▪Connect cybersecurity processes to the people development process
▪Structuring a communication and training plan for the end areas and for the support areas that interface with security
▪Ensure that training guidelines and cybersecurity topics are addressed in a way that is understandable by the public
▪Map root causes of vulnerabilities linked to the insecure mindset and connect with targeted and customized actions
▪ Objectively measure the public’s ability to absorb the communications issued
▪Measure the effectiveness of awareness and training actions through phishing simulations
▪ Reinforcement of layers that can detect failures due to improper human behavior: DLP, VPN monitoring, identity management, etc.