"Why?" Role-based Collection
"Why?" Role-based
Audience: Module for each of the following
- Customer Support
- Executive Assistant
- Finance
- Help Desk
- Highly Visible Employees
- HR (Human Resources)
- I.T.
- Legal
- Manufacturing Professionals
- Marketing
- People Managers
- Privileged Users
- Product Development
- Sales
- Service Desk
- Vendor/Supply Chain
Difficulty Level: Beginner
Time: 12 modules, ≈1 minutes each + 3 Questions per module
Availability: Available on Training as Independent Modules. Do not need to be assigned or watched together, designed to stand independently.
Modules:
- Why? Customer Support (1:00 Video)
- Why? Executive Assistant (1:00 Video)
- Why? Finance (1:00 Video)
- Why? Help Desk (0:55 Video)
- Why? Highly Visible Employees (1:14 Video)
- Why? HR (1:00 Video)
- Why? I.T. (1:13 Video)
- Why? Legal (0:58 Video)
- Why? Manufacturing (1:02 Video)
- Why? Marketing (1:00 Video)
- Why? People Managers (0:54 Video)
- Why? Privileged Users (0:57 Video)
- Why? Product Development (1:02 Video)
- Why? Sales (1:00 Video)
- Why? Service Desk (0:55 Video)
- Why? Vendor/Supply Chain (1:03 Video)
Trailer:
Marketing Materials: Role-based "Why?" Marketing Kit
Major Themes: For the end user starting at square one, jumping into the deep end of cybersecurity training can be overwhelming. Help them get their feet wet first with these awareness-oriented, introductory training modules.
- Customer Support
- Risk of privileged access
- Consequences of a data breach
- Collection and disposal of sensitive data
- Importance of annual cybersecurity training
- Executive Assistants
- Risk of privileged access
- Personal responsibility
- Importance of annual cybersecurity training
- Finance
- Targeted phishing
- Reporting suspicious emails
- Importance of annual cybersecurity training
- Help Desk
- Leading by example
- Impersonation of help desk employees
- Reporting suspicious activity
- Importance of annual cybersecurity training
- Highly Visible Employees
- Security risks of public attention
- Malicious use of personal information
- Social engineering for money or data theft
- Importance of annual cybersecurity training
- Human Resources
- Sharing of sensitive information
- Risk of privileged access
- Importance of annual cybersecurity training
- I.T.
- Message of appreciation
- Leading by example
- Contributions to company cybersecurity culture
- Importance of annual cybersecurity training
- Legal
- Cybersecurity's role in maintaining discretion
- Access & influence
- Legal repercussions
- Importance of annual cybersecurity training
- Manufacturing Professionals
- Cybersecurity is a safety concern
- Impact of incidents on organization and employees
- Importance of annual cybersecurity training
- Marketing
- Risk of privileged access
- Legitimate campaigns that look like phishing
- Importance of annual cybersecurity training
- People Managers
- Teaches team how to interact with technology
- Role models
- Importance of annual cybersecurity training
- Privileged Users
- Responsibility of having privileged access
- Targeting of privileged users by cybercriminals
- Importance of annual cybersecurity training
- Product Development
- Insider knowledge requiring discretion
- Consequences of data leaks
- Importance of data privacy and annual cybersecurity training
- Sales
- Highly visible employees
- Risks of privileged access
- Security policy compliance
- Reporting suspicious messages
- Importance of annual cybersecurity training
- Service Desk
- Leading by example
- Impersonation of service desk employees
- Reporting suspicious activity
- Importance of annual cybersecurity training
- Vendors/Supply Chain
- Security policy compliance
- Relinquishing access
- Reporting suspicious messages
- Importance of annual cybersecurity training
🔍 View Role-based "Why?" in your Living Security platform catalog here!