Share this
Selecting the Right Cybersecurity Training Solution
by Reflare Research Team on Aug 15, 2022 7:01:00 PM
Learning and development teams are increasingly outsourcing the creation and delivery of IT security training to other departments or third-party vendors. However, not being aware of the limitations of your training solution may be worse than not training at all.
First Published 12th June 2020 | Latest Refresh 15th August 2022
IT security training solutions – same same... but different.
7 min read | Reflare Research Team
There's training, and there's "training"
Although there are various factors that drive talent development requirements for infosec, over 80% of organisations unsurprisingly report that the two largest reasons for delivering IT security training are 1) to meet compliance requirements, and 2) to increase security awareness.
What is surprising is that many of those in charge of shaping what the training will look like often evaluate different solutions with criteria that is completely devoid of trainee context or workflows. And even worse, many decision-makers will architect their training programs without understanding all the additive benefits they can pick up for little to no extra effort. So many IT security training initiatives leave significant value on the table, but it doesn’t have to be this way.
This research report will guide you through how to correctly evaluate your options when selecting the right IT security training solution that best meets your requirement and budget.
Overview
Firstly, it is important to note that there are several actions you should first complete before selecting which training to deliver. To ensure your selection process is successful, we highly recommend you download our step-by-step overview here.
Secondly, once you have completed the prior steps of identifying the right trainees, ascertaining where their skill gaps lie and clarifying what time schedule those gaps should be filled by, the next step is to choose a training solution that will do the job well.
Thirdly, you can now either do this by relying on internal talent, or by finding outside vendors. The following questionnaire will guide you through the process of identifying what solution is adequate for your needs.
A Note on Internal Talent
If you rely on internal talent to train your wider workforce, make sure that the coaches you select are at least two skill levels above the trainees. Staff members with only a marginally better understanding of the subject matter will not be able to convey the contents well, respond to questions or command the authority necessary for effective training.
Similarly, make sure to address large hierarchical gaps should they exist. For example, C-level executives may be reluctant to accept training from an employee fresh out of university.
The Questions to Ask
Answer the following questions to the best of your abilities. If you lack the data required to answer any of the following questions, now is a good time to gain access to it.
Sufficiency
Does the solution cover the training requirements?
Ensure you understand all aspects of training delivery, and they are included in the overall solution. Some IT security training vendors may have complex (and sometimes even convoluted) offerings when it comes to different topic domains within cyber security. Confirm that all your capabilities and compliance requirements are included in your training curriculum, testing (sometimes an extra cost), and reporting (and sometimes, more extra cost). Double-check that everything you need is included in your quote. Avoid nasty billing surprises.
Caution: It is easy to buy training programs that exceed your scope. Many vendors have a financial incentive to sell longer programs covering more cyber security topics. Although it may appear to be better value for money, longer training programs are not better training programs. Your trainees have a finite capacity to take in knowledge and turn it into on-the-job action. Don’t go ‘over the top’ with giving them nice-to-have, unnecessary content. Instead, keep your training concise, stay true to the needs of your organisation, and aim to deliver that content in the most impactful way possible, within the resources you have available.
Make sure that your trainee's experience is on-point, fit for purpose and actionable to their workflow. Remember, buying a solution because it gives you access to “5,000 advanced phishing email templates” might look like a great deal, but will it actually improve the behaviour of your trainees? In reality, almost certainly not.
Suitability
Is the person or company providing the solution specialised in cyber security?
Be sure to ask your vendor what their security industry credentials are. Who is on the research and support teams to help me deliver the training successfully? Where did these training materials come from?
It can be quite tempting to use training generalists (a-la Udmey) to deliver IT security training. And don’t get us wrong – generalist learning platforms are great... for general information. However, cyber security is an incredibly specialised field that requires certain ways of thinking to deliver meaningful results. Your users are dealing with very sophisticated hackers, malware, and phishing attacks every single day, and you need to match (or preferably exceed) that effort to achieve meaningful cyber resilience not only for today, but also for tomorrow. Although most generalist training platforms can be incredibly cost-effective (and you know in your heart this is true), you ultimately will get what you pay for.
Please, please, please.... be sure to only use proven cyber security training professionals to deliver cyber security capabilities to your team. If you must cut corners to deliver your training, this is not the place to do it.
Can the solution scale to your requirement size?
Many internal and third-party IT security training solutions do not effectively scale. When it comes to training developers and administrators, the most common mode of delivery (unfortunately) is hands-on, live training workshops. This is fine if you are training a small number of tech staff. However, once your numbers start to expand, your price grows non-linear and exponentially. More room hires, more printed materials, more trainers, and more hours for your key tech talent out of business-as-usual activities. Your spend ramps will up, but the positive impact may not.
On the other hand, online, self-paced PowerPoint presentations are incredibly scalable. However, when was the last time you took an online slide-after-slide training presentation only to be met with a relatively benign multiple-choice question at the end? And if you think back to the last time you took one of these, did you actually learn anything from it that changed your behaviour and how you work today? Trainees see this sort of delivery method as an annoyance, and treat it as such. Often clicking through the slide presentation while eating lunch or on a team call, they will randomly click through whatever answers are in front of them until they hit the sufficiency pass grade, and then go back to the day. They learn very little, and retain even less.
