{"id":66184,"date":"2024-12-16T11:54:29","date_gmt":"2024-12-16T00:54:29","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=66184"},"modified":"2024-12-16T11:54:30","modified_gmt":"2024-12-16T00:54:30","slug":"data-driven-security-awareness","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/","title":{"rendered":"How to Create a Data-Driven Security Awareness Campaign and Measure Impact"},"content":{"rendered":"\n<p>As today\u2019s digital landscape continues to evolve, a robust cybersecurity program must address not only technical controls, but also human risk. According to <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">Verizon\u2019s 2024 Data Breach Investigations Report<\/a>, 68% of breaches involved a non-malicious human element, such as social engineering attacks or simple human error. Recognising this risk, Salesforce\u2019s Security Awareness team uses data-driven programming to educate employees and prepare them for emerging threats.<\/p>\n\n\n\n<p>In August 2024, I had the honour of presenting at the <a href=\"https:\/\/www.sans.org\/blog\/a-visual-summary-of-sans-human-risk-summit-2024\/\">SANS Managing Human Risk Summit<\/a>, where I shared insights on how organisations can use data-driven security awareness programs to influence behaviour change and enhance their security. This blog will delve deeper into these topics and explore how Salesforce\u2019s Security Awareness team implements these strategies to uphold our #1 value of Trust.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-are-data-driven-security-awareness-programs-important\"><strong>Why are data-driven security awareness programs important?<\/strong><\/h2>\n\n\n\n<p>Keeping our customers\u2019 data secure is intrinsically linked to keeping our employees\u2019 data secure. With over 72,000 employees globally, Salesforce encompasses a wide array of roles and responsibilities, each with its own set of risky behaviours. While companywide security awareness campaigns are invaluable, they can fall short in addressing the nuanced and varied nature of each employee audience. By using data-driven insights, Salesforce tailors training and messaging to the specific risks and behaviours of different employee groups, enhancing their ability to recognise and report potential threats.<\/p>\n\n\n\n<div class=\"layout-one wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Building and measuring a security awareness program<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Learn more about how to manage human risk and create a strong culture of security throughout your organisation.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_self\" href=\"https:\/\/www.salesforce.com\/blog\/security-awareness\/\">Read more<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"wp-block-offer__graphics wp-block-offer__contour\"><\/div>\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-one.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-one.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-one.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<p>This approach offers several advantages. Employees are more likely to engage with and retain information that&#8217;s directly relevant to their roles and responsibilities, making them better prepared for attacks specific to their functions. In addition, from a data analyst\u2019s perspective, measuring the effectiveness of a targeted campaign can be easier due to its smaller scale. Implementing data-driven processes also lets companies refine and improve future campaigns, enhancing their effectiveness over time. To stay ahead of top threats, Salesforce uses the <a href=\"https:\/\/www.sans.org\/security-awareness-training\/resources\/maturity-model\/\">SANS Security Awareness Maturity Model<\/a> as a benchmarking tool to continually evolve and mature our program. We integrate data from the beginning to the end of our targeted campaigns to support and maintain the levels of cultural change and metrics framework in the model.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-salesforce-creates-a-security-awareness-program\">How Salesforce creates a security awareness program<\/h2>\n\n\n\n<p>Building a trust-first culture is a team effort. Salesforce\u2019s Security Awareness team partners with Salesforce Incident Response, Threat Intelligence, and other teams within the security organisation to identify incident-related trends and emerging threats.