{"id":210,"date":"2026-04-19T12:15:10","date_gmt":"2026-04-19T12:15:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/?p=210"},"modified":"2026-04-19T12:34:40","modified_gmt":"2026-04-19T12:34:40","slug":"budget-allocation-for-training-and-technology","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/2026\/04\/19\/budget-allocation-for-training-and-technology\/","title":{"rendered":"Budget Allocation for Training and Technology"},"content":{"rendered":"\n<p>BLUF<\/p>\n\n\n\n<p>To effectively mitigate cyber threats driven by human behavior and workplace<br>deviance, I would recommend allocating 40% of the budget to behavioral training and<br>60% to technical security. I believe this balance allows employees to act as a first line of<br>defense while technology provides a necessary safety net for human error.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The Human Element<\/p>\n\n\n\n<p>I believe the human element is a major part of an organization\u2019s security because<br>employee actions, whether intentional or accidental, can create serious vulnerabilities. By<br>investing in training, it would help turn employees into active defenders by changing<br>their behavior through hands-on activities such as phishing instead of just watching<br>training videos. Research shows that realistic, continuous training helps employees fall<br>for phishing attacks less often and improves their ability to recognize threats (Alluqmani,<br>2025). This approach creates a more alert workplace by clearly explaining security rules<br>and consequences, creating more aware and responsible employees.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Safeguards<\/p>\n\n\n\n<p>As a Chief Information Security Officer with a limited budget, I would allocate<br>about 60% to cybersecurity technology and 40% to employee training. Although training<br>can reduce human error, I recognize that it cannot prevent all threats. Therefore, I would<br>prioritize technology to help prevent, detect, and limit damage when mistakes happen.<br>For example, tools like Data Loss Prevention (DLP) provide continuous protection that<br>training alone cannot achieve, which is supported by the National Institute of Standards<br>and Technology (NIST, 2020).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Conclusion<\/p>\n\n\n\n<p>I believe the balance between training and technology is not one or the other, they<br>must work together. From a behavioral viewpoint, I understand that employees are<br>naturally prone to error and influence, which makes them vulnerable to attacks like<br>phishing. While training can improve awareness and behavior, it cannot eliminate<br>mistakes completely. For this reason, I would prioritize technology slightly more with a<br>60\/40 ratio because it provides safeguards that reduce the impact of those errors. I<br>recognize that people will not always change their behavior, so I would rely on<br>technology as a backup to create a stronger and more realistic strategy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF To effectively mitigate cyber threats driven by human behavior and workplacedeviance, I would recommend allocating 40% of the budget to behavioral training and60% to technical security. I believe this balance allows employees to act as a first line ofdefense while technology provides a necessary safety net for human error. The Human Element I believe&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/2026\/04\/19\/budget-allocation-for-training-and-technology\/\">Read More<\/a><\/div>\n","protected":false},"author":31921,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts\/210"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/users\/31921"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"predecessor-version":[{"id":229,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts\/210\/revisions\/229"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}