Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Education & TrainingCybersecurity News

How to Turn Every Employee into a Cybersecurity Expert

By Leslie Redd
cyber-class
January 5, 2017

Chief security officers are the obvious point people to address a workforce’s cybersecurity concerns. While it is the obligation of a CSO or CISO to spearhead a company’s defense against cyber attacks, the responsibility cannot fall solely on the shoulders of a single person. With 43 percent of data breaches caused internally and the average data breach costing $4 million, fostering a companywide commitment to cybersecurity awareness becomes a shared responsibility.  

Given the technical nature of cybersecurity, the average employee may not have a full grasp of best cybersecurity practices. In fact, up to 90 percent of internet users haven’t had any recent cybersecurity training. To ensure that each employee helps fortify an organization against an attack, providing digestible, effective training is critical – and eLearning is making it easier than ever for companies to educate their employees.

 

Making Cybersecurity Digestible

The most successful training is accessible, entertaining and engaging. These qualities are especially critical when the content is complex and heady, and eLearning solutions can deliver these elements with a responsive, visual interface.

Like any subject matter, cybersecurity can be intimidating for those not already versed in it. While lectures on cybersecurity may dive into obscure topics or use jargon, it is critical to consider employees’ knowledge and utilize training techniques that align with and build off of their understanding. Though it may be tempting to discuss the nitty gritty details of a hack, consider what employees actually need to know to protect your company.

Given the weight of the topic, it’s also imperative to employ training methods that resonate with employees. While corporate training sessions historically may have caused employees’ eyes to glaze over, given the monetary loss associated with a breach, CSOs need to consider how the training will engage employees and encourage retention.

Considering today’s digitally savvy workforce, eLearning may be a more attractive option than more standard training fare when it comes to engagement. Audiences tend to receive educational content better when it’s visually and aurally stimulating, which can be fulfilled by the video capability of eLearning. Adult learners in particular tend to reap video’s benefits, with better engagement and retention.

Video is also the perfect medium for a compelling narrative, which is another key component of effective instruction – modules can introduce learners to characters who face similar scenarios. For example, a module could focus on a character who is trying to decipher whether an email is genuine or phishy, a scenario that your employees experience weekly if not daily. From there, the module can bring the user and the character together on a mission to learn the corresponding best practices.

 

Linking Conceptual Cybersecurity to Reality

The flexibility of eLearning makes it easy to render the training as relevant to users as possible, not only through storytelling but also through capabilities like course customization and responsive technology.

Along these lines, consider interactivity and having employees actually practice cybersecurity best practices in a low-stakes environment.

For instance, have employees practice creating strong passwords and provide real-time feedback. ELearning solutions can provide real-time feedback at scale, and feedback given “in the moment” is far more likely to improve performance. Interactions that directly adapt to the user allow for a more personalized learning experience, while teaching actionable lessons that can be applied to everyday situations.

Given demands on employees’ time, it is also worth considering offering training that is flexible, allowing your team to access the content and pace at their own convenience, while keeping in line with the company’s broader timeline goals. 

 

Changing Company Cybersecurity Culture

Cybersecurity training not only provides employees with a wealth of information, but it can also arm CISOs and CSOs with valuable data about their workforce.

Maybe your workforce is well-versed in data storage and transmission practices, but has little knowledge about office tailgating, for instance. Software can show you broader company patterns that you may not have detected otherwise. With this information, your company can adjust the eLearning modules and general cybersecurity strategy accordingly.

Finally, ensure that the education you offer provides actionable next steps upon course completion. From there, employees can take the lessons learned and translate it into real-life best practices. With malware adapting to network security provisions, effective cybersecurity education is more critical now than ever. Because of its dynamic, responsive and flexible nature, eLearning presents an unparalleled opportunity to create a companywide ethos of cybersecurity knowledge and accountability. 

KEYWORDS: cyber security awareness cyber security education cyber security metrics eLearning phishing campaigns security training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As Co-Founder and CEO, Leslie Redd leads the LearnBIG team to create interactive eLearning courses for organizations to enhance customer relations, employee effectiveness, and operational efficiency. Her team combines science-based instructional design, gorgeous compelling video, clever technology, and just enough cheek to delight and engage learners.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-frame

    5 Steps to Turn the NIST Cybersecurity Framework into Reality

    See More
  • Sale sign

    How to Stay Safe Online This Black Friday, According to a Cyber Expert

    See More
  • Cybersecurity book

    New book Cybersecurity: The Expert Guide explains how to stop cybercrime in its tracks

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing