top of page

50 Engaging Cyber Security Activities for Continuous Awareness

People often say that one-and-done security training isn't enough and doesn't make a lasting impact. I completely agree. Continuous engagement is key to building a robust security culture. But how do you keep your team engaged and informed without hiring a consultant like me to brainstorm ideas for you?


Fear not! Here are 50 creative, cost-effective cyber security activities that you can implement right away. From interactive challenges to innovative training sessions, these ideas will help you maintain a vigilant and security-savvy workforce all year round. Dive in and discover how to make cyber security both fun and effective for your team.


1. OSINT Challenge

Get your team’s detective hats on! This challenge is about finding non-sensitive information using open-source intelligence techniques.

"Find out the name of my first pet to see how easy it is to gather personal information online."

Why? 

Teaches the team how easily personal info can be found, driving home the importance of protecting it.


Cost: 

Free


What do I need? 


How?

  1. Define the challenge.

  2. Set rules and guidelines.

  3. Announce the challenge via email and intranet.

  4. Provide OSINT resources.

  5. Collect and review submissions.

  6. Announce winners with shout-outs or a small voucher.


2. Phishing Scenario Creation

Turn the tables! Let your team think like attackers by creating phishing scenarios.

"Create a phishing email targeting a manager using their interests."

Why?

Helps the team understand phishing tactics without actual simulations.


Cost

Free


What do I need?

Internal email system


How?

  1. Explain the concept.

  2. Set guidelines.

  3. Provide examples of phishing emails.

  4. Collect submissions.

  5. Review and select the best.

  6. Reward winners with a small voucher.


3. Security Scavenger Hunt

Who doesn't love a scavenger hunt? Make it about finding security-related clues around the office.

"Find a hidden security tip in the office and take a photo."

Why?

A fun way to boost security knowledge.


Cost:

<£50 for printing clue cards


What do I need?

Printer, clue cards


How?

  1. Plan the layout and create clues.

  2. Distribute clues digitally or in print.

  3. Announce the event and provide instructions.

  4. Set up locations.

  5. Monitor participation.

  6. Reward winners with a small voucher.


4. Password Strength Contest

Challenge your team to create the strongest password using the best practices.

"Create a password with upper and lower case letters, numbers, and symbols."

Why?

Promotes strong, secure passwords.


Cost

Free


What do I need?


How?

  1. Announce the contest and remind staff not to submit their actual passwords

  2. Collect anonymous entries.

  3. Evaluate passwords.

  4. Reward the strongest passwords with a small voucher.


5. Cyber Security Escape Room

Escape room fun with a twist! Engage your team with security puzzles to 'escape' the room. You can either create your own escape room experience or rent one from a specialised provider.

"Solve security-related puzzles and gain knowledge."

Why?

Provides hands-on experience with security concepts in a fun, interactive way.


Cost

£500 per week or £1500 per month for rental from a provider, or variable if you create your own.


What do I need?

Materials and resources to create your own.


Option 1: Rent from Cyber Escape Room Provider

  1. Contact the provider and discuss your needs.

  2. Rent the escape room for the desired duration.

  3. Set up the escape room as per the provider's instructions.

  4. Announce the event and provide instructions to participants.

  5. Monitor participation and guide as needed.

  6. Announce winners and reward with a small voucher.


Option 2: Create Your Own Escape Room

  1. Plan the escape room scenario and puzzles.

  2. Choose a theme and story.

  3. Design puzzles that require solving cyber security challenges.

  4. Gather materials.

  5. Printable puzzles, locks, clues.

  6. Use resources like YouTube.com for ideas.

  7. Set up the physical or virtual escape room.

  8. Use office space or virtual platforms like Zoom or Teams.

  9. Announce the event and provide instructions to participants.

  10. Monitor participation and guide as needed.

  11. Announce winners and reward with a small voucher.


6. Cyber Security Mythbusters

Engage your team with a Mythbusters-style activity where they debunk common cyber security myths.


"Determine if the myth 'Using public Wi-Fi is always safe if it's password protected' is true or false."

Why?

