<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Caroline Boyer, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/caroline-boyer/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/caroline-boyer/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 06 Nov 2024 22:09:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Caroline Boyer, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/caroline-boyer/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to activate gamification for an impactful Cyber Month</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/#respond</comments>
		
		<dc:creator><![CDATA[Caroline Boyer]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 15:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[gamification]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=21390</guid>

					<description><![CDATA[<p>Cyber Month is to cybersecurity awareness what the Olympics are to sports: the time to shine, with all eyes on you. Given that human-risk remains significant, with human error accounting for 82% of data breaches according to the 2022 Verizon...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/">How to activate gamification for an impactful Cyber Month</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Cyber Month is to cybersecurity awareness what the Olympics are to sports: the time to shine, with all eyes on you.</p>
<p style="text-align: justify;">Given that human-risk remains significant, with human error accounting for 82% of data breaches according to the <a href="https://www.verizon.com/business/resources/T1ed/reports/dbir/2022-data-breach-investigations-report-dbir.pdf">2022 Verizon Data Breach Investigations Report</a>, no wonder CISOs across European organizations are aiming for the most innovative and ground-breaking activities during this crucial time of the year.</p>
<p style="text-align: justify;">Once key risks have been identified, it&#8217;s go-time: spread priority secure behaviors throughout your organization using the ultimate medium: gamification.</p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>Fail to play, fail the Cyber Month game</strong></h2>
<p style="text-align: justify;">From football matches to Monopoly fights, there is a game for everyone, and whichever your preference goes to, the chosen one will always elicit enthusiasm.</p>
<p style="text-align: justify;">It is then only logical that when meeting an opportunity to learn secure behaviors, employees will favor a game rather than an e-learning that they will have to &#8211; let&#8217;s face it &#8211; painfully sit through.</p>
<p style="text-align: justify;">Gamification is a winner, and although there are many reasons behind this fact, we have selected seven striking pieces of rationale that will shed a light on the benefits that gamification presents in a learning environment.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Gamification increases engagement dramatically</strong></span></h6>
<p style="text-align: justify;">To feel involved in an activity, and therefore reach the holy grail component of attention, <strong>interactivity</strong> is key.</p>
<p style="text-align: justify;">Games require action from the participant, which transforms the latter into a moving cog of their own learning process.</p>
<p style="text-align: justify;">Additionally, the element of <strong>competition</strong>, whether between teams or against a fictitious villain, present in games serves as a powerful motivator, further promoting engagement.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Practice beats theory in a learning context</strong></span></h6>
<p style="text-align: justify;">Practice accounts for <strong>70% of the learning process</strong>. Why so? Because practice allows to make the materials tangible and embed them into real-life situations, that employees can directly link to their everyday practices.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Feedback and rewards stimulate positive behaviors</strong></span></h6>
<p style="text-align: justify;">Games imply prizes and rewards to be earned. Not only does it contribute to foster motivation, but it also allows employees to access <strong>direct positive feedback</strong> about their actions and decisions, which comes with a sense of accomplishment and progress, further embedding the targeted secure behavior.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Games revamp the image of your cyber team</strong></span></h6>
<p style="text-align: justify;">Cyberawareness games have the power to shift the perception that staff hold of your cyber team. Indeed, cybersecurity may seem like an obscure and complex area for many employees.</p>
<p style="text-align: justify;">Offering games helps to make security concepts more<strong> tangible, accessible, and applicable into everyday life</strong>.</p>
<p style="text-align: justify;">Further, if they are held in-person, they allow your cyber team to gain <strong>visibility</strong> with end-users and bring a sense of <strong>recognition and trust</strong>, which in turn will boost the impact of future awareness actions.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Learning together increases team cohesion</strong></span></h6>
<p style="text-align: justify;">As if learning more effectively wasn&#8217;t enough, gamification also offers the valuable benefit of boosting <strong>team spirit</strong>.</p>
<p style="text-align: justify;">Many awareness games provide the opportunity to work collaboratively to attain success. This way, employees leave with fond memories and appreciation on top of precious security tips.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Games allow repetition of security messages in novel and fun ways</strong></span></h6>
<p style="text-align: justify;">When aiming to embed secure behaviors across an organization, repetition is crucial to ensure integration and implementation.</p>
<p style="text-align: justify;">However, repeating awareness communications through the same channels may decrease the attention that employees pay to them.</p>
<p style="text-align: justify;">Games constitute an innovative and enjoyable experience to<strong> reinforce security messages</strong>, making them <strong>stick over time</strong>.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Bonus: You collect valuable feedback and inputs from end-users</strong></span></h6>
