{"id":295,"date":"2025-11-09T17:47:42","date_gmt":"2025-11-09T17:47:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/justinbarfield\/?p=295"},"modified":"2025-11-09T17:47:42","modified_gmt":"2025-11-09T17:47:42","slug":"ciso-writeup","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/justinbarfield\/2025\/11\/09\/ciso-writeup\/","title":{"rendered":"CISO Writeup"},"content":{"rendered":"\n<div class=\"wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<p>Justin Barfield-Smith<\/p>\n\n\n\n<p>Chief Information Security Officer<\/p>\n\n\n\n<p class=\"has-text-align-left\">Ctrl Alt Defend<\/p>\n<\/div>\n\n\n\n<p>Bottom Line Up Front: Given a constrained budget, it seems the most effective cybersecurity strategy is a balanced investment: approximately 60% in human-factor training and awareness initiatives, and 40% in targeted technological controls. This allocation recognizes that human error remains the predominant contributor to cyber incidents, yet effective technology remains essential to contain threats that human awareness alone cannot prevent.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Introduction<\/strong><\/p>\n\n\n\n<p>In today\u2019s cyber threat environment, the human element plays a pivotal role in both incident causation and prevention. As CISO, I must determine how best to allocate finite resources between training the workforce and deploying cybersecurity technologies. Given research showing that employee behavior often triggers attacks (e.g., through phishing, credential misuse, inadvertent disclosures), organizations must invest in both human and technical defenses. Yet budget constraints demand prioritization and a strategy that maximizes risk reduction per dollar spent.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Understanding the Human Factor in Cybersecurity<\/strong><\/p>\n\n\n\n<p>Human behavior remains a primary attack vector. Studies show that many breaches begin with an employee\u2019s mistake: clicking a malicious link, using weak credentials or passwords, or misconfiguring a device (Threatscape.com). For example, cognitive biases (such as overconfidence or urgency in decision-making) are exploited by adversaries to bypass technological controls (PMC). Further, training programs that are generic or compliance-driven often fail to translate into behavioral change: \u201cone size fits all\u201d awareness efforts do not sufficiently tailor to the roles and risk profiles of staff (Threatscape.com). Therefore, human risk must be addressed deliberately and systematically.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Technology\u2019s Role and Its Limitations<\/strong><\/p>\n\n\n\n<p>On the technological side, tools such as phishing simulators, security information and event management (SIEM), endpoint detection &amp; response (EDR), multi-factor authentication (MFA), and network segmentation are vital. These controls help reduce the \u201cattack surface,\u201d detect anomalies, and limit the fallout from successful attacks. But technology alone is not a panacea. Because adversaries increasingly exploit human rather than purely technical vulnerabilities, technology without human awareness can leave gaps (200T Mod 06). Moreover, expensive tools with low adoption or poor alignment to organizational context may deliver diminishing returns. Therefore, technology must be selected carefully and integrated with human processes.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Proposed Budget Allocation Strategy<\/strong><\/p>\n\n\n\n<ul>\n<li>Given that human error contributes substantially to breach incidents, placing a slightly higher weight on the training side addresses the root of many risks.<\/li>\n\n\n\n<li>The 40% investment in technology ensures solid baseline protections, targeted to the most critical controls and risk-exposure areas.<\/li>\n\n\n\n<li>This 60\/40 split is not rigid \u2013 it will be fine-tuned over time based on metrics (e.g., phishing click-rates, incident counts, tool efficacy) and organizational risk profile.<\/li>\n<\/ul>\n\n\n\n<p><strong>Training (~60% of budget):<\/strong><\/p>\n\n\n\n<ol>\n<li>Role-based training \u2013 differentiate modules for executives, finance, IT\/OT staff, general employees.<\/li>\n\n\n\n<li>Frequent micro-learning, simulated phishing campaigns, and incident-reporting drills \u2013 to move beyond mere awareness and into behavioral change. (Research suggests behavioral interventions reduce susceptibility when continuous (PMC).)<\/li>\n\n\n\n<li>Culture and leadership engagement \u2013 training for senior management on setting tone and reinforcing policies; ensure policy-to-practice alignment (Threatscape.com)<\/li>\n\n\n\n<li>Measurement and Metrics \u2013 implement key performance indicators (KPIs) like reporting rates of phishing, time to detect, percentage of staff completing training. This will feed into refinement of the program.<\/li>\n\n\n\n<li>Awareness campaigns and continuous reinforcement \u2013 not one-and-done annual training, but ongoing refreshers tied to the current threat landscape.<\/li>\n<\/ol>\n\n\n\n<p><strong>Technology (~40% of budget):<\/strong><\/p>\n\n\n\n<ol>\n<li>Multi-Factor Authentication (MFA) and Identity Management \u2013 foundational to reducing credential-based risks.<\/li>\n\n\n\n<li>Phishing simulation &amp; email filtering tools \u2013 support training by reducing real-world exposure and tracking staff behavior.<\/li>\n\n\n\n<li>Endpoint Detection &amp; Response (EDR) solutions \u2013 to detect and respond to breaches quickly, especially those initiated by human actions.<\/li>\n\n\n\n<li>Basic network segmentation and access control \u2013 especially for high-risk functions (finance, HR, OT\/ICS environment).<\/li>\n\n\n\n<li>Incident response tools and automation \u2013 to ensure that when human error leads to a breach, the organization can respond rapidly and contain the damage.<\/li>\n<\/ol>\n\n\n\n<p class=\"has-text-align-center\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>As CISO, my allocation strategy emphasizes the human factor first \u2013 because human behavior continues to be a leading vector for breaches \u2013 and then backs this with targeted technology solutions. The 60% training \/ 40% technology split provides a pragmatic starting point. Role-based, continuous training, leadership involvement, behavioral metrics and cultural change are the foundations for this strategy. Technology investments support and enable human performance; they are not a complete substitute for it. Over time, metrics will guide adjustments in budget allocation to match an evolving threat landscape and organizational growth. Ultimately, the goal is a resilient security posture built not just on tools, but on empowered, informed people and effective processes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Justin Barfield-Smith Chief Information Security Officer Ctrl Alt Defend Bottom Line Up Front: Given a constrained budget, it seems the most effective cybersecurity strategy is a balanced investment: approximately 60% in human-factor training and awareness initiatives, and 40% in targeted technological controls. This allocation recognizes that human error remains the predominant contributor to cyber incidents,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/justinbarfield\/2025\/11\/09\/ciso-writeup\/\">Read More<\/a><\/div>\n","protected":false},"author":31356,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/users\/31356"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justinbarfield\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}