Cybersecurity Training: A Pathway to Readiness
By Gregory J. Skulmoski and Chris Walker
()
About this ebook
Organizations face increasing cybersecurity attacks that threaten their sensitive data, systems, and existence; but there are solutions. Experts recommend cybersecurity training and general awareness learning experiences as strategic necessities; however, organizations lack cybersecurity training planning, implementation, and optimization guidance. Cybersecurity Training: A Pathway to Readiness addresses the demand to provide cybersecurity training aligned with the normal flow of IT project delivery and technology operations.
Cybersecurity Training combines best practices found in standards and frameworks like ITIL technology management, NIST Cybersecurity Framework, ISO risk, quality and information security management systems, and the Guide to the Project Management Body of Knowledge. Trainers will appreciate the approach that builds on the ADDIE model of instructional design, Bloom’s Taxonomy of Cognitive Thought, and Kirkpatrick’s Model of Evaluation, a trilogy of training best practices.
Readers learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement and evaluate training and learning, followed by continual improvement sprints and projects.
Cybersecurity Training prepares trainers, project managers, and IT security professionals to deliver and optimize cybersecurity training so that organizations and its people are ready to prevent and mitigate cybersecurity threats leading to more resilient organizations.
Gregory J. Skulmoski
Greg Skulmoski, PhD, MBA, BEd, CITP, FBCS, enjoys dual career paths: he is an award-winning project manager and an innovation management academic from time to time, where he teaches graduate and undergraduate students and researches tomorrow’s project opportunities and threats!
Related to Cybersecurity Training
Related ebooks
Shields Up: Cybersecurity Project Management Rating: 0 out of 5 stars0 ratingsCan. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity Rating: 5 out of 5 stars5/5Building Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture Rating: 0 out of 5 stars0 ratingsCybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2 Rating: 0 out of 5 stars0 ratingsExecutive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program Rating: 0 out of 5 stars0 ratingsA Practitioner's Guide to Adapting the NIST Cybersecurity Framework Rating: 0 out of 5 stars0 ratingsFundamentals of Adopting the NIST Cybersecurity Framework Rating: 0 out of 5 stars0 ratingsCyberSecure™: An Essential Guide to Protecting Your Digital World Rating: 0 out of 5 stars0 ratingsAdvanced Security Architecture: Skills and Competencies for Protecting Tomorrow’s Enterprise Rating: 0 out of 5 stars0 ratingsCCSP (ISC)2 Certified Cloud Security Professional Exam Guide: Build your knowledge to pass the CCSP exam with expert guidance Rating: 0 out of 5 stars0 ratingsPractical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects Rating: 0 out of 5 stars0 ratingsThe Little Book of Cybersecurity Rating: 0 out of 5 stars0 ratingsMastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity: A Project Management Approach Rating: 0 out of 5 stars0 ratingsCloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans Rating: 0 out of 5 stars0 ratingsHybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud Rating: 0 out of 5 stars0 ratingsCyber Guardians: Empowering Board Members for Effective Cybersecurity Rating: 0 out of 5 stars0 ratingsIncident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents Rating: 0 out of 5 stars0 ratingsBlueprints of DevSecOps: Foundations to Fortify Your Cloud Rating: 0 out of 5 stars0 ratingsDefending the Digital Perimeter: Network Security Audit Readiness Strategies Rating: 0 out of 5 stars0 ratingsAgile Security Operations: Engineering for agility in cyber defense, detection, and response Rating: 0 out of 5 stars0 ratings
Business For You