<p style="text-align: justify;">By interacting with staff through awareness games, your cyber team gets the unique opportunity to collect information on the most urgent security questions that employees ask themselves and uncover which are their biggest challenges in terms of security in their daily activities. This feedback is then useful to <strong>prioritise future awareness messages</strong> and <strong>review or implement processes to facilitate employees&#8217; work life</strong>. For example, if staff repeatedly bring up the fact that they may see suspicious-looking emails but don&#8217;t know how to report them, this may lead to a special awareness campaign meant to remind employees of the way to report phishing emails, and the implementation of a phishing report button to facilitate the reporting process.</p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>L</strong><strong>everaging gamification: The musts for organizing successful awareness games</strong></h2>
<p style="text-align: justify;">Prior to establishing the success factors of an awareness game, let&#8217;s pinpoint what makes a fruitful one.</p>
<p style="text-align: justify;">In order to prove truly effective, an awareness game should see its participants leave the activity with a clear idea of the security behaviors that they will change in their own office life.</p>
<p style="text-align: justify;">To achieve this goal, we have identified a set of <strong>five key criteria</strong>:</p>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-21392 " src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification.png" alt="" width="492" height="350" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification.png 2144w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-269x191.png 269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-768x546.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-1536x1091.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-2048x1455.png 2048w" sizes="(max-width: 492px) 100vw, 492px" /></p>
<p style="text-align: justify;">A solid game will cover a<strong> priority awareness topic</strong>, based on the risks identified for the organization and ranked accordingly.</p>
<p style="text-align: justify;">Then, the right <strong>level of complexity</strong> must be found, based on the level of knowledge of your staff.</p>
<p style="text-align: justify;">Staff who already have a high level of maturity in terms of security behaviors will &#8211; at best &#8211; not learn anything new during an easy game, and &#8211; at worst &#8211; be bored or resentful towards the security awareness team for taking away some of their working time to cover elements they already know.</p>
<p style="text-align: justify;">The reverse scenario would also be problematic: confronting beginner staff with a difficult game would only leave them confused.</p>
<p style="text-align: justify;">Having an<strong> understanding of the level of security maturity of your target audience</strong> is therefore key to adapt the game for optimal results.</p>
<p style="text-align: justify;">Thirdly, the game must have at its center a <strong>compelling story</strong>. The scenario must be intriguing and should unfold seamlessly. Additionally, it should be adapted to the context of the organization so participants relate to the events happening in the game.</p>
<p style="text-align: justify;">To truly catch, and most importantly, retain employees&#8217; attention, the game will have a <strong>strong focus on interactivity</strong>. Interactions can happen between the game master(s) and the players, but also between players themselves when collaborating in the context of the activity.</p>
<p style="text-align: justify;">To further exploit this concept, the game may stimulate the 5 senses to render it even more engaging and immersive.</p>
<p style="text-align: justify;">The final key element to an effective game resides in providing a<strong> good incentive</strong>. Again, there are multiple ways to achieve this: you can for example establish a scoring system to foster playful competition between teams, and implement rewards. Rewards may come in the form of goodies, prizes such as individual or team experiences, or even donations to the charitable organization of the participants&#8217; choice. A solid incentive will boost voluntary participation to the activity, and a decision to participate that comes from the genuine willingness of staff will also be synonymous with higher motivation and involvement in the game for better retention of the shared secure behaviors.</p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>Which awareness game is made for you?</strong></h2>
<p style="text-align: justify;">To make your Cyber Month gamification dreams come true, let&#8217;s jump from theory to practice!</p>
<p style="text-align: justify;">Take the quiz below to find out which cyberawareness game is tailored to your needs and objectives for <strong>maximal impact</strong>.</p>
<p style="text-align: justify;"><a href="https://take.quiz-maker.com/QCMG79JZ3" data-quiz="QCMG79JZ3" data-type="4">Loading&#8230;</a><script>(function(i,s,o,g,r,a,m){var ql=document.querySelectorAll('A[quiz],DIV[quiz],A[data-quiz],DIV[data-quiz]'); if(ql){if(ql.length){for(var k=0;k<ql.length;k++){ql[k].id='quiz-embed-'+k;ql[k].href="javascript:var i=document.getElementById('quiz-embed-"+k+"');try{qz.startQuiz(i)}catch(e){i.start=1;i.style.cursor='wait';i.style.opacity='0.5'};void(0);"}}};i['QP']=r;i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)})(window,document,'script','https://take.quiz-maker.com/3012/CDN/quiz-embed-v1.js','qp');</script></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/">How to activate gamification for an impactful Cyber Month</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cracking the recipe: making employees hungry for more cyber awareness activities</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/#respond</comments>
		
		<dc:creator><![CDATA[Caroline Boyer]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[EscapeGame]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19509</guid>

