{"id":303,"date":"2025-11-21T18:41:27","date_gmt":"2025-11-21T18:41:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/krisraesmith\/?p=303"},"modified":"2025-11-21T18:41:30","modified_gmt":"2025-11-21T18:41:30","slug":"human-factor-in-cyber-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/krisraesmith\/2025\/11\/21\/human-factor-in-cyber-security\/","title":{"rendered":"Human Factor in Cyber Security"},"content":{"rendered":"Chief Information Security Officer<br \/>The Chief Information Security Officer is a senior leader in the organization that is in<br \/>charge of protecting the organization&#8217;s information and makes sure that the business runs<br \/>smoothly and securely. They set up the game plan on how things are going to run. They build the<br \/>security within the organization, make policies and then report any significant threats or possible<br \/>threats.<br \/>How to balance training and technology<br \/>First, with today&#8217;s day and age I would focus on technology first. Although they are both<br \/>very important I would say to focus on the technology side of it first. I would try to keep costs as<br \/>low as possible to keep the budget. Most important parts of the training would be with those that<br \/>deal with the most sensitive information and valuable information. I would then focus on the<br \/>policies and procedures.<br \/>Conclusion<br \/>With a limited budget, I would focus mainly on technology and then training those for the<br \/>most valuable and sensitive information positions to make sure there is the most coverage and<br \/>knowledge along those positions. This process would certainly give the most benefit to the<br \/>organization without going over the limited budget. This can also reduce the holes within the<br \/>technology aspect of everything.<br \/>","protected":false},"excerpt":{"rendered":"<p>Chief Information Security OfficerThe Chief Information Security Officer is a senior leader in the organization that is incharge of protecting the organization&#8217;s information and makes sure that the business runssmoothly and securely. They set up the game plan on how things are going to run. They build thesecurity within the organization, make policies and then&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/krisraesmith\/2025\/11\/21\/human-factor-in-cyber-security\/\">Read More<\/a><\/div>\n","protected":false},"author":31450,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/posts\/303"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/users\/31450"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/comments?post=303"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/posts\/303\/revisions"}],"predecessor-version":[{"id":304,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/posts\/303\/revisions\/304"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/media?parent=303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/categories?post=303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/tags?post=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}