{"id":363,"date":"2025-08-07T09:42:15","date_gmt":"2025-08-07T09:42:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/?p=363"},"modified":"2025-08-07T09:42:15","modified_gmt":"2025-08-07T09:42:15","slug":"career-paper-security-awareness-trainer","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/career-paper-security-awareness-trainer\/","title":{"rendered":"Career Paper: Security Awareness Trainer"},"content":{"rendered":"\n<p>Generally speaking, a job in cybersecurity requires an interdisciplinary set of<\/p>\n\n\n\n<p>technical abilities, intellectually challenging domains, and research-focused subject<\/p>\n\n\n\n<p>disciplines. It is a job that is significant to securing the social and technological domains<\/p>\n\n\n\n<p>of human life; security awareness trainers rely extensively on social science research<\/p>\n\n\n\n<p>and ideas. Understanding human motivations, decision-making processes, and the<\/p>\n\n\n\n<p>social engineering tactics used by attackers are critical for developing effective security<\/p>\n\n\n\n<p>awareness initiative programs that are effective, influencing positive security behaviors<\/p>\n\n\n\n<p>within an organization, and developing more effective security strategies that are more<\/p>\n\n\n\n<p>user-friendly and benefit a diverse population because it affects everyone around us.<\/p>\n\n\n\n<p>I am new to this field, and everything that I have gone through in the courses that<\/p>\n\n\n\n<p>I have taken for Cybersecurity, all have similar paths. The field keeps evolving, but one<\/p>\n\n\n\n<p>thing for sure is that social science research and social science principles are needed in<\/p>\n\n\n\n<p>the execution of daily tasks. They use these factors to address individual behavior,<\/p>\n\n\n\n<p>marginalized populations, and broader societal effects that keep changing.<\/p>\n\n\n\n<p>As a security awareness trainer, you are required to be a subject matter expert<\/p>\n\n\n\n<p>that will be able to create updated training for all personnel, be able to create and teach<\/p>\n\n\n\n<p>about current cyberattacks and to be able to explain it in as simple as possible terms. I<\/p>\n\n\n\n<p>have always been involved in training personnel, so it comes easy to me, because I<\/p>\n\n\n\n<p>understand the social factor of the equation, you need to understand your audience to<\/p>\n\n\n\n<p>be able to get through a well thought out training season. Not to mention other related<\/p>\n\n\n\n<p>tasks that will be needed by whomever I end up working for.<\/p>\n\n\n\n<p>Cybersecurity awareness training is an essential part of protecting an<\/p>\n\n\n\n<p>organization&#8217;s information and systems from cyber threats, but it has to be done right,<\/p>\n\n\n\n<p>and properly documented, one must keep all records to track all the changes and<\/p>\n\n\n\n<p>trainees. As cyber-attacks become more complex and frequent, personnel must be<\/p>\n\n\n\n<p>educated on how to recognize and respond to these dangers. This paper examines<\/p>\n\n\n\n<p>ways for effective cybersecurity awareness training, with a focus on identifying typical<\/p>\n\n\n\n<p>cyber hazards such as phishing, malware, and social engineering, as well as<\/p>\n\n\n\n<p>implementing data protection best practices. which again falls into social sciences due<\/p>\n\n\n\n<p>to the fact that you need to identify key components necessary, human components and<\/p>\n\n\n\n<p>key strategies based on your audience that might be effective and be more vulnerable<\/p>\n\n\n\n<p>than others.<\/p>\n\n\n\n<p>As companies and individuals rely more as digital technologies advance and<\/p>\n\n\n\n<p>evolve, the possibility of cyberattacks and data breaches increases on a daily basis,<\/p>\n\n\n\n<p>training will always be required to be updated as well. Cybersecurity is necessary not<\/p>\n\n\n\n<p>only to safeguard sensitive data and systems, but also to protect an organization&#8217;s<\/p>\n\n\n\n<p>reputation which can bankrupt a company if broken, preserve customer trust, and<\/p>\n\n\n\n<p>comply with local and government regulations.<\/p>\n\n\n\n<p>By identifying your audience, you should be able to create a training plan that<\/p>\n\n\n\n<p>can be successful, you might want to incorporate interactive learning for does that<\/p>\n\n\n\n<p>learned better with visuals, live security drills to keep awareness and to keep them on<\/p>\n\n\n\n<p>their toes, practice simulated attacks to see how they respond, and can even make it<\/p>\n\n\n\n<p>fun for them, so they can retain the information better, because games can directly have<\/p>\n\n\n\n<p>people more engage and be better prepare and be enhance their understanding of<\/p>\n\n\n\n<p>cybersecurity.<\/p>\n\n\n\n<p>Every group is different and requires a different approach, cybercriminals do not<\/p>\n\n\n\n<p>discriminate, we are all equals that have something that can be taken, if we let them.