Skip to content
English
  • There are no suggestions because the search field is empty.

"Why?" Role-based Collection

"Why?" Role-based

Whys_ClientMarketingFlyer_8-5x11_THUMBNAIL

Audience: Module for each of the following

  • Customer Support
  • Executive Assistant
  • Finance
  • Help Desk
  • Highly Visible Employees
  • HR (Human Resources)
  • I.T.
  • Legal
  • Manufacturing Professionals
  • Marketing
  • People Managers
  • Privileged Users
  • Product Development
  • Sales
  • Service Desk
  • Vendor/Supply Chain

Difficulty Level: Beginner
Time: 12 modules, ≈1 minutes each + 3 Questions per module
Availability: Available on Training as Independent Modules. Do not need to be assigned or watched together, designed to stand independently.

Modules: 

  • Why? Customer Support (1:00 Video)
  • Why? Executive Assistant (1:00 Video)
  • Why? Finance (1:00 Video)
  • Why? Help Desk (0:55 Video)
  • Why? Highly Visible Employees (1:14  Video)
  • Why? HR (1:00 Video)
  • Why? I.T. (1:13 Video)
  • Why? Legal (0:58 Video)
  • Why? Manufacturing (1:02 Video)
  • Why? Marketing (1:00 Video)
  • Why? People Managers (0:54 Video)
  • Why? Privileged Users (0:57 Video)
  • Why? Product Development (1:02 Video)
  • Why? Sales (1:00 Video)
  • Why? Service Desk (0:55 Video)
  • Why? Vendor/Supply Chain (1:03 Video)

Trailer:

Marketing Materials: Role-based "Why?" Marketing Kit



Major Themes: For the end user starting at square one, jumping into the deep end of cybersecurity training can be overwhelming. Help them get their feet wet first with these awareness-oriented, introductory training modules.

Major Learning Concepts:
  • Customer Support
    • Risk of privileged access
    • Consequences of a data breach
    • Collection and disposal of sensitive data
    • Importance of annual cybersecurity training
  • Executive Assistants
    • Risk of privileged access
    • Personal responsibility
    • Importance of annual cybersecurity training
  • Finance
    • Targeted phishing
    • Reporting suspicious emails
    • Importance of annual cybersecurity training
  • Help Desk
    • Leading by example
    • Impersonation of help desk employees
    • Reporting suspicious activity
    • Importance of annual cybersecurity training
  • Highly Visible Employees
    • Security risks of public attention
    • Malicious use of personal information
    • Social engineering for money or data theft
    • Importance of annual cybersecurity training
  • Human Resources
    • Sharing of sensitive information
    • Risk of privileged access
    • Importance of annual cybersecurity training
  • I.T.
    • Message of appreciation
    • Leading by example
    • Contributions to company cybersecurity culture
    • Importance of annual cybersecurity training
  • Legal
    • Cybersecurity's role in maintaining discretion
    • Access & influence
    • Legal repercussions
    • Importance of annual cybersecurity training
  • Manufacturing Professionals
    • Cybersecurity is a safety concern
    • Impact of incidents on organization and employees
    • Importance of annual cybersecurity training
  • Marketing
    • Risk of privileged access
    • Legitimate campaigns that look like phishing
    • Importance of annual cybersecurity training
  • People Managers
    • Teaches team how to interact with technology
    • Role models
    • Importance of annual cybersecurity training
  • Privileged Users
    • Responsibility of having privileged access
    • Targeting of privileged users by cybercriminals
    • Importance of annual cybersecurity training
  • Product Development
    • Insider knowledge requiring discretion
    • Consequences of data leaks
    • Importance of data privacy and annual cybersecurity training
  • Sales
    • Highly visible employees
    • Risks of privileged access
    • Security policy compliance
    • Reporting suspicious messages
    • Importance of annual cybersecurity training
  • Service Desk
    • Leading by example
    • Impersonation of service desk employees
    • Reporting suspicious activity
    • Importance of annual cybersecurity training
  • Vendors/Supply Chain
    • Security policy compliance
    • Relinquishing access
    • Reporting suspicious messages
    • Importance of annual cybersecurity training

🔍 View Role-based "Why?" in your Living Security platform catalog here!