{"id":25538,"date":"2025-03-14T08:00:01","date_gmt":"2025-03-14T07:00:01","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=25538"},"modified":"2025-03-14T08:00:03","modified_gmt":"2025-03-14T07:00:03","slug":"are-you-ready-to-tamam-your-cybersecurity-awareness","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/","title":{"rendered":"Are you ready to TAMAM your cybersecurity awareness?"},"content":{"rendered":"\n<p style=\"text-align: justify;\"><em>This article was originally published on our corporate website <a href=\"https:\/\/www.wavestone.com\/en\/\">wavestone.com<\/a> on 26 January 2023.<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Cybersecurity awareness is a journey to embed secure behaviours in people&#8217;s daily lives<\/h2>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">To do so, you need to build\u00a0<strong>a strong cyberawareness program<\/strong>, focus on your key cybersecurity themes, that engages your people and respects their uniqueness, with practical positive actions and diverse activities. In other words, a program that meets your ambitions and aims:<\/p>\n<ul style=\"text-align: justify;\">\n<li>An\u00a0<strong>effective behavioural change<\/strong><\/li>\n<li>The development of a<strong>\u00a0security culture<\/strong>\u00a0in your organization<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">We developed our\u00a0<strong>TAMAM framework<\/strong>\u00a0to formalize our strong beliefs about how best to build a cyberawareness framework.<\/p>\n<p style=\"text-align: justify;\"><strong>TARGET<\/strong>: set concrete and measurable objectives<\/p>\n<p style=\"text-align: justify;\"><strong>AUDIENCE<\/strong>: adapt the approach according to the people concerned<\/p>\n<p style=\"text-align: justify;\"><strong>MESSAGE<\/strong>: choose a concise, positive message that calls for action<\/p>\n<p style=\"text-align: justify;\"><strong>ACTIONS<\/strong>: set up effective, concrete and various actions<\/p>\n<p style=\"text-align: justify;\"><strong>MEASURES<\/strong>: evaluate the program&#8217;s impact on behaviour<\/p>\n<p style=\"text-align: justify;\">This article explains the principles, the stakes and the role that TAMAM has to play to support you!<\/p>\n<p style=\"text-align: justify;\">But first, let\u2019s put some contextual elements about cybersecurity awareness\u2026<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Why do they keep clicking on these phishing emails?!<\/h2>\n<p>\u00a0<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Our journey doing cybersecurity awareness started more than 15 years ago.<\/strong>\u00a0And things looked quite different back then. It was the time of the new awareness programs, led by newly appointed cybersecurity managers, with little means and yet a key objective to tell people what they must do to protect the information systems. Nothing more, nothing less. It was the time of the Top 10 best practices; the Do\u2019s and Don\u2019ts; the mass training sessions; etc.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Once said, these messages were considered to be common knowledge and applied by everyone; and just like that<strong>\u00a0awareness was deprioritized<\/strong>\u00a0and no longer a priority for the cybersecurity managers. It was the rough time of insufficiency and budget cuts.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Then came the\u00a0<strong>rising number of cyberattacks and the GDPR<\/strong>. With new risks came new appetite for awareness and education of users. Cybersecurity awareness was back in the agenda, yet with variable means and interests. Over the years it remained part of the cybersecurity topics but with great variability between the organizations when it came to effectiveness and efficiency.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>And here we are now: at the beginning of the year 2023 and the same questions remain: \u201cI\u2019ve tried everything but there are still some people who do not perceive the risks\u2013 what can I do?\u201d; \u201cI need to keep my people interested in the topic, what new things can you propose?\u201d. Basically, what we notice is simply a\u00a0<strong>lack of consideration of the effectiveness of the program<\/strong>: they seemed to be reaching a glass ceiling. Efforts were put, investments were made, but little change happened. That triggered our attention and led us to discussions and research until we finally came to the evidence: efforts and investment are vain if they don\u2019t aim at\u00a0<strong>effectively changing behaviours<\/strong>\u00a0and ultimately\u00a0<strong>establishing a culture of cybersecurity<\/strong>. But how do you do that? That\u2019s the focus of this article.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Are you getting everyone on board with cybersecurity?<\/h2>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Based on these observations of the past years of cyberawareness, we developed\u00a0<strong>a framework to build an effective cybersecurity awareness program<\/strong>. We wanted this model to be customizable so that it could be applied to every organization regardless of its size, maturity, budget, or current culture. Not a one-size-fits-all, but a backbone to be adapted to every organization.<\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Target<\/h3>\n<p style=\"text-align: justify;\">Just like with everything, you have to start with the \u201cwhy\u201d. This serves to define the\u00a0<strong>objectives<\/strong>: a target to reach,\u00a0<a href=\"https:\/\/www.linkedin.com\/pulse\/shall-we-start-your-secure-behaviours-corentin-decock\/\">a vision of where to go and a path to reach that place<\/a>.