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-1-build-a-data-analysis-framework\">Step 1: Build a data analysis framework<\/h3>\n\n\n\n<p>As part of our <a href=\"https:\/\/images.contentstack.io\/v3\/assets\/blt36c2e63521272fdc\/blt28a69c2c92e69330\/66abed7cbc6ec28055f9ba60\/08_SANSSecAware_Meyer_WebVersion.jpg\" target=\"_blank\" rel=\" noopener\">data analysis framework<\/a>, we evaluate incident, behavioural, and employee attribution data to help determine which groups are at the highest risk. To maintain employee privacy, we use only aggregate data to develop our targeted campaigns. We then integrate this data into a human risk measurement based on user negligence incidents to understand the highest priority risks. This approach provides us with the topic, audience, and data needed to develop targeted education and messaging.<\/p>\n\n\n\n<div class=\"layout-astro wp-block-salesforce-blog-related-trail\">\n\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-cloud-layout-astro.png\" alt=\"\">\n\n\t\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__background\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-background-layout-astro.png\" alt=\"\">\n\n\t<div class=\"related-trail__wrapper\">\n\t\t<div class=\"related-trail__content\">\n\t\t\t\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 345.8 82.8\" aria-hidden=\"true\" class=\"related-trail__logo\"><path fill=\"#1d3767\" d=\"M96.6 33h9v22.6h4.8V33h8.8v-4.3H96.6zm49.8 5.3c0-5.7-3.6-9.6-10.8-9.6H127v27h4.8v-7.9h3l2.3-.1 5.7 8h5.6l-7-9.2c3.4-1.6 5-4.5 5-8.2m-11.1 5.3h-3.6V33h3.6c4.4 0 6 2.3 6 5.3s-1.6 5.3-6 5.3m30.8-15.2-12.6 27.2h5l2.3-5.3h11.6l2.4 5.3h5l-12.6-27.1zm-3.6 18 4.1-9.2 4.1 9.3zm25.2-17.7h4.8v27h-4.8zm20.7 0h-4.8v27h17.6v-4.4h-12.8zm38.4 12.1h-13.2V28.7H229v27h4.7V45h13.2v10.6h4.7V28.7h-4.7zm15.9 14.8h17.5v-4.4h-12.7v-6.4H279v-4.2h-11.5v-7.5h12.7v-4.4h-17.5zm36.9-27.2L287 55.6h5l2.3-5.3H306l2.4 5.3h5l-12.6-27.1zm-3.6 18 4.1-9.2 4.1 9.3zm35.4-17.7h-10.2v27h10.2c8.2 0 14.4-5.9 14.4-13.6s-6-13.4-14.4-13.4m0 22.6H326V33h5.4a9.1 9.1 0 1 1 0 18.1z\" \/><path fill=\"#1d315f\" d=\"M43 82.8h.1a74 74 0 0 0 38.5-12.3 3 3 0 0 0 1.3-2.4v-6A66.2 66.2 0 0 0 42.5.2a3 3 0 0 0-2.3 0A66.2 66.2 0 0 0 0 62.2V68a3 3 0 0 0 1.2 2.4 74 74 0 0 0 40.2 12.4z\" \/><path fill=\"#8ed1f4\" d=\"M13.8 51.8a.3.3 0 0 0 0-.1L33 23.6a3.1 3.1 0 0 1 .8-.8 3 3 0 0 1 4 .8l9.5 13.8 3.5-5a3 3 0 0 1 4.9 0L69 51.6a.3.3 0 0 1 .1.3h7C70.7 17.7 43.7 7.2 41.4 6.2c0 0-11.2 4-21.2 16A59.6 59.6 0 0 0 6.8 51.8zm21.7-21.3\" \/><path fill=\"#aa76b3\" d=\"m62 51.9-8.7-12.6-4.2 6.1 4.8 6.4z\" \/><path fill=\"#722a87\" d=\"m49 45.4-4.4 6.4H54z\" \/><path fill=\"#8ed1f4\" d=\"m37 32.6-1.5-2.1z\" \/><path fill=\"#aa76b3\" d=\"m28 41.4 7.6 10.4h1.8l6.4-9.2-6.8-10-1.5-2.1z\" \/><path fill=\"#722a87\" d=\"m28 41.4-7 10.4h14.6z\" \/><path fill=\"#069a49\" d=\"M43.8 72.5a1.8 1.8 0 0 0-1-2.4L40.1 69a8 8 0 0 1-1-.5 7.8 7.8 0 0 1-2.4-10.7H6a44 44 0 0 0-.2 4.4v4.4A70 70 0 0 0 26 75a70 70 0 0 0 15.2 2l2.4-4.3zm33-14.8H44.3l-2.5 3a1.7 1.7 0 0 0-.2.5 1.8 1.8 0 0 0 1 2.3l2.7 1.2.7.4a7.8 7.8 0 0 1 3 10.6l-.5.9 4.8-.8a71 71 0 0 0 8.4-2.2l1.3-.4a71 71 0 0 0 14-6.7v-8.8z\" \/><path fill=\"#fff\" d=\"m46 65-.7-.3-2.7-1.2a1.8 1.8 0 0 1-1-2.4 1.7 1.7 0 0 1 .2-.4l2.5-3h-7.6A7.8 7.8 0 0 0 39 68.4a8 8 0 0 0 1 .5l2.7 1.2a1.8 1.8 0 0 1 1 2.4l-.1.2-2.5 4.3a52.5 52.5 0 0 0 7.2-.4l.5-.9A7.8 7.8 0 0 0 46 65.1z\" \/><path fill=\"#157139\" d=\"M56.9 67.3h8.8l-4.4-5zM23 71h9l-4.5-5.1zm-4.1-10.4-4.5 5h8.9z\" \/><\/svg>\n\t\t\t<h2 class=\"wp-block-related-trail__title\">Get started with security awareness<\/h2>\n\t\t\t<p>Learn what it means to build security awareness into an organisation. <\/p>\n\t\t\t\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/trails\/get-started-with-security-awareness\">Take the Trail<\/a><\/div>\n\n\t\t<\/div>\n\t\t<div class=\"related-trail__mock\">\n\t\t\t<div class=\"related-trail__points\">+400 points<\/div>\n\t\t\t<div class=\"related-trail__eyebrow\">Trail<\/div>\n\t\t\t<p class=\"related-trail__trail-title h3\">Security Awareness<\/p>\n\t\t\t<p class=\"related-trail__trail-description\">Prepare for a security awareness career.<\/p>\n\t\t\t<div class=\"related-trail__actions\">\n\t\t\t\t<div class=\"related-trail__action\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 10 10\" aria-hidden=\"true\"><path fill=\"#747474\" fill-rule=\"evenodd\" d=\"m4.93.69.88 2.88c.04.12.16.18.27.18h2.89c.29 0 .4.38.17.56L6.79 6.04c-.1.07-.13.2-.1.32l1.12 2.96c.08.27-.2.5-.44.33L4.85 7.77c-.1-.08-.23-.08-.34 0L1.97 9.65a.29.29 0 0 1-.45-.33L2.6 6.36a.3.3 0 0 0-.1-.32L.17 4.3c-.23-.18-.1-.56.17-.56h2.89c.13 0 .23-.04.27-.18l.9-2.9c.08-.27.46-.25.54.02Z\" clip-rule=\"evenodd\" \/><\/svg>\n<\/div>\n\t\t\t\t<div class=\"related-trail__action\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 9 5\" aria-hidden=\"true\"><path fill=\"#747474\" d=\"M4.16 4.5.26 0h7.8z\" \/><\/svg>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__foreground\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-foreground-layout-astro.png\" alt=\"\">\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__parks\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-parks-layout-astro.png\" alt=\"\">\n\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-2-focus-on-influencing-behavior-change\">Step 2: Focus on influencing behavior change<\/h3>\n\n\n\n<p>Building a culture of trust at Salesforce requires changing risky behaviours. Our team draws inspiration from Salesforce\u2019s <a href=\"https:\/\/europe.customercontactweekdigital.com\/performance-metrics\/articles\/human-centred-change-from-complaint-management-great-cx-ex#:~:text=The%20framework%20that%20Dold%20mentions,these%20six%20LEVERS%20are%20engaged\">LEV<\/a><a href=\"https:\/\/europe.customercontactweekdigital.com\/performance-metrics\/articles\/human-centred-change-from-complaint-management-great-cx-ex#:~:text=The%20framework%20that%20Dold%20mentions,these%20six%20LEVERS%20are%20engaged\" target=\"_blank\" rel=\" noopener\">E<\/a><a href=\"https:\/\/europe.customercontactweekdigital.com\/performance-metrics\/articles\/human-centred-change-from-complaint-management-great-cx-ex#:~:text=The%20framework%20that%20Dold%20mentions,these%20six%20LEVERS%20are%20engaged\">RS framework<\/a> for creating change, which encompasses Leadership, Ecosystem, Values, Enablement, Rewards, and Structures. This framework was developed by Salesforce\u2019s change management team. While it\u2019s often seen as beneficial for sales teams, our team uses the framework in our own campaigns as a way to influence behaviour change. Salesforce researchers found that successful change is ten times more likely when four or more levers are employed. Therefore, we use multiple channels for education and messaging to engage as many of these levers as possible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-3-educate-with-targeted-messaging\">Step 3: Educate with targeted messaging<\/h3>\n\n\n\n<p>What does this look like in action? For a targeted group, we might lead an event or workshop for leadership that equips them to pass down specific messaging to their teams. We also partner with Communications and other teams outside the security organisation to deliver targeted messaging that meets employees where they are by using existing communication ecosystems. For example, we might share content in messaging channels relevant to targeted groups. In addition, our security awareness training aligns with organisational values, such as our #1 value of Trust, while providing tools and enablement to set teams up for success.\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/trailhead.salesforce.com\/\" target=\"_blank\" rel=\" noopener\">Trailhead<\/a>, Salesforce\u2019s online learning platform, is an excellent resource for this because it integrates rewards into the learning process by providing virtual badges to learners after they complete a course.<\/p>\n\n\n\n<p>Our education and messaging reference structures, policies, and documentation that employees can refer to for more information. Using different methods of communication not only lets us address various learning styles but also engage as many of these levers as possible in one campaign. This sets the stage to influence behaviours in high-risk groups.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-4-track-campaign-effectiveness-with-data\">Step 4: Track campaign effectiveness with data<\/h3>\n\n\n\n<p>As mentioned previously, data is integrated into our campaigns from beginning to end. In addition to providing rationale and establishing the basis of our campaign, we use the same data to track its effectiveness. One way to do this is by tracking campaign actions over time and observing any changes in the number of incidents addressed by the campaign. The goal is to observe a decrease in targeted incidents as the campaign progresses. Our team can quantitatively communicate the value of our program to stakeholders by showing this reduction through a simple line graph.