1 / 23

Successful Trends in e-Learning in imparting e-Security

Successful Trends in e-Learning in imparting e-Security. C.N.S.K. Murthy CISA, PMP, CAIIB, CTM 14 th December, 2007. Have you ever shared your User ID and Password with another person?. Rs. 1 Crore worth Shares in Your name. SCENARIO # 1

archer
Download Presentation

Successful Trends in e-Learning in imparting e-Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Successful Trends in e-Learning in imparting e-Security C.N.S.K. Murthy CISA, PMP, CAIIB, CTM 14th December, 2007.

  2. Have you ever shared your User ID and Password with another person?

  3. Rs. 1 Crore worth Shares in Your name SCENARIO # 1 • You have an online trading account containing blue chip companies’ shares worth more than Rs.1 Crore. How do you protect your online account from falling into wrong hands?

  4. You Are Carrying Rs.1 Crore Hard Cash in Mumbai SCENARIO # 2 • You are carrying hard cash of Rs. 1 Crore with you and say you are traveling in Mumbai. How do you travel?

  5. You have jewels worth Rs. 10 Crore + SCENARIO # 3 • You have precious and most valuable jewelry and say its value is more than Rs.10 Crore. You are searching for a place to store it. Which place would you select?

  6. What drives us • OWNERSHIP • COMMITMENT • RESPONSIBILITY

  7. The Purpose The purpose of e-learning is to make the employee to do or not to do what is required for maintaining security.

  8. If you Build, will they come? If you build it, they will come. Will they? Is it not a myth?

  9. Is e-learning effective? • Training Magazine 2004 Survey: • Modes of delivery of training: • 17% by computer • 8% by instructor via virtual classroom • 70% in class room • 5% Other modes • As much as 62% of all learning technologies fail to meet expectations. • A study of 139 companies in 15 countries found that 75% of respondents rated the effectiveness of e-learning as less than 5 on a 10 point scale.

  10. When will e-learning facility become e-security for the organization?

  11. Motivated Employees The employee needs to be motivated – • to show ownership • to be responsible and • to be committed

  12. Rocket Science • How do we change employee behavior? • How do you make the horse drink water?

  13. The Skills Needed Changing human behavior requires skills in • Change management, • Communication and • Leadership

  14. Our Roles • We are not police • We are not technology pushers • We are not mere trainers • We are the change agents

  15. The Path to Security Secured Environment Motivated Employees E-learning technology and E-security learning content

  16. The TrendsInformal Learning • Learning is not a separate activity. It is made a part of the daily work. • Learning is blended with the informal work culture of the organization. • Blended learning is convergence of training, info repositories, communities, networks, experts, expertise and a host of others.

  17. The TrendsInformal Learning…contd. Users today lead a more active life outside the work: • they listen to podcasts; • they write and read blogs • share views and experiences through wikis Bring those informal approaches into the company and make them informal learning means.

  18. The various ways of informal learning • Mentors or coaches • Networking with external professionals • On the job work experience • Online referenceware • Podcasts • Shared repositories of info • Trade and business publications • Web-conferences • Wikis • Blogs • Collaborative learning spaces • Established communities of practice • Expertise locators • Industry conferences • Informal conversation with colleagues • Internet searches • Knowledge and content management systems • Learning portals • Livechats

  19. The TrendsUse Professional Help Use skills from PR and Advertising

  20. The TrendsLocalize and Customize Working Globally with workforce diversity requires us to localize, regionalize and customize the message

  21. The TrendsSecurity Beyond the Work Where does security end? Security does not end with employee leaving the company’s premises. Security is emphasized as a way of life for users – whether they are in the office, at home or on the road.

  22. The TrendsTalk Their Language Tailor security learning at different levels • Executive Management • Middle Management • End Users

  23. THANK YOU cnsk@hotmail.com

More Related