{"id":295,"date":"2023-12-08T01:00:34","date_gmt":"2023-12-08T01:00:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/?p=295"},"modified":"2023-12-08T01:00:34","modified_gmt":"2023-12-08T01:00:34","slug":"cyber-budget","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/2023\/12\/08\/cyber-budget\/","title":{"rendered":"Cyber Budget"},"content":{"rendered":"\n<p>Cyber Budget<br>As a chief technological officer your duty for your budget is split up in two sections. The<br>First being cyber security training, such as going over safe email use and the second part is<br>cyber security technology . An example of this would be a firewall or 2 factor authentication.<br>Cyber Security Training<br>In a company cyber security training is extremely important to not just increase<br>employees knowledge but also to raise awareness for the possible dangers that could shut<br>down the companies . The order of business if I were to be in charge of allocating funds would<br>be to invest 30% of the cybersecurity budget to monthly cybersecurity training and tests. The<br>reason why I would do a monthly test would be to not only test my employees but also to teach<br>them what not to do. The reason why training and awareness is so important is because if the<br>servers go down virtually every one of the employees will not be able to do their work because<br>of the use of technology in the workforce today.(Wallace, 2019)<br>Cyber Security Technology<br>The technology part of cybersecurity is a very vital step to running a cyber security<br>department. This side of cyber security is also probably the most expensive. This is because the<br>technology used is always evolving so you are always buying new technology to prevent<br>breaches. This is why I would spend 70% of my budget to buy new technologies such as the<br>newest softwares and in a consulting team to manage and mitigate our risk.<br>Conclusion<\/p>\n\n\n\n<p>In conclusion, leading a cyber security department is a massive responsibility. It is a<br>large responsibility because if you mess up and allow a security breach into the company and<br>either client data, company data or your business needs to shut down then your company will<br>collapse.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>References<br>Wallace, F. (2019, June 3). CyberUSA College Park, MD. United States<br>Cybersecurity Magazine.<br>https:\/\/www.uscybersecurity.net\/cybersecurity-training-important\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber BudgetAs a chief technological officer your duty for your budget is split up in two sections. TheFirst being cyber security training, such as going over safe email use and the second part iscyber security technology . An example of this would be a firewall or 2 factor authentication.Cyber Security TrainingIn a company cyber security&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/2023\/12\/08\/cyber-budget\/\">Read More<\/a><\/div>\n","protected":false},"author":27631,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/users\/27631"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandrosmendrinos\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}