In association with Proofpoint
Securing your business with education and training
Keeping your workforce updated on the latest threats requires a cohesive cyber skills strategy

What’s the biggest cybersecurity threat your business faces right now? Hopefully, an answer springs to mind, along with a list of the solutions you have in place to keep attackers at bay. But ask yourself this: do your employees know? And if the worst did happen, how confident are you that your workforce would know exactly how to respond?
Cybersecurity education and training is one of the cornerstones of any enterprise security strategy, keeping companies looped in on the latest attack methods and helping employees foster a security-first mindset.
But how receptive are employees to the various training methods, how can training keep up with new advancements such as AI, and where do vendors such as your managed security service provider fit into the mix?
In this special edition of the ITPro Podcast, in association with Proofpoint, Jane and Rory are joined by Kevin Leusing, EMEA chief technologist at Proofpoint. Together, they discuss how firms can best use cybersecurity education and training to protect their workforce against the latest threats.
Highlights
"When a simulation is completed, the employee needs to understand: did they do the right thing? Was it even a simulation? Give them that immediate and timely feedback about what they did, how they performed, and what that looked like. But then continue and follow up with that, give them education materials throughout the year, short training, short articles that aren’t going to take a lot of time, but it keeps that security in the top of their mindset as they continue on."
RELATED RESOURCE
"With the social engineering attacks that we see, it’s easy for even knowledgeable and very savvy users to fall victim to some of these kinds of threats. So by gamifying it, by making this more of an interactive and more valuable exercise for the employee, the better off they tend to be in solving some of this social engineering and not falling victim to it."
"Just the same way as threats coming into the environment through email or other sources, employees are understanding now the impact [of the fact that] AI is potentially far more risky than some of the inbound threats coming in, because now what we're doing is getting ourselves into a potential data loss situation."
Footnotes
- https://bit.ly/proofpoint-cyber-awareness-kit
- 2024 State of the Phish
- 2024 Voice of the CISO
- Why social engineering is such a problem and how your business can protect itself
- Organisations could soon be using generative AI to prevent phishing attacks
- Nearly half of EMEA data breaches were due to internal blunders in 2023
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
The new era of cyber threats
ITPro Podcast With AI-powered attacks and state-backed groups, security teams face face a new wave of sophisticated threats
By Rory Bathgate
-
Supply chain scares and Google’s AI code
ITPro Podcast As the ransomware attack on Blue Yonder disrupts a wide range of firms, Google moves to lead by example on internal AI code
By Rory Bathgate
-
Halloween special: Cybersecurity horror stories
Podcast Join us for three terrifying tales sure to chill any IT professional to the core
By Jane McCallion
-
Cracking open insider threats
ITPro Podcast Leaders need to perform strict identity measures on would-be hires – and ensure employees who leave have access promptly removed
By Rory Bathgate
-
Proofpoint and CyberArk expand strategic partnership
News The collaboration includes a new ZenWeb browser extension to protect employees from malicious URLs
By Daniel Todd
-
Alert issued for ‘Voldemort’ malware as dozens of organizations hit
News Proofpoint researchers say the Voldemort malware campaign appears to be aimed at cyber espionage
By Emma Woollacott
-
Advanced email security
Whitepaper Protect against advanced email threats, streamline operations, and get actionable visibility into people risk and your threat landscape
By ITPro
-
Metrics that matter
Whitepaper The CISO’s guide to assessing, prioritizing, and justifying cybersecurity budgets that make business sense
By ITPro