There are general topics to cover for the training, but it is necessary for each organization to have a coverage strategy based on its needs, as this will ensure the training is practical and captures critical topics relevant to the organization. As the threat landscape changes very frequently, organizations should continuously review their training programs to ensure relevance with current trends.5
Topics covered in ISAT6 include:
Being Internet Security Aware means you understand that there are people actively trying to steal data that is stored within your organization's computers. (This often focuses on user names and passwords, so that criminal elements can ultimately get access to bank accounts and other high-value IT assets.) That is why it is important to protect the assets of the organization and stop that from happening.7
The general scope should include topics such as password security, Email phishing, Social engineering, Mobile device security, Sensitive data security, and Business communications. In contrast, those requiring specialized knowledge are usually required to take technical and in-depth training courses.8 Suppose an organization determines that it is best to use one of the available training tools on the market, it must ensure it sets objectives that the training can meet, including confirming the training will provide employees with the knowledge to understand risks and the behaviors needed in managing them, actions to take to prevent or detect security incidents, using language easily understandable by the trainees, and ensuring the pricing is reasonable.9
Organizations are recommended to base ISAT training content on employee roles and their culture; the policy should guide that training for all employees10 and gave the following as examples of sources of reference materials:11
The training must focus on current threats specific to an organization and the impacts if that materializes as a result of user actions. Including practical examples and ways of dealing with scenarios help users know the appropriate measures to take. It is a good practice to periodically train customers of specific organizations on threats they face from people with malicious intentions.12
Coverage strategy for SAT should be driven by an organization’s policy. It can help truly determine the level of depth of the training and where it should be conducted at a global level or business unit level, or a combination of both. A policy also empowers a responsible party within the organization to run the training.13
Studies show that well-structured security awareness training can significantly reduce the likelihood of cyber incidents caused by human error. According to the Ponemon Institute, organizations that implement regular security training experience up to 70% fewer successful phishing attacks. Additionally, a 2023 Verizon Data Breach Investigations Report found that 74% of breaches involve the human element, highlighting the need for continuous education.14
Employees are key in whether organizations are breached or not; there must be a policy on creating awareness and training them on emerging threats and actions to take in safeguarding sensitive information and reporting any observed unusual activity within the corporate environment.15
Research has shown that SAT has helped reduce cyber-attacks within organizations, especially when it comes to phishing, as trainees learned to identify these attack modes and give them the self-assurance to take action appropriately.16
There is an increase in phishing attacks, and it has become increasingly important for people to understand how to these attacks work, and the actions required to prevent these and SAT has shown a significant impact on the number of successful phishing attacks against organizations.17
Various regulations and laws mandate SAT for organizations in specific industries, including the Gramm–Leach–Bliley Act (GLBA) for the financial services, the Federal Information Security Modernization Act of 2014 for federal agencies, and the European Union’s General Data Protection Regulation (GDPR).18
Employees and contractors in federal agencies are required to receive Security Awareness Training annually, and the program needs to address job-related information security risks linked that provide them with the knowledge to lessen security risks.19
The Health Insurance Portability and Accountability Act has the Security Rule,20 and Privacy Rule21 requiring the creation of a security awareness training program and ensuring employees are trained accordingly.
The Payment Card Industry Security Standards Council, the governing council for stakeholders in the payment industry, formed by American Express, Discover, JCB International, MasterCard, and Visa that developed the DSS as a requirement for the payment industry.22 Requirement 12.6 requires member organizations to institute a formal security awareness program. There is a published guide for organizations to adhere to when setting up the program.23
Some States mandate Security Awareness Training whiles other do not but simply recommend voluntary training. Among states that require the training for its employees include:
Below are some common training techniques, even though some can be blended depending on the operating environment:41
Training should be conducted during on-boarding and at least annually for employees or other third parties with access to organizational information systems; the medium is either through face-to-face instruction or online, typically focusing on recognizing attack symptoms and safeguarding sensitive data using several security mechanisms, including passwords, encryption, and secure sessions.43
ISAT also teaches and refreshes the memory of participants on various present threats, emerging security threats, attack vectors, organizational policies related information security, and basic principles or norms to maintain security on the internet.44
Organizations consider several options when it comes to training media to deliver the security awareness training to users, but research using learning theory, media richness theory, and cognitive load theory has shown that organizations do not need to invest heavily in highly-rich media as that does not lead to improved user behavior; the training content is most important.45
SAT services are often coupled with additional tools and services related to a company’s employees including:
"Information Security Awareness Training (ISAT)". University of Virginia. Archived from the original on 4 November 2019. Retrieved 4 November 2019. https://web.archive.org/web/20191104083720/https://security.virginia.edu/isat-workday ↩
Caballero, Albert (2017-01-01). "Security Education, Training, and Awareness". Computer and Information Security Handbook: 497–505. doi:10.1016/B978-0-12-803843-7.00033-8. ISBN 9780128038437. 9780128038437 ↩
Wilson, M; Hash, J (2003). "Building an Information Technology Security Awareness and Training Program". Gaithersburg, MD: 34. doi:10.6028/nist.sp.800-50. {{cite journal}}: Cite journal requires |journal= (help) /wiki/Doi_(identifier) ↩
"Content | ISAT | International Students Admissions Test | ACER". isat.acer.org. Retrieved 2021-03-13. https://isat.acer.org/about-isat/content-of-isat ↩
Sharf, Elad (July 2016). "Information exchanges: regulatory changes to the cyber-security industry after Brexit: Making security awareness training work". In Computer Fraud & Security. 7: 9–12. doi:10.1016/S1361-3723(16)30052-5. /wiki/Doi_(identifier) ↩
Cooper, Michael H. (2009). "Information security training". Proceedings of the 37th annual ACM SIGUCCS fall conference: Communication and collaboration. New York, New York, USA: ACM Press. p. 217. doi:10.1145/1629501.1629541. ISBN 978-1-60558-477-5. S2CID 7117477. 978-1-60558-477-5 ↩
"Cybersecurity Awareness Training for Beginners". awarego.com. 8 November 2022. Retrieved 5 June 2023. https://awarego.com/materials/cybersecurity-for-beginners/ ↩
"Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards". www.pcisecuritystandards.org. Retrieved 2021-07-05. https://www.pcisecuritystandards.org/about_us/ ↩
Liska, Allan (2015), "Building a network security intelligence model", Building an Intelligence-Led Security Program, Elsevier, pp. 124–125, doi:10.1016/b978-0-12-802145-3.00003-x, ISBN 978-0-12-802145-3 978-0-12-802145-3 ↩
"DBIR Report 2023 - Summary of Findings". Verizon Business. Retrieved 2025-03-05. https://www.verizon.com/business/en-nl/resources/reports/dbir/2023/summary-of-findings/ ↩
Payment Card Industry. Security Standards Council. (2014). Best Practices for implementing a Security Awareness Program.[1] https://www.pcisecuritystandards.org/documents/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf?agreement=true&time=1625443073856 ↩
Tschakert, Kai Florian; Ngamsuriyaroj, Sudsanguan (2019). "Effectiveness of and user preferences for security awareness training methodologies". Heliyon. 5 (6): e02010. Bibcode:2019Heliy...502010T. doi:10.1016/j.heliyon.2019.e02010. ISSN 2405-8440. PMC 6606995. PMID 31338464. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6606995 ↩
Carella, Anthony; Kotsoev, Murat; Truta, Traian Marius (2017). "Impact of security awareness training on phishing click-through rates". 2017 IEEE International Conference on Big Data (Big Data). IEEE. pp. 4458–4466. doi:10.1109/bigdata.2017.8258485. ISBN 978-1-5386-2715-0. S2CID 35766007. 978-1-5386-2715-0 ↩
