Resources: Awareness Posters


Posters can be a great way to communicate your message; such as the best way for ordinary computer users to protect themselves or a roadmap to help you plan, build and implement your security awareness program. These resources are developed by the community for the community. These posters are distributed under the Creative Commons BY-NC-ND 3.0 license. You are welcome and encouraged to download, print and share these posters as long as you do not modify them. Please send any questions or any feedback on how to improve these resources to

You Are A Target

This poster identifies and explains different ways cyber criminals can make money from a hacked computer. This helps ordinary computer users understand why they are a target and how they are worth money. This is an excellent resource to actively engage people in your awareness program. This poster is based on the original work of Brian Krebs.

Don't Get Hooked

This poster teaches people how to identify phishing and spear phishing emails. It provides an example of a common phishing email and the most common indicators that it is an attack. This poster was created as a community project based on input from numerous individuals and organizations.

Security Awareness Roadmap

This poster walks you through step-by-step how to build an engaging, high-impact security awareness program. Included are templates, checklists and documents that provide everything you need to plan, maintain and measure your program.

Controls Systems Are A Target

This poster identifies and explains different reasons why and how cyber attackers will target Industrial Control Systems / SCADA networks. This is an excellent awareness resource for critical infrastructure.

NERC Standards Mapping to Critical Security Controls

This poster maps the different NERC CIP standards (ver 03, 04 and 05) to the Critical Security Controls.

Securing Web Applications Poster

This poster provides a simple reference for developing secure web applications. The poster can be used as a first step towards building secure coding skills in your development team.