4 questions security experts ask about cybersecurity training 

  • Photo of Ethena Team
    Ethena Team

SOC II. Attack vectors. Bad actors. Phishing attempts. Cybersecurity can be more complicated than the latest multi-player fantasy adventure game. And, knowing what questions to ask to find the right data privacy training for your team can be more difficult than defeating a Level 20 Spellcaster. 

So we asked Matt Dean — our VP of Engineering, resident IT expert, and sword-wielding security sorcerer — what questions he would ask about any cybersecurity course he was considering. 

Matt Dean, VP of Engineering, Ethena

Will this course fit with my organization’s specific security policies?

Look for a course that's designed to teach best practices while also leaving room for policies and procedures specific to an organization

For example, while many organizations choose to use corporate password managers, it's important that training also discusses password best practices for even tighter security. 

Does this course emphasize realistic breach methods and attack vectors over-complicated technical jargon?

While learners will need to absorb a broad range of cybersecurity best practices, those same employees also need guidance on day-to-day cybersecurity risks.

A course that focuses on the ways individual employees can be more aware and vigilant against risks like social engineering, phishing, and malware will teach folks how to avoid leaving the door open to bad actors.

Does this course address everything I need to maintain SOC II compliance or other similar frameworks?

While there is no official required list of topics that organizations must cover in their security training in order to maintain SOC II compliance, companies that deal with sensitive information and customer data will want to train their teams to maintain a high level of information security.

You can think of it like taking an Honors course in data protection! 

How will this course prepare our teams for phishing attacks?

We've all seen more than our fair share of phishing fails, so getting teams some firsthand experience in identifying suspicious emails is key. Including a phishing simulator alongside comprehensive training will help equip teams to prevent future attacks from being successful. 

Find the training you seek... 

In case you're wondering where you can find training that does all of the above and more, we just launched our Cybersecurity Awareness course — with an integrated phishing simulator coming very soon!

Take a quick look at one of our sample microlessons from the course (simply use the link above and scroll slightly down the page) or schedule a demo with our adventurous sales team to see all the ways Ethena can prepare your organization for every potential attack! No swords necessary.

Let's build a better workplace together. Button: Let's Talk

Articles

View All

The Ethics Edit: A 5-Day Year-End Refresh

Small steps to reflect, recognize, and reset during Corporate Compliance & Ethics Week It's Corporate Compliance & Ethics Week, the perfect moment to take stock of what worked, where you’ve...

4 min read

7 ways to get your employees to actually take (and enjoy) their required training

Effective compliance training isn't just about checking a regulatory box—it’s a foundational tool for building a successful, ethical business. When companies invest in educating employees on policies, legal expectations, and...

4 min read

Why One-Size-Fits-All Compliance Training Fails

Compliance training is mandatory, but it doesn’t have to be generic. Too many organizations still rely on one-size-fits-all courses. This approach checks the compliance box but overlooks learning. With new...

2 min read

Training Fatigue — How to Spot It Before It Hurts Compliance

Even well-intentioned training can backfire when employees are overloaded. Compliance training fatigue happens when employees receive too many courses, too often — especially when the content feels repetitive or irrelevant....

3 min read