<\/p>\n<p style=\"text-align: justify;\">These objectives must be targeted to your priority battles, i.e., what change you want to see in your organization,\u00a0<strong>precise behaviours that you expect from your people<\/strong>. They do not just represent good intentions \u2013 like \u201craising awareness among my employees\u201d \u2013 but precise behaviours that you want to see every day. For instance, if phishing is one of your primary concerns, and it sure is: \u201cHow to educate my employees to report phishing attempts and incidents?\u201d. Like this you see your target and the way to reach it.<\/p>\n<p style=\"text-align: justify;\">Precise objectives also enable\u00a0<strong>measurable results<\/strong>. When you define them, you also define the KPIs and metrics that you will use to assess their success. As a rule of thumb: if you are unable to find a measure for your objective, that means it\u2019s more illusional than achievable.<\/p>\n<p style=\"text-align: justify;\">Finally, you share these with your employees. Isn\u2019t it plain fairness that to tell your people from the beginning what you expect from them? This way, you make them actively engaged in the change of behaviour that you expect from them. By giving them the rules of the game, you enable them to play by these rules and to win the game with you, because\u00a0<strong>cybersecurity is a collective win<\/strong>.<\/p>\n<p style=\"text-align: justify;\">This first step is largely overviewed, and few are the organizations that take the necessary time to reflect on their true target when it comes to cyberawareness. However, it is the essential starting point of our journey. Just like with any journey: we can only reach a friend\u2019s house if know their address.<\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Audience<\/h3>\n<p style=\"text-align: justify;\">And who do you want to reach exactly? That is your audience, your population, your\u00a0<strong>people that need awareness, training, and education<\/strong>. A clear identification of these specific audiences will help you define an approach that is meant to reach them. To know these needs you will need to start by differentiating people in clusters \u2013 mostly based on their positions in the organization, their closeness to the topic, their expositions to the risks you want to prevent, their role figures, etc. These clusters can gather newcomers, external staff, local ambassadors, IT staff, etc.<\/p>\n<p style=\"text-align: justify;\">For each of these populations, you will want to\u00a0<strong>assess their current level of mastery<\/strong>\u00a0of the different targets defined. That is basically performing a skills gap to know what topics requires more attention for each population. This information will be essential to customize the program to the needs of these populations (because you understand what they do in life) and their current level of mastery (which you have assessed precisely).<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Message<\/h3>\n<p style=\"text-align: justify;\">Off we go now with the messages you want to communicate to these people to reach these objectives; the moment where you find this catchy phrase that will be repeated oftentimes. The people with whom you will be communicating also receive numerous other communications for numerous other causes (name it: CSR, compliance, values, etc.). Hence the importance to select your messages wisely and to stay concise. The time and attention available are limited, this is why you will prefer to select\u00a0<strong>a few messages that address key risks and meaningful objectives<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Eventually, the tone used to communicate these messages is crucial as it must be adapted to the organizational culture: funny messages work in some environment while serious ones work better in others. Regardless of the tone used, the\u00a0<strong>messages will need to be positive and call for action<\/strong>. Drop out the negative injunctions (\u201cdon\u2019t\u201d) and embrace the positive actions (\u201cact\u201d).<\/p>\n<p style=\"text-align: justify;\">With these first three steps in mind (Target, Audience and Message), you build up the framing of your cyberawareness program: you know what you want to tell, to whom, in order to reach the expected behaviours.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Actions<\/h3>\n<p style=\"text-align: justify;\">Now that you have tailored your messages for your specific audiences to reach the defined objectives, time has come to identify the actions that you will implement in this framing. Although you now open the catalogue of action, you must be focus and pragmatic. The principle when doing so is to think of the\u00a0<strong>effectiveness of the chosen action in your journey to reach your objectives<\/strong>.\u00a0<a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/01\/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities\/\">Creativity and innovation<\/a>\u00a0are surely important to keep people motivated but is not the sole success factor. You want to make cybersecurity practical for people, to bring the topic closer to their life and to involve them in their learning (e.g., practical activities, application of the behaviour expected, etc.) on top of a more theoretical top-down approach.<\/p>\n<p style=\"text-align: justify;\"><strong>The way you implement these activities<\/strong>\u00a0is also an essential success factor, with the right resources, people and planning to enforce the selected messages:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Who is the bearer of these messages? Internal or external?