{"id":1102,"date":"2019-11-06T14:38:43","date_gmt":"2019-11-06T19:38:43","guid":{"rendered":"https:\/\/ndisac.org\/dev\/dibscc\/?p=1102"},"modified":"2025-05-16T13:24:22","modified_gmt":"2025-05-16T18:24:22","slug":"employee-training-and-awareness","status":"publish","type":"post","link":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/","title":{"rendered":"Employee Training and Awareness"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training and awareness based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and privacy as well as actions by users to maintain security and personal privacy and to respond to suspected incidents. The content addresses the need for operations security and the handling of personally identifiable information. <a href=\"https:\/\/csrc.nist.gov\/projects\/cprt\/catalog#\/cprt\/framework\/version\/SP_800_53_5_1_0\/home?element=AT-2\" target=\"_blank\" rel=\"noopener noreferrer\">(Source)<\/a>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]\n\t\t\t<div class='et-tabs-container et_sliderfx_fade et_sliderauto_false et_sliderauto_speed_5000 et_slidertype_top_tabs'>\n\t\t\t\t<p>\n\t\t<ul class='et-tabs-control'>\n\t\t\t<li><a href='#'>\n\t\t\tStandards\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tImplementation \/ Use Cases\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tIndustry Best Practices\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tExample Tools \/ Policies\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tCMMC Readiness\n\t\t<\/a><\/li>\n\t\t<\/ul> <!-- .et-tabs-control -->\n\n\t\t<div class='et-tabs-content'>\n\t\t\t<div class='et-tabs-content-main-wrap'>\n\t\t\t\t<div class='et-tabs-content-wrapper'>\n\t\t\t\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat619 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-114r1.pdf\" id=\"link-14654\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-114 Rev 1: User&#8217;s Guide to Telework and Bring Your Own Device (BYOD) Security<\/a>\n<p>This publication provides recommendations for securing BYOD devices used for telework and remote access, as well as those directly attached to the enterprise\u2019s own networks.<\/p><\/li>\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-50r1.pdf\" id=\"link-1505\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-50 Rev 1: Building a Cybersecurity Privacy Learning Program<\/a>\n<p>This publication provides guidance for federal agencies and organizations to develop and manage a life cycle approach to building a Cybersecurity and Privacy Learning Program (CPLP).<\/p><\/li>\n<li><a href=\"https:\/\/csrc.nist.gov\/projects\/cprt\/catalog#\/cprt\/framework\/version\/SP_800_53_5_1_1\/home?element=AT-02\" id=\"link-14684\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-53 Rev 5: AT-2 Literacy Training and Awareness<\/a>\n<p>NIST resources that defines requirements for literacy training and awareness.<\/p><\/li>\n<li><a href=\"https:\/\/csrc.nist.gov\/projects\/cprt\/catalog#\/cprt\/framework\/version\/SP_800_53_5_1_1\/home?element=AT-03\" id=\"link-14685\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-53 Rev 5: AT-3 Role-Based Training<\/a>\n<p>NIST resources that defines requirements for role-based training.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat620 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.sei.cmu.edu\/documents\/466\/2015_019_001_446379.pdf\" id=\"link-3406\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Carnegie Mellon University &#8211; Effective Insider Threat Programs: Understanding and Avoiding Potential Pitfalls<\/a>\n<p>This paper from Carnegie Mellon discusses potential ways an insider threat program could go wrong.<\/p><\/li>\n<li><a href=\"https:\/\/securityawareness.dcsa.mil\/cybersecurity\/index.htm\" id=\"link-1512\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Security Awareness Hub &#8211; Cybersecurity Awareness<\/a>\n<p>This course introduces the threats and vulnerabilities faced when working within the government or defense industrial systems.<\/p><\/li>\n<li><a href=\"https:\/\/securityawareness.dcsa.mil\/itawareness\/index.htm\" id=\"link-1521\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Security Awareness Hub &#8211; Insider Threat Awareness<\/a>\n<p>This course discusses how Insider Threat Awareness is an essential component of a comprehensive security program.<\/p><\/li>\n<li><a href=\"https:\/\/www.hhs.gov\/about\/agencies\/asa\/ocio\/cybersecurity\/security-awareness-training\/index.html\" id=\"link-1514\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">U.S. Department of Health &amp; Human Service Security Awareness and Training<\/a>\n<p>This resource provides general awareness and role-based information security training documents.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat621 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/topics\/physical-security\/insider-threat-mitigation\" id=\"link-1519\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency &#8211; Insider Threat Mitigation<\/a>\n<p>This webpage provided by CISA will help individuals, organizations, and communities create or improve an existing insider threat mitigation program.<\/p><\/li>\n<li><a href=\"https:\/\/aware.eccouncil.org\/security-awareness-training-6-important-training-practices.html\" id=\"link-14686\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">EC-Council Security Awareness Training: 6 Important Training Practices<\/a>\n<p>This blog discusses security awareness best practices and references other awareness training topics<\/p><\/li>\n<li><a href=\"https:\/\/www.dni.gov\/files\/NCSC\/documents\/nittf\/20240926_NITTF-Insider-Threat-Guide.pdf\" id=\"link-1516\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">National Insider Threat Task Force \u2013 Insider Threat Guide<\/a>\n<p>This guide provides direction for implementing the basic building blocks of an insider threat program.<\/p><\/li>\n<li><a href=\"https:\/\/listings.pcisecuritystandards.org\/documents\/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf\" id=\"link-14688\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">PCI Security Standards Council Whitepaper &#8211; Best Practices for Implementing a Security Awareness Training Program<\/a>\n<p>This guide focuses on organizational security awareness, security awareness content, and it provides a security awareness training checklist.