The case against Dan Hadaway!
The one thing everyone knows about me is that I believe firmly in Awareness Training. I actually go so far as to declare that “awareness is 9/10’s of the battle.” If you’ve ever been to one of my workshops, or if you’ve ever been audited by infotex, you’ll know exactly why we believe awareness to be key.
Security Awareness Training . . . . not?
However, as with any “mythology” about information security, we must be careful to understand the opposing philosophy. [I would say you should be aware of the opposing philosophy!]
And thus, when I ran across “Why you shouldn’t train employees for security awareness,” I was intrigued. As busy as I was, I still took time to go read the article!
And though it almost had a revulsive effect on me, I decided that you deserve to at least think about the position AGAINST awareness training. Now, please know that I can rebut every point made in this article, though some of them do make sense, at least on the surface. For example: our position is that the CISO can NOT have “meaningful authority” unless the management team is AWARE of this authority and the CISO’s role in protecting the business.
Still, the article does pull together “what organizations should do instead of wasting time on employee training” and I do agree that these are good ideas that should be prioritized as to-do’s right after you’ve polished your awareness training program! In other words, they’re the other 1/10th of the battle!
The article, written by Dave Aitel of Immunity Inc, should only take a few minutes to read. Be forewarned: presenting this article in an audit will NOT mitigate compliance risk!
Dan Hadaway CRISC, CISA, CISM
Founder and President, Infotex
“Dan’s New Leaf” is a “fun blog to inspire thought in the area of IT Governance.”
Leave a comment
2018 has been the year of the data breach, but how are consumers reacting? An article Read more
Focused on small businesses, the guide covers twelve topics you need to know to be se Read more
We rely on them to keep our systems safe, but who is protecting the security research Read more
We have recently made a significant change to our Incident Response Policy regarding Read more