Welcome!

News Feed Item

Omnicom Media Group Selects Security Mentor® To Deliver Employee Security Awareness Training

RSA Conference USA 2014 Booth #532, Tuesday February 25, 2014, Security Mentor, pioneer of security awareness training employees love to take, today announced that Omnicom Media Group, the media services division of Omnicom Group Inc. (NYSE: OMC), has licensed and will deploy Security Mentor online security awareness training for its 10,000 employees.

The Security Mentor security awareness training program enables companies in every industry to reduce risk by creating a more secure workforce. Employees are given critical security information that leads to fundamental behavior changes and significantly reduces risk to commercial and government organizations.

The need for security awareness training for today’s organizations has never been greater. “Five years ago you had a defined perimeter with more control of your data. With the advent of mobile computing i.e. smartphones, tablets, etc., one can't guarantee where the data will rest,” said Dan Reynolds, VP Chief of Security and Information Architecture for Omnicom Media Group. “Today, your employees are the perimeter. If we are not educating our employees about security, then we are not protecting our business.”

Prior to selecting Security Mentor, Omnicom Media Group had been conducting employee security awareness training using its own “home-baked” program. “Yet when we saw a demo of Security Mentor CORE, we immediately liked the training's rich security content, user-friendly interface and ability to measure training penetration for our employees. This reporting ability is key -- I can easily see who has taken the training and where more follow-up is needed,” said Mr. Reynolds.

“Over the last year, we have seen a significant increase in demand for our employee training as organizations realize technology alone is not enough to protect confidential data. Our customers tell us that employees not only enjoy the training, but that it has a played a significant role in changing employee behavior to reduce risk to their organization,” said Marie White, CEO of Security Mentor. “We are very pleased that Omnicom Media Group has chosen Security Mentor security awareness training to be part of its defense-in-depth security strategy.”

In addition to providing the necessary security awareness training, Security Mentor also will help the Omnicom Media Group meet employee compliance of its security policies. Security Mentor’s new Policy Management service will host Omnicom Media Group’s security policy documentation and provide reporting on employee viewing and acknowledgment of policies. While this new feature will first be used by Omnicom Media Group, Security Mentor will offer this capability to other customers soon thereafter.

About Security Mentor Security Awareness Training

Security Mentor CORE trains employees on 12 important security topics including Phishing, Office Security, Mobile Security, and Information Protection. Brief, interactive lessons give employees critical security information in an easy-to-understand format. The lessons, written by certified information security professionals, can be customized and branded for any organization.

Simple to administer, organizations can take Security Mentor training as a service from Security Mentor's website with username/password authentication or federated Single Sign-on (SSO), or as SCORM-compliant lessons hosted on an organization’s internal, corporate LMS (Learning Management System). The LMS tracks trainee progress and completion, and provides training status reports.

Security Mentor is demonstrating its security awareness training this week at the RSA Conference USA 2014 at Booth #532.

About Security Mentor

Security Mentor, Inc., pioneer of security awareness training that employees love to take, enables companies in every industry to reduce risk by creating a more secure workforce. Interactive, highly engaging lessons teach critical security skills in an easy-to-understand, fun format. Our Brief, Frequent, Focused™ training model of 10-minute lessons delivered monthly fits employees’ busy schedules and keeps security top of mind. Training is served from Security Mentor’s Cloud LMS or provided as SCORM-compliant modules. Founded in 2008, Security Mentor has customers ranging from Fortune 500 enterprises to local and state governments, including the State of Michigan. To learn more, take a look at our two-minute introductory video or request a demo at www.securitymentor.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...