{"id":48982,"date":"2022-10-21T14:00:00","date_gmt":"2022-10-21T14:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too"},"modified":"2022-10-21T14:00:00","modified_gmt":"2022-10-21T14:00:00","slug":"iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/","title":{"rendered":"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7db7c44ef91ba2ea\/6351acfdc522781d4ce2ad4b\/IronMan_Federico_Julien_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Iron Man wasn&#8217;t built in a day. Nor was his suit \u2014 or ego, for that matter. The creation of the superhero and his suit of high-tech armor came out of necessity \u2014 to keep shrapnel shards from puncturing his heart. The solution was the creation of Iron Man&#8217;s first-ever electromagnetic reactor \u2014 and, well, the rest is Marvel Cinematic Universe history.<\/p>\n<p>But how does this relate to building a security awareness program? No, it doesn&#8217;t mean you add watching <em>The Avengers<\/em> to your cybersecurity curriculum (we tried!). But it does show that the first foray into building out such a heart-saving program often comes from necessity. No one expects to be trapped in the caves of a terrorist group or to have their organization&#8217;s protective walls breached \u2014 but it does happen to superheroes and everyday companies alike.<\/p>\n<p>So, you have to build something better to ensure your organization survives the missile attacks \u2014 whether being shot by the <a href=\"https:\/\/marvelcinematicuniverse.fandom.com\/wiki\/Ten_Rings_(Organization)\" target=\"_blank\" rel=\"noopener\">Ten Rings terrorist organization<\/a> or by a <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/blackcat-alphv-gang-wiper-functionality-ransomware-tactic\" target=\"_blank\" rel=\"noopener\">ransomware-as-a-service group<\/a> using smishing on an executive. Many stop there, when their first-gen defenses are in place and they&#8217;re lulled into a false sense of security, but you don&#8217;t have to.<\/p>\n<h2 class=\"regular-text\">More Than Human<\/h2>\n<p><strong><\/strong><\/p>\n<p>Much like the arc of Iron Man throughout his decade-plus saga, your security awareness program needs to start with an origin story \u2014 a guiding set of principles that explain your current actions and future motivations. Many deem humans as the faulty link in cybersecurity and, in some ways, they can be; <a href=\"https:\/\/www.weforum.org\/agenda\/2020\/12\/cyber-risk-cyber-security-education\" target=\"_blank\" rel=\"noopener\">according to the World Economic Forum<\/a>,<span> 95% of cybersecurity breaches are caused by human error. Using this data, many organizations will purchase tech to bolster their defenses and limit their employee&#8217;s visibility into threats facing the organization. For my team and our security awareness program, we chose the opposite course. We equip our humans with the tech, tools, and training they need to be first-line defenders against cyber threats.<\/span><\/p>\n<p><span>This process of <\/span><a href=\"https:\/\/www.darkreading.com\/edge-threat-monitor\/time-constraints-hamper-security-awareness-programs\" target=\"_blank\" rel=\"noopener\">embedding security awareness into everything your employees do<\/a><span> takes time. It can take months and even years <\/span><a href=\"https:\/\/penntoday.upenn.edu\/news\/iron-man-engineer-who-became-superhero\" target=\"_blank\" rel=\"noopener\">to spark your company&#8217;s collective Pikul<\/a><span> \u2014 the energized arc reactor that drives your security awareness program forward \u2014 but it&#8217;s worthwhile. To begin, you need to s<\/span>tart the training journey early \u2014 incorporate training at the very start of employment, at new employee orientation.<\/p>\n<p>Next, you need to embed real-world trainings and simulations into the day-to-day work environments of your employees, including things like phishing simulations, crisis tabletops, and social media alerts. For content inspiration, it&#8217;s important to &#8220;run on reality&#8221; and use real things that have happened to your company or employees as the backbone of this training content. Often in the case of cyber bad actors, <a href=\"https:\/\/www.washingtonpost.com\/news\/innovations\/wp\/2017\/07\/21\/how-a-fish-tank-helped-hack-a-casino\/\" target=\"_blank\" rel=\"noopener\">reality is stranger than fiction<\/a>.<\/p>\n<h2 class=\"regular-text\">What&#8217;s Your Jarvis?<\/h2>\n<p>Once you have your arc reactor powering the day-to-day movements of your program, it&#8217;s time to set up your &#8220;Jarvis System.