Educates employees by correcting common misconceptions about cyber security in an interactive way.


Cost:

Free


What do I need?

List of common cyber security myths, presentation materials


How?

  1. Research and compile a list of common cyber security myths, such as "Public Wi-Fi is safe if it's password protected," "Incognito mode makes you completely anonymous," "Macs don't get viruses."

  2. Prepare materials for debunking these myths.

  3. Use resources like Cyber Aware or Stay Safe Online for accurate information.

  4. Announce the Mythbusters activity to employees.

  5. Explain the purpose and format of the activity.

  6. Host a session where you present each myth.

  7. Employees can vote on whether they think each myth is true or false.

  8. Reveal the correct answers and provide explanations.

  9. Encourage discussion and questions.

  10. Foster an open environment where employees can share their own misconceptions and learn from each other.

  11. Reward participation.

  12. Offer small prizes for those who engage most actively or answer correctly the most times.


7. Workshops

Host workshops on various cyber security topics. Perfect for in-depth learning.

"Workshop on creating strong passwords and using password managers."

Why?

Provides practical skills and knowledge.


Cost:

Free if using internal resources


What do I need?

Meeting rooms,

Zoom, Microsoft Teams, Google Meet, etc


How?

  1. Plan topics and schedule.

  2. Identify internal experts.

  3. Book rooms or set up virtual sessions.

  4. Announce workshops.

  5. Engage participants.

  6. Collect feedback for improvement.



8. Training Videos

Share short, informative videos on cyber security topics. Visual and auditory learning at its best.

"Video on recognising phishing emails."

Why?

Provides a clear understanding of cyber security concepts.


Cost:

Free to low-cost


What do I need?

Internal video creation tools


How?

  1. Identify key topics.

  2. Source or create videos.

  3. Announce availability.

  4. Encourage viewing and feedback.


9. Infographics

Design and distribute visually appealing infographics on key security topics.

"Infographic on the anatomy of a phishing email."

Why?

Visual representation for better retention.


Cost:

Free using internal tools


What do I need?


How?

  1. Identify topics.

  2. Design infographics.

  3. Print or distribute digitally.

  4. Place in high-traffic areas and online.


10. Interactive Modules

Create interactive learning modules on cyber security.

"Module on creating secure passwords."

Why?

Engages employees with interactive content.


Cost:

Free to low-cost


What do I need?


How?

  1. Plan the content.

  2. Create modules.

  3. Announce availability.

  4. Monitor participation and feedback.


11. Giveaways

Who doesn’t love freebies? Provide small rewards for participation.

"Branded mugs for completing security training."

Why?

Motivates participation and engagement.


Cost:

£5-£20 per person


What do I need?

Local suppliers and online stores


How?

  1. Identify suitable items.

  2. Purchase within budget.

  3. Announce giveaways.

  4. Distribute rewards.


12. Recognition Programmes

Give a shout-out to those engaging in your security initiatives.

"Recognise top participants in the company newsletter."

Why?

Encourages ongoing participation and commitment.


Cost:

Free


What do I need?

Internal communications, newsletter platform


How?

  1. Plan criteria for recognition.

  2. Announce the programme.

  3. Track participation.

  4. Recognise top performers.


13. Digital Badges

Reward achievement with digital recognition.

"Award digital badges for completing security training modules."

Why?

Provides a sense of accomplishment.


Cost:

Free using internal tools


What do I need?


How?

  1. Design badges.

  2. Announce the programme.

  3. Track achievements.

  4. Award badges.



14. Spotlight Features

Highlight individual contributions with spotlight features.

"Feature an employee who identified a phishing attempt."

Why?

Recognises individual efforts and encourages others.


Cost:

Free


What do I need?

Internal communications, newsletter platform


How?

  1. Identify contributors.

  2. Write spotlight articles.

  3. Publish features.

  4. Announce the programme.


15. Cyber Savvy Employee of the Month

Recognise exceptional performance with an Employee of the Month programme.

"Award Cyber Savvy Employee of the Month for significant contributions to cyber security."

Why?