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e6756fc3b75&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e6756fc3b75\" class=\"wp-block-image size-full is-resized wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1240\" height=\"738\" data-attachment-id=\"66183\" data-permalink=\"https:\/\/www.salesforce.com\/au\/blog\/screenshot-2024-10-04-at-3-15-58-pm\/\" data-orig-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/Screenshot-2024-10-04-at-3.15.58\u202fPM.png\" data-orig-size=\"1240,738\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screenshot 2024-10-04 at 3.15.58\u202fPM\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/Screenshot-2024-10-04-at-3.15.58\u202fPM.png?w=840\" data-large-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/Screenshot-2024-10-04-at-3.15.58\u202fPM.png?w=1240\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/10\/Screenshot-2024-10-04-at-3.15.58\u202fPM.png?strip=all&#038;quality=95\" alt=\"Hypothetical example of a line graph depicting a drop in security incidents after campaign actions are taken.\" class=\"wp-image-66183\" style=\"width:620px;height:auto\" srcset=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/Screenshot-2024-10-04-at-3.15.58\u202fPM.png 1240w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/Screenshot-2024-10-04-at-3.15.58\u202fPM.png?w=840&amp;h=500 840w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/Screenshot-2024-10-04-at-3.15.58\u202fPM.png?w=768&amp;h=457 768w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/Screenshot-2024-10-04-at-3.15.58\u202fPM.png?w=150&amp;h=89 150w\" sizes=\"auto, (max-width: 1240px) 100vw, 1240px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p><em>Hypothetical example of a line graph depicting a drop in security incidents after campaign actions are taken.<\/em><\/p>\n\n\n\n<p>Even if there isn\u2019t a decrease in incidents over time, this type of graph helps us understand where to revisit or shift our campaign strategy by examining specific points in time. For example, we might find a drop in incidents after certain types of campaign actions, such as in-person workshops. Using a visualisation like this helps us show programmatic impact to leadership and stakeholders, and provides a metrics-based framework for us to continually evolve our campaign strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-takeaways\">Takeaways<\/h2>\n\n\n\n<p>Implementing a targeted approach to security awareness and training at Salesforce has proven to be highly effective in addressing the nuanced and varied nature of human risk. Building a culture of trust and security at Salesforce requires comprehensive, data-driven programming that integrates targeted education, continuous data analysis, and effective communication strategies. Using these methods helps us enhance our employees\u2019 security and foster a more aware and resilient workforce. In doing so, we keep security top of mind for our employees, which translates to security for our customers. As we continue to evolve our programs, we remain committed to staying ahead of emerging threats and ensuring the safety of both our employees and customers.<\/p>\n\n\n\n<p>Interested in learning about the role of a specialist on Salesforce\u2019s Security Awareness team? <a href=\"https:\/\/trailhead.salesforce.com\/cybersecurity\/security-awareness-specialist\/\" target=\"_blank\" rel=\" noopener\">Take this Trail<\/a> to learn more about the role and its responsibilities.<span id=\"docs-internal-guid-983ff0e0-7fff-fd75-9444-41ff833323ca\"><\/span><\/p>\n\n\n\n<div class=\"layout-two wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Discover top security tips<\/h2>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_self\" href=\"https:\/\/security.salesforce.com\/security-best-practices\">Learn more<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"wp-block-offer__graphics wp-block-offer__contour\"><\/div>\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-two.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-two.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-two.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Addressing user behaviour is key to managing human risk in security. Here are four steps to create an effective security awareness program.