SlideShare une entreprise Scribd logo
1  sur  35
© 2019 Ben Woelk
https://youtu.be/cRTaksvIpUg
© 2019 Ben Woelk
What is Gamification?
© 2019 Ben Woelk
Why Gamify Security
Awareness?
© 2019 Ben Woelk
Changing the
Culture
Build strong roots
© 2019 Ben Woelk
Build on Foundation
•DSD classes
•Monthly topics
•Social media
•Leverage events
© 2019 Ben Woelk
Inspiration
© 2019 Ben Woelk
DSD Dojo
© 2019 Ben Woelk
Digital Self Defense (DSD)
Dojo
© 2019 Ben Woelk
Dojo Goals
•Socialize best practices
•Increase training participation
© 2019 Ben Woelk
Structure
•Badges and Belts
•Website
•Physical Badges
•Gift Cards
© 2019 Ben Woelk
© 2019 Ben Woelk
Escape Room
© 2019 Ben Woelk
Goals
•Leverage escape room popularity
•Educate about phishing
•Educate about passphrases
© 2019 Ben Woelk
Structure
•Portable
•7 Puzzles
•Various locks
•USB drive
•Fishing game
•Email samples
© 2019 Ben Woelk
Self Phishing
© 2019 Ben Woelk
 Improve end user recognition of
phishes
 Improve timeliness of reporting
 Improve baseline detection rate by
25%
• For example, 70% detection rate to 87.5%,
NOT 70% to 95%
Goals
© 2019 Ben Woelk
Guiding Principles
 Self Phishing
 Positive Experience
 Non punitive
 Anonymized results
18
© 2019 Ben Woelk
© 2019 Ben Woelk
Phish Handling
Communications
© 2019 Ben Woelk
PhishBowl
© 2019 Ben Woelk
Phishing Program Structure
 Initial Announcement
 Division/Department
 3 and 1
 Follow up presentations
© 2019 Ben Woelk
Reporting
Results
• Ignored
• Reported
• Reported in First
Minute
2018 12
Delivery
2018 12
File
2018 12
Maintena
nce
2019 02
Order
2019 03
Credit
2019 03
Gloogle
Doc All
2019 03
Quarentin
e
2019 04
Red Light
ALL
2019 05
Office 365
Invoice
ALL
2019 06
Mailbox
Full All
2019 07
Ransomw
are All
F&A
Average
Ignored 94% 100% 99% 92% 97% 99% 99% 96% 94% 91% 99% 91%
Reported 18% 24% 19% 35% 35% 12% 25% 36% 8% 30% 4% 14%
Reported in First Minute 14% 18% 12% 16% 14% 12% 10% 10% 8% 11% 4% 4%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Phishing (by template)
Ignored Reported Reported in First Minute
© 2019 Ben Woelk
Phish First-minute
reports
First-minute
report rate
Reported Report Rate Ignored Ignore Rate
2019 03 Credit 15 14% 37 35% 102 97%
2019 03
Gloogle Doc All 12 12% 12 12% 101 99%
2019 03
Quarantine 10 10% 26 25% 104 99%
Sample Department Results
© 2019 Ben Woelk
© 2019 Ben Woelk
New Student Orientation
© 2019 Ben Woelk
© 2019 Ben Woelk
and…
© 2019 Ben Woelk
© 2019 Ben Woelk
Snapchat
Filters and
Geofencing
© 2019 Ben Woelk
© 2019 Ben Woelk
Discussion
•Should you gamify?
•What would you gamify?
•What would you not gamify?
© 2019 Ben Woelk
Ben.woelk@rit.edu
www.rit.edu/Security
34
© 2019 Ben Woelk
References• Jessica Barker, "The Human Nature of Cybersecurity," EDUCAUSE Review, May
20, 2019.
• Julianne Basinger, A Campus Culture of Cybersecurity, (Washington DC: The
Chronicle of Higher Education, 2019).
• Valerie Vogel, "Security Awareness Made Simple: 2019 Security Awareness
Campaign Materials," Security Matters (blog), EDUCAUSE Review, December
17, 2018.
• Ben Woelk, "Building a Culture of Digital Self Defense," Security Matters (blog),
EDUCAUSE Review, September 20, 2016.
• Ben Woelk, “Wind, Trees, and Security Awareness" Security Matters (blog),
EDUCAUSE Review, September 13, 2019.

Contenu connexe

Plus de Ben Woelk, CISSP, CPTC

Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual WorkforceCreating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual WorkforceBen Woelk, CISSP, CPTC
 
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxCreating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxBen Woelk, CISSP, CPTC
 
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesSaying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesBen Woelk, CISSP, CPTC
 
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesBen Woelk, CISSP, CPTC
 
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessBen Woelk, CISSP, CPTC
 
Building a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBen Woelk, CISSP, CPTC
 
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipHarnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipBen Woelk, CISSP, CPTC
 
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18Ben Woelk, CISSP, CPTC
 
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityFollow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityBen Woelk, CISSP, CPTC
 
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and YourselfCollaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and YourselfBen Woelk, CISSP, CPTC
 
Digital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminarDigital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminarBen Woelk, CISSP, CPTC
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsBen Woelk, CISSP, CPTC
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsBen Woelk, CISSP, CPTC
 
Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014Ben Woelk, CISSP, CPTC
 

Plus de Ben Woelk, CISSP, CPTC (20)

Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual WorkforceCreating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce
 
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxCreating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
 
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesSaying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership Opportunities
 
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
 
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for Success
 
Building a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
 
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipHarnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted Leadership
 
