Face-off: Is end-user education worth the effort?

Face-off: Is end-user education worth the effort?

Date: Apr 29, 2010
Extensive end-user education has been touted as an information security best practice by some, and as a gigantic waste of time by others. Does pouring time, effort and money into making users security savvy really pay off?

In this face-off, security experts Hugh Thompson, Founder of People Security and Program Committee Chair of the RSA Conference, and Adam Shostack, co-author of The New School of Information Security, discuss whether user security awareness training is really worth it.

More on Security Awareness Training and Internal Threats-Information

  • canderson

    Researcher details findings on spoofing GPS, malicious insiders

    VIDEO - Roger Johnston of Argonne National Laboratory discusses the implications of spoofing GPS and ways to manage angry and potentially malicious insiders.
  • canderson

    Black Hat 2012: Phishing and social engineering penetration testing

    VIDEO - Video: Anti-spear phishing training is controversial, but can be effective if it is done right, says Rohyt Belani, CEO and co-founder of PhishMe Inc.
  • canderson

    Bruce Schneier: What is cyberwar?

    VIDEO - In this RSA Conference 2011 interview, Michael Mimoso, Editorial Director of the Security Media Group at TechTarget interviews Bruce Schneier, Chief Security Technology Officer of BT Group and tried to answer the question, "What is cyberwar?"
  • exit interview

    Definition - An exit interview is a meeting between management representatives and someone who is leaving an organization. Businesses and other organizations such as educational institutions use exit interviews to gather useful feedback that can help guide future practices.
  • Attack security literacy with brute force

    Opinion - Forget the slogans. Reset your security awareness program with actionable information.
  • IT security strategy 2.0: Adjusting for a shifting infosec landscape

    Tip - Seismic shifts in the infosec landscape can no longer be ignored. Ernie Hayden explains how to update an IT security strategy to account for change.
  • Whistleblower policy: Preventing insider information leak incidents

    Tip - NSA-level incidents are rare, but they do happen. Learn how to prevent a whistleblower scenario and limit the risk of insider information leaks.
  • IT content and vendor engagement evaluation survey

    Survey - When IT professionals, such as you, have an IT project at their organization, there is a need to research multiple pieces of content from a variety of sources including vendors, third-parties and experts. This survey will allow TechTarget to identify the type of content that you prefer when conducting research related to your IT projects, and how you prefer to engage with vendors.