際際滷

際際滷Share a Scribd company logo
The Anatomy 
of a 
Security Culture Campaign 
The Security Culture Framework: https://scf.roer.com
Security Culture Campaign 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com 
Security 
Culture
The Security Culture Framework: https://scf.roer.com 
Security 
Culture 
The ideas, customs, and social 
behavior of a particular people or 
society that allows them to be free 
from danger or threats. 
Kai Roer, author
The Security Culture Framework: https://scf.roer.com 
Security 
Culture 
Knowing accepted use of technology, understanding 
why the policies are needed, and accepting to follow 
the rules in place. 
Rules and regulations in place to regulate how 
technology is being used. Creates a common frame 
of accepted use, and incentives to follow the rules. 
Must be trained, and supported by technology. 
Business enabler, as well as threat level increaser. 
Technology use should be regulated by policies, and 
staff must be trained.
People are different. 
Adapt to 
their 
needs! 
The Security Culture Framework: https://scf.roer.com
Your Goal! 
The Security Culture Framework: https://scf.roer.com
Security Culture Campaign 
Plan Execute Measure 
The Security Culture Framework: https://scf.roer.com
Security Culture Campaign 
Plan Execute Measure 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com
Feedback from the Campaign is fed back into 
the next campaign to build on the results. 
As culture is changed, the new culture emerges 
and feeds back into the program, creating a 
stronger culture each time. 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com 
1 
2
Security Culture Campaign 
Feedback Loop: Review and Revise 
The Security Culture Framework: https://scf.roer.com 
Security 
Culture
Download templates and join the 
community to discuss security culture 
https://scf.roer.com 
The Security Culture Framework: https://scf.roer.com

More Related Content

Similar to The Security culture campaign explained in 5 minutes (20)

PPTX
Mastery Journey Timeline of Christine Mitchell-Robinson
Christine Mitchell-Robinson
PDF
Web Campaigning Acting With Technology Kirsten Foot Steven M Schneider
orjantrtek
PDF
Social Media Monitoring tools as an OSINT platform for intelligence
E Hacking
PDF
Technology Transfer And Entrepreneurial Innovations Policies Across Continent...
aednacufm029
PPTX
Introduction-to-Information-Security.pptx
SittieAmaniAlonto
PDF
Cyber Security Auditing Assurance And Awareness Through Csam And Catram Regne...
galloucharid
DOCX
OL 325 Milestone One Guidelines and Rubric The Stra.docx
cherishwinsland
PPT
Bright future ahead in Cybersecurity
Vaughan Olufemi ACIB, AICEN, ANIM
PPTX
Most Effective Information Security and Risk Management Training
Bryan Len
PDF
Multipronged Omics Technologies To Understand Covid19 Sanjeeva Srivastava
sercumayetvm
PPT
C2.0 2010 d lacallade presentation version
Dawn Lacallade
PPTX
MyData2018 - Making Responsible Technology the New normal
Laura James
PDF
Recent Trends In Peripheral Security Systems Abhishek Rawat Dipankar Deb
evblagfe853
PDF
Cyber Security Risk Mitigation Checklist
timsnp
ODP
Content strategy in Technical Communications
Scriptorium Publishing
PPTX
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
PDF
Value Based And Intelligent Asset Management Mastering The Asset Management T...
swxogvpdyi8567
PPTX
Cybersecurity_Presentation_80_際際滷s.pptx
PujaDevgun1
PPTX
Strategic Foresight From theory to practice in the MENA region Iran Focus
Victor Motti
DOCX
Csc520 you are a senior level employee and you must tailor your deliverables ...
leonardjonh145
Mastery Journey Timeline of Christine Mitchell-Robinson
Christine Mitchell-Robinson
Web Campaigning Acting With Technology Kirsten Foot Steven M Schneider
orjantrtek
Social Media Monitoring tools as an OSINT platform for intelligence
E Hacking
Technology Transfer And Entrepreneurial Innovations Policies Across Continent...
aednacufm029
Introduction-to-Information-Security.pptx
SittieAmaniAlonto
Cyber Security Auditing Assurance And Awareness Through Csam And Catram Regne...
galloucharid
OL 325 Milestone One Guidelines and Rubric The Stra.docx
cherishwinsland
Bright future ahead in Cybersecurity
Vaughan Olufemi ACIB, AICEN, ANIM
Most Effective Information Security and Risk Management Training
Bryan Len
Multipronged Omics Technologies To Understand Covid19 Sanjeeva Srivastava
sercumayetvm
C2.0 2010 d lacallade presentation version
Dawn Lacallade
MyData2018 - Making Responsible Technology the New normal
Laura James
Recent Trends In Peripheral Security Systems Abhishek Rawat Dipankar Deb
evblagfe853
Cyber Security Risk Mitigation Checklist
timsnp
Content strategy in Technical Communications
Scriptorium Publishing
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
Value Based And Intelligent Asset Management Mastering The Asset Management T...
swxogvpdyi8567
Cybersecurity_Presentation_80_際際滷s.pptx
PujaDevgun1
Strategic Foresight From theory to practice in the MENA region Iran Focus
Victor Motti
Csc520 you are a senior level employee and you must tailor your deliverables ...
leonardjonh145

