top of page

Search Results

143 items found for ""

Other Pages (11)

  • Audiences | SecAware

    About your audiences It makes little sense to blast out awareness and training content without first understanding your audiences, their perspectives and their information needs. To that end, Sec Aware materials are designed to appeal to the following three corporate audiences: ​ 1. Workers in general (everyone!) Persuading workers to participate willingly in your information risk, security, privacy and compliance activities takes more than just policies and management edicts. Workers need to understand what is expected of them, and be sufficiently motivated to act accordingly. Top quality, professionally crafted security policies and other awareness and guidance materials are key. For the general audience, the materials take the individual's perspective, addressing their self-interests, their families and personal lives, as much as their working roles. ​ 2. Managers Management sets the tone for your organization. Without management’s understanding and support, information security is doomed. Getting senior and general management on-board with information risk and security is the quickest and most powerful - if not the only - way to influence your corporate culture. Content for the management audience revolves around the business perspective: how does information security support and enable the business? What is its commercial value? What are the compliance imperatives, the strategic and policy options? How should information risk and security management people be structured and directed? There are governance as well as information risk and security management aspects here. ​ 3. Professionals Various experts are typically involved in designing, implementing, operating and managing the organization's information risks and the security arrangements. Despite their specialist knowledge in areas such as IT, risk management, HR, physical security and compliance, information security presents unique challenges. Sometimes even the professionals need guidance and support. Sec Aware helps them understand the issues and options, get to grips with the technology, and get things on-track. Think about it: would you let an untrained mechanic work on your car brakes? ​ All three audiences are addressed in the Sec Aware content - for instance, each Sec Aware awareness module covers the same topic from their distinct perspectives. We plant the seeds, leading the audiences to consider and discuss information security, exploring their common interests and (in some cases) points of difference. Overall, Sec Aware, in conjunction with you and your employees, brings the content to life, lifting it off the page or screen. Gradually those seeds germinate, security becoming simply 'what we do around here', an integral and vital part of the corporate culture. ​ ​

  • SecAware | ISO27k toolkits; templates; policies; information security; cybersecurity | Hawke's Bay

    Implementing or running an ISO 27001 I nformation S ecurity M anagement S ystem? Need guidance to protect and exploit valuable information? Sec Aware delivers top-quality ISMS toolkits , security policies and awareness materials, plus risk and security consulting services. About Shop Specials

  • About | SecAware | New Zealand

    About you You are busy running the show, juggling priorities and trying to keep everyone happy. ​ Under pressure to comply with GDPR, HIPAA, PCI-DSS, ISO27k, SP800-53 and more, you're concerned about cyber incidents. Management demands action. ​ You're looking for an approach that is both effective and pragmatic, something to get you started and drive long-term success. ​ A 'management system' for information risk and security is more than just good practice. It enables the achievement of your organisation's business objectives. ​ Discover how we helped a U.S. client re-build its failed ISMS, regaining its ISO certification and customer trust (case study ) ... and worked with an innovative agritech business to implement ISO/IEC 27001 (case study ) This NZ tech startup needed an information security policy manual, quick ! (case study ) Auditing an OT process control specialist's information security controls (case study ) Find out more about us and how we help you succeed.

View All
bottom of page