Encourages excellence and participation.


Cost:

Free


What do I need?

Internal communications, meeting platform


How?

  1. Define criteria.

  2. Track performance.

  3. Announce the winner.

  4. Provide a certificate or small reward.


16. Posters in Lifts and on Toilet Doors

Place high visibility reminders in lifts and on toilet doors.

"Place posters with security tips in high-traffic areas."

Why?

Constant visual reminders of key security practices.


Cost:

£1-£2 per poster


What do I need?

Canva

Local print shop or office printer


How?

  1. Design posters with key security messages.

  2. Print posters.

  3. Place in high-traffic areas.

  4. Regularly update posters with new messages.


17. Weekly Emails

Send out weekly emails with practical security tips.

"Weekly email with tips on recognising phishing emails."

Why?

Keeps security top-of-mind for employees.


Cost:

Free


What do I need?

Company email system


How?

  1. Plan weekly email topics.

  2. Write and schedule emails.

  3. Send emails to all employees.

  4. Track open rates and feedback.


18. Intranet Updates

Post daily security tips on your company intranet.

"Daily tip on password security posted on the intranet."

Why?

Ensures all employees are informed.


Cost:

Free


What do I need?

Company intranet platform


How?

  1. Plan daily or weekly intranet update topics.

  2. Write and schedule posts.

  3. Monitor engagement and feedback.

  4. Adjust content based on feedback.



19. Social Media Posts

Share security tips on the company's social media channels.

"Daily security tips on the company’s LinkedIn page."

Why?

Reaches a wider audience and reinforces security messages.


Cost:

Free


What do I need?

Company social media accounts


How?

  1. Plan social media content calendar.

  2. Create and schedule posts.

  3. Monitor engagement and respond to comments.

  4. Adjust strategy based on feedback.


20. Digital Newsletters

Include a cyber security section in your regular newsletters.

"Monthly newsletter featuring a section on the latest cyber threats."

Why?

Keeps employees informed about security news and tips.


Cost:

Free


What do I need?

Email newsletter platforms like Mailchimp or Constant Contact


How?

  1. Plan content for the cyber security section.

  2. Write and design the newsletter.

  3. Send newsletters to all employees.

  4. Track open rates and feedback.


21. Infographics

Create infographics on key security topics.


"Infographic on the anatomy of a phishing email."

Why?

Visual representation of information for better retention.


Cost:

Free using internal tools


What do I need?


How?

  1. Identify key topics for infographics.

  2. Design infographics using tools like Canva.

  3. Print or digitally distribute infographics.

  4. Place infographics in high-traffic areas and online.


22. Security-Themed Screen Savers

Create screen savers with security messages.

"Create a screen saver with tips on how to secure personal devices."

Why?

Provides constant visual reminders of key security practices.


Cost:

Free


What do I need?

Internal IT system


How?

  1. Design screen savers with security messages.

  2. Deploy screen savers to all company computers.

  3. Regularly update screen savers with new messages.


23. Security Awareness Games

Use free online games that teach security concepts.

"Interactive game on spotting phishing emails."

Why?

Makes learning about security fun and engaging.


Cost:

Free


What do I need?

Cyber security game websites like CyberSec Labs or CyberStart


How?

  1. Identify free online security games.

  2. Announce game availability to employees.

  3. Monitor participation and collect feedback.

  4. Provide follow-up resources based on feedback.


24. Virtual Escape Rooms

Set up virtual escape rooms with security challenges.

"Solve security puzzles in a virtual escape room."

Why?

Provides hands-on experience with security concepts.


Cost:

Free to low-cost


What do I need?

Free online escape room platforms like Escape Live


How?

  1. Plan the escape room scenario and puzzles.

  2. Set up the virtual escape room using free platforms.

  3. Announce the event and provide instructions.

  4. Monitor participation and guide as needed.

  5. Announce winners and reward with a small voucher.


25. Digital Storytelling

Use narratives to convey security messages.

"Share stories about real-life security breaches and their impact."

Why?

Engages employees with relatable and memorable content.


Cost:

Free


What do I need?

