{"id":294,"date":"2025-12-05T00:39:25","date_gmt":"2025-12-05T00:39:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dxkyle200\/?p=294"},"modified":"2025-12-05T00:51:19","modified_gmt":"2025-12-05T00:51:19","slug":"write-up-on-the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dxkyle200\/2025\/12\/05\/write-up-on-the-human-factor-in-cybersecurity\/","title":{"rendered":"Write-Up on The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p>In this detailed write-up from my Cybersecurity course, I explore the critical role of the Chief Information Security Officer (CISO) and the delicate balance I need to strike between investing in employee training and upgrading cybersecurity technology. As the CISO, I understand that while advanced tech solutions are crucial for safeguarding our organization&#8217;s data infrastructure, it is equally important to develop a skilled and aware workforce. This document outlines strategies for effectively allocating resources, ensuring our team is well-trained in security protocols while also implementing state-of-the-art cybersecurity tools to enhance our defense measures. By integrating both aspects, I aim to build a strong security posture that not only protects our assets but also nurtures a culture of security awareness throughout the organization.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-content\/uploads\/sites\/39980\/2025\/12\/WU-The-Human-Factor-in-Cybersecurity.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WU-The-Human-Factor-in-Cybersecurity.\"><\/object><a id=\"wp-block-file--media-fd6591f3-5e7d-4041-bf81-eff678f9f137\" href=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-content\/uploads\/sites\/39980\/2025\/12\/WU-The-Human-Factor-in-Cybersecurity.pdf\">WU-The-Human-Factor-in-Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-content\/uploads\/sites\/39980\/2025\/12\/WU-The-Human-Factor-in-Cybersecurity.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-fd6591f3-5e7d-4041-bf81-eff678f9f137\">Download<\/a><\/div>\n\n\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">Write-Up on What to do with Cybersecurity? (ft. AI)<\/h2>\n\n\n\n<p>For this assignment, I was given the opportunity to utilize my preferred AI tool, ChatGPT, to conduct a thorough investigation and evaluation of the most effective placement for a Cybersecurity department within an organization. I explored various structural options, considering factors such as risk management, communication flow, and organizational hierarchy. After carefully analyzing these elements, I arrived at the conclusion that the Cybersecurity function should have a direct reporting line to the CEO. This positioning would not only elevate the importance of cybersecurity within the company but also ensure that it remains a strategic priority aligned with the organization&#8217;s overall goals and objectives.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-content\/uploads\/sites\/39980\/2025\/12\/annotated-David20Kyle20-20AI20Assignment20What20to20do20with20Cybersecurity.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-David20Kyle20-20AI20Assignment20What20to20do20with20Cybersecurity.docx.\"><\/object><a id=\"wp-block-file--media-096b2882-55b3-4c6f-8dd8-22311dc4f07c\" href=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-content\/uploads\/sites\/39980\/2025\/12\/annotated-David20Kyle20-20AI20Assignment20What20to20do20with20Cybersecurity.docx.pdf\">annotated-David20Kyle20-20AI20Assignment20What20to20do20with20Cybersecurity.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-content\/uploads\/sites\/39980\/2025\/12\/annotated-David20Kyle20-20AI20Assignment20What20to20do20with20Cybersecurity.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-096b2882-55b3-4c6f-8dd8-22311dc4f07c\">Download<\/a><\/div>\n\n\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">Stringed Paper Assignment<\/h2>\n\n\n\n<p>For this assignment, I had the opportunity to attend the thought-provoking play <em>Stringed<\/em>, which intricately delves into the lives of three Fates: Clotho, Lachesis, and Atropos. These mysterious figures possess the unique ability to control the destinies of all humans. The story kicks off with Zeus, the king of the gods, casting the Fates down to Earth after they refuse to intervene in the life of his beloved\u2014a life that was fated to end. This crucial moment lays the groundwork for a profound exploration of choices, fate, and the implications of divine intervention.<\/p>\n\n\n\n<p>After engaging thoroughly with the powerful performances and intricate storytelling of the play, I was tasked with writing a two-page essay. In this reflection, I will explore the key themes of the production, expressing my emotional reactions and insights gained from our class discussions. This will involve an analysis of character development\u2014how each of the Fates evolves throughout the narrative\u2014as well as their distinct objectives, methods, and the artistic design elements that enhanced the overall experience. Furthermore, I will consider the teamwork among the cast and crew that was essential to the production\u2019s success.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-content\/uploads\/sites\/39980\/2025\/12\/annotated-David20Kyle20Stringed20Paper20Essay.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-David20Kyle20Stringed20Paper20Essay.\"><\/object><a id=\"wp-block-file--media-8da1a65c-b230-47ca-89e5-f61b8158eb1f\" href=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-content\/uploads\/sites\/39980\/2025\/12\/annotated-David20Kyle20Stringed20Paper20Essay.pdf\">annotated-David20Kyle20Stringed20Paper20Essay<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-content\/uploads\/sites\/39980\/2025\/12\/annotated-David20Kyle20Stringed20Paper20Essay.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8da1a65c-b230-47ca-89e5-f61b8158eb1f\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this detailed write-up from my Cybersecurity course, I explore the critical role of the Chief Information Security Officer (CISO) and the delicate balance I need to strike between investing in employee training and upgrading cybersecurity technology. As the CISO, I understand that while advanced tech solutions are crucial for safeguarding our organization&#8217;s data infrastructure,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dxkyle200\/2025\/12\/05\/write-up-on-the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":30695,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/users\/30695"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":307,"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/posts\/294\/revisions\/307"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dxkyle200\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}