Welcome!

News Feed Item

Omnicom Media Group Selects Security Mentor® To Deliver Employee Security Awareness Training

RSA Conference USA 2014 Booth #532, Tuesday February 25, 2014, Security Mentor, pioneer of security awareness training employees love to take, today announced that Omnicom Media Group, the media services division of Omnicom Group Inc. (NYSE: OMC), has licensed and will deploy Security Mentor online security awareness training for its 10,000 employees.

The Security Mentor security awareness training program enables companies in every industry to reduce risk by creating a more secure workforce. Employees are given critical security information that leads to fundamental behavior changes and significantly reduces risk to commercial and government organizations.

The need for security awareness training for today’s organizations has never been greater. “Five years ago you had a defined perimeter with more control of your data. With the advent of mobile computing i.e. smartphones, tablets, etc., one can't guarantee where the data will rest,” said Dan Reynolds, VP Chief of Security and Information Architecture for Omnicom Media Group. “Today, your employees are the perimeter. If we are not educating our employees about security, then we are not protecting our business.”

Prior to selecting Security Mentor, Omnicom Media Group had been conducting employee security awareness training using its own “home-baked” program. “Yet when we saw a demo of Security Mentor CORE, we immediately liked the training's rich security content, user-friendly interface and ability to measure training penetration for our employees. This reporting ability is key -- I can easily see who has taken the training and where more follow-up is needed,” said Mr. Reynolds.

“Over the last year, we have seen a significant increase in demand for our employee training as organizations realize technology alone is not enough to protect confidential data. Our customers tell us that employees not only enjoy the training, but that it has a played a significant role in changing employee behavior to reduce risk to their organization,” said Marie White, CEO of Security Mentor. “We are very pleased that Omnicom Media Group has chosen Security Mentor security awareness training to be part of its defense-in-depth security strategy.”

In addition to providing the necessary security awareness training, Security Mentor also will help the Omnicom Media Group meet employee compliance of its security policies. Security Mentor’s new Policy Management service will host Omnicom Media Group’s security policy documentation and provide reporting on employee viewing and acknowledgment of policies. While this new feature will first be used by Omnicom Media Group, Security Mentor will offer this capability to other customers soon thereafter.

About Security Mentor Security Awareness Training

Security Mentor CORE trains employees on 12 important security topics including Phishing, Office Security, Mobile Security, and Information Protection. Brief, interactive lessons give employees critical security information in an easy-to-understand format. The lessons, written by certified information security professionals, can be customized and branded for any organization.

Simple to administer, organizations can take Security Mentor training as a service from Security Mentor's website with username/password authentication or federated Single Sign-on (SSO), or as SCORM-compliant lessons hosted on an organization’s internal, corporate LMS (Learning Management System). The LMS tracks trainee progress and completion, and provides training status reports.

Security Mentor is demonstrating its security awareness training this week at the RSA Conference USA 2014 at Booth #532.

About Security Mentor

Security Mentor, Inc., pioneer of security awareness training that employees love to take, enables companies in every industry to reduce risk by creating a more secure workforce. Interactive, highly engaging lessons teach critical security skills in an easy-to-understand, fun format. Our Brief, Frequent, Focused™ training model of 10-minute lessons delivered monthly fits employees’ busy schedules and keeps security top of mind. Training is served from Security Mentor’s Cloud LMS or provided as SCORM-compliant modules. Founded in 2008, Security Mentor has customers ranging from Fortune 500 enterprises to local and state governments, including the State of Michigan. To learn more, take a look at our two-minute introductory video or request a demo at www.securitymentor.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at @DevOpsSUMMIT and CloudEXPO tell the world how they can leverage this emerging disruptive trend."
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...