Internal communications platform


How?

  1. Identify key security topics for storytelling.

  2. Create engaging stories or case studies.

  3. Share stories via email, intranet, or social media.

  4. Collect feedback and adjust future stories.


26. Daily Security Tips

Share a daily security tip via email or intranet.

"Daily tip on creating strong passwords."

Why?

Keeps security top-of-mind for employees.


Cost:

Free


What do I need?

Company intranet or email system


How?

  1. Plan a schedule of daily tips.

  2. Write and schedule tips.

  3. Distribute tips via email or intranet.

  4. Monitor engagement and adjust tips as needed.


27. Monthly Themes

Focus on different security topics each month.

"Focus on password security in January and phishing awareness in February."

Why?

Provides comprehensive coverage of various security topics.


Cost:

Free


What do I need?

Company intranet


How?

  1. Plan monthly themes based on current threats.

  2. Create content and activities for each theme.

  3. Announce themes and activities to employees.

  4. Monitor participation and adjust themes as needed.


28. Quarterly Reviews

Conduct quarterly reviews of your security awareness efforts.

"Review and assess the effectiveness of the security awareness campaign."

Why?

Ensures the campaign remains effective and relevant.


Cost:

Free


What do I need?

Internal review meetings


How?

  1. Schedule quarterly review meetings.

  2. Collect data on campaign activities and participation.

  3. Analyse the effectiveness and identify areas for improvement.

  4. Adjust the campaign strategy based on the review.


29. Annual Security Awareness Month

Dedicate a week each year to intensive security awareness activities.

"Host workshops, quizzes, and contests during Security Awareness Month."

Why?

Provides concentrated learning and engagement.


Cost:

Free to low-cost


What do I need?

Stuff listed in this article


How?

  1. Plan activities and events for the month.

  2. Announce the Security Awareness Month to employees.

  3. Conduct activities such as workshops, quizzes, and contests.

  4. Collect feedback and measure participation.

  5. Report on the success and areas for improvement.


30. Regular Surveys

Gather employee feedback on the campaign through surveys.

"Survey employees on their awareness and satisfaction with the security training."

Why?

Provides insights for continuous improvement.


Cost:

Free using internal tools


What do I need?


How?

  1. Create survey questions to gauge awareness and satisfaction.

  2. Distribute surveys via email or intranet.

  3. Collect and analyse responses.

  4. Adjust campaign activities based on feedback.


31. Cyber Security Bingo

Turn learning into a game with Cyber Security Bingo, where employees complete tasks related to best security practices.


"Complete tasks such as updating passwords, attending a workshop, or identifying phishing emails to mark off your Bingo card."

Why? 

Encourages active participation in security practices and makes learning fun and engaging.


Cost: 

Free to low-cost


What do I need? 

Printable Bingo cards

Small rewards


How?

  1. Create Bingo cards with various security tasks.

    • Examples: "Update your password," "Attend a security workshop," "Spot a phishing email."

    • Use tools like Canva to design your cards.

  2. Announce the Bingo game and distribute cards.

    • Send via email or provide printed copies.

  3. Set a timeframe for completing the Bingo card.

    • Example: "Complete your card within a month."

  4. Encourage employees to complete tasks and mark their cards.

    • Provide instructions and resources for each task.

  5. Collect completed Bingo cards and verify task completion.

  6. Announce winners and reward with small prizes.

    • Example: Small vouchers, branded merchandise.


32. Phishing Awareness

Educate on identifying and avoiding phishing attempts.

"Share examples of phishing emails and how to spot them."

Why?

Reduces the risk of falling for phishing attacks.


Cost:

Free


What do I need?


How?

1. Create materials explaining phishing tactics and defences.

2. Share materials via email, intranet, and posters.

3. Conduct interactive sessions or quizzes on phishing.

4. Collect feedback and adjust future content.


33. Cyber Security Jeopardy

Turn learning into a competitive and fun game with a Cyber Security Jeopardy challenge. Teams compete by answering security-related questions in a quiz-show format.

