
Data Protection in Action
Duration: 2 hours
Resources and Materials: Case studies on data breaches, GDPR and CCPA summaries, personal data inventory template (online research)
Target Group and Number of Participants: Educators, administrators, and IT staff, 10-20 participants
Learning Objectives and Goals: Understand key principles of GDPR and CCPA, identify personal data under these regulations, learn to protect and handle such data correctly
Expected Outcomes: Improved knowledge of data protection laws, ability to categorize and secure personal data appropriately
How to Do It:
- Begin with a brief overview of GDPR and CCPA.
- Break into small groups to discuss recent case studies of data breaches and the implications of these breaches.
- Each group identifies types of personal data handled in their roles and applies data protection principles to these scenarios.
- Groups present their findings and strategies for better data management.
Feedback: Conduct a feedback session to discuss the practical challenges faced during the exercise and gather suggestions for improving data protection practices.
Phishing Identification Workshop
Duration: 1 hour
Resources and Materials: Examples of phishing emails, anti-phishing checklist
Target Group and Number of Participants: All staff and students, 10-20 participants
Learning Objectives and Goals: Identify and react appropriately to phishing attempts
Expected Outcomes: Enhanced ability to recognize and report phishing attempts
How to Do It:
- Presentation on the characteristics of phishing emails and the potential risks involved.
- Distribute examples of phishing emails and have participants use a checklist to identify telltale signs.
- Discussion on correct responses to phishing attempts and how to report them.
Feedback: Collect feedback through a short questionnaire on the clarity of the training and any additional areas needing coverage.
Secure Password Creation and Management
Duration: 1 hour
Resources and Materials: Guidelines on creating secure passwords, access to a password management tool
Target Group and Number of Participants: Staff and older students, 10-20 participants
Learning Objectives and Goals: Learn to create and manage strong, secure passwords
Expected Outcomes: Adoption of better password practices, increased use of password managers
How to Do It:
- Start with a brief presentation on the importance of strong passwords.
- Hands-on session with participants creating their own strong passwords following best practices.
- Introduce a password manager, demonstrating how to store and manage passwords securely.
Feedback: End with a discussion on the ease of use of password managers and any barriers to their adoption.
Cybersecurity Role-Playing Game
Duration: 2 hours
Resources and Materials: Role-playing scenarios, cyber incident response checklist
Target Group and Number of Participants: IT team and interested staff members, 10-20 participants
Learning Objectives and Goals: Understand and react appropriately to different types of cyber threats
Expected Outcomes: Improved readiness and reaction strategies to cyber incidents
How to Do It:
- Divide participants into groups and assign each a specific cyber threat scenario (e.g., ransomware attack, data breach).
- Each group discusses and plans their response using the incident response checklist.
- Groups present their strategies, followed by a feedback session on what could be improved in real situations.
Feedback: Gather feedback on the realism of the exercise and its effectiveness in preparing participants for actual cyber incidents.