Take the HR department as an ally and use the corporate university information system for training. It will allow you to abandon the webinar in favor of an online course, so that employees can gain knowledge when it is convenient for them. It will remind those who treat it too frivolously about the need to undergo training. It will implement the mechanics of gamification and will allow you to identify the most “savvy” employees in information security. In the end, it will accumulate materials and information that the HR department will introduce to newcomers when they start work.
The consequences of automation - even though it is brazil mobile database implemented at the initiative of the CISO - extend far beyond the department of the information security director. From this position, the implementation of solutions that take on part of the routine is a significant factor influencing the business environment of a huge number of beneficiaries.
Let's count together. The first category of beneficiaries of information security automation is, of course, business owners: from their point of view, investments in individual solutions will pay off at the first serious incident. On the eve of the almost inevitable introduction of turnover fines for leakage of personal data, even the deployment of a rather expensive solution looks expedient precisely from an economic point of view.