Never Split the Difference: Negotiating As If Your Life Depended On It Rating: 4 out of 5 stars4/5Collaborating with the Enemy: How to Work with People You Don't Agree with or Like or Trust Rating: 4 out of 5 stars4/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Super Learning: Advanced Strategies for Quicker Comprehension, Greater Retention, and Systematic Expertise Rating: 4 out of 5 stars4/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 4 out of 5 stars4/5The Concise Laws of Human Nature Rating: 4 out of 5 stars4/5The Unfair Advantage: BUSINESS BOOK OF THE YEAR AWARD-WINNER: How You Already Have What It Takes to Succeed Rating: 5 out of 5 stars5/5Courage Is Calling: Fortune Favours the Brave Rating: 4 out of 5 stars4/5Ultralearning: Master Hard Skills, Outsmart the Competition, and Accelerate Your Career Rating: 4 out of 5 stars4/5Business English Vocabulary Builder: Idioms, Phrases, and Expressions in American English Rating: 5 out of 5 stars5/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5On Writing Well, 30th Anniversary Edition: An Informal Guide to Writing Nonfiction Rating: 4 out of 5 stars4/5Discipline Is Destiny: A NEW YORK TIMES BESTSELLER Rating: 5 out of 5 stars5/5Summary of Peter C. Brown & Henry L. Roediger III, & Mark A. McDaniel's Make It Stick Rating: 4 out of 5 stars4/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5The Mom Test: How to Talk to Customers & Learn if Your Business is a Good Idea When Everyone is Lying to You Rating: 5 out of 5 stars5/5Summary of Erin Meyer's The Culture Map Rating: 5 out of 5 stars5/5High Conflict: Why We Get Trapped and How We Get Out Rating: 4 out of 5 stars4/5Summary and Analysis of Thinking, Fast and Slow: Based on the Book by Daniel Kahneman Rating: 4 out of 5 stars4/5Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life Rating: 4 out of 5 stars4/5The Concise Mastery Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers Rating: 5 out of 5 stars5/5Productivity Hacks: 500+ Easy Ways to Accomplish More at Work--That Actually Work! Rating: 4 out of 5 stars4/5Financial Words You Should Know: Over 1,000 Essential Investment, Accounting, Real Estate, and Tax Words Rating: 4 out of 5 stars4/5HBR'S 10 Must Reads: The Essentials Rating: 4 out of 5 stars4/5Everybody Writes: Your Go-To Guide to Creating Ridiculously Good Content Rating: 4 out of 5 stars4/5
Reviews for Cybersecurity Training
0 ratings0 reviews
Book preview
Cybersecurity Training - Gregory J. Skulmoski
Cybersecurity Training
Cybersecurity Training
A Pathway to Readiness
Gregory J. Skulmoski and Chris Walker
Cybersecurity Training: A Pathway to Readiness
Copyright © Business Expert Press, LLC, 2024
Cover design by Gregory J. Skulmoski
Photo courtesy of Pexels.com, (Laptop Over A White Desk, Anna Nekrashevich)
Interior design by Exeter Premedia Services Private Ltd., Chennai, India All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, photocopy, recording, or any other except for brief quotations, not to exceed 400 words, without the prior permission of the publisher.
First published in 2023 by
Business Expert Press, LLC
222 East 46th Street, New York, NY 10017
www.businessexpertpress.com
ISBN-13: 978-1-63742-553-4 (paperback)
ISBN-13: 978-1-63742-554-1 (e-book)
Business Expert Press Portfolio and Project Management Collection
First edition: 2023
Description
Organizations face increasing cybersecurity attacks that threaten their sensitive data, systems, and existence, but there are solutions. Experts recommend cybersecurity training and general awareness learning experiences as strategic necessities; however, organizations lack cybersecurity training planning, implementation, and optimization guidance. Cybersecurity Training: A Pathway to Readiness addresses the demand to provide cybersecurity training aligned with the normal flow of IT project delivery and technology operations.
Cybersecurity Training combines best practices found in standards and frameworks like ITIL technology management, NIST Cybersecurity Framework, ISO risk, quality and information security management systems, and the Guide to the Project Management Body of Knowledge. Trainers will appreciate the approach that builds on the ADDIE Model of Instructional Design, Bloom’s Taxonomy of Cognitive Thought, and Kirkpatrick’s Model of Evaluation, a trilogy of training best practices.
Readers learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement, and evaluate training and learning, followed by continual improvement sprints and projects.
Cybersecurity Training prepares trainers, project managers, and IT security professionals to deliver and optimize cybersecurity training so that organizations and its people are ready to prevent and mitigate cybersecurity threats, leading to more resilient organizations.
