How to Run a Cybersecurity Awareness Training Program in Academia

How to Run a Cybersecurity Awareness Training Program in Academia

May 15

Ravi Miranda
Ravi MirandaWith over 16 years of global cybersecurity experience, Ravi Miranda specializes in governance, risk management, and awareness strategy with a focus on academic institutions. A certified CISA, CISSP, and CRISC professional, he empowers teams across industries to build resilient security frameworks rooted in education and compliance. Ravi’s passion for bridging strategic oversight practical human-centric security, and complex stakeholder management makes him a highly regarded expert in the cybersecurity space.
View Profile

Broadly speaking, universities are comprised of 3 groups of individuals: those that carry out cutting edge research, PhD students, and those that provide the administrative functions usually referred to as ‘Professional Services.’ Yes, this is an oversimplified view of the academic setting, but more on that later. There is one more group of that you’re likely thinking I’ve omitted - yes, the fourth group - the students.

Cybersecurity means different things to all these groups. Furthermore, cultures and modes of thinking vary across individuals according to their places of origin and the specificities of their backgrounds. This has material consequences for the deployment of cybersecurity awareness programs and how such efforts are perceived by the end user.

Having worked as a cybersecurity professional for many years, it took me a long time to understand each mindset. With each passing year, my own understanding and interpretation changes. To add another couple of elements to this already complicated cultural mix: the culture of the Institution accrued over decades the diverse subcultures of each department. Each cultural layer warrants a blog post of its own – we’ll get to each in subsequent posts.

How Does a Cybersecurity Professional Drive a Cyber Security Awareness Program in Academic Settings?

Short answer: very carefully.

Let’s take the first group: the academics or professors who are usually at the tip of the spear for research activity. They need access to all types of information required for their research with a zero-hindrance policy. Understandably, given the very important job they do conducting research to better humanity, inform government policymaking, and improve our understanding of the universe.

The second line of researchers – the PhD students - need access to information from various sources to deliver their own PhD theses. Again, the demographics within this group and across departments can vary quite a bit.

The Administrators/Professionals also require information to ensure the continued success of the institution. Generally, these include Estates, Finance, HR, Alumni Relations, Student Registry, and Information Technology and Cyber Security.

I am reminded of an incident at a very prestigious institution in India, where a student hacked the exam results to give themselves better grades. Unfortunately, such things do happen and must be guarded against via effective and engaging awareness programs.

Within this large and diverse ecosystem, how does one deliver an effective cybersecurity awareness program that protects the digital environment, builds digital trust, and provides assurance to funders and regulators that cybersecurity is in a good place?

Understanding Cybersecurity Risk in Academia

Before we find solutions, we need to understand what the threat landscape is for an academic institution. Again, a very short answer – almost every threat actor (fancy term for hacker) is keen to attack an academic institution for several obvious reasons.

I’m going to pick a couple that I think are especially compelling to cybercriminals. One is information about ‘VIP’ students. If there are high profile students attending these institutions, their personal information is always of interest to hackers. Another key one to note is that academic institutions have links to sensitive funding organizations such as the government, military, or corporations. This provides an easy way to enter such facilities for further theft if credentials are left carelessly unsecured.

Effective Approaches to Enhance Cybersecurity Awareness Training

A suitable model to work with all stakeholders is to continuously ENGAGE them. This contributes to building trust. To start, one must reach an understanding of the funder’s cybersecurity requirements in the working relationship. The next step is to define the environment that the researcher is working in and what elements could be vulnerable.

I will focus on the cybersecurity awareness training dimension of this scenario for the purpose of this blog.

Given the myriad players comprising an academic institution, what can we do to make cybersecurity awareness training effective? In short: TARGET end users with relevant information about their area.

Yes, this requires a lot of work.

But the truth is that one size does not fit all when it comes to cybersecurity awareness training. Some users may be advanced IT users in say databases, so providing them relevant information on security issues and appropriate controls would help. It helps to ADAPT your message to the relevant audience. Again, there are other controls that would help, but it would be out of scope of this blog piece. This would ENABLE better two-way communications between the cybersecurity teams and broader stakeholders within the institution.

Yes, I hear the objection: “I have just one team member or maybe no team at all. Hell, I don’t even have a budget.”

Practical Tips for Cybersecurity Awareness Training Program Implementation

  • Start small – localize security awareness campaigns in a department or within a Community of Practice – say Business Analysts, or even maybe the Student Union.
  • Try an outreach program – get invited to other team meetings or town halls.
  • Have you tried onboarding meetings? They’re a great way to jumpstart communication and hand out small cards with cyber security messages on them including information on how to contact the cyber security team.
  • What about a small quiz to departments maybe on a Friday Thursday afternoon? Once you’ve got the buzz going, scale it up, include it as an agenda item for conversations with your line manager, build a case, and maybe people would like a cybersecurity catch-up, this will lead to a new role being created.
  • Can you use the expertise of an intern for example or a temporary assignment as part of the role? The possibilities are endless.

What Do Other Cybersecurity Professionals in Academia Think?

It would be good to hear from other cybersecurity awareness experts on what works and what might not in academia. If you’re a cybersecurity professional working at an academic institution or thinking of joining one, share your experiences and perspectives and we can help improve the cybersecurity landscape.

As a reminder to conclude this blog post ahead of the next one, a few words to summarize my recommendations for how to effectively administer and conduct cybersecurity awareness programs in an academic setting:

ENGAGE. TARGET. ADAPT. ENABLE.

