{"id":295,"date":"2024-11-17T23:12:04","date_gmt":"2024-11-17T23:12:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/?p=295"},"modified":"2024-11-17T23:12:04","modified_gmt":"2024-11-17T23:12:04","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/2024\/11\/17\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p>This report outlines how, as a Chief Information Security Officer operating on a limited budget, how I would balance the tradeoff of training and additional cybersecurity technology. It explains my strategy for allocating limited funds, with detailed reasoning, to ensure no cyber threats.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Groundwork<\/strong><\/p>\n\n\n\n<p>As a Chief Information Security Officer I would first start by building a foundation\u00a0because it&#8217;ll help balance our budget and competence. Visualizing this helps us create a solid company plan and a realistic layout that will set the company up for maximum efficiency. Another key part of this is comparing the past plans to see what we can keep or do differently. This will bring a lot of benefits down the road and ensure a strong foundation for our new strategy.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Action Plan<\/strong><\/p>\n\n\n\n<p>The next step is creating a list of priorities and tackling the most important item first.\u00a0This could include incident response plans, addressing potential ransomware threats, data breaches, MFA, endpoint security, conducting risk assessments, and etc. Even though this action plan is a critical cybersecurity task, employee training is just as important. To stay ahead, regular training sessions will be conducted once a month to make sure everyone is fit to catch anything that can potentially harm the company. This field is very complex and fast changing and as a CISO I want to make sure my employees are prepared like no other.\u00a0<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Invest In Essential Technology<\/strong><\/p>\n\n\n\n<p>While everything I talked about is crucial, focusing on the correct technology in place is equally important. Putting in place tools such as intrusion detection (IDS), antivirus software, firewalls, etc. These technologies provide defense against various cyber threats and help in monitoring and mitigating risk. It&#8217;s also the most pricey out of everything so this will take up most of the funding but it&#8217;s essential for this growing company in securing our most critical assets. As reported by Giuseppe Brizio, understanding the most critical assets for the business will ensure they are assigned adequate protection.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>In conclusion, building a foundation to prioritize what&#8217;s important while on a limited budget will provide the best plan and security for a company. Making sure employees get the training that is needed ensures that they never forget the cybersecurity principles and practice, creating a well rounded space. Ultimately, this approach will not only maximize our efficiency but create a successful approach against future cyber threats.<\/p>\n\n\n\n<p><strong>Work Cited<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/approach-budgeting-ciso\/\">Brizio, G. (2021, July 5). <em>#HOWTO: Approach budgeting as a Ciso<\/em>. Infosecurity Magazine. https:\/\/www.infosecurity-magazine.com\/opinions\/approach-budgeting-ciso\/&nbsp;<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cybersecurity\/vulnerability-assessment\/\"><em>What is vulnerability assessment? types &amp; benefits<\/em>. SentinelOne. (2024, October 30). https:\/\/www.sentinelone.com\/cybersecurity-101\/cybersecurity\/vulnerability-assessment\/&nbsp;<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC7122347\/\">Borky, J. M., &amp; Bradley, T. H. (2018, September 9). <em>Protecting information with cybersecurity<\/em>. Effective Model-Based Systems Engineering. https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC7122347\/&nbsp;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This report outlines how, as a Chief Information Security Officer operating on a limited budget, how I would balance the tradeoff of training and additional cybersecurity technology. It explains my strategy for allocating limited funds, with detailed reasoning, to ensure no cyber threats. Groundwork As a Chief Information Security Officer I would first start by&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ayanniagamble\/2024\/11\/17\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":29793,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/users\/29793"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayanniagamble\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}