Keywords
NIST cybersecurity awareness and role-based training; specialized cybersecurity training; ADDIE Model of Instructional Design; Bloom’s Taxonomy; Kirkpatrick’s Model of Evaluation; project-oriented cybersecurity training; cybersecurity readiness; ITIL technology management; cybersecurity resilience; Lean Six Sigma; agile project management; quantum cybersecurity
Contents
Testimonials
Foreword
Acknowledgments
PART I Cybersecurity Learning Ecosystem
PART II Cybersecurity Training
Appendix 1: Leaderboard Use Case
Appendix 2: Instructional Design Team
Appendix 3: Cybersecurity Roles
Appendix 4: An Applied Glossary
References
About the Authors
Index
Testimonials
Cybersecurity Training: A Pathway to Readiness was peer-reviewed by a diverse group of project management, instructional designers, and cybersecurity practitioners. Our peer review sample of experts was heterogenous, representing project management, instructional design, and cybersecurity. Fifteen subject matter experts were invited to participate in a peer review process, and nine reviewed Cybersecurity Training and returned constructive comments, recommendations for change, and praise. The project management reviewers deliver today’s innovations on time, on budget, and to the delight of their customers. The cybersecurity reviewers are on the leading edge of protecting organizations and understand where cybersecurity is evolving and needs to mature. Finally, instructional design specialists reviewed Cybersecurity Training and gave guidance about our project-oriented approach to cybersecurity training.
We thank our reviewers like Derek Molnar, Thomas Edgerton, and others like Irene Corpuz, who gave praise and constructive criticism like only a seasoned cybersecurity specialist can: One area to improve would be to provide a more context on why ISO/IEC 27001 and NIST Cybersecurity Framework are important for organizations to follow (i.e., when would it be advisable to implement NIST over ISO/IEC 27001, and vice-versa).
The personal pronoun we
is being used to refer to the authors of Cybersecurity Training. We incorporated Irene’s and other peer reviewers’ feedback, which strengthened our book. Thank you again!
Highly recommended
"Cybersecurity readiness is becoming increasingly critical as people remain the weakest link despite the widely available information on the Internet about massive attacks caused by a single end user clicking on a ‘click-bait’ link (i.e., phishing e-mail). But what is wrong with the ongoing cybersecurity awareness training the organizations offer their employees? Were they designed strategically according to specific training models? Were they executed correctly and treated as a project?
Cybersecurity is often seen as a technical responsibility, but in the book Cybersecurity Training: A Pathway to Readiness, authors Greg and Chris encourage readers to merge strategic thinking and project management when implementing a cybersecurity readiness program. They discuss creating a cybersecurity awareness culture aligned with the organization’s vision, principles, goals, and objectives. Doing so provides a ‘learning ecosystem that encourages life-long and ubiquitous learning,’ supporting the organization’s cybersecurity-related KPIs. It also discusses combining the training ecosystem’s tailoring and principles to achieve the most beneficial delivery plan.
Thus, Cybersecurity Training is highly recommended for project managers, the HR training section, and the cybersecurity readiness team."—Irene Corpuz, United Arab Emirates, MSc, CISA, ISO 27k Lead Auditor and Lead Implementer, ITIL, PMP, PMI-ACP, Co-Founder and Board Member—Women in Cyber Security Middle East, Global Advisory Board Member—EC Council
A to Z in cybersecurity training
"I’m very impressed with the overall cybersecurity training model beautifully detailed in Cybersecurity Training: A Pathway to Readiness. I can use these techniques; if the reader follows this approach that combines best practices from training, project management, and relevant standards, they will remove most project risks. Chris and Greg have written an easy-to-read book that guides the reader to plan and implement cybersecurity training by removing guesswork and leaving no room for errors. They have captured everything from A to Z in cybersecurity training."—Zaid Al Ardah, Director, Technical Protective Operations, Cleveland Clinic, United States
An incredible book that empowered and inspired me
"Cybersecurity Training is an incredible book that empowered and inspired me. The authors, Greg and Chris, write with a genuine passion for cybersecurity readiness and its critical role in the success and survival of organizations.
Their writing is characterized by a deep knowledge of the subject matter, evident in the comprehensive overview of NIST cybersecurity functions and the Goldilocks Approach to cybersecurity. The authors stress the importance of a holistic approach to cybersecurity readiness involving people, processes, and technologies. Cybersecurity Training emphasizes the importance of seeing cybersecurity frameworks as a guide rather than a rigid set of rules. By doing so, organizations can balance cybersecurity with business objectives and avoid unnecessary constraints on their partners.
What impressed me most about the book was the authors’ unwavering belief that cybersecurity readiness is everyone’s responsibility. Their call to action for organizations to shift toward designing-in cybersecurity as a routine matter is bold and inspiring. I was particularly moved by their invitation to business partners from the finance and supply chain departments to join to improve resilience.
Overall, Cybersecurity Training is an excellent book written with character and passion. It inspired me to act and make a difference in the fight against cyber threats."—Charles Aunger, CEO/President/Founder, HEAL Security Inc., United States
A timely and innovative approach
"Cybersecurity Training provides an innovative holistic project management approach that combines the best practices of established instructional design, training, and learning programs (e.g., ADDIE, Bloom’s Taxonomy, and Kirkpatrick). This blueprint will guide your organization as it builds a resilient cybersecurity operation. I congratulate Chris and Greg for their timely and innovative approach to cybersecurity training. Fantastic!" —Rhoda DiCrescenzo, CCNA, CCNI, Sr. eLearning Specialist and Instructional Designer and Trainer, United States
The first worldwide reference
"According to IIBA and IEEE Computer Society, a hacker attack occurs every 39 seconds. Also, according to the 2022 (ISC)² Cybersecurity Workforce Study, there’s a global shortage of 3.4 million cybersecurity-related jobs. This could signal that society needs to change its thoughts about cybersecurity and invite nontechnical participants to join cybersecurity teams. The first building block, ‘a well-thought cybersecurity awareness program,’ is the starting point. Greg and Chris’s book proves this can be successfully achieved.
As a business analyst, program manager, and professional trainer for over 20 years, I have found this book to be the first worldwide reference combining cybersecurity, project management, and training with a ready-to-action perspective. Read it, study it, and tailor it to your specific context. Get ready now to help your organization proactively manage cybersecurity risks."—Rafa Pagán MSc, CBAP, CPOA, AAC, PMP, PMI-ACP, PMI-PBA, PMI-RMP, PMI-SP, OPEN PM2, KANBAN, POWER BI, MCTS, MCITP, CTT+, SAMC, SDC, SMC, SPOC, SSMC, SSPOC, CSM, CSPO, PSM, PSPO, COMPTIA, Freelance Consultant and Trainer, Madrid, Spain
"Invaluable resource for both beginners and experts"
"As the CEO of a management consulting company that delivers innovation through projects, cybersecurity has increasingly gained attention in the last 15 years of my consultancy. Unfortunately, and more often than not, there is a disconnect among project team members as they are grounded in their own discipline’s tradition, culture, and language. A disconnected project team is not a recipe for project success. Skulmoski and Walker, in Cybersecurity Training: A Pathway to Readiness, have aligned cybersecurity training and project management with global standards, frameworks, and best practices, resulting in an invaluable resource for beginners and experts."—Dr.-Ing. Alexander Lang, CEO IMAN Solutions GmbH, Munich, Germany
A hands-on guide to cybersecurity training
"Skulmoski and Walker take the complex IT and educational frameworks that guide modern organizations and meld them into an approachable guide to cybersecurity training focusing on delivering successful projects that provide true value to organizations.
The design of Cybersecurity Training makes it a perfect guide for anyone looking to educate themselves on the current approaches within IT and education and how to blend both to deliver value.
For educators, Cybersecurity Training, with its comprehensive yet approachable guides to IT and educational frameworks, paired with microlearning sections, enhances and invites the reader to explore key concepts . The authors provide a perfect reference for students on delivering value by utilizing proven project management and training best practices ."—Derek Molnar PMP, IT Project Manager, Colorado State University, United States
Foreword
Chris Walker and I met at the beginning of the Cleveland Clinic Abu Dhabi hospital project, where I was on the owner’s side and Chris on the vendor’s side. Our project was to train approximately 3,500 caregivers representing 550 positions ranging from surgeons, accountants, phlebotomists, pharmacy technicians, respiratory nurses, registration specialists, and many more. I was assigned the training project due to my background (e.g., a university professor with a Bachelor of Education degree and a Canadian professional teaching license). Our CIO asked me to review the training contract before our organization signed the document.
The next day, the CIO asked me what I thought, and I responded, This contract is for training. We don’t want training; we want learning.
We then examined training as an input and the vendor could provide double the number of contracted training hours, and our organization still might not have competent systems users. However, if we signed a contract based on outputs (e.g., learning outcomes), our training project team could track learning KPIs. Indeed, the vendor could achieve the contracted KPIs and underspend with a lean approach. The vendor liked this innovative approach to training, and a training contract was signed where training continued until 80 percent of our caregivers received an average mark of 80 percent on assessments. The assessments were developed in collaboration with the business units to ensure that proper learning occurred and was assessed.
