For the e-learning portion of the blended training program, the company chose MoreSteam.com, which specializes in online Six Sigma training. Over several weeks, each security team member worked on the online beginner class, which provided a cost effective way to evaluate Six Sigma. Individuals worked at their own pace until completing the program. Each member’s progress was monitored via the Web by tracking online quiz results. Teleconferences were held to support the e-learning, as well as to discuss possible projects.
The subjects taught during the class included the DMAIC process, process mapping, measurement and basic statistics, understanding variation, and standardized work documentation.
One team member was given additional training and served as the Six Sigma project leader after the trainer left. The remaining team members stopped after the initial training.
The purpose for training each member at a basic level was to give all members an understanding of terminology as well as driving cultural change. The goal was not just to save money and improve quality on a project-by-project basis, but to create an environment driven by data and measurements.
As an initial project, the company chose to address access control issues. The overall problem was that security received a significant number of access control alarms. When security responded to these alarms, they often found that the access control devices were malfunctioning. The data had been collected from the system audit reports that showed thousands of data points indicating various potential security breaches. However, security eventually responded to these alarms as if they were false, creating the potential for a real security incident to be ignored or handled poorly. Once the project was chosen, the Six Sigma project leader worked alongside the trainer to apply to the real world what had been learned in the online training class.
Applying the Six Sigma process, the company decided to work with the access control vendor and address each malfunctioning device. After this was completed, a maintenance schedule was devised to ensure that devices remained in good working order.