Going the extra mile will give you the best results with training. But who in your organisation should do that?
There are normally two people involved in running the training
Whether you are using awareness or phishing training, it’s important to consider who should run it. Our products save you time compared to doing your own training, but the best results come when you go the extra mile and invest some time and effort in it.
Normally we see 2 people involved in the training.
- A motivator and long-term owner of the training. This person is active throughout the onboarding phase and drives the training efforts afterwards.
- A tech-savvy person. This person is often active during the onboarding phase. They can help get the tech-side set up, especially if your organisation is using AD integration and single sign-on.
Owner of the training
Who should then own your training once the setup is done?
Ideally, the person in charge of training at your company should be someone who is willing to set aside a small amount of time for training every now and then.
We see the best results when the owner/person responsible for the training has regular meetings with their dedicated Customer Success Manager at CyberPilot to discuss how to make the training successful for your company.
The tasks for the owner could be:
-
Communicating the importance of the training internally
-
Keeping an eye on course completion – who actually completes the courses and who doesn’t
-
Following up with learners who have not completed courses as planned
-
Making sure new employees are onboarded
-
Receiving feedback from colleagues
-
Enrolling users to courses (we help you build a course plan suited your company's wishes in regards to frequency and subject matter)
-
Selecting which phishing campaigns to run, when, and to which employees
It's not a job that takes up a lot of time, but to truly make a difference in how security is handled at your company, it's important the person responsible is ready for these tasks.
The tech-savvy person
The reason why it is a good idea to have a tech-savvy person involved is that phishing setups, AD Integration, and single sign-on functionality requires a bit of technical setup to make sure everything works smoothly.
For instance, whitelisting needs to be done to ensure our simulated phishing emails reach the right recipients. Likewise, single sign-on functionality requires setting up your Azure AD to communicate with our platform.
In some cases, the tech-savvy person may not be the same person who keeps an eye on the training progress once the employees begin taking the courses. That's why we often see both a tech-savvy person and a person responsible for the training being involved from the get-go.
If you have any questions about the roles and why they’re important, let us know, and will be happy to help.
Got a question?
Contact us at support@cyberpilot.io