More from Kai Roer (8)

PDF
Measuring security culture is different from counting employees
Kai Roer
PDF
GDPR and Security Culture: Measuring effectiveness
Kai Roer
PDF
The Security Culture Conference 2016
Kai Roer
PDF
Hacking You Mind - How you are being exploited by hackers of all sorts!
Kai Roer
PPT
Selling security - understanding how mental patterns and bias impacts your me...
Kai Roer
PDF
The Active Listening Cheat Sheet
Kai Roer
KEY
The Cloud Security Rules
Kai Roer
PPT
Jci Viking Weekend 2009
Kai Roer
Measuring security culture is different from counting employees
Kai Roer
GDPR and Security Culture: Measuring effectiveness
Kai Roer
The Security Culture Conference 2016
Kai Roer
Hacking You Mind - How you are being exploited by hackers of all sorts!
Kai Roer
Selling security - understanding how mental patterns and bias impacts your me...
Kai Roer
The Active Listening Cheat Sheet
Kai Roer
The Cloud Security Rules
Kai Roer
Jci Viking Weekend 2009
Kai Roer
Ad

Recently uploaded (20)

PDF
Top 25 FinOps Tools to Watch in 2025.pdf
Amnic
PDF
GIO TRNH KINH DOANH QU畛C T畉 畉I H畛C NGO畉I TH働NG
k622314115078
PPTX
Jessica Garza: At the Intersection of Technology and Humanity
Jessica Garza
PDF
SAG Infotech Issues Press Release for Media and Publications
SAG Infotech
PDF
PTAC Repair Near Me | Heating and Cooling
angisonairnyc
PDF
Fueling Growth - Funding & Scaling Your Business - AI Amplified SB Summit 202...
Hector Del Castillo, CPM, CPMM
DOCX
Top Digital Marketing Services Company | Fusion Digitech
ketulraval6
PPTX
Integrating Customer Journey Insights into Your Business Process Management S...
RUPAL AGARWAL
PPTX
The Strategic Landscape of Essars CSR Initiatives in 2024
essarupdate
PDF
Summary of Comments on Writing the House, Parts I & II.pdf
Brij Consulting, LLC
PDF
Books on Display in the Library June 2025 - Matariki
NZSG
PPTX
Real Options Analysis in an Era of Market Volatility and Technological Disrup...
abakahmbeahvincent
PDF
Deception Technology: The Cybersecurity Paradigm We Didnt Know We Needed
GauriKale30
PPTX
Appreciations - June 25.pptxggggggghhhhhh
anushavnayak
PPTX
2. The History of New Digital Economy.pptx
WidiSriwahyuniPasari1
PDF
Walt Disney Business Proposal for Hollywood Studios
balazscsillag
PDF
Thane Stenner - A Leader In Extreme Wealth Management
Thane Stenner
PDF
Beyond the Launch: Solving Deep Problems in Traditional Industries with Tech
EkoInnovationCentre
PPTX
Vedantas Pivotal Role in Indias Growth with Record Vedanta Tax Contribution...
Vedanta Cases
PDF
Trends in Artificial Intelligence 2025 M Meeker
EricSabandal1
Top 25 FinOps Tools to Watch in 2025.pdf
Amnic
GIO TRNH KINH DOANH QU畛C T畉 畉I H畛C NGO畉I TH働NG
k622314115078
Jessica Garza: At the Intersection of Technology and Humanity
Jessica Garza
SAG Infotech Issues Press Release for Media and Publications
SAG Infotech
PTAC Repair Near Me | Heating and Cooling
angisonairnyc
Fueling Growth - Funding & Scaling Your Business - AI Amplified SB Summit 202...
Hector Del Castillo, CPM, CPMM