<\/p>\n","protected":false},"author":514,"featured_media":66182,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"","post_meta_title":"","ai_synopsis":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[2485,2504],"sf_content_type":[],"coauthors":[3243],"class_list":["post-66184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-data-culture","sf_topic-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Create Data-Driven Security Awareness Campaigns<\/title>\n<meta name=\"description\" content=\"Addressing user behaviour is key to managing human risk in security. Here are four steps to create an effective security awareness program.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Create a Data-Driven Security Awareness Campaign and Measure Impact\" \/>\n<meta property=\"og:description\" content=\"Addressing user behavior is key to managing human risk in security. Here are four steps to create an effective security awareness program.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-16T00:54:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-16T00:54:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jade Meyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Addressing user behavior is key to managing human risk in security. Here are four steps to create an effective security awareness program.\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforce\" \/>\n<meta name=\"twitter:site\" content=\"@salesforce\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jade Meyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/676ba6380c1f12c17cdfa816eeb82676\"}],\"headline\":\"How to Create a Data-Driven Security Awareness Campaign and Measure Impact\",\"datePublished\":\"2024-12-16T00:54:29+00:00\",\"dateModified\":\"2024-12-16T00:54:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/\"},\"wordCount\":1118,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/\",\"name\":\"How to Create Data-Driven Security Awareness Campaigns\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png\",\"datePublished\":\"2024-12-16T00:54:29+00:00\",\"dateModified\":\"2024-12-16T00:54:30+00:00\",\"description\":\"Addressing user behaviour is key to managing human risk in security. Here are four steps to create an effective security awareness program.\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png\",\"width\":1500,\"height\":844,\"caption\":\"Develop a robust security awareness program by proactively identifying trends in incidents and emerging threats.\u00a0[Adobe Images]\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"name\":\"Salesforce\",\"description\":\"Learn how to get ahead of trends and supercharge professional relationships\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\",\"https:\/\/x.com\/salesforce\",\"https:\/\/instagram.com\/salesforce\",\"http:\/\/www.linkedin.com\/company\/salesforce\",\"http:\/\/www.youtube.com\/Salesforce\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/676ba6380c1f12c17cdfa816eeb82676\",\"name\":\"Jade Meyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/eb2de092f2b127473508a7ad6058e030\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/12\/jade-meyer-headshot.webp?w=128&h=96&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/12\/jade-meyer-headshot.webp?w=128&h=96&crop=1\",\"width\":128,\"height\":96,\"caption\":\"Jade Meyer\"},\"description\":\"Jade helps build a culture of trust at Salesforce by leveraging data analysis and targeted campaigns to drive behavioral change. Her background in Information Science, Business, and Psychology from Cornell University equips her with a unique interdisciplinary perspective, which she uses to drive innovative solutions in cybersecurity.\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/author\/jade-meyer\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Create Data-Driven Security Awareness Campaigns","description":"Addressing user behaviour is key to managing human risk in security. Here are four steps to create an effective security awareness program.