Submit Search
Upload
Digital self defense iia isaca it audit seminar
•
Download as PPTX, PDF
•
1 like
•
1,091 views
Ben Woelk, CISSP, CPTC
Follow
Presentation of RIT security awareness program
Read less
Read more
Technology
Report
Share
Report
Share
1 of 43
Download now
Recommended
Digital Self Defense at RIT
Digital Self Defense at RIT
Ben Woelk, CISSP, CPTC
Digital Self Defense
Digital Self Defense
Ben Woelk, CISSP, CPTC
Resume
Resume
Steven Shi
Posterous versus homework noel jenkins
Posterous versus homework noel jenkins
Noel Jenkins
Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014
Ben Woelk, CISSP, CPTC
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and Yourself
Ben Woelk, CISSP, CPTC
Empowering the Introvert Within stc13
Empowering the Introvert Within stc13
Ben Woelk, CISSP, CPTC
An Introvert's Journey to Leadership
An Introvert's Journey to Leadership
Ben Woelk, CISSP, CPTC
Recommended
Digital Self Defense at RIT
Digital Self Defense at RIT
Ben Woelk, CISSP, CPTC
Digital Self Defense
Digital Self Defense
Ben Woelk, CISSP, CPTC
Resume
Resume
Steven Shi
Posterous versus homework noel jenkins
Posterous versus homework noel jenkins
Noel Jenkins
Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014
Ben Woelk, CISSP, CPTC
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and Yourself
Ben Woelk, CISSP, CPTC
Empowering the Introvert Within stc13
Empowering the Introvert Within stc13
Ben Woelk, CISSP, CPTC
An Introvert's Journey to Leadership
An Introvert's Journey to Leadership
Ben Woelk, CISSP, CPTC
UNYCC Information Security Discussion
UNYCC Information Security Discussion
Ben Woelk, CISSP, CPTC
The Course Implementation
The Course Implementation
Leia Jackson
Controlling the Chaos with ITSM Governance
Controlling the Chaos with ITSM Governance
Cherwell Software
Tools And Resources For Continuous Improvement Of Technology In Schools
Tools And Resources For Continuous Improvement Of Technology In Schools
fridayinstitute
Co-op Presentation Fall_Winter_2014 FINAL VERSION
Co-op Presentation Fall_Winter_2014 FINAL VERSION
Joyce Lu
[WSO2Con Asia 2018] Get on the Bus for the Journey
[WSO2Con Asia 2018] Get on the Bus for the Journey
WSO2
Et5083 module 3 application ppt
Et5083 module 3 application ppt
swahl123
2015 OSU Extension Ed Tech Year in Review
2015 OSU Extension Ed Tech Year in Review
Jamie Seger
Introduction to software that can be used to capture and analyse Twitter data
Introduction to software that can be used to capture and analyse Twitter data
Dr Wasim Ahmed
Online education in the field of Responsible Education
Online education in the field of Responsible Education
TU Delft, Faculty of Technology, Policy and Management
GR Techincal Resume
GR Techincal Resume
Gedeon Richemond
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
SURF Events
FDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdf
gurukhade1
Transforming student engagement using mobile technology
Transforming student engagement using mobile technology
Capita FHE
How to Build a Learning Tech Stack
How to Build a Learning Tech Stack
Watershed
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
engtsze
PMU ITD Strategic Plan (2011-2016)
PMU ITD Strategic Plan (2011-2016)
Michael Dobe, Ph.D.
