Workplace Deviance

Cyber technology has made workplace deviance a lot easier, and a lot harder to catch in some instances. Because almost everything we do at work now happens on a computer or network, employees have more chances to misuse systems without being physically seen or even present. For example, someone can copy sensitive files onto a…

CISO Writeup

Justin Barfield-Smith Chief Information Security Officer Ctrl Alt Defend Bottom Line Up Front: Given a constrained budget, it seems the most effective cybersecurity strategy is a balanced investment: approximately 60% in human-factor training and awareness initiatives, and 40% in targeted technological controls. This allocation recognizes that human error remains the predominant contributor to cyber incidents,…

SCADA Writeup

Supervisory Control and Data Acquisition (SCADA) systems form the backbone of modern industrial automation. It provides centralized oversight and management for critical infrastructure and is an industrial control system designed to monitor and coordinate large-scale processes such as power generation, water treatment, transportation, and manufacturing. These systems do not typically control processes directly in real…