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
 
Digital self defense 101 me rit
Digital self defense 101 me ritDigital self defense 101 me rit
Digital self defense 101 me rit
 
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityFollow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
 
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and YourselfCollaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and Yourself
 
An Introvert's Journey to Leadership
An Introvert's Journey to LeadershipAn Introvert's Journey to Leadership
An Introvert's Journey to Leadership
 
Digital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminarDigital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminar
 
Digital Self Defense at RIT
Digital Self Defense at RITDigital Self Defense at RIT
Digital Self Defense at RIT
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
 
Succession Planning and Volunteering
Succession Planning and VolunteeringSuccession Planning and Volunteering
Succession Planning and Volunteering
 
Digital Self Defense
Digital Self DefenseDigital Self Defense
Digital Self Defense
 
Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014
 
A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14
 

Dernier

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Dernier (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

We're All Winners--Gamification and Security Awareness

  • 1.
  • 2. © 2019 Ben Woelk https://youtu.be/cRTaksvIpUg
  • 3. © 2019 Ben Woelk What is Gamification?
  • 4. © 2019 Ben Woelk Why Gamify Security Awareness?
  • 5. © 2019 Ben Woelk Changing the Culture Build strong roots
  • 6. © 2019 Ben Woelk Build on Foundation •DSD classes •Monthly topics •Social media •Leverage events
  • 7. © 2019 Ben Woelk Inspiration
  • 8. © 2019 Ben Woelk DSD Dojo
  • 9. © 2019 Ben Woelk Digital Self Defense (DSD) Dojo
  • 10. © 2019 Ben Woelk Dojo Goals •Socialize best practices •Increase training participation
  • 11. © 2019 Ben Woelk Structure •Badges and Belts •Website •Physical Badges •Gift Cards
  • 12. © 2019 Ben Woelk
  • 13. © 2019 Ben Woelk Escape Room
  • 14. © 2019 Ben Woelk Goals •Leverage escape room popularity •Educate about phishing •Educate about passphrases
  • 15. © 2019 Ben Woelk Structure •Portable •7 Puzzles •Various locks •USB drive •Fishing game •Email samples
  • 16. © 2019 Ben Woelk Self Phishing
  • 17. © 2019 Ben Woelk  Improve end user recognition of phishes  Improve timeliness of reporting  Improve baseline detection rate by 25% • For example, 70% detection rate to 87.5%, NOT 70% to 95% Goals
  • 18. © 2019 Ben Woelk Guiding Principles  Self Phishing  Positive Experience  Non punitive  Anonymized results 18
  • 19. © 2019 Ben Woelk
  • 20. © 2019 Ben Woelk Phish Handling Communications
  • 21. © 2019 Ben Woelk PhishBowl
  • 22. © 2019 Ben Woelk Phishing Program Structure  Initial Announcement  Division/Department  3 and 1  Follow up presentations
  • 23. © 2019 Ben Woelk Reporting Results • Ignored • Reported • Reported in First Minute 2018 12 Delivery 2018 12 File 2018 12 Maintena nce 2019 02 Order 2019 03 Credit 2019 03 Gloogle Doc All 2019 03 Quarentin e 2019 04 Red Light ALL 2019 05 Office 365 Invoice ALL 2019 06 Mailbox Full All 2019 07 Ransomw are All F&A Average Ignored 94% 100% 99% 92% 97% 99% 99% 96% 94% 91% 99% 91% Reported 18% 24% 19% 35% 35% 12% 25% 36% 8% 30% 4% 14% Reported in First Minute 14% 18% 12% 16% 14% 12% 10% 10% 8% 11% 4% 4% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Phishing (by template) Ignored Reported Reported in First Minute
  • 24. © 2019 Ben Woelk Phish First-minute reports First-minute report rate Reported Report Rate Ignored Ignore Rate 2019 03 Credit 15 14% 37 35% 102 97% 2019 03 Gloogle Doc All 12 12% 12 12% 101 99% 2019 03 Quarantine 10 10% 26 25% 104 99% Sample Department Results
  • 25. © 2019 Ben Woelk
  • 26. © 2019 Ben Woelk New Student Orientation
  • 27. © 2019 Ben Woelk
  • 28. © 2019 Ben Woelk and…
  • 29.
  • 30. © 2019 Ben Woelk
  • 31. © 2019 Ben Woelk Snapchat Filters and Geofencing
  • 32. © 2019 Ben Woelk
  • 33. © 2019 Ben Woelk Discussion •Should you gamify? •What would you gamify? •What would you not gamify?
  • 34. © 2019 Ben Woelk Ben.woelk@rit.edu www.rit.edu/Security 34
  • 35. © 2019 Ben Woelk References• Jessica Barker, "The Human Nature of Cybersecurity," EDUCAUSE Review, May 20, 2019. • Julianne Basinger, A Campus Culture of Cybersecurity, (Washington DC: The Chronicle of Higher Education, 2019). • Valerie Vogel, "Security Awareness Made Simple: 2019 Security Awareness Campaign Materials," Security Matters (blog), EDUCAUSE Review, December 17, 2018. • Ben Woelk, "Building a Culture of Digital Self Defense," Security Matters (blog), EDUCAUSE Review, September 20, 2016. • Ben Woelk, “Wind, Trees, and Security Awareness" Security Matters (blog), EDUCAUSE Review, September 13, 2019.

Notes de l'éditeur

  1. https://youtu.be/cRTaksvIpUg
  2. the application of typical elements of game playing (e.g. point scoring, competition with others, rules of play) to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service
  3. programmatic approach  not enough to communicate only about specific cyberattacks (gusts) as they occur