Learning Technologist Network - Overview and January 2015 Meeting
Learning Technologist Network - Overview and January 2015 Meeting
James Little
ALTNWESIG Embedding Technology Enhanced Learning by Dr Neil Ringan
ALTNWESIG Embedding Technology Enhanced Learning by Dr Neil Ringan
ALTNWESIG
Management of Distance Learning Systems in China - Selecting technologies
Management of Distance Learning Systems in China - Selecting technologies
Giovanni Marconato
Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce
Ben Woelk, CISSP, CPTC
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Ben Woelk, CISSP, CPTC
More Related Content
Similar to Digital self defense iia isaca it audit seminar
UNYCC Information Security Discussion
UNYCC Information Security Discussion
Ben Woelk, CISSP, CPTC
The Course Implementation
The Course Implementation
Leia Jackson
Controlling the Chaos with ITSM Governance
Controlling the Chaos with ITSM Governance
Cherwell Software
Tools And Resources For Continuous Improvement Of Technology In Schools
Tools And Resources For Continuous Improvement Of Technology In Schools
fridayinstitute
Co-op Presentation Fall_Winter_2014 FINAL VERSION
Co-op Presentation Fall_Winter_2014 FINAL VERSION
Joyce Lu
[WSO2Con Asia 2018] Get on the Bus for the Journey
[WSO2Con Asia 2018] Get on the Bus for the Journey
WSO2
Et5083 module 3 application ppt
Et5083 module 3 application ppt
swahl123
2015 OSU Extension Ed Tech Year in Review
2015 OSU Extension Ed Tech Year in Review
Jamie Seger
Introduction to software that can be used to capture and analyse Twitter data
Introduction to software that can be used to capture and analyse Twitter data
Dr Wasim Ahmed
Online education in the field of Responsible Education
Online education in the field of Responsible Education
TU Delft, Faculty of Technology, Policy and Management
GR Techincal Resume
GR Techincal Resume
Gedeon Richemond
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
SURF Events
FDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdf
gurukhade1
Transforming student engagement using mobile technology
Transforming student engagement using mobile technology
Capita FHE
How to Build a Learning Tech Stack
How to Build a Learning Tech Stack
Watershed
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
engtsze
PMU ITD Strategic Plan (2011-2016)
PMU ITD Strategic Plan (2011-2016)
Michael Dobe, Ph.D.
Learning Technologist Network - Overview and January 2015 Meeting
Learning Technologist Network - Overview and January 2015 Meeting
James Little
ALTNWESIG Embedding Technology Enhanced Learning by Dr Neil Ringan
ALTNWESIG Embedding Technology Enhanced Learning by Dr Neil Ringan
ALTNWESIG
Management of Distance Learning Systems in China - Selecting technologies
Management of Distance Learning Systems in China - Selecting technologies
Giovanni Marconato
Similar to Digital self defense iia isaca it audit seminar
(20)
UNYCC Information Security Discussion
UNYCC Information Security Discussion
The Course Implementation
The Course Implementation
Controlling the Chaos with ITSM Governance
Controlling the Chaos with ITSM Governance
Tools And Resources For Continuous Improvement Of Technology In Schools
Tools And Resources For Continuous Improvement Of Technology In Schools
Co-op Presentation Fall_Winter_2014 FINAL VERSION
Co-op Presentation Fall_Winter_2014 FINAL VERSION
[WSO2Con Asia 2018] Get on the Bus for the Journey
[WSO2Con Asia 2018] Get on the Bus for the Journey
Et5083 module 3 application ppt
Et5083 module 3 application ppt
2015 OSU Extension Ed Tech Year in Review
2015 OSU Extension Ed Tech Year in Review
Introduction to software that can be used to capture and analyse Twitter data
Introduction to software that can be used to capture and analyse Twitter data
Online education in the field of Responsible Education
Online education in the field of Responsible Education
GR Techincal Resume
GR Techincal Resume
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
FDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdf
Transforming student engagement using mobile technology
Transforming student engagement using mobile technology
How to Build a Learning Tech Stack
How to Build a Learning Tech Stack
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
PMU ITD Strategic Plan (2011-2016)
PMU ITD Strategic Plan (2011-2016)
Learning Technologist Network - Overview and January 2015 Meeting
Learning Technologist Network - Overview and January 2015 Meeting
ALTNWESIG Embedding Technology Enhanced Learning by Dr Neil Ringan
ALTNWESIG Embedding Technology Enhanced Learning by Dr Neil Ringan
Management of Distance Learning Systems in China - Selecting technologies
Management of Distance Learning Systems in China - Selecting technologies
More from Ben Woelk, CISSP, CPTC
Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce
Ben Woelk, CISSP, CPTC
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Ben Woelk, CISSP, CPTC
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership Opportunities
Ben Woelk, CISSP, CPTC
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
Ben Woelk, CISSP, CPTC
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
Ben Woelk, CISSP, CPTC
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for Success
Ben Woelk, CISSP, CPTC
