyber threats to the organisation.
Topic 1: Cyber Security Awareness

Activity: Research

Go to www.surveymonkey.com and check out how the surveys


can be developed.
Read about survey design:
Survey Design 101
Topic 1: Cyber Security Awareness

Developing a Cyber Security Awareness Program

The next step would be to develop a program that could be used


to promote and manage best practices.
Topic 1: Cyber Security Awareness

Cyber Security Policies and Procedures

An organisation’s best practices and part of a cyber security


awareness program can be implemented through policies and
procedures.
Topic 1: Cyber Security Awareness

Activity: Read

Consolidate your learning by reading through the provided


information.
Topic 1: Cyber Security Awareness

How Much Do Employees Know?

Promoting workplace cyber security awareness and supporting


effective practices can support the success of a business’ cyber
security strategy.
Topic 1: Cyber Security Awareness

Communicating to Personnel

The development of a cyber security policy must address key


information relating to:
Topic 1: Cyber Security Awareness

Communicating Policies and Procedures

This could greatly affect whether or not cyber security policies


are implemented and carried out successfully.
Topic 1: Cyber Security Awareness

Activity: Read

To find out more about effective communication, read the


information at the following link:
https://www.proofhub.com/articles/effective-communication
Topic 1: Cyber Security Awareness

Activity: Watch

Read the article and watch the informative video on high level
cyber policy making
https://www.forbes.com/sites/cognitiveworld/2019/08/30/we-need-
cyber-policy-now/#78789edb1e17
(43:12)
Topic 1: Cyber Security Awareness

Activity: Read

Read the following information on how to run effective cyber


security awareness training:
https://blog.ironbastion.com.au/running-effective-security-awaren
ess-training/
Topic 1: Cyber Security Awareness

Activity: Group work – Cyber Security team project

You are to work collaboratively as part of a cyber security team to


help develop a cyber security awareness program for staff.
Using effective cyber security practices
Topic 2: Using effective cyber security
practices
Reviewing Cyber Security Practices

To support the effective implementation of cyber security


practices, it will be necessary to review these to ensure that
employees are following the policies and procedures
communicated.
Topic 2: Using effective cyber security
practices
Activity: Watch

Read the article and watch the video on the top security
predictions for 2020:
https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-to
p-20-security-predictions-for-2020.html
Topic 2: Using effective cyber security
practices
Activity: Research and discuss

1. Review the cyber security practices that are not being followed
and identify what issues could arise from each.
2. Review the following Cyber Policy.
Topic 2: Using effective cyber security
practices
Training

Training in cyber security awareness can, as previously


mentioned, promote a culture that supports effective cyber
security practices.
Topic 2: Using effective cyber security
practices
Maintaining Updates

Once you have reviewed the cyber security practices, the next
step would be to ensure that everyone is updated.
Topic 2: Using effective cyber security
practices
Communicating Feedback from Reviews

To further support effective cyber security practices, the insights


gained from review and training can be presented to highlight any
potential impacts on the workplace.
Topic 2: Using effective cyber security
practices
Activity: Group work – Cyber Security team project

You are to work collaboratively as part of your cyber security


team to support effective cyber security practices.
Reviewing the Cyber Security
Topic 3: Review cyber security

Keeping abreast of what is happening, new advances or different


approaches and strategies to cyber security best practices, will
help to ensure that the organisation is up to date, current and
aware of potential new risks.
Topic 3: Review cyber security

Activity: Watch

Watch the following webinar on insights into today’s cyber-


attacks (2020)
https://www.brighttalk.com/webcast/7451/384866
Topic 3: Review cyber security

Suggesting Improvements

By reviewing the latest security threats and trends you can apply
this information to support improvements and provide further
awareness of issues impacting organisations.
Topic 3: Review cyber security

Activity: Research and report

Your organisation has asked you to write a report that addresses


cyber security trends. You can select an organisation to provide
context to the research.
Topic 3: Review cyber security

Communicating Improvements

Any new information that could help an organisation against


cyber security threats, need to be integrated into policies and
procedures and then communicated through training or modules
to support the updates.
Topic 3: Review cyber security

Activity: Group work – Cyber Security team project

You are to work collaboratively as part of your cyber security


team to review cyber security awareness.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy