People often say that one-and-done security training isn't enough and doesn't make a lasting impact. I completely agree. Continuous engagement is key to building a robust security culture. But how do you keep your team engaged and informed without hiring a consultant like me to brainstorm ideas for you?
Fear not! Here are 50 creative, cost-effective cyber security activities that you can implement right away. From interactive challenges to innovative training sessions, these ideas will help you maintain a vigilant and security-savvy workforce all year round. Dive in and discover how to make cyber security both fun and effective for your team.
1. OSINT Challenge
Get your team’s detective hats on! This challenge is about finding non-sensitive information using open-source intelligence techniques.
"Find out the name of my first pet to see how easy it is to gather personal information online."
Why?
Teaches the team how easily personal info can be found, driving home the importance of protecting it.
Cost:
Free
What do I need?
How?
Define the challenge.
Set rules and guidelines.
Announce the challenge via email and intranet.
Provide OSINT resources.
Collect and review submissions.
Announce winners with shout-outs or a small voucher.
2. Phishing Scenario Creation
Turn the tables! Let your team think like attackers by creating phishing scenarios.
"Create a phishing email targeting a manager using their interests."
Why?
Helps the team understand phishing tactics without actual simulations.
Cost
Free
What do I need?
Internal email system
How?
Explain the concept.
Set guidelines.
Provide examples of phishing emails.
Collect submissions.
Review and select the best.
Reward winners with a small voucher.
3. Security Scavenger Hunt
Who doesn't love a scavenger hunt? Make it about finding security-related clues around the office.
"Find a hidden security tip in the office and take a photo."
Why?
A fun way to boost security knowledge.
Cost:
<£50 for printing clue cards
What do I need?
Printer, clue cards
How?
Plan the layout and create clues.
Distribute clues digitally or in print.
Announce the event and provide instructions.
Set up locations.
Monitor participation.
Reward winners with a small voucher.
4. Password Strength Contest
Challenge your team to create the strongest password using the best practices.
"Create a password with upper and lower case letters, numbers, and symbols."
Why?
Promotes strong, secure passwords.
Cost
Free
What do I need?
How?
Announce the contest and remind staff not to submit their actual passwords
Collect anonymous entries.
Evaluate passwords.
Reward the strongest passwords with a small voucher.
5. Cyber Security Escape Room
Escape room fun with a twist! Engage your team with security puzzles to 'escape' the room. You can either create your own escape room experience or rent one from a specialised provider.
"Solve security-related puzzles and gain knowledge."
Why?
Provides hands-on experience with security concepts in a fun, interactive way.
Cost
£500 per week or £1500 per month for rental from a provider, or variable if you create your own.
What do I need?
Materials and resources to create your own.
Option 1: Rent from Cyber Escape Room Provider
Contact the provider and discuss your needs.
Rent the escape room for the desired duration.
Set up the escape room as per the provider's instructions.
Announce the event and provide instructions to participants.
Monitor participation and guide as needed.
Announce winners and reward with a small voucher.
Option 2: Create Your Own Escape Room
Plan the escape room scenario and puzzles.
Choose a theme and story.
Design puzzles that require solving cyber security challenges.
Gather materials.
Printable puzzles, locks, clues.
Use resources like YouTube.com for ideas.
Set up the physical or virtual escape room.
Use office space or virtual platforms like Zoom or Teams.
Announce the event and provide instructions to participants.
Monitor participation and guide as needed.
Announce winners and reward with a small voucher.
6. Cyber Security Mythbusters
Engage your team with a Mythbusters-style activity where they debunk common cyber security myths.
"Determine if the myth 'Using public Wi-Fi is always safe if it's password protected' is true or false."
Why?
Educates employees by correcting common misconceptions about cyber security in an interactive way.
Cost:
Free
What do I need?
List of common cyber security myths, presentation materials
How?
Research and compile a list of common cyber security myths, such as "Public Wi-Fi is safe if it's password protected," "Incognito mode makes you completely anonymous," "Macs don't get viruses."
Prepare materials for debunking these myths.
Use resources like Cyber Aware or Stay Safe Online for accurate information.
Announce the Mythbusters activity to employees.
Explain the purpose and format of the activity.
Host a session where you present each myth.
Employees can vote on whether they think each myth is true or false.
Reveal the correct answers and provide explanations.
Encourage discussion and questions.
Foster an open environment where employees can share their own misconceptions and learn from each other.
Reward participation.
Offer small prizes for those who engage most actively or answer correctly the most times.
7. Workshops
Host workshops on various cyber security topics. Perfect for in-depth learning.
"Workshop on creating strong passwords and using password managers."
Why?
Provides practical skills and knowledge.
Cost:
Free if using internal resources
What do I need?
Meeting rooms,
Zoom, Microsoft Teams, Google Meet, etc
How?
Plan topics and schedule.
Identify internal experts.
Book rooms or set up virtual sessions.
Announce workshops.
Engage participants.
Collect feedback for improvement.
8. Training Videos
Share short, informative videos on cyber security topics. Visual and auditory learning at its best.
"Video on recognising phishing emails."
Why?
Provides a clear understanding of cyber security concepts.
Cost:
Free to low-cost
What do I need?
Internal video creation tools
How?
Identify key topics.
Source or create videos.
Announce availability.
Encourage viewing and feedback.
9. Infographics
Design and distribute visually appealing infographics on key security topics.
"Infographic on the anatomy of a phishing email."
Why?
Visual representation for better retention.
Cost:
Free using internal tools
What do I need?
How?
Identify topics.
Design infographics.
Print or distribute digitally.
Place in high-traffic areas and online.
10. Interactive Modules
Create interactive learning modules on cyber security.
"Module on creating secure passwords."
Why?
Engages employees with interactive content.
Cost:
Free to low-cost
What do I need?
How?
Plan the content.
Create modules.
Announce availability.
Monitor participation and feedback.
11. Giveaways
Who doesn’t love freebies? Provide small rewards for participation.
"Branded mugs for completing security training."
Why?
Motivates participation and engagement.
Cost:
£5-£20 per person
What do I need?
Local suppliers and online stores
How?
Identify suitable items.
Purchase within budget.
Announce giveaways.
Distribute rewards.
12. Recognition Programmes
Give a shout-out to those engaging in your security initiatives.
"Recognise top participants in the company newsletter."
Why?
Encourages ongoing participation and commitment.
Cost:
Free
What do I need?
Internal communications, newsletter platform
How?
Plan criteria for recognition.
Announce the programme.
Track participation.
Recognise top performers.
13. Digital Badges
Reward achievement with digital recognition.
"Award digital badges for completing security training modules."
Why?
Provides a sense of accomplishment.
Cost:
Free using internal tools
What do I need?
How?
Design badges.
Announce the programme.
Track achievements.
Award badges.
14. Spotlight Features
Highlight individual contributions with spotlight features.
"Feature an employee who identified a phishing attempt."
Why?
Recognises individual efforts and encourages others.
Cost:
Free
What do I need?
Internal communications, newsletter platform
How?
Identify contributors.
Write spotlight articles.
Publish features.
Announce the programme.
15. Cyber Savvy Employee of the Month
Recognise exceptional performance with an Employee of the Month programme.
"Award Cyber Savvy Employee of the Month for significant contributions to cyber security."
Why?
Encourages excellence and participation.
Cost:
Free
What do I need?
Internal communications, meeting platform
How?
Define criteria.
Track performance.
Announce the winner.
Provide a certificate or small reward.
16. Posters in Lifts and on Toilet Doors
Place high visibility reminders in lifts and on toilet doors.
"Place posters with security tips in high-traffic areas."
Why?
Constant visual reminders of key security practices.
Cost:
£1-£2 per poster
What do I need?
Canva
Local print shop or office printer
How?
Design posters with key security messages.
Print posters.
Place in high-traffic areas.
Regularly update posters with new messages.
17. Weekly Emails
Send out weekly emails with practical security tips.
"Weekly email with tips on recognising phishing emails."
Why?
Keeps security top-of-mind for employees.
Cost:
Free
What do I need?
Company email system
How?
Plan weekly email topics.
Write and schedule emails.
Send emails to all employees.
Track open rates and feedback.
18. Intranet Updates
Post daily security tips on your company intranet.
"Daily tip on password security posted on the intranet."
Why?
Ensures all employees are informed.
Cost:
Free
What do I need?
Company intranet platform
How?
Plan daily or weekly intranet update topics.
Write and schedule posts.
Monitor engagement and feedback.
Adjust content based on feedback.
19. Social Media Posts
Share security tips on the company's social media channels.
"Daily security tips on the company’s LinkedIn page."
Why?
Reaches a wider audience and reinforces security messages.
Cost:
Free
What do I need?
Company social media accounts
How?
Plan social media content calendar.
Create and schedule posts.
Monitor engagement and respond to comments.
Adjust strategy based on feedback.
20. Digital Newsletters
Include a cyber security section in your regular newsletters.
"Monthly newsletter featuring a section on the latest cyber threats."
Why?
Keeps employees informed about security news and tips.
Cost:
Free
What do I need?
Email newsletter platforms like Mailchimp or Constant Contact
How?
Plan content for the cyber security section.
Write and design the newsletter.
Send newsletters to all employees.
Track open rates and feedback.
21. Infographics
Create infographics on key security topics.
"Infographic on the anatomy of a phishing email."
Why?
Visual representation of information for better retention.
Cost:
Free using internal tools
What do I need?
How?
Identify key topics for infographics.
Design infographics using tools like Canva.
Print or digitally distribute infographics.
Place infographics in high-traffic areas and online.
22. Security-Themed Screen Savers
Create screen savers with security messages.
"Create a screen saver with tips on how to secure personal devices."
Why?
Provides constant visual reminders of key security practices.
Cost:
Free
What do I need?
Internal IT system
How?
Design screen savers with security messages.
Deploy screen savers to all company computers.
Regularly update screen savers with new messages.
23. Security Awareness Games
Use free online games that teach security concepts.
"Interactive game on spotting phishing emails."
Why?
Makes learning about security fun and engaging.
Cost:
Free
What do I need?
Cyber security game websites like CyberSec Labs or CyberStart
How?
Identify free online security games.
Announce game availability to employees.
Monitor participation and collect feedback.
Provide follow-up resources based on feedback.
24. Virtual Escape Rooms
Set up virtual escape rooms with security challenges.
"Solve security puzzles in a virtual escape room."
Why?
Provides hands-on experience with security concepts.
Cost:
Free to low-cost
What do I need?
Free online escape room platforms like Escape Live
How?
Plan the escape room scenario and puzzles.
Set up the virtual escape room using free platforms.
Announce the event and provide instructions.
Monitor participation and guide as needed.
Announce winners and reward with a small voucher.
25. Digital Storytelling
Use narratives to convey security messages.
"Share stories about real-life security breaches and their impact."
Why?
Engages employees with relatable and memorable content.
Cost:
Free
What do I need?
Internal communications platform
How?
Identify key security topics for storytelling.
Create engaging stories or case studies.
Share stories via email, intranet, or social media.
Collect feedback and adjust future stories.
26. Daily Security Tips
Share a daily security tip via email or intranet.
"Daily tip on creating strong passwords."
Why?
Keeps security top-of-mind for employees.
Cost:
Free
What do I need?
Company intranet or email system
How?
Plan a schedule of daily tips.
Write and schedule tips.
Distribute tips via email or intranet.
Monitor engagement and adjust tips as needed.
27. Monthly Themes
Focus on different security topics each month.
"Focus on password security in January and phishing awareness in February."
Why?
Provides comprehensive coverage of various security topics.
Cost:
Free
What do I need?
Company intranet
How?
Plan monthly themes based on current threats.
Create content and activities for each theme.
Announce themes and activities to employees.
Monitor participation and adjust themes as needed.
28. Quarterly Reviews
Conduct quarterly reviews of your security awareness efforts.
"Review and assess the effectiveness of the security awareness campaign."
Why?
Ensures the campaign remains effective and relevant.
Cost:
Free
What do I need?
Internal review meetings
How?
Schedule quarterly review meetings.
Collect data on campaign activities and participation.
Analyse the effectiveness and identify areas for improvement.
Adjust the campaign strategy based on the review.
29. Annual Security Awareness Month
Dedicate a week each year to intensive security awareness activities.
"Host workshops, quizzes, and contests during Security Awareness Month."
Why?
Provides concentrated learning and engagement.
Cost:
Free to low-cost
What do I need?
Stuff listed in this article
How?
Plan activities and events for the month.
Announce the Security Awareness Month to employees.
Conduct activities such as workshops, quizzes, and contests.
Collect feedback and measure participation.
Report on the success and areas for improvement.
30. Regular Surveys
Gather employee feedback on the campaign through surveys.
"Survey employees on their awareness and satisfaction with the security training."
Why?
Provides insights for continuous improvement.
Cost:
Free using internal tools
What do I need?
How?
Create survey questions to gauge awareness and satisfaction.
Distribute surveys via email or intranet.
Collect and analyse responses.
Adjust campaign activities based on feedback.
31. Cyber Security Bingo
Turn learning into a game with Cyber Security Bingo, where employees complete tasks related to best security practices.
"Complete tasks such as updating passwords, attending a workshop, or identifying phishing emails to mark off your Bingo card."
Why?
Encourages active participation in security practices and makes learning fun and engaging.
Cost:
Free to low-cost
What do I need?
Printable Bingo cards
Small rewards
How?
Create Bingo cards with various security tasks.
Examples: "Update your password," "Attend a security workshop," "Spot a phishing email."
Use tools like Canva to design your cards.
Announce the Bingo game and distribute cards.
Send via email or provide printed copies.
Set a timeframe for completing the Bingo card.
Example: "Complete your card within a month."
Encourage employees to complete tasks and mark their cards.
Provide instructions and resources for each task.
Collect completed Bingo cards and verify task completion.
Announce winners and reward with small prizes.
Example: Small vouchers, branded merchandise.
32. Phishing Awareness
Educate on identifying and avoiding phishing attempts.
"Share examples of phishing emails and how to spot them."
Why?
Reduces the risk of falling for phishing attacks.
Cost:
Free
What do I need?
How?
1. Create materials explaining phishing tactics and defences.
2. Share materials via email, intranet, and posters.
3. Conduct interactive sessions or quizzes on phishing.
4. Collect feedback and adjust future content.
33. Cyber Security Jeopardy
Turn learning into a competitive and fun game with a Cyber Security Jeopardy challenge. Teams compete by answering security-related questions in a quiz-show format.
"Answer questions in categories like 'Phishing Tactics,' 'Password Safety,' and 'Data Protection' to earn points for your team."
Why?
Makes learning about cyber security interactive and engaging, fostering teamwork and healthy competition.
Cost:
Free to low-cost
What do I need?
Jeopardy game template, projector or screen for displaying questions, small prizes
How?
Create a Jeopardy game board with categories and questions.
Use online tools like Jeopardy Labs to create a digital game board.
Categories could include: Phishing Tactics, Password Safety, Data Protection, Social Engineering, and Mobile Security.
Announce the Jeopardy game and invite teams to participate.
Form teams of 3-5 employees.
Schedule the game session and set up the game board.
Use a meeting room with a projector or a virtual platform like Zoom with screen sharing.
Play the game.
A moderator reads the questions, and teams buzz in to answer.
Keep track of points for each team.
Announce the winning team and reward them with small prizes.
Example: Small vouchers, branded merchandise, or an extra break time
34. Mobile Security
Share tips on securing mobile devices.
"Provide guidelines on using secure mobile apps and avoiding malware."
Why?
Improves mobile device security awareness.
Cost:
Free
What do I need?
Mobile security guidelines, internal communications
How?
Create materials on mobile security best practices.
Distribute materials via email, intranet, and posters.
Conduct training sessions on mobile security.
Monitor and encourage adherence to best practices.
35. Social Engineering Awareness
Educate employees on social engineering tactics and defences.
"Share real-life examples of social engineering attacks and how to avoid them."
Why?
Enhances awareness of social engineering threats.
Cost:
Free
What do I need?
Social engineering awareness materials
Internal communications
How?
Create materials on social engineering tactics and defences.
Distribute materials via email, intranet, and posters.
Conduct interactive sessions or quizzes on social engineering.
Collect feedback and adjust future content.
36. Free Online Resources
Share links to free online courses and tools on cyber security.
"Provide access to free online courses on cyber security fundamentals."
Why?
Encourages continuous learning and skill development.
Cost:
Free
What do I need?
Coursera
How?
Identify relevant free online resources.
Curate and organise resources for easy access.
Share resources via email, intranet, and social media.
Encourage employees to utilise the resources.
37. Internal Expertise
Leverage internal expertise for customised training.
"Have IT staff lead a session on the latest cyber threats."
Why?
Provides practical insights and fosters a culture of learning.
Cost:
Free
What do I need?
Internal experts, meeting rooms, virtual meeting platforms
How?
1. Identify internal experts on various security topics.
2. Schedule and announce training sessions.
3. Provide support and resources for presenters.
4. Conduct sessions and collect feedback.
38. DIY Design
Empower employees to create engaging security materials.
"Create posters and infographics using Canva."
Why?
Enhances creativity and ownership of security practices.
Cost:
Free using internal tools
What do I need?
How?
1. Identify key topics for materials.
2. Design materials using free tools like Canva.
3. Print or digitally distribute materials.
4. Monitor engagement and adjust designs as needed.
39. Cyber Security Storytelling Sessions
Organise Cyber Security Storytelling Sessions where employees share real-life experiences and lessons learned from cyber security incidents.
"Share a story about a time you almost fell for a phishing scam and what you learned from the experience."
Why?
Personal stories make cyber security more relatable and memorable, fostering a culture of shared learning and vigilance.
Cost:
Free
What do I need?
Meeting room or virtual meeting platform, storytelling guidelines
How?
Plan the Storytelling Sessions.
Schedule regular sessions (e.g., monthly).
Create guidelines for sharing stories, focusing on lessons learned and positive outcomes.
Announce the sessions to all employees.
Use email, intranet, and posters to promote the events.
Encourage employees to volunteer and share their experiences.
Prepare the session format.
Start with an introduction to set the context.
Allow each storyteller 5-10 minutes to share their experience.
Follow each story with a brief discussion on key takeaways.
Facilitate the storytelling sessions.
Ensure a supportive and non-judgmental atmosphere.
Moderate the session to keep it on track and focused.
Follow up after the session.
Summarise key lessons and share them with all employees via email or intranet.
Encourage ongoing sharing of stories and experiences.
Recognise participants for their contributions.
40. Partnerships
Collaborate with external experts for enhanced training.
"Partner with a local university for guest lectures on cyber security."
Why?
Expands knowledge base and provides diverse perspectives.
Cost:
Free to low-cost
What do I need?
External partnerships, guest speakers
How?
Identify potential partners (universities, organisations).
Reach out and propose collaboration.
Organise joint activities or share resources.
Monitor the partnership and assess impact.
41. Employee Forums
Encourage peer-to-peer learning through online forums.
"Set up an online forum for employees to share cyber security tips."
Why?
Fosters a collaborative learning environment.
Cost:
Free
What do I need?
Internal forum platform
How?
Set up an online forum or discussion board.
Announce the forum to employees and provide access instructions.
Monitor discussions and provide moderation as needed.
Collect feedback and adjust forum structure as needed.
42. Idea Submission
Harness employee creativity with a suggestion box for security ideas.
"Create a suggestion box for cyber security tips and ideas."
Why?
Encourages proactive contributions to security practices.
Cost:
Free
What do I need?
Suggestion box, email submission system
How?
1. Create a submission process (e.g., email, intranet form).
2. Announce the initiative and encourage participation.
3. Review and implement useful submissions.
4. Recognise contributors in newsletters or meetings.
43. Cyber Security Roadshows
Organise Cyber Security Roadshows to take cyber security awareness and training to different departments or locations within your organisation.
"Bring a pop-up cyber security training session to each department, complete with interactive demos and Q&A."
Why?
Provides hands-on, tailored training directly to employees' workspaces, increasing accessibility and engagement.
Cost:
Free to low-cost
What do I need?
Portable training materials, demo equipment, schedule of visits
How?
Plan the Cyber Security Roadshows.
Identify key topics and create portable training materials.
Schedule visits to different departments or locations over a set period (e.g., a week or month).
Announce the roadshows to all employees.
Use email, intranet, and posters to inform employees about the upcoming visits.
Highlight the topics and benefits of attending.
Prepare the content and demos.
Develop interactive demos and presentations tailored to each department's needs.
Ensure all materials are easily transportable.
Conduct the roadshows.
Set up a pop-up training area in each department or location.
Deliver engaging presentations, interactive demos, and Q&A sessions.
Collect feedback and follow up.
Use feedback forms to gather insights from participants.
Share additional resources and materials based on the sessions.
Recognise participation and encourage continued engagement.
44. Team Challenges
Foster teamwork with security-related challenges.
"Host a team-based quiz on cyber security knowledge."
Why?
Enhances collaboration and collective learning.
Cost:
Free
What do I need?
Internal quiz platform,
How?
Plan and design team challenges (e.g., security quiz bowl).
Announce challenges and provide instructions.
Monitor participation and track team progress.
Announce winners and reward with a small voucher.
45. Peer Learning
Organise peer-led workshops on cyber security best practices.
"Peer-led session on secure browsing habits."
Why?
Utilises internal knowledge and fosters collaboration.
Cost:
Free
What do I need? Meeting rooms, virtual meeting platforms
How?
Identify knowledgeable employees willing to lead sessions.
Schedule and announce peer learning sessions.
Provide support and resources for session leaders.
Collect feedback and improve future sessions.
46. Cyber Security Surgery
Host a Cyber Security Surgery where employees can drop in to get personalised advice and solutions for their cyber security questions and issues.
"Get one-on-one advice on how to secure your home network or protect your personal data."
Why?
Provides tailored support and education, addressing individual concerns and enhancing overall security awareness.
Cost:
Free to low-cost
What do I need?
Meeting room or virtual meeting platform, knowledgeable staff or external experts, promotional materials
How?
Plan the Cyber Security Surgery.
Schedule regular sessions (e.g., once a month).
Choose a convenient location or set up a virtual meeting space.
Announce the Cyber Security Surgery to employees.
Use email, intranet, and posters to inform employees about the event.
Highlight the types of support and advice available.
Prepare knowledgeable staff or external experts.
Ensure they are well-versed in various cyber security topics.
Provide them with resources and materials to assist employees.
Host the Cyber Security Surgery.
Set up a welcoming space with necessary equipment (e.g., computers, network access).
Allow employees to drop in and discuss their cyber security concerns.
Offer one-on-one consultations and practical advice.
Follow up with participants.
Provide additional resources or guides based on the consultations.
Collect feedback to improve future sessions.
Recognise participation and encourage continued engagement.
47. Security Roundtables
Host monthly roundtable discussions on current cyber threats.
"Monthly roundtable on emerging security threats."
Why?
Encourages open dialogue and idea exchange.
Cost:
Free
What do I need?
Meeting rooms, virtual meeting platforms
How?
Plan and schedule roundtable discussions.
Invite employees to participate and share insights.
Facilitate discussions and document key points.
Follow up with action items and improvements.
48. Cyber Security Hackathon Using Hackathon Platforms
Organise a hackathon focused on developing innovative solutions to common cyber security challenges using a platform designed for easy hackathon management.
"Develop a tool that helps employees recognize phishing emails."
Why?
Fosters innovation and deepens understanding of cyber security issues through hands-on experience.
Cost:
Variable (depends on platform subscription and prizes)
What do I need?
Hackathon platform, computers, internet access, mentors/judges, small prizes
How?
Select a Hackathon Platform, such as Devpost, HackerEarth, Hackathon.com
Announce the hackathon and its objectives.
Set clear guidelines and criteria for participation. Focus on solving specific cyber security problems relevant to your organisation.
Set up the hackathon on the selected platform.
Provide detailed information, rules, and resources on the platform.
Provide resources and support, and invite mentors from the IT department or external cyber security experts.
Host the hackathon event, using the platform to manage submissions, team collaboration, and event scheduling.
Provide virtual or physical workspace, refreshments, and support during the event.
Teams present their solutions through the platform.
Judges evaluate based on creativity, feasibility, and impact.
Announce winners and award prizes, like vouchers, tech gadgets, recognition in the company newsletter.
49. Security Champions
Create a network of security champions who advocate for best practices.
"Appoint security champions to promote awareness."
Why?
Promotes a culture of security awareness through dedicated advocates.
Cost:
Free
What do I need?
Internal communications
How?
Define criteria for security champions.
Announce the programme and invite nominations.
Provide training and resources to champions.
Recognise and support champions in their efforts.
50. Knowledge Sharing Sessions
Hold regular sessions for employees to share security knowledge.
"Monthly knowledge sharing session on cyber security tips."
Why?
Fosters a collaborative learning environment and reinforces security practices.
Cost:
Free
What do I need?
Meeting rooms
Virtual meeting platforms
How?
Schedule regular knowledge-sharing sessions.
Invite employees to present on security topics.
Provide support and resources for presenters.
Facilitate the sessions and document key points.
Follow up with action items and improvements based on discussions.
Ready to take your cyber security awareness to the next level? While these ideas are a great start, having a tailored strategy can make all the difference. At Culture Gem, we specialise in creating bespoke security training programmes that fit your unique needs. Visit our consultation page to learn more about how we can help you build a resilient security culture. Let’s make your organisation safer, together.