Security awareness and associated processes.

Original price was: € 199,00.Current price is: € 0,00.


Like any other business process, security awareness requires structured processes. Ensure your systems are protected and users are aware of their digital protection duties and risks. Improve your security and protect your data with this security awareness training program.

SKU: 0967d5f7-cd69-4afc-8315-4961d82418e8 Category: Tags: , , , , , , , , , , , , , , , , , , ,
Available in: English, Dutch, French, German, Spanish
  • The CIO who needs to understand the awareness of her ICT team.
  • The CISO who needs a baseline assessment of the organization's security.
  • The consulting partner who needs to address her client's security status.
  • The CTO who needs to ensure that technology is deployed on a secure funadament.
  • The project manager who needs to upgrade a "chaange" to a "run" organization.
The threat
what is the risk

Risk assessment
understand how to assess risks

Security policy
how to create a security policy

Threats and vulnerabilities
identify potential threats and weaknesses in your environment

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. How is fraud protected against?
  1. We don't know
  2. Our bank knows best how to protect itself against fraudsters
  3. Our bank evaluates its own fraud risk and also asks us for help if needed

Q. Are there clear and specific policy guidelines for the use of IT systems?
  1. There are guidelines available
  2. There are general guidelines which have been discussed with the project
  3. There are clear and specific policy guidelines formalized with the project
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “Security awareness and associated processes.”

    Your email address will not be published. Required fields are marked *