Please do not Reply All.. If you received this email, you've got an annual Role-Based Information Security (IS) training requirement.
Please review the attached tracking sheet. There are only 13 regular workdays left this year! Training in 2018 cannot be used to meet this requirement. To find out more about your individual requirement and available options:
In the attached spreadsheet Column Q indicates one of the three following statuses. If you've already met this year's requirement and a 2017 history record has been entered by your manager or you for your assigned course (i.e., 1117, 1118, 1119, or 1120), you can disregard this message.
Good job! Nothing more needs to be done this year. The requirement appears to have been met and a 2017 history record has been successfully entered in Intelex. |
|||
Y |
|||
|
Note: If the Total Hrs YTD column shows a total less than the requirement, it has been highlighted in orange. This does not necessarily indicate a problem. Attendance in the Announced Courses tracked on this spreadsheet is not required. There are lots of other ways to meet the annual requirement, and the individual may have obtained their training by other means. Also, some may be prorated based on being in the role only part of the year. |
||
|
The training requirement appears to have been met, but a 2017 history record has not yet been entered in Intelex. |
||
|
P |
||
|
|||
|
|
Note: For guidance on how to update your training history records, refer to the How to Track Training in Intelex work instruction (it's OK to click on "Continue to this website" if you receive a certificate message with this link). If you don't have management privileges in Intelex, you may need to get your manager do this for you. Guidance and examples are provided in FAQ #10 – see "Key points to remember" about two-thirds down the page. |
|
It appears that this year's training requirement has not yet been completed. |
|||
N |
|||
|
Note: If individuals were in a specialized role for only part of the year, prorating is permitted. While audits are easier if everyone meets their full annual requirement, which is based on the calendar year. It's recommended to have the goal of meeting the full annual requirement; however, sometimes that is not practical or possible. If prorating is used, count the full month for every month in the role, including the month of the start date. See FAQ #10 for additional guidance and an example. |
||
If you're listed as incomplete, but feel that you have met the requirement, submit your evidence to your manager and request that the history record be entered. As noted in FAQ #10, there are several online courses that can be taken at your convenience. Also attached is information about a 2-hour course being offered on Tue 12/19. It's a classroom course for those in Nashville as well as a teleconference for remote workers.
If that time on Tuesday 12/19 won't work for your schedule, there are several recommended online courses in FAQ #10 to choose from, which can be taken at your convenience:
Course Name |
External Address / Link / URL |
Training Credit Value |
Cyber Awareness Challenge 2018 # |
1.0 hour |
|
Identifying and Safeguarding Personally Identifiable Information (PII) 2.0 # |
1.0 hour |
|
Phishing Awareness 3.1 # |
http://iatraining.disa.mil/eta/disa_phishing_v31_fy17/launchPage.htm |
1.0 hour |
Social Networking v2.1 # |
http://iatraining.disa.mil/eta/disa_sn_v21_fy17/launchPage.htm |
1.0 hour |
Mobile Devices v1.1 # |
http://iatraining.disa.mil/eta/disa_mobile_v11_fy17/launchPage.htm |
1.0 hour |
Smartphone and Tablets 2.0 # |
http://iatraining.disa.mil/eta/smartphone_tablet_v2/launchpage.htm |
1.0 hour |
Getting Started with Web Application Security % |
https://www.sans.org/webcasts/started-web-application-security-101222 |
1.0 hour |
CEO Fraud and the $2.3 Billion Mistake You Can't Afford to Make % |
1.5 hours |
|
Pokemon Go - What To Tell Employees % |
1.0 hour |
|
Insider Threat Awareness # |
https://securityawareness.usalearning.gov/itawareness/index.htm |
0.5 hour |
Cybersecurity Awareness # |
https://securityawareness.usalearning.gov/cybersecurity/index.htm |
0.5 hour |
The Hidden Enemy: Malvertising and Ransomware % |
1.0 hour |
|
Active Shooter Preparedness for Civilians % |
https://securitytoday.com/webcasts/2016/03/critical-issues-in-campus-safety.aspx |
1.0 hour |
2016 Malware Review and Top Threat Predictions for 2017 % |
1.0 hour |
|
Be Prepared for Ransomware % |
https://www.infosecurity-magazine.com/webinars/apt-ransomware/ |
1.0 hour |
How IoT Enabled a DDoS; How to Avoid Being Part of It % |
https://www.infosecurity-magazine.com/webinars/iot-enabled-ddos/ |
1.0 hour |
The Enemy Within: Overcoming a Company's Greatest Security Vulnerability – Its People % |
https://www.infosecurity-magazine.com/webinars/the-enemy-within/ |
1.0 hour |
How to Achieve Best Practice in Application Security in 2017 % |
https://www.infosecurity-magazine.com/webinars/best-practise-application-security/ |
1.0 hour |
Yahoo! A Breach Too Far or the Reality of Consumer Privacy in 2016? % |
https://www.infosecurity-magazine.com/webinars/yahoo-a-breach-too-far-2016/ |
1.0 hour |
The Five Stages of Insider Threat % |
https://www.infosecurity-magazine.com/webinars/the-five-stages-of-insider-threat/ |
1.0 hour |
Mobile App Development Security Trends and Techniques % |
https://www.sans.org/webcasts/mobile-app-security-trends-techniques-104397 |
1.0 hour |
|
|
|
More specific suggestions to follow... |
|
|
There are links below to search for training... |
...you can choose something to fit your preferences and role on your own. |
|
s