"Answer questions in categories like 'Phishing Tactics,' 'Password Safety,' and 'Data Protection' to earn points for your team."

Why? 

Makes learning about cyber security interactive and engaging, fostering teamwork and healthy competition.


Cost: 

Free to low-cost


What do I need? 

Jeopardy game template, projector or screen for displaying questions, small prizes


How?

  1. Create a Jeopardy game board with categories and questions.

    • Use online tools like Jeopardy Labs to create a digital game board.

    • Categories could include: Phishing Tactics, Password Safety, Data Protection, Social Engineering, and Mobile Security.

  2. Announce the Jeopardy game and invite teams to participate.

    • Form teams of 3-5 employees.

  3. Schedule the game session and set up the game board.

    • Use a meeting room with a projector or a virtual platform like Zoom with screen sharing.

  4. Play the game.

    • A moderator reads the questions, and teams buzz in to answer.

    • Keep track of points for each team.

  5. Announce the winning team and reward them with small prizes.

    • Example: Small vouchers, branded merchandise, or an extra break time


34. Mobile Security

Share tips on securing mobile devices.

"Provide guidelines on using secure mobile apps and avoiding malware."

Why?

Improves mobile device security awareness.


Cost:

Free


What do I need?

Mobile security guidelines, internal communications


How?

  1. Create materials on mobile security best practices.

  2. Distribute materials via email, intranet, and posters.

  3. Conduct training sessions on mobile security.

  4. Monitor and encourage adherence to best practices.


35. Social Engineering Awareness

Educate employees on social engineering tactics and defences.

"Share real-life examples of social engineering attacks and how to avoid them."

Why?

Enhances awareness of social engineering threats.


Cost:

Free


What do I need?

Social engineering awareness materials

Internal communications


How?

  1. Create materials on social engineering tactics and defences.

  2. Distribute materials via email, intranet, and posters.

  3. Conduct interactive sessions or quizzes on social engineering.

  4. Collect feedback and adjust future content.


36. Free Online Resources

Share links to free online courses and tools on cyber security.

"Provide access to free online courses on cyber security fundamentals."

Why?

Encourages continuous learning and skill development.


Cost:

Free


What do I need?

Coursera


How?

  1. Identify relevant free online resources.

  2. Curate and organise resources for easy access.

  3. Share resources via email, intranet, and social media.

  4. Encourage employees to utilise the resources.


37. Internal Expertise

Leverage internal expertise for customised training.

"Have IT staff lead a session on the latest cyber threats."

Why?

Provides practical insights and fosters a culture of learning.


Cost:

Free


What do I need?

Internal experts, meeting rooms, virtual meeting platforms


How?

1. Identify internal experts on various security topics.

2. Schedule and announce training sessions.

3. Provide support and resources for presenters.

4. Conduct sessions and collect feedback.


38. DIY Design

Empower employees to create engaging security materials.

"Create posters and infographics using Canva."

Why?

Enhances creativity and ownership of security practices.


Cost:

Free using internal tools


What do I need?


How?

1. Identify key topics for materials.

2. Design materials using free tools like Canva.

3. Print or digitally distribute materials.

4. Monitor engagement and adjust designs as needed.


39. Cyber Security Storytelling Sessions

Organise Cyber Security Storytelling Sessions where employees share real-life experiences and lessons learned from cyber security incidents.

"Share a story about a time you almost fell for a phishing scam and what you learned from the experience."

Why? 

Personal stories make cyber security more relatable and memorable, fostering a culture of shared learning and vigilance.


Cost: 

Free


What do I need? 

Meeting room or virtual meeting platform, storytelling guidelines


How?

  1. Plan the Storytelling Sessions.

    • Schedule regular sessions (e.g., monthly).

    • Create guidelines for sharing stories, focusing on lessons learned and positive outcomes.

  2. Announce the sessions to all employees.

    • Use email, intranet, and posters to promote the events.

    • Encourage employees to volunteer and share their experiences.

  3. Prepare the session format.

    • Start with an introduction to set the context.

    • Allow each storyteller 5-10 minutes to share their experience.