Building a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
Ben Woelk, CISSP, CPTC
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted Leadership
Ben Woelk, CISSP, CPTC
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
Ben Woelk, CISSP, CPTC
Digital self defense 101 me rit
Digital self defense 101 me rit
Ben Woelk, CISSP, CPTC
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
Ben Woelk, CISSP, CPTC
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Ben Woelk, CISSP, CPTC
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Ben Woelk, CISSP, CPTC
Succession Planning and Volunteering
Succession Planning and Volunteering
Ben Woelk, CISSP, CPTC
A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14
Ben Woelk, CISSP, CPTC
A Techcomm Bestiary Spectrum14
A Techcomm Bestiary Spectrum14
Ben Woelk, CISSP, CPTC
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Ben Woelk, CISSP, CPTC
Security Awareness at RIT 2012-2013
Security Awareness at RIT 2012-2013
Ben Woelk, CISSP, CPTC
Empowering the Introvert Within: Becoming an Outstanding Leader
Empowering the Introvert Within: Becoming an Outstanding Leader
Ben Woelk, CISSP, CPTC
Bulletproofing Your Career Online
Bulletproofing Your Career Online
Ben Woelk, CISSP, CPTC
More from Ben Woelk, CISSP, CPTC
(20)
Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership Opportunities
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for Success
Building a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted Leadership
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
Digital self defense 101 me rit
Digital self defense 101 me rit
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Succession Planning and Volunteering
Succession Planning and Volunteering
A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14
A Techcomm Bestiary Spectrum14
A Techcomm Bestiary Spectrum14
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Security Awareness at RIT 2012-2013
Security Awareness at RIT 2012-2013
Empowering the Introvert Within: Becoming an Outstanding Leader
Empowering the Introvert Within: Becoming an Outstanding Leader
Bulletproofing Your Career Online
Bulletproofing Your Career Online
Recently uploaded
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Recently uploaded
(20)
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Digital self defense iia isaca it audit seminar
1.
Rochester IIA &
ISACA IT Audit Seminar December 10, 2015 Ben Woelk, CISSP ISO Program Manager Rochester Institute of Technology
2.
Copyright © 2015
Rochester Institute of Technology Presentation Overview • Background • Communications Plan Basics • RIT Implementation • Success? • Discussion
3.
Copyright © 2014
Rochester Institute of Technology BACKGROUND
4.
Copyright © 2015
Rochester Institute of Technology My Background • Corporate • Higher Education – ISO Office – Adjunct • Techcomm • Computing Security
5.
Copyright © 2014
Rochester Institute of Technology Rochester Institute of Technology • RIT Environment – 18,500 students – 3,500 faculty and staff – International Locations – ~40,000+ systems on the network at any given time – Very skilled IT security students
6.
Copyright © 2014
Rochester Institute of Technology RIT Information Security • RIT ISO – 3 full time • Information Security Officer • Program Manager • Sr. Forensics Investigator – 1-4 student employees • Mix of coop and part- time • Risk Management, not Information Technology
7.
Copyright © 2014
Rochester Institute of Technology COMMUNICATIONS PLAN BASICS
8.
Copyright © 2015
Rochester Institute of Technology Communications Plan • Benefits – Systematic approach – Repeatable – Set and achieve goals – Be proactive – Be strategy driven, not event driven – Strategic plan drives marketing/communications plan
9.
Copyright © 2015
Rochester Institute of Technology TechComm 101 • “We explain things” (R. J. Lippincott, Intercom) • Characteristics – Interactive and adaptable – Reader centered • Personas – Contextualized – Concise – Visual – Cross cultural
10.
Copyright © 2014
Rochester Institute of Technology RIT IMPLEMENTATION
11.
Copyright © 2015
Rochester Institute of Technology Digital Self Defense Goals • Inform the entire population about threats. • Educate new members of the RIT community on Information Security topics. • Maintain current information outputs and engagement on Information Security topics. • Create new avenues for communication to expand awareness of Information Security office. • Inform community of new Infosec initiatives
12.
Copyright © 2015
Rochester Institute of Technology Challenges • Multiple audiences • Messaging overload • 30% annual turnover • What, me worry? • Dry/technical subject
13.
Copyright © 2015
Rochester Institute of Technology Security Awareness Plan • Components – Audience analysis – Key messages – Communications channels – Calendar of promotions – Develop relationships
14.
Copyright © 2015
Rochester Institute of Technology Target Audiences
15.
Copyright © 2015
Rochester Institute of Technology Strategies • Consistent outreach • Creative/fun deliverables • New communication channels • “What’s in it for me?” fulfillment – Emphasizing home use – Easy-to-implement best practices – Consequences of non-compliance – Interactive elements
16.