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/","og_type":"article","og_title":"How to Create a Data-Driven Security Awareness Campaign and Measure Impact","og_description":"Addressing user behavior is key to managing human risk in security. Here are four steps to create an effective security awareness program.","og_url":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce","article_published_time":"2024-12-16T00:54:29+00:00","article_modified_time":"2024-12-16T00:54:30+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png","type":"image\/png"}],"author":"Jade Meyer","twitter_card":"summary_large_image","twitter_description":"Addressing user behavior is key to managing human risk in security. Here are four steps to create an effective security awareness program.","twitter_creator":"@salesforce","twitter_site":"@salesforce","twitter_misc":{"Written by":"Jade Meyer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/676ba6380c1f12c17cdfa816eeb82676"}],"headline":"How to Create a Data-Driven Security Awareness Campaign and Measure Impact","datePublished":"2024-12-16T00:54:29+00:00","dateModified":"2024-12-16T00:54:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/"},"wordCount":1118,"commentCount":0,"publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png","inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/","url":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/","name":"How to Create Data-Driven Security Awareness Campaigns","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png","datePublished":"2024-12-16T00:54:29+00:00","dateModified":"2024-12-16T00:54:30+00:00","description":"Addressing user behaviour is key to managing human risk in security. Here are four steps to create an effective security awareness program.","inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/data-driven-security-awareness\/#primaryimage","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png","width":1500,"height":844,"caption":"Develop a robust security awareness program by proactively identifying trends in incidents and emerging threats.\u00a0[Adobe Images]"},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/au\/blog\/#website","url":"https:\/\/www.salesforce.com\/au\/blog\/","name":"Salesforce","description":"Learn how to get ahead of trends and supercharge professional relationships","publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/au\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce","https:\/\/x.com\/salesforce","https:\/\/instagram.com\/salesforce","http:\/\/www.linkedin.com\/company\/salesforce","http:\/\/www.youtube.com\/Salesforce"]},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/676ba6380c1f12c17cdfa816eeb82676","name":"Jade Meyer","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/eb2de092f2b127473508a7ad6058e030","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/12\/jade-meyer-headshot.webp?w=128&h=96&crop=1","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/12\/jade-meyer-headshot.webp?w=128&h=96&crop=1","width":128,"height":96,"caption":"Jade Meyer"},"description":"Jade helps build a culture of trust at Salesforce by leveraging data analysis and targeted campaigns to drive behavioral change. Her background in Information Science, Business, and Psychology from Cornell University equips her with a unique interdisciplinary perspective, which she uses to drive innovative solutions in cybersecurity.","url":"https:\/\/www.salesforce.com\/au\/blog\/author\/jade-meyer\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/au\/blog","push-errors":false,"primary_topic":{"term_id":2485,"name":"Data","slug":"data-culture","term_group":0,"term_taxonomy_id":2485,"taxonomy":"sf_topic","description":"Global data will double every 12 hours by 2025. You need the right tech and training for data-driven decisions at every level.","parent":0,"count":59,"filter":"raw"},"featured_image_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/How-to-Create-Data-Driven-Security-Awareness-Campaigns-and-Measure-Impact.png?w=1500","_links":{"self":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/66184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/users\/514"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/comments?post=66184"}],"version-history":[{"count":2,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/66184\/revisions"}],"predecessor-version":[{"id":66260,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/66184\/revisions\/66260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media\/66182"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media?parent=66184"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_topic?post=66184"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_content_type?post=66184"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/coauthors?post=66184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}