Chris arranged and led a highly skilled training team, and we provided training to our caregivers as outlined in this book. Training in the Middle East and for specialized skillsets required for a first-class hospital brings unique risks, such as unpredictable new caregiver arrivals due to at-home work obligations and visa approval time variances. We used risk management and other project management approaches to deliver training successfully. Our project team trained 90 percent of our caregivers, who earned an average of 90 percent on their assessments. Our vendor, led by Chris, delivered a successful training project, came in under budget, and the Cleveland Clinic Abu Dhabi hospital was safely opened with competent caregivers.
Fundamental to Cybersecurity Training is the authors (we
) rely on best practices in project management, risk and quality management, and training. We are aware that no one model fits all training circumstances. As you begin your study of instructional design, bear in mind that models of instructional design/development are helpful guides to the process, but no single model should be considered a lock-step recipe for creating instruction, nor is any one model the only correct way to design instruction
(Brown and Green 2016, 12). Project managers tailor
tools and processes to the unique project context. Therefore, we invite you to tailor our instructional design models, standards, and frameworks to your projects to improve the probability of success.
Our book is structured in three parts. In PART I, we review the burgeoning demand for cybersecurity training. Simply, the demand for cybersecurity training is increasing because there is an increase in cybersecurity incidents, with the expectation that the need for cybersecurity readiness will continue for years to come. The main drivers include waves of digital transformation; a recent wave of digital transformation was triggered by the COVID-19 pandemic, resulting in the massive adoption of technologies to support new ways of working. Unfortu -nately, cybersecurity was not always a high priority, resulting in many vulnerabilities, attacks, and the increased need for cybersecurity training. The following digital transformation wave features AI-embedded func -tionalities where organizations launch new projects to implement and protect these new systems, leading to an increased demand for training. Finally, quantum computing will enhance or displace AI-based systems, resulting in new projects and training. Government regulatory bodies and insurance companies are responding with more cybersecurity regula -tions and cybersecurity readiness expectations for reduced cybersecurity premiums. Thus, there is an increased and sustained demand for cyber -security training.
PART I continues with an overview of globally recognized training and education models and frameworks that Cybersecurity Training incorporates: the ADDIE (Analyze, Design, Develop, Implement, and Evaluate) Model of Instructional Design, Bloom’s Taxonomy of Cognitive Thought, and the Kirkpatrick Model of Evaluation. These training best practices are longstanding and successful that can be used in cybersecurity training. In PART I, we align our training with the Information Technology Infrastructure Library (ITIL) framework. The ITIL framework guides organizations to plan, deliver, and optimize digital products (e.g., new laptops, printers, servers, etc.) and services (e.g., e-mail, human resource information systems, pharmacy systems, IT, etc.).
We review the National Institute of Standards (NIST) Cybersecurity Framework in PART I. The NIST Cybersecurity Framework includes a comprehensive suite of documents to guide organizations to provide cybersecurity, including the (1) identify, (2) protect, (3) detect, (4) respond, (5) recover, and (6) govern functions. Cybersecurity training can optimize these six functions to achieve cybersecurity readiness. The NIST Cybersecurity Framework is widely adopted globally in over 100 countries and translated into 10 languages, including English, Arabic, Japanese, Spanish, Portuguese, and Polish, with more translations promised. Therefore, in Cybersecurity Training, we align with the generally accepted NIST Cybersecurity Framework and supporting documents.
Finally, in PART I, we use the hybrid project delivery approach to deliver technologies, products, and services like cybersecurity. We align the ITIL framework, NIST Cybersecurity Framework,¹ and project management with the ADDIE Model of Instructional Design to improve the probability of successful cybersecurity training. These models and frameworks are incorporated into an adaptive learning ecosystem to help achieve cybersecurity readiness. Therefore, we combine previously disconnected best practices into a holistic approach to deliver cybersecurity training, a critical success factor for organizational readiness and resilience.
In PART II, we apply the ADDIE Model of Instructional Design phases to cybersecurity training using a project management delivery approach. We use the same project management approach to deliver and optimize NIST Cybersecurity Framework aligned training: general security awareness and specialized (role-based) cybersecurity training. Thus, we align best practices to deliver and optimize training, including ongoing learning experiences to achieve cybersecurity readiness. Combining best