Cool Security Stuff for End-Users (Input needed!)

I'm working on designing a page of our intranet collaboration portal that is intended to be a "one stop shop" for end-users on security. Here's what I've got so far... what else would you add to something like this? The target is the end-user... and the vast majority of ours are non-technical, so I'm trying to keep this well below the "eye-glazing" technical level.
- How to report something suspicious
- Security tips / RSS feed of SANS Tip of the Day
- A listing of cool, end user-related security resources (SANS newsletters, National Cybersecurity Awareness Month resources, threat maps with flashy lights, etc.)
- An RSS feed of a select few "end user-friendly" blogs
- Links to all corporate security policies, procedures, and documents
EDIT so newcomers see this. This isn't supposed to be 'THE' entire security awareness training program. We've already got that. Videos, phish/vish/USB assessments, posters, e-mail alerts, etc. All supported and enforced by senior management. This is a "bonus" add-on... a "nice to have".
- How to report something suspicious
- Security tips / RSS feed of SANS Tip of the Day
- A listing of cool, end user-related security resources (SANS newsletters, National Cybersecurity Awareness Month resources, threat maps with flashy lights, etc.)
- An RSS feed of a select few "end user-friendly" blogs
- Links to all corporate security policies, procedures, and documents
EDIT so newcomers see this. This isn't supposed to be 'THE' entire security awareness training program. We've already got that. Videos, phish/vish/USB assessments, posters, e-mail alerts, etc. All supported and enforced by senior management. This is a "bonus" add-on... a "nice to have".
LinkedIn - Just mention you're from TE!
Comments
2020: GCIP | GCIA
2021: GRID | GDSA | Pentest+
2022: GMON | GDAT
2023: GREM | GSE | GCFA
WGU BS IT-NA | SANS Grad Cert: PT&EH | SANS Grad Cert: ICS Security | SANS Grad Cert: Cyber Defense Ops | SANS Grad Cert: Incident Response
I'm trying to keep it as simple as possible with as much "cool" stuff as possible... links to thinks like "HaveIBeenPwned", threat maps and other blinky lights... easier-to-read RSS feeds that don't go into too much techy detail, etc, etc.
We already have mandatory video training at the beginning of employment as well as every follow-on quarter (among other things). This is primarily as a secondary reference.
This will help your overall end user training goal .... for free. Cofense has CBFree video training. They have compliance modules and awareness modules. The awareness modules are where you educate the users on phishing, spam, etc. All videos are 5mins with 2-4 questions at the end.
Overview
https://cofense.com/cbfree-computer-based-training/
Awareness Module Signup
https://cofense.com/cbfree-download-awareness-modules/
Compliance Module Signup
https://cofense.com/cbfree-download-cbt-modules/
Hopefully your employer takes security seriously and backs you up on having users review these. I work in the finance industry so its actually law....
2023 Cert Goals: SC-100, eCPTX
Effective end user security awareness training should be short, relevant, and if possible entertaining.
A better approach would be to hold webinar that is recorded and posted on your intranet where you provide few examples of recent credential stuffing attacks. Explain how the users can protect themselves by using "HaveIBeenPwned" and a password manager.
Imagine if HR dropped a 200 page packet on your desk, said all of your benefits were changing and walked away without providing any sort of summary or analysis. That's what you are doing to your users by throwing links and feeds at them without any sort of personal touch and relevant context.
2020: GCIP | GCIA
2021: GRID | GDSA | Pentest+
2022: GMON | GDAT
2023: GREM | GSE | GCFA
WGU BS IT-NA | SANS Grad Cert: PT&EH | SANS Grad Cert: ICS Security | SANS Grad Cert: Cyber Defense Ops | SANS Grad Cert: Incident Response
Security Engineer/Analyst/Geek, Red & Blue Teams
OSCP, GCFA, GWAPT, CISSP, OSWP, AWS SA-A, AWS Security, Sec+, Linux+, CCNA Cyber Ops, CCSK
2021 goals: maybe AWAE or SLAE, bunch o' courses and red team labs?
Who we are | What we do
That's some good stuff right there! ...and plays into exactly how I'm trying to frame this whole thing: as a marketing tool to spread the word of who we are and what we do; not to be the internal source of training.
Thanks, gents!