Haney, Julie; Lutters, Wayne (2020). "Security Awareness Training for the Workforce: Moving Beyond "Check-the-Box" Compliance". Computer. 53 (10): 91–95. doi:10.1109/MC.2020.3001959. ISSN 0018-9162. PMC 8201414. PMID 34131349. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8201414 ↩
"Federal Information Security Modernization Act | CISA". www.cisa.gov. Retrieved 2021-07-27. https://www.cisa.gov/federal-information-security-modernization-act ↩
"The Security Rule". hhs.gov. United States Office for Civil Rights. 2009-09-10. Retrieved 2021-07-05. https://www.hhs.gov/hipaa/for-professionals/security/index.html ↩
"For State Employees - Colorado Governor's Office of Information Technology". www.oit.state.co.us. Retrieved 2021-07-27. http://www.oit.state.co.us/ois/stateemployees ↩
"13 FAM 301.1 Mandatory Security Training for All Department Employees". fam.state.gov. Retrieved 2021-07-27. https://fam.state.gov/FAM/13FAM/13FAM030101.html ↩
"Statutes & Constitution :View Statutes : Online Sunshine". www.leg.state.fl.us. Retrieved 2021-07-27. http://www.leg.state.fl.us/Statutes/index.cfm?App_mode=Display_Statute&URL=0200-0299/0282/0282.html ↩
"Bill Resource". custom.statenet.com. Retrieved 2021-07-27. https://custom.statenet.com/public/resources.cgi?id=ID:exec_order:GA2019182&ciq=ncsl&client_md=06910a1a6dad9aedaa33e180d467ef94&mode=current_text ↩
"Cybersecurity Training for Cook County, Illinois, Employees". GovTech. 2013-11-07. Retrieved 2021-07-27. https://www.govtech.com/security/Cybersecurity-Training-for-Cook-County-Illinois-Employees.html ↩
"Bill Resource". custom.statenet.com. Retrieved 2021-07-27. https://custom.statenet.com/public/resources.cgi?id=ID:bill:IN2020000H1240&ciq=ncsl&client_md=5b34595f359178a9c0dec999a6175a10&mode=current_text ↩
"Bill Resource". custom.statenet.com. Retrieved 2021-07-27. https://custom.statenet.com/public/resources.cgi?id=ID:bill:LA2020000H633&ciq=ncsl&client_md=93abd925a6226057afbec370fa9d1ac2&mode=current_text ↩
"20-07 IT Security Policy". doit.maryland.gov. Retrieved 2021-07-27. https://doit.maryland.gov/policies/Pages/20-07-IT-Security-Policy.aspx ↩
"Security Training Resources". sitsd.mt.gov. Retrieved 2021-07-27. https://sitsd.mt.gov/cybersecurity/Awareness/Training ↩
"NVeLearn". nvelearn.nv.gov. Retrieved 2021-07-27. http://nvelearn.nv.gov/moodle/ ↩
"State Security Policies Standards & Procedures". it.nv.gov. Retrieved 2021-07-27. https://it.nv.gov/Governance/Security/State_Security_Policies_Standards___Procedures/ ↩
"Bill Resource". custom.statenet.com. Retrieved 2021-07-27. https://custom.statenet.com/public/resources.cgi?id=ID:bill:NJ2020000A1654&ciq=ncsl&client_md=16ab0d148d6fdbd9d7042db719a8f900&mode=current_text ↩
"State of Ohio Information Security and Privacy > Government > State Government > Security > Training and Awareness". infosec.ohio.gov. Retrieved 2021-07-27. https://infosec.ohio.gov/Government/StateGovernment/Security/TrainingandAwareness.aspx ↩
"Cybersecurity for Commonwealth Agencies and Employees". Office of Administration. Retrieved 2021-07-27. https://www.oa.pa.gov:443/Programs/Information%20Technology/cybersecurity/agencies-employees/Pages/default.aspx ↩
"Certified Cybersecurity Training Programs, 154". dir.texas.gov. Retrieved 2021-07-27. https://dir.texas.gov/View-About-DIR/Information-Security/Pages/Content.aspx?id=154#requirements ↩
"2021 Security Awareness Training | Division of Technology Services". dts.utah.gov. Retrieved 2021-07-27. https://dts.utah.gov/news/2021-security-awareness-training ↩
"Bill Resource". custom.statenet.com. Retrieved 2021-07-27. https://custom.statenet.com/public/resources.cgi?id=ID:bill:VA2020000H852&ciq=ncsl&client_md=b66dba074c900f2e71ed4206fc1b74b6&mode=current_text ↩
"Adding Personality To Cyber Security". www.metacompliance.com. 2023-10-23. Retrieved 2025-03-05. https://www.metacompliance.com/blog/cyber-security-awareness/adding-personality-to-cyber-security ↩
Lincke, Susan (2016). SECURITY PLANNING : an applied approach. Springer International. pp. 176–177. ISBN 978-3-319-36560-2. OCLC 1005117710. 978-3-319-36560-2 ↩
Jenkins, Jeffrey L.; Durcikova, Alexandra; Burns, Mary B. (2012). "Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior". 2012 45th Hawaii International Conference on System Sciences. Maui, HI, USA: IEEE. pp. 3288–3296. doi:10.1109/HICSS.2012.285. ISBN 978-1-4577-1925-7. S2CID 206705398. 978-1-4577-1925-7 ↩
Mezquita, Ty (2022-01-18). "The Hidden Benefits of Awareness Training for MSPs". CyberHoot. Retrieved 2022-01-27. https://cyberhoot.com/blog/the-hidden-benefits-of-awareness-training-for-msps/ ↩