    • Follow each story with a brief discussion on key takeaways.

  4. Facilitate the storytelling sessions.

    • Ensure a supportive and non-judgmental atmosphere.

    • Moderate the session to keep it on track and focused.

  5. Follow up after the session.

    • Summarise key lessons and share them with all employees via email or intranet.

    • Encourage ongoing sharing of stories and experiences.

    • Recognise participants for their contributions.


40. Partnerships

Collaborate with external experts for enhanced training.

"Partner with a local university for guest lectures on cyber security."

Why?

Expands knowledge base and provides diverse perspectives.


Cost:

Free to low-cost


What do I need?

External partnerships, guest speakers


How?

  1. Identify potential partners (universities, organisations).

  2. Reach out and propose collaboration.

  3. Organise joint activities or share resources.

  4. Monitor the partnership and assess impact.


41. Employee Forums

Encourage peer-to-peer learning through online forums.

"Set up an online forum for employees to share cyber security tips."

Why?

Fosters a collaborative learning environment.


Cost:

Free


What do I need?

Internal forum platform


How?

  1. Set up an online forum or discussion board.

  2. Announce the forum to employees and provide access instructions.

  3. Monitor discussions and provide moderation as needed.

  4. Collect feedback and adjust forum structure as needed.


42. Idea Submission

Harness employee creativity with a suggestion box for security ideas.

"Create a suggestion box for cyber security tips and ideas."

Why?

Encourages proactive contributions to security practices.


Cost:

Free


What do I need?

Suggestion box, email submission system


How?

1. Create a submission process (e.g., email, intranet form).

2. Announce the initiative and encourage participation.

3. Review and implement useful submissions.

4. Recognise contributors in newsletters or meetings.


43. Cyber Security Roadshows

Organise Cyber Security Roadshows to take cyber security awareness and training to different departments or locations within your organisation.

"Bring a pop-up cyber security training session to each department, complete with interactive demos and Q&A."

Why? 

Provides hands-on, tailored training directly to employees' workspaces, increasing accessibility and engagement.


Cost: 

Free to low-cost


What do I need? 

Portable training materials, demo equipment, schedule of visits


How?

  1. Plan the Cyber Security Roadshows.

    • Identify key topics and create portable training materials.

    • Schedule visits to different departments or locations over a set period (e.g., a week or month).

  2. Announce the roadshows to all employees.

    • Use email, intranet, and posters to inform employees about the upcoming visits.

    • Highlight the topics and benefits of attending.

  3. Prepare the content and demos.

    • Develop interactive demos and presentations tailored to each department's needs.

    • Ensure all materials are easily transportable.

  4. Conduct the roadshows.

    • Set up a pop-up training area in each department or location.

    • Deliver engaging presentations, interactive demos, and Q&A sessions.

  5. Collect feedback and follow up.

    • Use feedback forms to gather insights from participants.

    • Share additional resources and materials based on the sessions.

    • Recognise participation and encourage continued engagement.


44. Team Challenges

Foster teamwork with security-related challenges.

"Host a team-based quiz on cyber security knowledge."

Why?

Enhances collaboration and collective learning.


Cost:

Free


What do I need?

Internal quiz platform,


How?

  1. Plan and design team challenges (e.g., security quiz bowl).

  2. Announce challenges and provide instructions.

  3. Monitor participation and track team progress.

  4. Announce winners and reward with a small voucher.


45. Peer Learning

Organise peer-led workshops on cyber security best practices.

"Peer-led session on secure browsing habits."

Why?

Utilises internal knowledge and fosters collaboration.


Cost:

Free

What do I need? Meeting rooms, virtual meeting platforms


How?

  1. Identify knowledgeable employees willing to lead sessions.

  2. Schedule and announce peer learning sessions.

  3. Provide support and resources for session leaders.

  4. Collect feedback and improve future sessions.


46. Cyber Security Surgery

Host a Cyber Security Surgery where employees can drop in to get personalised advice and solutions for their cyber security questions and issues.

"Get one-on-one advice on how to secure your home network or protect your personal data."

Why? 

