Resources for the global digital safety training community.
Credits
Last Updated 2017-06In this session, you will present a set of recommendations that can help participants facilitate post-training implementation of their security plans and protocols within their organizations.
This session was developed for, and should be attributed to, the Institute for War & Peace Reporting resource “Cyberwomen: Holistic Digital Security Training Curriculum for Women Human Rights Defenders” under a Creative Commons Attribution-Share Alike 4.0 International CC BY-SA 4.0 License
Step 1 | Working in pairs, ask participants to describe their organizations: How many people participate in them? How often do they meet? Are there areas or committees that bring different parts of the organization together?
Step 2 | Remaining in pairs, now ask participants to share with one another some of the barriers or challenges they anticipate facing within their organizations when presenting their security plans and articulating the need to begin an implementation process.
Step 3 | Once the groups have finished discussing the points above, share some ideas that can help participants facilitate post-training implementation of their security plans and protocols within their organizations:
Step 4 | Share with participants a basic structure for starting this important conversation within their organizations - it could be a set of questions, or a possible training plan of their own with specific sessions and exercises relevant to the organizational risk context.
Step 5 | Remind the group to be aware of the logistics involved, time in particular – people within their organization may not have the time to set aside an entire afternoon, day or even longer for training. Changing long-standing habits takes a lot of time and patience, so it’s will be more ideal for participants to find ways of building these conversations (or trainings) into existing regular meetings or other gatherings.
Here is a basic structure that participants could follow to raise awareness of certain topics – this begins with a conversation about why digital security is important for the organization, and then includes sessions (from this curriculum) which go into further detail on basic digital security topics - how participants ultimately choose to have these conversations is up to them:
Activity & Discussion:
How Does the Internet Work?
Input:
How Do Mobile Devices Work?
Input:
Encrypted Communications
Input:
Safe Browsing
Deepening:
Gender-Based Risk Model
Deepening:
Organizational Security Plans and Protocols
Remind participants that this is just a suggested approach – they should feel free to adjust the sessions and the topics as they see fit. It is important that, as participants work through the implementation process with their organizations, that you make yourself available (to the extent possible) to provide support and answer any question they might have.