&#8221; In <em>Iron Man<\/em>, Tony Stark uses his Jarvis AI to schedule everything from interplanetary drone strikes to dinner reservations. In the case of your organization&#8217;s Jarvis, the scope of what you&#8217;re looking for your system to do is much smaller. Jarvis, in the security sense, is a <a href=\"https:\/\/stage.darkreading.com\/vulnerabilities-threats\/time-to-change-our-flawed-approach-to-security-awareness\" target=\"_blank\" rel=\"noopener\">combination of internal programs and external tools and tech<\/a> that creates a hard shell around your employees \u2014 think proactive threat intel, defense-in-depth processes, and automation and machine learning.<\/p>\n<p>The complexity of your Jarvis system will depend on the size of your organization and what you can invest in outside resources. Simple open source phishing simulations and basic firewalls with intel feeds are a good starting point for smaller organizations; medium to larger organizations may look to email gateway-scanning tools and complex phishing-simulation services as well. Regardless of your buying power, a proper blending of external tools and resources with your inside expertise and processes are vital to ensure that the setup of your very own Jarvis system is successful.<\/p>\n<p>Once you&#8217;ve found your Pikul and activated your Jarvis, you may be asking what else you can do to supercharge security awareness at your organization. For me, it&#8217;s all about blending the people\/processes\/tech to focus on psychology. Security programs built with cyber psychology at the center create a collaborative, not punitive, relationship between your security team and the employee base and empowers employees to be proactive and stay vigilant from threats through positive interactions and reinforcement.<\/p>\n<p>You never know the true potential of your team until you give them the proper training, tech, and trust \u2014 that&#8217;s where the psychological element layers in. After all, Tony Stark wasn&#8217;t a superhero until he put on the suit. And to end with my favorite line from Tony to Peter Parker, &#8220;If you&#8217;re nothing without this suit, then you shouldn&#8217;t have it.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Build your company&#8217;s security awareness program a suit of high-tech cybersecurity armor along with a collaborative atmosphere. Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-48982","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-21T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7db7c44ef91ba2ea\/6351acfdc522781d4ce2ad4b\/IronMan_Federico_Julien_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too\",\"datePublished\":\"2022-10-21T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/\"},\"wordCount\":813,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7db7c44ef91ba2ea\\\/6351acfdc522781d4ce2ad4b\\\/IronMan_Federico_Julien_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/\",\"name\":\"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7db7c44ef91ba2ea\\\/6351acfdc522781d4ce2ad4b\\\/IronMan_Federico_Julien_Alamy.jpg\",\"datePublished\":\"2022-10-21T14:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7db7c44ef91ba2ea\\\/6351acfdc522781d4ce2ad4b\\\/IronMan_Federico_Julien_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7db7c44ef91ba2ea\\\/6351acfdc522781d4ce2ad4b\\\/IronMan_Federico_Julien_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/","og_locale":"en_US","og_type":"article","og_title":"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-21T14:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7db7c44ef91ba2ea\/6351acfdc522781d4ce2ad4b\/IronMan_Federico_Julien_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too","datePublished":"2022-10-21T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/"},"wordCount":813,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7db7c44ef91ba2ea\/6351acfdc522781d4ce2ad4b\/IronMan_Federico_Julien_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/","url":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/","name":"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7db7c44ef91ba2ea\/6351acfdc522781d4ce2ad4b\/IronMan_Federico_Julien_Alamy.jpg","datePublished":"2022-10-21T14:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7db7c44ef91ba2ea\/6351acfdc522781d4ce2ad4b\/IronMan_Federico_Julien_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7db7c44ef91ba2ea\/6351acfdc522781d4ce2ad4b\/IronMan_Federico_Julien_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/iron-man-started-his-journey-from-scratch-your-security-awareness-program-can-too\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Iron Man Started His Journey From Scratch &amp; Your Security Awareness Program Can Too"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48982"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48982\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}