Objective: If the requirements and risks of information security are not known to the employees, there is a risk of misconduct resulting in damage to the organization. Therefore, it is important that information security is internalized and practiced as a natural part of their work.
Requirements (must): Employees are trained and made aware.
Requirements (should): A concept for awareness and training of employees is prepared. As a minimum, the following aspects are considered:
- Information security policy,
- Reports of information security events,
- Reaction to occurrence of malware,
- Policies regarding user accounts and login information (e.g. password policy),
- Compliance issues of information security,
- Requirements and procedures regarding the use of non-disclosure agreements when sharing information requiring protection,
- Use of external IT services.
Target groups for training and awareness measures (i.e., people working in specific risk environments such as administrators, employees having access to customer networks, personnel in areas of manufacturing) are identified and considered in a training concept.
The concept has been approved by the responsible management.
Training and awareness measures are carried out both at regular intervals and in response to events.
Participation in training and awareness measures is documented.
Contact persons for information security are known to employees.
Our organization has defined procedures for maintaining staff's cyber security awareness.These may include e.g. the following things:
Training should focus on the most relevant security aspects for each job role and include often enough the basics, which concern all employees:
Personnel under the direction of the entire organization must be aware:
In addition, top management has defined ways in which personnel are kept aware of security guidelines related to their own job role.
The organization shall have a sufficient number of trained, supervised and, where necessary, properly security cleared personnel who play key roles in information security, performing management tasks related to the information security management system.
The organization has defined:
The owner of the task regularly reviews the number and level of competence of the security personnel.
The organisation should have a procedure for training and guidance of its personnel. These procedures should include and cover at least the following topics:
The training program should identify specific groups of employees who require this training, such as administrators, those with access to customer networks, and manufacturing personnel.
The training concept must be approved by responsible management. Conduct training and awareness programs regularly and in response to specific events. Ensure that employees know who to contact for information security concerns.
The organization needs to remind employees of their roles and security responsibilities. The reminder reinforces staff security awareness, safe practices and compliance with guidelines and legal requirements related to their job role.
Ensuring staff security awareness is an important part of protection against malware. Because of this, staff are regularly informed of new types of malware that may threaten them.
Before granting access rights to data systems with confidential information employees have:
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.