Copyright © 2015
Rochester Institute of Technology Key Message • Short and Simple
17.
Copyright © 2015
Rochester Institute of Technology Calendar of Promotions
18.
Copyright © 2015
Rochester Institute of Technology Monthly Topics Month Topic June, July, August Pre-Semester, Start of Semester September New Students, New Semester, New Threats October Cyber Security Awareness Month November No Click November December Scams and Hoaxes January Data Privacy Month February Ph(F)ebruary Phish March Mobile Device Madness April Spring Cleaning May Graduating to Good Passwords
19.
Copyright © 2015
Rochester Institute of Technology Pre-Semester/Start of Semester
20.
Copyright © 2015
Rochester Institute of Technology Communications Channels • What’s the best vehicle?
21.
Copyright © 2015
Rochester Institute of Technology Develop Relationships
22.
Copyright © 2015
Rochester Institute of Technology RIT Infosec Website
23.
Copyright © 2015
Rochester Institute of Technology RIT Social Media
24.
Copyright © 2015
Rochester Institute of Technology Posters
25.
Copyright © 2015
Rochester Institute of Technology Go Phish https://www.pinterest.com/ritinfosec/playing-cards-by-rit-information-security/
26.
Copyright © 2014
Rochester Institute of Technology Alerts and Advisories • Message Center Portal/email • Ad hoc • ~20 per academic year
27.
Copyright © 2014
Rochester Institute of Technology Move-in
28.
Copyright © 2015
Rochester Institute of Technology New Student Orientation
29.
Copyright © 2015
Rochester Institute of Technology Lightning Talks • Six minute presentations • Slides move every 18 seconds • Topics – Online reputation management – Illegal file sharing – Safe use of social media – Securing mobile devices
30.
Copyright © 2015
Rochester Institute of Technology DSD Lightning Talk • https://www.youtube.com/watch?v=-Yo8TV-ZLbE
31.
Copyright © 2015
Rochester Institute of Technology New vehicles this fall • Bus posters • Employee Benefits Fair • RIT Information Security Field Guide to Identifying Phishing and Scams
32.
Copyright © 2015
Rochester Institute of Technology DSD 101 classes • Tips, Tricks, and Best Practices for staying safe online – Monthly – Departmental presentations
33.
Copyright © 2015
Rochester Institute of Technology RIT Digital Self Defense Team • Launched 11/11/15 – Using internal survey tool to collect metrics and recruit team members – 535 survey participants; 206 joined DSD Team
34.
Copyright © 2015
Rochester Institute of Technology In Development • Phishing exercises
35.
Copyright © 2014
Rochester Institute of Technology SUCCESS?
36.
Copyright © 2015
Rochester Institute of Technology Evaluation Tools • Internal survey tool – Fall baseline (open now) – Spring progress
37.
Copyright © 2015
Rochester Institute of Technology Social Media Evaluation
38.
Copyright © 2015
Rochester Institute of Technology External Evaluations • Use with care • Kred (2013) – Influence (trust) – Outreach (propensity to share) • Klout (2009) – Perceived social influence
39.
Copyright © 2015
Rochester Institute of Technology Evaluate and Make Mid-Course Corrections • You will make mistakes • Don’t be afraid to make a change • Did it make a difference? • Ways to evaluate – Surveys – Analytics From austinevan
40.
Copyright © 2015
Rochester Institute of Technology Key Success Factors • What’s in it for them? • Relevant at home as well as at work • Reach them where they are
41.
Copyright © 2015
Rochester Institute of Technology Resources • EDUCAUSE – Cybersecurity Awareness Resource Library – Security Awareness Quick Start and Advanced Guides • W. K. Kellogg Foundation Template for Strategic Communications Plan • Richard Johnson-Sheehan Technical Communication Today • Society for Technical Communication
42.
Copyright © 2015
Rochester Institute of Technology Contact Me Ben Woelk Ben.woelk@gmail.com; ben.woelk@rit.edu Benwoelk.com @benwoelk www.linkedin.com/in/benwoelk/
43.
Copyright © 2014
Rochester Institute of Technology DISCUSSION
Editor's Notes
What’s the best vehicle? Paper: Brochures, advertisements Digital: online sites, RSS links to website Social media: Facebook, Twitter, LinkedIn Video: YouTube In person: presentations, information fairs All of the above!
Download now