<\/p><\/li>\n<li><a href=\"https:\/\/www.sans.org\/white-papers\/1160\" id=\"link-2658\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">SANS Whitepaper &#8211; Developing an Integrated Security Training, Awareness, and Education Program<\/a>\n<p>This SANS whitepaper describes how to successfully implement a comprehensive Security Training, Awareness, and Education program.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat622 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cdse.edu\/Training\/Insider-Threat\/\" id=\"link-1522\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Center for Development of Security Excellence \u2013 Insider Threat<\/a>\n<p>This link to CDSE provides insider threat training and awareness.<\/p><\/li>\n<li><a href=\"https:\/\/www.cdse.edu\/Training\/Toolkits\/Insider-Threat-Toolkit\/\" id=\"link-3214\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Center for Development of Security Excellence \u2013 Insider Threat Toolkit<\/a>\n<p>This toolkit contains resources to help you perform your role in the insider threat field.<\/p><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/resources-tools\/resources\/cisa-cybersecurity-awareness-program-toolkit\" id=\"link-14690\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency &#8211; Cybersecurity Awareness Program Toolkit<\/a>\n<p>Cybersecurity awareness resources for all segments of the community.<\/p><\/li>\n<li><a href=\"https:\/\/www.cyber.mil\/training\" id=\"link-1720\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">DoD Cyber Exchange Training<\/a>\n<p>Collection of cyber training courses and training aids provided by the DoD Cyber Exchange. It provides an overview of cybersecurity threats and best practices to keep information and information systems secure.\u00a0<\/p><\/li>\n<li><a href=\"https:\/\/19january2017snapshot.epa.gov\/sites\/production\/files\/2016-01\/documents\/cio_2150-p-02.2.pdf\" id=\"link-1506\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Environmental Protection Agency Information Security \u2013 Awareness and Training Procedures<\/a>\n<p>The purpose of this example procedure from the EPA is to help with implementing the security control requirements for the Awareness and Training (AT) control family.<\/p><\/li>\n<li><a href=\"https:\/\/www.knowbe4.com\/security-awareness-training\" id=\"link-1725\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">KnowBe4 &#8211; Security and Awareness Training<\/a>\n<p>KnowBe4 is a large security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.<\/p><\/li>\n<li><a href=\"https:\/\/niccs.cisa.gov\/training\/catalog\" id=\"link-1510\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">The National Initiative for Cybersecurity Careers and Studies (NICCS) Catalog<\/a>\n<p>The NICCS Education and Training Catalog is a central location where cybersecurity professionals across the nation can find over 3,000 cybersecurity-related courses.<\/p><\/li>\n<li><a href=\"https:\/\/policy.arizona.edu\/information-technology\/acceptable-use-system-administrators-policy\" id=\"link-3397\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">The University of Arizona &#8211; Acceptable Use for System Administrators Policy<\/a>\n<p>This document is an example of an Acceptable Use for System Administrators Policy from the University of Arizona.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\tCMMC Related Controls<\/p>\n<ul>\n<li>Level 2 | <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/at-l2-3-2-1\/\">AT.L2-3.2.1 \u2013 Role-Based Risk Awareness: Ensure that managers, system administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.<\/a><\/li>\n<li>Level 2 | <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/at-l2-3-2-2\/\">AT.L2-3.2.2 \u2013 Role-Based Training: Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities.<\/a><\/li>\n<li>Level 2 | <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/at-l2-3-2-3\/\">AT.L2-3.2.3 \u2013 Insider Threat Awareness: Provide security awareness training on recognizing and reporting potential indicators of insider threat.<\/a><\/li>\n<\/ul>\n<p>CMMC Assessment Guides<\/p>\n<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat671 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL1v2.pdf\" id=\"link-9988\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 1 Self-Assessment Guide<\/a>\n<p>This document provides self-assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 1.<\/p>\n<\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL2v2.pdf\" id=\"link-9989\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 2 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2.<\/p>\n<\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL3v2.pdf\" id=\"link-14791\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 3 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 3.<\/p>\n<\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n<\/span><\/p>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div> <!-- .et-tabs-container -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":657,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam id tincidunt sapien. Suspendisse aliquam nisl sapien, luctus sodales tellus vehicula non. Interdum et malesuada fames ac ante ipsum primis in faucibus. Etiam facilisis pellentesque sapien, vel porta nibh commodo at. Aliquam eu porta nisi, eget tincidunt quam. Nam eu nunc convallis, gravida magna rhoncus, tincidunt quam. Praesent quis gravida magna, non lacinia orci. Vivamus et scelerisque odio, in fringilla massa. Integer nec ipsum nibh. Mauris tincidunt dictum nulla, id tristique massa dictum ac. Curabitur porttitor nisl sit amet ornare aliquet. Sed sed ultrices nibh, id varius felis. Nunc cursus lobortis ex feugiat aliquam.<\/p><p>Nullam justo dui, imperdiet luctus enim euismod, consequat euismod sapien. Aenean placerat fermentum magna, id tempus libero consectetur nec. Morbi a nunc orci. Donec porta, tellus vitae bibendum pulvinar, diam sapien mattis nisi, vitae lobortis quam sem non purus. Cras tempus odio eget urna faucibus sollicitudin. Aliquam porta neque in arcu vehicula venenatis eu vitae nulla. Vivamus sed neque ligula. Maecenas auctor dui et arcu pellentesque molestie.<\/p><p>Fusce luctus diam sit amet nisl consequat, vitae aliquam metus finibus. Nulla facilisi. In nec neque sem. Ut vitae fermentum mauris, vel gravida turpis. Nunc vitae velit sit amet ipsum semper condimentum sed id metus. Phasellus vel mauris dignissim, lobortis felis ac, eleifend justo. Suspendisse consectetur erat eu ipsum euismod ultricies. Vestibulum a libero quis nibh congue sagittis eget sed ipsum. Morbi dictum mi id sem imperdiet, ac pretium lorem suscipit.<\/p>","_et_gb_content_width":"","footnotes":""},"categories":[24],"tags":[],"class_list":["post-1102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-top-10-high-value-controls"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Employee Training and Awareness - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employee Training and Awareness - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-06T19:38:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T18:24:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"508\" \/>\n\t<meta property=\"og:image:height\" content=\"342\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"markcarr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markcarr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/\",\"name\":\"Employee Training and Awareness - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg\",\"datePublished\":\"2019-11-06T19:38:43+00:00\",\"dateModified\":\"2025-05-16T18:24:22+00:00\",\"author\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\"},\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#primaryimage\",\"url\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg\",\"contentUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg\",\"width\":508,\"height\":342},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Employee Training and Awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\",\"name\":\"markcarr\",\"url\":\"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Employee Training and Awareness - DIB SCC CyberAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/","og_locale":"en_US","og_type":"article","og_title":"Employee Training and Awareness - DIB SCC CyberAssist","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/","og_site_name":"DIB SCC CyberAssist","article_published_time":"2019-11-06T19:38:43+00:00","article_modified_time":"2025-05-16T18:24:22+00:00","og_image":[{"width":508,"height":342,"url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg","type":"image\/jpeg"}],"author":"markcarr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markcarr","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/","url":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/","name":"Employee Training and Awareness - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#primaryimage"},"image":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg","datePublished":"2019-11-06T19:38:43+00:00","dateModified":"2025-05-16T18:24:22+00:00","author":{"@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0"},"breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#primaryimage","url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg","contentUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg","width":508,"height":342},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/employee-training-and-awareness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"Employee Training and Awareness"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0","name":"markcarr","url":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"landscape":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"portraits":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"thumbnail":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4-150x150.jpg",150,150,true],"medium":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4-300x202.jpg",300,202,true],"large":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"1536x1536":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"2048x2048":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"et-pb-post-main-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4-400x250.jpg",400,250,true],"et-pb-post-main-image-fullwidth":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"et-pb-portfolio-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4-400x284.jpg",400,284,true],"et-pb-portfolio-module-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"et-pb-portfolio-image-single":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"et-pb-gallery-module-image-portrait":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4-400x342.jpg",400,342,true],"et-pb-post-main-image-fullwidth-large":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"et-pb-image--responsive--desktop":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"et-pb-image--responsive--tablet":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false],"et-pb-image--responsive--phone":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",401,270,false],"gform-image-choice-sm":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",300,202,false],"gform-image-choice-md":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",400,269,false],"gform-image-choice-lg":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/post4.jpg",508,342,false]},"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":" <a href=\"https:\/\/ndisac.org\/dibscc\/category\/implementation-and-assessment\/top-10-high-value-controls\/\" rel=\"tag\">Top 10 High Value Controls<\/a>","rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1102"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=1102"}],"version-history":[{"count":14,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1102\/revisions"}],"predecessor-version":[{"id":16317,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1102\/revisions\/16317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media\/657"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=1102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/categories?post=1102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=1102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}