					<description><![CDATA[<p>Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?  In a never-ending quest to find innovative ways to raise awareness on cybersecurity topics, the Wavestone team...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/">Cracking the recipe: making employees hungry for more cyber awareness activities</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="reader-text-block__paragraph" style="text-align: justify;">Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity? </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">In a never-ending quest to find innovative ways to raise awareness on cybersecurity topics, the Wavestone team might have very well unearthed the new golden nugget.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Tested and approved by hundreds of our clients&#8217; employees, <strong>read on to find out the secret recipe that makes cybersecurity best practices so easy to digest. </strong></p>
<p><img decoding="async" class="aligncenter wp-image-24559 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1.png" alt="Cyber escape game as a secret recipe for maximizing awareness-raising efforts" width="1002" height="318" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1.png 1002w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1-768x244.png 768w" sizes="(max-width: 1002px) 100vw, 1002px" /></p>
<div class="reader-image-block reader-image-block--full-width" style="text-align: justify;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </div>
<div> </div>
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "><span style="font-size: revert; color: initial;">The concept, inspired by a beloved leisure activity, is </span><strong style="font-size: revert; color: initial;">simple, yet mightily potent. </strong></div>
</div>
</figure>
</div>
<p class="reader-text-block__paragraph" style="text-align: justify;">Employees are assembled into teams of four or five participants. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">The mission starts with a 10-minute briefing where they receive a lightning-fast training to become agents, and step into the shoes of hackers to perform their mission &#8211; should they accept it. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">They are then given 15 minutes to uncover as many confidential documents as they will find in their fictional target&#8217;s office. The game elaborately weaves in clues of varying difficulty level related to key security topics, including <strong>passwords, physical security, and social engineering</strong> to name a few. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Finally, participants come out of their adventure eyes bright and laughing, enthusiastic to move on to a 15-minute debriefing, where best cybersecurity practices are explained. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">In the end, <strong>the activity mobilizes employees for a mere 40 minutes, which pass by in a flash, and leaves them motivated to implement concrete actions to protect their organization</strong>.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-24561" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2.png" alt="What sets the cyber game apart?" width="966" height="325" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2.png 966w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2-437x147.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2-768x258.png 768w" sizes="(max-width: 966px) 100vw, 966px" /></p>
<div class="reader-image-block reader-image-block--full-width" style="text-align: justify;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<h2 class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </h2>
</div>
</figure>
</div>
<h2 class="reader-text-block__heading2" style="text-align: justify;">Gamification never disappoints  </h2>
<p class="reader-text-block__paragraph" style="text-align: justify;">Quite a few years might have passed since you and the members of your organization ran around your school&#8217;s playground, but one thing remains the same: <strong>games are still a unanimously popular way to learn. </strong></p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Through gamification, <strong>people become actors, instead of spectators</strong>, of the learning process and embody the principles that you aim to instill in them. Keeping in mind that <strong>practice makes up 70% of the learning process</strong>, that is an opportunity that is hard to pass by.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">When adopting an active posture, participants get immersed in the activity, and they do not even realize that they are <strong>acquiring precious skills that will serve them and their organization&#8217;s security well for years to come. </strong></p>
<h2 class="reader-text-block__heading2" style="text-align: justify;">Spice it up with competition </h2>
<p class="reader-text-block__paragraph" style="text-align: justify;">What do football, chess, and Monopoly have in common? Besides the fact that they are all games, they also include an element of competition. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">In the context of a challenge, <strong>competition acts as a strong motivator and a driver to perform</strong>. Add a fun and safe environment to the mix, and you have yourself a perfect combination to tremendously boost engagement. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Our cyber escape game includes a <strong>smart scoring system</strong>, so teams feel driven to reach the highest score, and you can gather information on overall performance. That&#8217;s what we call a win-win. </p>
<figure id="attachment_19496" aria-describedby="caption-attachment-19496" style="width: 872px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-19496" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1.png" alt="Example of scoring sheet for the cybersecurity escape game" width="872" height="637" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1.png 872w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1-261x191.png 261w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1-53x39.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1-768x561.png 768w" sizes="auto, (max-width: 872px) 100vw, 872px" /><figcaption id="caption-attachment-19496" class="wp-caption-text"><em>Example of scoring sheet</em></figcaption></figure>
<div class="reader-image-block reader-image-block--resize" style="text-align: center;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </div>
