{"componentChunkName":"component---src-templates-post-js","path":"/blog/the-benefits-of-active-gamified-learning-in-cyber-training/","result":{"data":{"wordpressPost":{"title":"Game On: The Benefits of Hands-On, Gamified Learning in Cyber Training","content":"<p>What is gamified learning? Before we dive into that question, let&#8217;s discuss some of the ways we currently learn about cyber today. Traditional cyber training has been conducted in the same way for years, comprised of static, classroom-style settings complete with a teacher lecturing and passive listeners. <a href=\"https://trainingmag.com/trgmag-article/strategies-make-learning-stick\" target=\"_blank\" rel=\"noopener noreferrer\">This model causes people to forget</a>: <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">40% of what they’ve learned after 20 minutes<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Between 50-80% of what they’ve learned after one day  <span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">77% of what they’ve learned after six days</li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">90% of what they’ve learned after one month <span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<p>In addition to forgetting material learned, there’s minimal opportunity for the student to proactively solve problems, think critically, and analyze material. Instead, they superficially understand concepts without truly learning their application to real-world situations. This leaves the trainees disengaged, disempowered, bored, and unmotivated. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>We believe there’s a better way to deliver information security training—a way that engages teams in healthy competition and in critical thinking and problem-solving activity. Through active learning, studies show learners are more engaged, empowered, excited, and possess deep, conceptual understandings of topics learned. <a href=\"https://www.openlearning.com/blog/HowPeopleLearnActiveVsPassiveLearning\" target=\"_blank\" rel=\"noopener noreferrer\">Active learning</a> involves collaborating with teams and applying concepts to real-world exercises and scenarios, which <a href=\"https://cdns3.trainingindustry.com/media/3203537/game%20based%20learning.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">improves retention rates to 75%,</a> compared to 5% through traditional learning methods.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h3><b>So </b><b>why is active learning so important for cybersecurity professionals?</b></h3>\n<p>Because the undeniable <a href=\"https://cybersecurityventures.com/jobs/\" target=\"_blank\" rel=\"noopener noreferrer\">jobs shortage</a> affecting the industry is prompting CISOs to take a closer look at ways in which they can close the skills gap. The first step involves leveling up existing cyber teams by equipping them with the tools and skills they need to do their jobs better. Without proper cyber training and skills development, professionals can’t keep pace with evolving cyber threats, causing teams, organizations, and companies to succumb to hacker attacks. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>How significant is this issue? According to a recent <a href=\"http://www.esg-global.com/esg-issa-research-report-2017\" target=\"_blank\" rel=\"noopener noreferrer\">ESG/ISSA study</a>, 70% of cybersecurity professionals claimed their organization was impacted by the cybersecurity skills shortage, with ramifications such as an increasing staff workload, hiring and training junior personnel rather than experienced professionals, and situations where teams spend most of their time dealing with the emergency du jour, leaving little time for training, planning, strategy, etc. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>So what can we do about this? <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h3><b>Consider gamified cyber training </b></h3>\n<p>Not only is hands-on, active learning important but we believe that gamification is the natural, logical step in training the <a href=\"https://www.digitecinteractive.com/wp-content/uploads/2018/02/gamification_white_paper2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">next gen learner</a> (born after 1980), who has never known a world without video games. Gamification is often defined as the process of adding games or game-like elements to something. The term was originally coined in 2002 by a British computer programmer named Nick Pelling. When we think about the benefits of gamification of cyber security training, it is a learning style best suited for today’s learner who grew up playing video games and being motivated by elements like leaderboards, competition, collaboration, and social proof/progression.</p>\n<p>Even academic institutions across cyber schools are exploring <a href=\"https://www.circadence.com/wp-content/uploads/2019/07/EDU-Testimonial-Infographic-v3_final_March2020.pdf\">cyber security games for students</a> to complement their classroom learning. Some institutions like CU Boulder have even <a href=\"https://marketing.circadence.com/acton/attachment/36273/f-5214c34c-f9b3-4b15-b7e4-cb9eec2ba305/1/-/-/-/-/Building%20a%20Immersive%20Cyber%20Curriculum%20with%20Project%20Ares%20FINAL.pdf\">crafted an entire class around gamified cyber training</a> using Project Ares in their syllabus.</p>\n<p>Unlike compliance-driven teaching methods, gamified teaching engages practitioners individually and in teams, through modern learning strategies. It works by deploying connected, interactive, social settings that allow learners to excel in competitive, strategic situations. Further, it enables learners to apply what they know to simulated environments or “worlds,” creating a natural flow that keeps learners engaged and focused. Organizations that offer gamified exercises to teams report that <a href=\"https://www.computerweekly.com/news/252437833/Automation-and-gamification-key-to-cyber-security\" target=\"_blank\" rel=\"noopener noreferrer\">96% of workers see benefits</a> including increased awareness of weaknesses, knowledge of how breaches occur, improved teamwork and response times, and enhanced self-efficacy.  <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p>In gamified environments, trainees are typically: <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https://www.csoonline.com/article/3069948/security/7-reasons-to-gamify-your-cybersecurity-strategy.html\" target=\"_blank\" rel=\"noopener noreferrer\"><b>rewarded</b> for good behavior</a><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>incentivized</b> to maintain good behavior<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>encouraged</b> to dialogue about their lessons learned with peers<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>reminded</b> of what they don’t yet know and held accountable<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>engaged</b> in their progress thanks to leaderboards<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>prepared</b> to participate in simulated threat situations that further prepare them when real-world situations occur<span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<p>Active, gamified cyber training is only effective if employees apply their skills learned and acquired to real-world scenarios. For this reason, cybersecurity leaders are encouraged to measure the effectiveness of training efforts through regular audits and assessments to determine which employees may still pose a risk to the overall security posture of the organization. <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><i>“Keeping our workforce engaged, educated and satisfied at work is critical to ensuring </i><i>organisations</i><i> do not increase complexity in the already high-stakes game against </i><i>cyber crime</i><i>,” </i><i>Grant </i><i>Bourzikas</i><i>, chief information security officer at McAfee</i><i>.</i><i> (</i><i>ComputerWeekly</i><i>)</i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:864,&quot;335559737&quot;:864,&quot;335559738&quot;:200,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h3><b>Great, there are clear benefits. Now what?</b></h3>\n<p>Now it’s time to reflect on how your organization can <a href=\"https://marketing.circadence.com/acton/media/36273/blog-gamified-cybersecurity-training\" target=\"_blank\" rel=\"noopener noreferrer\">benefit from gamification in cybersecurity training</a>. First, look at what training (if any) is currently occurring. Then, speak with teams about where they’d like to improve and draw clear parallels between the investment in training and desired business outcomes. And of course, when you&#8217;re ready to learn more, <a href=\"https://www.circadence.com/contact-2/\">contact us</a> to see how gamified training actually works through our Project Ares<sup style=\"font-weight: 300; font-size: 9px;\">®</sup> platform.</p>\n"},"site":{"siteMetadata":{"title":"Circadence","description":"Build cyber skills hands-on with Project Ares cyber range platform."}}},"pageContext":{"id":"1609c5dc-95c5-5692-9890-2cc00f15ffe0","featured_img":"https://staging.circadence.com/wp-content/uploads/2018/11/gamification_design_green.jpg"}}}