How to Develop and Maintain an Effective Security Awareness Training Program

By November 8, 2018Events

Security Awareness Training

December 2018 Midwest Cyber Security Alliance Meeting

Despite the heavy investment your business may have made into IT security technology, now more than ever, hackers and other cyber criminals are focusing on the elements of your business that you have less direct control over—your employees. Inattentive staff or employees not familiar with basic IT security best practices can create countless opportunities for hackers to compromise your company’s security by visiting websites infected with malware, responding to phishing emails, storing their login information in an unsecured location, and more.

One of the best ways to protect your business and address the multitude of vulnerabilities day-to-day employee activity creates is to institute routine, comprehensive security awareness training initiatives company-wide. Doing so will help ensure your employees have a solid understanding of your company’s security policies and procedures as well as industry best practices.

Join us at the next Midwest Cyber Security Alliance meeting, which will feature a presentation regarding security awareness training. HALOCK Security Labs will address how to develop and maintain an effective program, including:

    1. Standards that require security awareness training
    2. Key program elements such as general user security awareness training, role-based training, phishing tests, and newsletters
    3. How to achieve widespread adoption of the program across your organization

Additionally, Trend Micro will present on phishing and online threats that are targeting employees and putting businesses at risk. They will cover the threat landscape and give insight into the mind of a hacker, as well as demo their product, Phish Insights, which offers the ability to test if your employees would fall for a phishing scam and helps you prepare for a real one.

Attendees will enjoy complimentary cocktails and networking before the presentation. There is no fee to attend this event, but advance registration is required.

Click here to RSVP


Jennifer Rathburn
Partner, Foley & Lardner LLP

Vitaliy Shtym
Principal Sales Engineer, Trend Micro

Glenn A. Stout, CISM, GSEC, PMP, PhD
Managing Consultant, HALOCK Security Labs


Foley & Lardner LLP

777 E Wisconsin Ave
40th Floor
Milwaukee, WI 53202

Continuing Education

Foley & Lardner LLP will apply for CLE credit after the program, wherever applicable. Foley & Lardner LLP certifies that this activity has been approved for California MCLE credits by the State Bar of California in the amount of 1.0 General credit. Foley & Lardner LLP is a State Bar of California MCLE approved provider. Please note that participants must be in attendance on the date of the event; credit may not be obtained by viewing and/or listening to a program recording after the event. Certificates of attendance will be distributed to eligible participants approximately eight weeks after the program via email.

Important Information for New York Attorneys: This program is appropriate for experienced attorneys only.

This program may be eligible for continuing privacy education (CPE) credit toward CISA, CISM, CGEIT, and/or CRISC certifications and maintenance. Please visit the ISACA website to review the specific CPE requirements for your certification and verify whether the topic(s) addressed in this program align with one or more of your certification’s job practice areas: CISA, CISM, CGEIT, CRISC. If determined to be eligible, you may pick up a copy of the ISACA Verification of Attendance form onsite during the program.

Leave a Reply