<\/li>\n<li>How to repeat them in different ways (as different people will respond to different stimuli that can be practical, visual, spoken, etc.)<\/li>\n<li>From what angles and with what activities should these issues be addressed in order to raise awareness among employees in the most appropriate way?<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">With few selected messages, you build different activities, at different moments, with different approaches, to embed these behaviours in your audiences\u2019 daily lives.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Measures<\/h3>\n<p style=\"text-align: justify;\">Finally,\u00a0<strong>this whole program needs to be evaluated<\/strong>\u00a0in order to say if it actually allows to change behaviours \u2013 for the management that will ask to see the value delivered for its investment, or for the awareness team that will want to show tangible results from its efforts.<\/p>\n<p style=\"text-align: justify;\">In your quest to raise awareness,\u00a0<strong>you must focus on the effectiveness of what you implement<\/strong>, beyond the implementation itself. All too frequently, organizations focus on numbers of activities or people addressed. But these figures seldom provide a real understanding of the change of behaviours happening.<\/p>\n<p style=\"text-align: justify;\">When building your evaluation plan, you need to include quantitative measures and qualitative feedback to obtain a comprehensive understanding of the achievement of your objectives. Perhaps this will require new ways to gather this information \u2013 like getting the helpdesk involved, or even obtaining fresh data from the SOC \u2013 but the outcome will bring terrific value to your program as it will allow you to review it and keep it continuously adapted to your objectives; which can also be subject to adaptations if the organizational context changes.<\/p>\n<p style=\"text-align: justify;\">Oh, and don\u2019t forget one last thing if you want to create a positive trend in awareness: communicate your achievements and celebrate the victories with everyone. You deserve it.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-25545\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image1ENG.png\" alt=\"TAMAM methodology relies on the following pillars: Target, Audience, Message, Actions and Measures\" width=\"945\" height=\"630\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image1ENG.png 945w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image1ENG-287x191.png 287w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image1ENG-59x39.png 59w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image1ENG-768x512.png 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/p>\n<p style=\"text-align: justify;\">Take the first letter of these 5 principles and you obtain TAMAM. It is no coincidence if the world translates into \u201call right\u201d in Turkish; this is what you want from your people: an adherence to your objectives and an agreement to onboard your journey to more secure behaviours.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Where to start?<\/h2>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Now that you have a better understanding of the iterative journey to build a strong awareness program, you must find yourself in the middle on a strong questioning: where do I stand in that and how do I lean more towards what you\u2019ve just said?<\/p>\n<p style=\"text-align: justify;\">A first action to take is probably to\u00a0<strong>take a step back to look at your current maturity level in cyberawareness<\/strong>. You will need to have a clear and honest understanding of how your organization addresses this topic in order to define a path towards a greater maturity.<\/p>\n<p style=\"text-align: justify;\">The power of TAMAM resides notably in its ability to be used regardless of your maturity level, because its principles are adaptable and true to different situations.<\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Do you TAMAM?<\/h3>\n<p style=\"text-align: justify;\">When you\u00a0<strong>TAMAM<\/strong>, you:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Visualize a clear and precise target \u2013 behaviours \u2013 that you want to reach<\/li>\n<li>Tailor your approach around the need of your specific clusters of people<\/li>\n<li>Define the few messages you want communicate to your audience on these objectives<\/li>\n<li>Select the best manner to communicate your messages with activities that focus on effectiveness<\/li>\n<li>Monitor and assess this effectiveness to adapt your approach and finetune your whole program<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">This article is only a glimpse of what TAMAM can bring to your cyberawareness program. Contact us for a full understanding of how our framework can help you step up your awareness!<\/p>\n<p><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/contact-us\/\">Contact us<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article was originally published on our corporate website wavestone.com on 26 January 2023. \u00a0 Cybersecurity awareness is a journey to embed secure behaviours in people&#8217;s daily lives \u00a0 To do so, you need to build\u00a0a strong cyberawareness program, focus&#8230;<\/p>\n","protected":false},"author":1368,"featured_media":25530,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,3977],"tags":[3407,2772,4626,2817,3785,3156],"coauthors":[3505,3548],"class_list":["post-25538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-focus","tag-awareness","tag-cybersecurity","tag-cybersecurity-awareness","tag-data-protection","tag-methodology","tag-risk-management-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are you ready to TAMAM your cybersecurity awareness? - RiskInsight<\/title>\n<meta name=\"description\" content=\"To put in place a solid cyber security awareness programme, we have developed the TAMAM methodology: Target, Audience, Message, Actions and Measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are you ready to TAMAM your cybersecurity awareness? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"To put in place a solid cyber security awareness programme, we have developed the TAMAM methodology: Target, Audience, Message, Actions and Measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-14T07:00:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-14T07:00:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"810\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"No\u00ebmie Honor\u00e9, Corentin Decock\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"No\u00ebmie Honor\u00e9, Corentin Decock\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/\"},\"author\":{\"name\":\"No\u00ebmie Honor\u00e9\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/770c3b6033b52b37512a70d681a8440d\"},\"headline\":\"Are you ready to TAMAM your cybersecurity awareness?\",\"datePublished\":\"2025-03-14T07:00:01+00:00\",\"dateModified\":\"2025-03-14T07:00:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/\"},\"wordCount\":1935,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg\",\"keywords\":[\"awareness\",\"cybersecurity\",\"cybersecurity awareness\",\"data protection\",\"methodology\",\"risk management\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/\",\"name\":\"Are you ready to TAMAM your cybersecurity awareness? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg\",\"datePublished\":\"2025-03-14T07:00:01+00:00\",\"dateModified\":\"2025-03-14T07:00:03+00:00\",\"description\":\"To put in place a solid cyber security awareness programme, we have developed the TAMAM methodology: Target, Audience, Message, Actions and Measures.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg\",\"width\":810,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are you ready to TAMAM your cybersecurity awareness?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/770c3b6033b52b37512a70d681a8440d\",\"name\":\"No\u00ebmie Honor\u00e9\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/noemie-honore\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are you ready to TAMAM your cybersecurity awareness? - RiskInsight","description":"To put in place a solid cyber security awareness programme, we have developed the TAMAM methodology: Target, Audience, Message, Actions and Measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/","og_locale":"en_US","og_type":"article","og_title":"Are you ready to TAMAM your cybersecurity awareness? - RiskInsight","og_description":"To put in place a solid cyber security awareness programme, we have developed the TAMAM methodology: Target, Audience, Message, Actions and Measures.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/","og_site_name":"RiskInsight","article_published_time":"2025-03-14T07:00:01+00:00","article_modified_time":"2025-03-14T07:00:03+00:00","og_image":[{"width":810,"height":540,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg","type":"image\/jpeg"}],"author":"No\u00ebmie Honor\u00e9, Corentin Decock","twitter_misc":{"Written by":"No\u00ebmie Honor\u00e9, Corentin Decock","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/"},"author":{"name":"No\u00ebmie Honor\u00e9","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/770c3b6033b52b37512a70d681a8440d"},"headline":"Are you ready to TAMAM your cybersecurity awareness?","datePublished":"2025-03-14T07:00:01+00:00","dateModified":"2025-03-14T07:00:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/"},"wordCount":1935,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg","keywords":["awareness","cybersecurity","cybersecurity awareness","data protection","methodology","risk management"],"articleSection":["Cloud &amp; Next-Gen IT Security","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/","name":"Are you ready to TAMAM your cybersecurity awareness? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg","datePublished":"2025-03-14T07:00:01+00:00","dateModified":"2025-03-14T07:00:03+00:00","description":"To put in place a solid cyber security awareness programme, we have developed the TAMAM methodology: Target, Audience, Message, Actions and Measures.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/03\/Image20.jpg","width":810,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/are-you-ready-to-tamam-your-cybersecurity-awareness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Are you ready to TAMAM your cybersecurity awareness?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/770c3b6033b52b37512a70d681a8440d","name":"No\u00ebmie Honor\u00e9","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/noemie-honore\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/25538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1368"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=25538"}],"version-history":[{"count":15,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/25538\/revisions"}],"predecessor-version":[{"id":25783,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/25538\/revisions\/25783"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/25530"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=25538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=25538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=25538"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=25538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}