{"id":295,"date":"2024-12-03T23:42:24","date_gmt":"2024-12-03T23:42:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/?p=295"},"modified":"2024-12-03T23:42:24","modified_gmt":"2024-12-03T23:42:24","slug":"balancing-cybersecurity-training-vs-technology","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/2024\/12\/03\/balancing-cybersecurity-training-vs-technology\/","title":{"rendered":"Balancing Cybersecurity: Training vs. Technology"},"content":{"rendered":"\n<p>When asked how I would balance training vs. technology with a low budget.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What would I do?<\/h3>\n\n\n\n<p>As a Chief Information Security Officer (CISO) who must manage a limited budget, I focus on the training aspect of cybersecurity, after all the readings, I don&#8217;t see the point of introducing more, and, or better technology that will be handled by people who aren&#8217;t trained to handle it. With my limited balance, I would stir toward training or look for a middle ground. If I train my employees more, I wouldn&#8217;t need to spend as much on cybersecurity technology. The revenue could be used to generate more money.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why?<\/h3>\n\n\n\n<p>Well, the risk behind leaning toward training is less than that of spending on cybersecurity technology. Better software is almost always a good thing, but people who lack training won\u2019t know how to manage it. &nbsp;There is less risk to investing in better training programs, better employees could increase profit by a large margin.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When asked how I would balance training vs. technology with a low budget. What would I do? As a Chief Information Security Officer (CISO) who must manage a limited budget, I focus on the training aspect of cybersecurity, after all the readings, I don&#8217;t see the point of introducing more, and, or better technology that&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/2024\/12\/03\/balancing-cybersecurity-training-vs-technology\/\">Read More<\/a><\/div>\n","protected":false},"author":29919,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/users\/29919"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}