Provides tailored support and education, addressing individual concerns and enhancing overall security awareness.


Cost: 

Free to low-cost


What do I need? 

Meeting room or virtual meeting platform, knowledgeable staff or external experts, promotional materials


How?

  1. Plan the Cyber Security Surgery.

    • Schedule regular sessions (e.g., once a month).

    • Choose a convenient location or set up a virtual meeting space.

  2. Announce the Cyber Security Surgery to employees.

    • Use email, intranet, and posters to inform employees about the event.

    • Highlight the types of support and advice available.

  3. Prepare knowledgeable staff or external experts.

    • Ensure they are well-versed in various cyber security topics.

    • Provide them with resources and materials to assist employees.

  4. Host the Cyber Security Surgery.

    • Set up a welcoming space with necessary equipment (e.g., computers, network access).

    • Allow employees to drop in and discuss their cyber security concerns.

    • Offer one-on-one consultations and practical advice.

  5. Follow up with participants.

    • Provide additional resources or guides based on the consultations.

    • Collect feedback to improve future sessions.

    • Recognise participation and encourage continued engagement.


47. Security Roundtables

Host monthly roundtable discussions on current cyber threats.

"Monthly roundtable on emerging security threats."

Why?

Encourages open dialogue and idea exchange.


Cost:

Free


What do I need?

Meeting rooms, virtual meeting platforms


How?

  1. Plan and schedule roundtable discussions.

  2. Invite employees to participate and share insights.

  3. Facilitate discussions and document key points.

  4. Follow up with action items and improvements.


48. Cyber Security Hackathon Using Hackathon Platforms

Organise a hackathon focused on developing innovative solutions to common cyber security challenges using a platform designed for easy hackathon management.


"Develop a tool that helps employees recognize phishing emails."

Why? 

Fosters innovation and deepens understanding of cyber security issues through hands-on experience.


Cost: 

Variable (depends on platform subscription and prizes)


What do I need? 

Hackathon platform, computers, internet access, mentors/judges, small prizes


How?

  1. Select a Hackathon Platform, such as Devpost, HackerEarth, Hackathon.com

  2. Announce the hackathon and its objectives.


  3. Set clear guidelines and criteria for participation. Focus on solving specific cyber security problems relevant to your organisation.

  4. Set up the hackathon on the selected platform.


  5. Provide detailed information, rules, and resources on the platform.

  6. Provide resources and support, and invite mentors from the IT department or external cyber security experts.

  7. Host the hackathon event, using the platform to manage submissions, team collaboration, and event scheduling.

    Provide virtual or physical workspace, refreshments, and support during the event.

  8. Teams present their solutions through the platform.

  9. Judges evaluate based on creativity, feasibility, and impact.

  10. Announce winners and award prizes, like vouchers, tech gadgets, recognition in the company newsletter.


49. Security Champions

Create a network of security champions who advocate for best practices.

"Appoint security champions to promote awareness."

Why?

Promotes a culture of security awareness through dedicated advocates.


Cost:

Free


What do I need?

Internal communications


How?

  1. Define criteria for security champions.

  2. Announce the programme and invite nominations.

  3. Provide training and resources to champions.

  4. Recognise and support champions in their efforts.


50. Knowledge Sharing Sessions

Hold regular sessions for employees to share security knowledge.

"Monthly knowledge sharing session on cyber security tips."

Why?

Fosters a collaborative learning environment and reinforces security practices.


Cost:

Free


What do I need?

Meeting rooms

Virtual meeting platforms


How?

  1. Schedule regular knowledge-sharing sessions.

  2. Invite employees to present on security topics.

  3. Provide support and resources for presenters.

  4. Facilitate the sessions and document key points.

  5. Follow up with action items and improvements based on discussions.


 

Ready to take your cyber security awareness to the next level? While these ideas are a great start, having a tailored strategy can make all the difference. At Culture Gem, we specialise in creating bespoke security training programmes that fit your unique needs. Visit our consultation page to learn more about how we can help you build a resilient security culture. Let’s make your organisation safer, together.

bottom of page