{"id":81,"date":"2025-12-02T03:43:53","date_gmt":"2025-12-02T03:43:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse008\/?page_id=81"},"modified":"2025-12-02T03:59:21","modified_gmt":"2025-12-02T03:59:21","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse008\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p><strong>Jayden Hood<\/strong><br>Professor Duvall<br>CYSE-200T<br>11\/16\/25<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Write Up \u2013 The Human Factor in Cybersecurity<\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>BLUF (Bottom Line Up Front)<\/strong><\/h2>\n\n\n\n<p>In such conditions, balancing investments across people, technology, and preparedness is most effective to reduce organizational threats for a CISO with a limited budget. Training strengthens employee behavior, modern security systems block advanced attacks, and incident-response readiness ensures the organization can recover quickly when threats succeed.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Balancing Technology and Training as a CISO<\/strong><\/h2>\n\n\n\n<p>As a CISO with constrained resources, I face the challenge of apportioning funding in a way to reduce the number of organizational threats for the least cost. This requires assessing the balance of human-centric programs, training and awareness, and behavioral controls, with technical controls, like tools, automation, and monitoring. Here is how I would approach this allocation, and why.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What can we do?<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Implementation of Enhanced Security Systems (35%)<\/strong><\/h3>\n\n\n\n<p>Reasoning? implementation security, in today\u2019s society is crucial because cyber threats and cybercrime are growing rapidly. These attackers and outside organizations have updated their techniques by using advanced methods that older or outdated systems can\u2019t defend against, they also have started to use more advanced tools such as exploit kits,malware toolkits, RATs(Remote Access Trojans), and many more.<\/p>\n\n\n\n<p><strong>Focus area<\/strong><br>Protect sensitive data from theft, misuse, or exposure<br>Prevent costly breaches that could damage finances and reputation<br>Detect attacks earlier through improved monitoring and automation<br>Close vulnerabilities that attackers might exploit<br>Comply with regulations and industry security standards<br>Support business continuity by reducing downtime from cyber incidents<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Prioritize Foundational Security Training (15%)<\/strong><\/h3>\n\n\n\n<p>Human error remains the leading cause of breaches\u2014phishing, weak passwords, mishandling data, or misconfiguring systems. Even the best technology fails if employees don\u2019t recognize threats or follow secure practices.<\/p>\n\n\n\n<p><strong>Focus area<\/strong><br>Regular phishing simulation and coaching<br>Role-based security training (IT, HR, finance, executives)<br>Clear policies explained in plain language<br>Security culture programs, not one-time modules<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Invest in Essential Cybersecurity Technology (20%)<\/strong><\/h3>\n\n\n\n<p>Training alone is insufficient. Attackers automate, innovate, and exploit system weaknesses that humans cannot realistically guard against without technological support.<\/p>\n\n\n\n<p><strong>Focus area<\/strong><br>Endpoint Detection and Response (EDR)<br>Email security filtering<br>Multifactor Authentication (MFA)<br>Vulnerability scanning and patch management<br>Cloud security posture monitoring (if applicable)<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Reserve funding for Incident response &amp; continuous improvement (10%)<\/strong><\/h3>\n\n\n\n<p>Even with training and tools, breaches can still occur. A CISO must ensure the organization can respond quickly and learn from incidents.<\/p>\n\n\n\n<p><strong>Focus area<\/strong><br>Incident response retainers<br>Tabletop exercises<br>Log analysis tools<br>Post-incident reviews and process updates<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why does it matter?<\/strong><\/h2>\n\n\n\n<p>These focus areas matter because modern cyber threats are more sophisticated, automated, and frequent than ever before. Without strong training, updated security tools, and a solid incident response strategy, an organization becomes an easy target. Every weakness\u2014whether it\u2019s an untrained employee, outdated software, or poor monitoring\u2014creates an opening for attackers to exploit.<\/p>\n\n\n\n<p>By prioritizing these areas, the organization can:Reduce the chance of a successful attack ,protect sensitive data and customer information, and avoid financial losses, legal consequences, and downtime<\/p>\n\n\n\n<p>Training is relatively inexpensive but drastically reduces risk. Strengthening people reduces the attack surface across the entire organization.<\/p>\n\n\n\n<p>These technologies provide the \u201calways-on\u201d protective layer that training cannot deliver. They catch threats employees may miss and prevent small mistakes from becoming major incidents.<\/p>\n\n\n\n<p>This ensures resilience\u2014being able to detect, contain, and recover quickly.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>The situation regarding threats is such that the methods of the enemies are constantly changing, and the Chief Information Security Officer (CISO) cannot rely on one defense line alone, especially when the resources are limited. The proper method, therefore, is a harmonized one that supports the personnel, refreshes the technology, and prepares the organization for incident response in case the first two lines fail.<\/p>\n\n\n\n<p>By putting money into better security systems, specialized employee training, minimal defensive tools, and organized incident-response capabilities, the company is reducing risk at every level across its environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jayden HoodProfessor DuvallCYSE-200T11\/16\/25 Write Up \u2013 The Human Factor in Cybersecurity BLUF (Bottom Line Up Front) In such conditions, balancing investments across people, technology, and preparedness is most effective to reduce organizational threats for a CISO with a limited budget&#8230;. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse008\/the-human-factor-in-cybersecurity\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29905,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/pages\/81"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/users\/29905"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/pages\/81\/revisions"}],"predecessor-version":[{"id":97,"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/pages\/81\/revisions\/97"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/media?parent=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}