</div>
<figcaption class="display-block mt2 full-width text-body-small-open t-sans text-align-center t-black--light"></figcaption>
</figure>
</div>
<h2 class="reader-text-block__heading2" style="text-align: justify;">The more the merrier </h2>
<p class="reader-text-block__paragraph" style="text-align: justify;">When faced with a puzzle to solve, who would be against a little bit of help? </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Indeed, completing an exercise on one&#8217;s own can be daunting, if not just plain lonely.  </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">As part of a cyber escape game, people are encouraged to collaborate to solve clues. <strong>Teamwork then makes the challenge even more fun</strong> as creative ideas to break codes burst and are implemented, rendering their success all the more rewarding. </p>
<figure id="attachment_19498" aria-describedby="caption-attachment-19498" style="width: 1024px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-19498" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2.jpg" alt="Briefing session in Krakow" width="1024" height="768" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2.jpg 1024w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2-255x191.jpg 255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2-52x39.jpg 52w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2-768x576.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2-600x450.jpg 600w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-19498" class="wp-caption-text"><em>Briefing before the escape game</em></figcaption></figure>
<div class="reader-image-block reader-image-block--resize" style="text-align: center;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </div>
</div>
<figcaption class="display-block mt2 full-width text-body-small-open t-sans text-align-center t-black--light"></figcaption>
</figure>
</div>
<h2 class="reader-text-block__heading2" style="text-align: justify;">Bring the human touch to learning experiences </h2>
<p class="reader-text-block__paragraph" style="text-align: justify;">To complement online training initiatives, providing staff with a way to <strong>engage in-person with cybersecurity experts</strong> allows to go the extra mile in accompanying them on their learning journey. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Indeed, this format promotes live discussions and gives people the opportunity to receive personalized answers to their specific questions related to security.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">The result? Employees coming out of the activity with <strong>advice that precisely solves their pain points</strong>. </p>
<figure id="attachment_19500" aria-describedby="caption-attachment-19500" style="width: 1395px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-19500" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3.png" alt="Positive feedback from the cybersecurity escape game" width="1395" height="919" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3.png 1395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3-290x191.png 290w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3-59x39.png 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3-768x506.png 768w" sizes="auto, (max-width: 1395px) 100vw, 1395px" /><figcaption id="caption-attachment-19500" class="wp-caption-text"><em>Feedback from participants of our latest session</em></figcaption></figure>
<div class="reader-image-block reader-image-block--resize" style="text-align: center;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </div>
</div>
<figcaption class="display-block mt2 full-width text-body-small-open t-sans text-align-center t-black--light"><em><br /><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24563" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3.png" alt="Make it happen" width="1004" height="320" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3.png 1004w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3-768x245.png 768w" sizes="auto, (max-width: 1004px) 100vw, 1004px" /></em></figcaption>
</figure>
</div>
<p class="reader-text-block__paragraph" style="text-align: justify;">Not only is the format of the cyber escape game particularly appreciated by employees, it also presents multiple advantages for your organization in terms of implementation. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Take it from the Wavestone team !</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Over the course of the month of October 2022, <a href="https://www.linkedin.com/company/wavestone/" data-entity-hovercard-id="urn:li:fs_miniCompany:10133" data-entity-type="MINI_COMPANY">Wavestone</a> Belgium carried out +100 cyber escape games sessions with +400 players across 6 countries.  </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">As training sessions last 40 minutes each,<strong> up to 45 collaborators can be trained in one day</strong>, maximizing time-efficiency. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Further, <strong>customization </strong>is at the core of our approach, with a debriefing that exposes concrete ways to <strong>apply the best security practices that are most crucial to your organization</strong>.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Although we could keep on enumerating the benefits that a cyber escape game can bring to an entity&#8217;s security, a game is still worth a thousand words.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Curious to understand how the cyber escape game leaves employees asking for another serving of awareness activities? <strong>Get in touch with our expert </strong><a href="https://www.linkedin.com/in/thomasvodinh?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAABXDa2gB3uuIfNKDhMbmEedA2haY2hHz1UA" data-entity-hovercard-id="urn:li:fs_miniProfile:ACoAABXDa2gB3uuIfNKDhMbmEedA2haY2hHz1UA" data-entity-type="MINI_PROFILE">Thomas Vo Dinh</a><strong> to organize a free session.</strong></p>
<p class="reader-text-block__paragraph" style="text-align: justify;">See you on the other side, agent <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/">Cracking the recipe: making employees hungry for more cyber awareness activities</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