Share

Train and Engage Your People

Related Articles
How to Run a Cybersecurity Awareness Training Program in Academia
Ravi Miranda
15/05/2025

How to Run a Cybersecurity Awareness Training Program in Academia

Read More about AI-Native Cybersecurity Human Risk Management
Why Cybersecurity Human Risk Management Benefits CISOs
Gry Evita Sivertsen
29/04/2025

Why Cybersecurity Human Risk Management Benefits CISOs

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity's Comfort Zone Problem
Jane Frankland
15/04/2025

Cybersecurity's Comfort Zone Problem

Read More about AI-Native Cybersecurity Human Risk Management
AI Phishing: The Rising Threat of Intelligent Cyber Deception
Roberto Ishmael Pennino
02/04/2025

AI Phishing: The Rising Threat of Intelligent Cyber Deception

Read More about AI-Native Cybersecurity Human Risk Management
What Maslow’s Hierarchy of Needs Reveals About Cybersecurity Flaws
Jane Frankland
01/04/2025

What Maslow’s Hierarchy of Needs Reveals About Cybersecurity Flaws

Read More about AI-Native Cybersecurity Human Risk Management
How Adaptive Security Awareness Training Drives Better Cybersecurity Outcomes: The Science
Rory Attwood
11/03/2025

How Adaptive Security Awareness Training Drives Better Cybersecurity Outcomes: The Science

Read More about AI-Native Cybersecurity Human Risk Management
PIPEDA Compliance: Why PIPEDA Training is Important
Roberto Ishmael Pennino
21/02/2025

PIPEDA Compliance: Why PIPEDA Training is Important

Read More about AI-Native Cybersecurity Human Risk Management
CCPA Training: Building a Culture of Privacy and Compliance
Roberto Ishmael Pennino
10/02/2025

CCPA Training: Building a Culture of Privacy and Compliance

Read More about AI-Native Cybersecurity Human Risk Management
Data Privacy Week: How Convention 108 Paved the Way for Modern Privacy Laws
Roberto Ishmael Pennino
31/01/2025

Data Privacy Week: How Convention 108 Paved the Way for Modern Privacy Laws

Read More about AI-Native Cybersecurity Human Risk Management
TISAX Training: Strengthening Automotive Information Security and Compliance
Roberto Ishmael Pennino
27/01/2025

TISAX Training: Strengthening Automotive Information Security and Compliance

Read More about AI-Native Cybersecurity Human Risk Management
GDPR Training: Building a Culture of Compliance
Roberto Ishmael Pennino
20/01/2025

GDPR Training: Building a Culture of Compliance

Read More about AI-Native Cybersecurity Human Risk Management
What Is DORA? DORA Training for Compliance
Dr. Charlotte Jupp
20/01/2025

What Is DORA? DORA Training for Compliance

Read More about AI-Native Cybersecurity Human Risk Management
Risk Quantification for Cybersecurity Human Risk Management
Lev Lesokhin
13/12/2024

Risk Quantification for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Empowering Organizations with Adaptive Security Awareness Training
Roberto Ishmael Pennino
07/11/2024

Empowering Organizations with Adaptive Security Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Awareness Training for Remote Workforces
Roberto Ishmael Pennino
25/10/2024

Cybersecurity Awareness Training for Remote Workforces

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management Gets Adaptive
Lev Lesokhin
08/10/2024

Human Risk Management Gets Adaptive

Read More about AI-Native Cybersecurity Human Risk Management
What is Cybersecurity Human Risk Management? What You Need to Know
Lev Lesokhin
23/09/2024

What is Cybersecurity Human Risk Management? What You Need to Know

Read More about AI-Native Cybersecurity Human Risk Management
Engagement Strategies for Cybersecurity Human Risk Management
Lev Lesokhin
16/08/2024

Engagement Strategies for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Enhance Your Phishing Training With Outthink
Lavinia Manocha
02/08/2024

Enhance Your Phishing Training With Outthink

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training for Frontline Workers
Lavinia Manocha
26/07/2024

Adaptive Security Awareness Training for Frontline Workers

Read More about AI-Native Cybersecurity Human Risk Management
The Role of Security Awareness Training After IT Outages
Lev Lesokhin
26/07/2024

The Role of Security Awareness Training After IT Outages

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management's Eight Dimensions of Secure Behavior Segmentation
Lev Lesokhin
25/07/2024

Human Risk Management's Eight Dimensions of Secure Behavior Segmentation

Read More about AI-Native Cybersecurity Human Risk Management
State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business
Lev Lesokhin
18/07/2024

State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training: Unlearning and Relearning Routines
Lev Lesokhin
10/07/2024

Adaptive Security Awareness Training: Unlearning and Relearning Routines

Read More about AI-Native Cybersecurity Human Risk Management
Did You Think Your Password Was Secure? Let’s Talk Password Security
Lev Lesokhin
24/05/2024

Did You Think Your Password Was Secure? Let’s Talk Password Security

Read More about AI-Native Cybersecurity Human Risk Management
Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework
Lev Lesokhin
23/05/2024

Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework

Read More about AI-Native Cybersecurity Human Risk Management
Password Security: Why the UK is Banning Generic Passwords
Lev Lesokhin
17/05/2024

Password Security: Why the UK is Banning Generic Passwords

Read More about AI-Native Cybersecurity Human Risk Management
Instagram Security Awareness Training: A Step-by-Step Guide
Lev Lesokhin
10/05/2024

Instagram Security Awareness Training: A Step-by-Step Guide

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Human Risk Management Forum Kicks Off in London
Lev Lesokhin
18/04/2024

Cybersecurity Human Risk Management Forum Kicks Off in London

Read More about AI-Native Cybersecurity Human Risk Management
Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step
Rory Attwood
31/01/2024

Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step

Read More about AI-Native Cybersecurity Human Risk Management