Top Digital Marketing Services Company | Fusion Digitech
ketulraval6
Integrating Customer Journey Insights into Your Business Process Management S...
RUPAL AGARWAL
The Strategic Landscape of Essars CSR Initiatives in 2024
essarupdate
Summary of Comments on Writing the House, Parts I & II.pdf
Brij Consulting, LLC
Books on Display in the Library June 2025 - Matariki
NZSG
Real Options Analysis in an Era of Market Volatility and Technological Disrup...
abakahmbeahvincent
Deception Technology: The Cybersecurity Paradigm We Didnt Know We Needed
GauriKale30
Appreciations - June 25.pptxggggggghhhhhh
anushavnayak
2. The History of New Digital Economy.pptx
WidiSriwahyuniPasari1
Walt Disney Business Proposal for Hollywood Studios
balazscsillag
Thane Stenner - A Leader In Extreme Wealth Management
Thane Stenner
Beyond the Launch: Solving Deep Problems in Traditional Industries with Tech
EkoInnovationCentre
Vedantas Pivotal Role in Indias Growth with Record Vedanta Tax Contribution...
Vedanta Cases
Trends in Artificial Intelligence 2025 M Meeker
EricSabandal1
Ad

The Security culture campaign explained in 5 minutes

  • 1. The Anatomy of a Security Culture Campaign The Security Culture Framework: https://scf.roer.com
  • 2. Security Culture Campaign Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com Security Culture
  • 3. The Security Culture Framework: https://scf.roer.com Security Culture The ideas, customs, and social behavior of a particular people or society that allows them to be free from danger or threats. Kai Roer, author
  • 4. The Security Culture Framework: https://scf.roer.com Security Culture Knowing accepted use of technology, understanding why the policies are needed, and accepting to follow the rules in place. Rules and regulations in place to regulate how technology is being used. Creates a common frame of accepted use, and incentives to follow the rules. Must be trained, and supported by technology. Business enabler, as well as threat level increaser. Technology use should be regulated by policies, and staff must be trained.
  • 5. People are different. Adapt to their needs! The Security Culture Framework: https://scf.roer.com
  • 6. Your Goal! The Security Culture Framework: https://scf.roer.com
  • 7. Security Culture Campaign Plan Execute Measure The Security Culture Framework: https://scf.roer.com
  • 8. Security Culture Campaign Plan Execute Measure Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com
  • 9. Feedback from the Campaign is fed back into the next campaign to build on the results. As culture is changed, the new culture emerges and feeds back into the program, creating a stronger culture each time. Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com 1 2
  • 10. Security Culture Campaign Feedback Loop: Review and Revise The Security Culture Framework: https://scf.roer.com Security Culture
  • 11. Download templates and join the community to discuss security culture https://scf.roer.com The Security Culture Framework: https://scf.roer.com