“Death by PowerPoint” is a real thing, and should be avoided if at all possible. There are scalable, customisable, and cost-effective solutions in the market (check out this brief video for the latest trends in cyber security training providers) that strike the balance between scalable delivery and high-impact, hands-on capability development. Be sure to explore all possible solutions before making your final decision on who to go with.
Risk Mitigation
Does the solution provider have a track record of success?
Please don’t be tempted to give this initiative to your intern to build and deliver. Additionally, don’t be tempted to give it to the biggest name in the industry just because “no one ever got fired for buying IBM”.
Ask open-ended, explorative questions, and listen attentively to their answers. Can I see testimonials from other customers? How long have you been delivering IT security training? Can I put your training in front of my CISO to review? What other products and services do you sell other than cyber security training?
Conducting basic validity checks on the credibility and track record of your trainers is a must. Seek to understand their history and evaluate their domain expertise. E.G: Have the lead trainers / content designers been quoted in infosec literature or spoken at cyber security events?
Ask context-specific questions directly to the trainer/vendor to evaluate if they have a deep understanding of what your organisation is trying to overcome. Ask how they can partner with you to design a training program that suits your use case, and critically... confirm they have the in-house expertise to help you deliver.
If a job is worth doing, it’s worth partnering with someone who’s successfully done it before.
Download: This simple-to-use questionnaire will help you capture the information needed to evaluate your solution options. (pdf)
Context and Relevance
Does the solution match your organisation?
When it comes to impactful cyber security training, making the materials relevant to specific trainees is key. If you are developing your training in house, does your lead designer have sufficient understanding and context to customise the training content that speaks directly to the trainee’s workflow?
If you’re looking at third-party providers, ensure that you have the ability to quickly supplement their training materials with your own organisation's messaging or specific internal processes. If you’re using a solution that is not able to be customised, be sure to evaluate how big the Delta is between the training you’re delivering, and the trainee's reality.
We cannot stress how much 'customised training material that speaks directly to the trainee’s reality' will positively impact translating this knowledge into action. A great example of a solution that achieves precisely this might only be one click away.
Correctly evaluating the cyber security training solution needs to be done correctly. Getting this wrong can mean at best you leave value and trainee impact on the table, and at worst your training initiative fails. But do be mindful that what you are training for is constantly evolving. The evolution of cyber security threats is incredibly fast-paced. Adversaries know this, and subsequently, use your 'Annual IT Security Awareness Training' cadence against you.
As a part of selecting the right training solution, you (yes... you the customer to your solution provider) must stay on top of what is happening with the cyber resilience of your teams, and the emerging threats your organisation faces.
The good news is this very research blog can help you stay up to speed with the ever-changing security landscape. Review some of our related research briefs, keep these in mind when evaluating your training solutions, and consider subscribing to receive the latest information directly in your inbox.
Share this
- November 2024 (1)
- October 2024 (1)
- September 2024 (1)
- August 2024 (1)
- July 2024 (1)
- June 2024 (1)
- April 2024 (2)
- February 2024 (1)
- January 2024 (1)
- December 2023 (1)
- November 2023 (1)
- October 2023 (1)
- September 2023 (1)
- August 2023 (1)
- July 2023 (1)
- June 2023 (2)
- May 2023 (2)
- April 2023 (3)
- March 2023 (4)
- February 2023 (3)
- January 2023 (5)
- December 2022 (1)
- November 2022 (2)
- October 2022 (1)
- September 2022 (11)
- August 2022 (5)
- July 2022 (1)
- May 2022 (3)
- April 2022 (1)
- February 2022 (4)
- January 2022 (3)
- December 2021 (2)
- November 2021 (3)
- October 2021 (2)
- September 2021 (1)
- August 2021 (1)
- June 2021 (1)
- May 2021 (14)
- February 2021 (1)
- October 2020 (1)
- September 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (2)
- March 2020 (1)
- February 2020 (1)
- January 2020 (3)
- December 2019 (1)
- November 2019 (2)
- October 2019 (3)
- September 2019 (5)
- August 2019 (2)
- July 2019 (3)
- June 2019 (3)
- May 2019 (2)
- April 2019 (3)
- March 2019 (2)
- February 2019 (3)
- January 2019 (1)
- December 2018 (3)
- November 2018 (5)
- October 2018 (4)
- September 2018 (3)
- August 2018 (3)
- July 2018 (4)
- June 2018 (4)
- May 2018 (2)
- April 2018 (4)
- March 2018 (5)
- February 2018 (3)
- January 2018 (3)
- December 2017 (2)
- November 2017 (4)
- October 2017 (3)
- September 2017 (5)
- August 2017 (3)
- July 2017 (3)
- June 2017 (4)
- May 2017 (4)
- April 2017 (2)
- March 2017 (4)
- February 2017 (2)
- January 2017 (1)
- December 2016 (1)
- November 2016 (4)
- October 2016 (2)
- September 2016 (4)
- August 2016 (5)
- July 2016 (3)
- June 2016 (5)
- May 2016 (3)
- April 2016 (4)
- March 2016 (5)
- February 2016 (4)