{"id":291,"date":"2023-04-23T18:20:17","date_gmt":"2023-04-23T18:20:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/areno1\/?p=291"},"modified":"2023-04-23T18:20:17","modified_gmt":"2023-04-23T18:20:17","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/areno1\/2023\/04\/23\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The human factor in cybersecurity"},"content":{"rendered":"\n<p>Dri reno<br>IT200<br>4\/20\/23<br>The human factor in cybersecurity<br>In my capacity as Chief Information Security Officer, I would take a risk-based approach<br>to the distribution of funding between more cybersecurity technology and training.<br>I would start by performing a thorough risk assessment to determine the biggest security<br>dangers to my firm. My understanding of the most common security threats and the assets that<br>are most essential to the organization&#8217;s operations would be aided by the results of the risk<br>assessment. I would prioritize my security efforts in light of this knowledge.<br>I would devote a sizable percentage of the budget to training and education initiatives if the risk<br>assessment reveals that human error significantly contributes to security vulnerabilities. These<br>initiatives would aim to educate staff members about cybersecurity threats and train them on how<br>to spot and reduce these dangers.<br>On the other hand, I would devote more funds to cybersecurity technologies if the risk<br>assessment identified external threats as a more serious worry. For instance, to identify and<br>stop external threats, I might spend money on firewalls, intrusion detection systems, and<br>endpoint security.<br>I would also take into account the culture and cybersecurity stance of the firm. I might invest<br>more money in cybersecurity technology if the company has a good security culture and its<br>staff is already knowledgeable about the hazards involved. To assist create a strong security<br>the culture within the organization, I would prioritize training programs if the organization&#8217;s<br>security culture is weak.<br>In the end, the distribution of funds between cybersecurity training and new technologies will<br>rely on the particular needs at the end of the day I\u2019m going to make sure that everything is<br>good and up to-date and making sure that everyone gets the right training to succeed.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dri renoIT2004\/20\/23The human factor in cybersecurityIn my capacity as Chief Information Security Officer, I would take a risk-based approachto the distribution of funding between more cybersecurity technology and training.I would start by performing a thorough risk assessment to determine the biggest securitydangers to my firm. My understanding of the most common security threats and the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/areno1\/2023\/04\/23\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":26200,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/users\/26200"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/posts\/291\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/areno1\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}