<\/p>\n\n\n\n<p>I know that by having interactive training makes for a better workplace, not only<\/p>\n\n\n\n<p>that they are learning, they are engaging in practice and are building comradery within<\/p>\n\n\n\n<p>themselves, straightening the companies security. It is imperative to build a more<\/p>\n\n\n\n<p>conscious-security culture within the workplace, building from lessons learned and<\/p>\n\n\n\n<p>personal involvements and consistent training, something that some companies lack.<\/p>\n\n\n\n<p>My 27 years in the company I work for, only required compilations, so within the<\/p>\n\n\n\n<p>office, we passed the answers to the annual cybersecurity training, we even completed<\/p>\n\n\n\n<p>it for personnel not present. All the company and manager cared is that we all met the<\/p>\n\n\n\n<p>deadline to be able to brief higher up that we were good on training. Going thru the<\/p>\n\n\n\n<p>courses i have learned and value more what back in the day was just consider a simple<\/p>\n\n\n\n<p>task with no importance, but as we move forward, and we learn more and more about<\/p>\n\n\n\n<p>the risk of cyber threats, and on how devastating they can be to a person or company, it<\/p>\n\n\n\n<p>need to be a more rigid way to make people understand the risk so that they can be<\/p>\n\n\n\n<p>capable to report and mitigate the risk associated with cybersecurity threats.<\/p>\n\n\n\n<p>In conclusion, any field related to cybersecurity like this one, relies heavily in the<\/p>\n\n\n\n<p>social science research and social science principles because it involves people, at the<\/p>\n\n\n\n<p>end of every key board, regardless of what they are doing there is a human person at<\/p>\n\n\n\n<p>the end, this is an evolving field, and my believe is that it will never stop growing, there<\/p>\n\n\n\n<p>will always be a new innovation, a new hack so they will always be something new to<\/p>\n\n\n\n<p>learn. Understanding the human mind is the next frontier, to understand human<\/p>\n\n\n\n<p>behaviors on the why of things. One thing for sure is that we will always be connected to<\/p>\n\n\n\n<p>the web, so we need to understand the human connection to the love of technology.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>References:<\/strong><\/p>\n\n\n\n<p>Khando, K., Gao, S., Islam, S. M., &amp; Salman, A. (2021, April 16). <em>Enhancing employees<\/em><\/p>\n\n\n\n<p><em>information security awareness in private and public organisations: A systematic<\/em><\/p>\n\n\n\n<p><em>literature review<\/em>. Computers &amp; Security.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404821000912\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404821000912<\/a><\/p>\n\n\n\n<p>Pr\u00fcmmer, J., Steen, T. V., &amp; Berg, B. V. D. (2023, November 9). <em>A systematic review of<\/em><\/p>\n\n\n\n<p><em>current cybersecurity training methods<\/em>. Computers &amp; Security.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404823004959\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404823004959<\/a><\/p>\n\n\n\n<p>Ready, M., &amp; Ok, E. (2024, January 13). <em>(PDF) cyber security awareness<\/em><\/p>\n\n\n\n<p><em>training:strategies for educating employees on Cyber Threats and Safe Practices<\/em>.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/388508669_Cyber_Security_Awareness_Train\">https:\/\/www.researchgate.net\/publication\/388508669_Cyber_Security_Awareness_Train<\/a><\/p>\n\n\n\n<p>ingStrategies_for_educating_employees_on_cyber_threats_and_safe_practices<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Generally speaking, a job in cybersecurity requires an interdisciplinary set of technical abilities, intellectually challenging domains, and research-focused subject disciplines. It is a job that is significant to securing the social and technological domains of human life; security awareness trainers rely extensively on social science research and ideas. Understanding human motivations, decision-making processes, and the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/career-paper-security-awareness-trainer\/\">Read More<\/a><\/div>\n","protected":false},"author":30571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/363"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/users\/30571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/363\/revisions"}],"predecessor-version":[{"id":364,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/363\/revisions\/364"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/media?parent=363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/categories?post=363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/tags?post=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}