{"id":284,"date":"2023-11-20T01:51:24","date_gmt":"2023-11-20T01:51:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/?p=284"},"modified":"2023-11-20T01:51:24","modified_gmt":"2023-11-20T01:51:24","slug":"the-human-factors-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/2023\/11\/20\/the-human-factors-in-cybersecurity\/","title":{"rendered":"The Human Factors in CyberSecurity"},"content":{"rendered":"\n<p><strong>Chief Information Security Officer strategic planning for the better<\/strong><br>Gerkeil Owens<br>CYSE200T- The human factor in cybersecurity<br><br>As a Chief Information Security Officer (CISO) according to (Tidmarsh) I would have<br>various roles and responsibilities depending on the company I work for. In this case I will have a tight budget and I must carefully weigh the trade-off between investing in cybersecurity technology and training. To optimize the efficiency of the company\u2019s cybersecurity endeavors, here is how I would distribute the limited resources and funds. <br><br>First, I would Investigate affordable or open-source cybersecurity options that can offer sufficient security without breaking the bank. Before making any judgments, perform detailed analyses and consider the long-term expenses, scalability, and support options. Then, I would make a thorough evaluation of the company&#8217;s current cybersecurity setup, considering staff awareness, policy, and technology will help how to move forward into the future. Determining which important holes or weaknesses requires a quick solution. By conducting an extensive evaluation of the current state of the business, I will be able to identify the most important cybersecurity requirements in relation to the evaluation&#8217;s conclusions.<br><br> Then I would pay particular attention to patching vulnerabilities that put the most at risk the organization&#8217;s assets, such classified information, proprietary technology, or vital systems. As a chief security officer according to (\u201cChief Security Officer (CSO): Definition, Requirements, Duties\u201d) setting aside some funds for fundamental cybersecurity technology that offer strong procedures and necessary security would be my responsibility and a key step. Firewalls, antivirus programs, intrusion detection systems, and encryption tools are a few examples of this. These technologies serve as the foundation of a robust cybersecurity defense. Set aside a portion of the funds for programs that educate and train employees. Instruct staff members on cybersecurity best practices, which include spotting phishing emails, creating secure passwords, and reporting unusual activity. Frequent workshops, training sessions, and simulated phishing exercises can assist enhance the organization&#8217;s overall security environment. Provide money so that multi-factor authentication can be implemented in all important applications and systems. By requiring users to give multiple forms of authentication, such as a password and a unique code sent to their mobile device, multi-factor authentication adds an extra layer of security. This aids in preventing unwanted access even if passwords are stolen.<br><br><strong>Where to allocate the limited funds<\/strong><br><br>Next, I would Invest in monitoring, threat intelligence, and set aside some cash for the purchase of monitoring equipment and threat intelligence services. These tools assist in quickly identifying and responding to any security events as well as providing real-time information about developing risks. Which would be extremely helpful for the current state of business security and for the future as well. Provide resources for the development and improvement of incident response capabilities after establishing them. Developing a plan for managing incidents, running simulated scenarios, and purchasing equipment and services for handling incidents are all included in this. Reduced recovery costs and lessened impact are two benefits of being ready to respond to security issues. Update and evaluate the plan on a regular basis to make any adjustments and to continuously assess how well the budget is being used. To guarantee that funds are used as efficiently as possible, the company should periodically review its cybersecurity posture, new threats, and developing technology.<br><br>In conclusion, businesses should optimize their cybersecurity budget in an efficient way, no matter if the budget is limited or not. Doing these few things, I listed throughout this essay can improve their overall security posture and company by striking a balance between investments in core technology, employee training, and important security<br>measures.<br><br>Works Cited<br>\u201cChief Security Officer (CSO): Definition, Requirements, Duties.\u201d Investopedia,<br>https:\/\/www.investopedia.com\/terms\/c\/cso.asp. Accessed 5 November 2023.<br>\u201c4.7 Chief Information Security Officer (CISO) | CIO.GOV.\u201d CIO Council,<br>https:\/\/www.cio.gov\/handbook\/key-stakeholders\/ciso\/. Accessed 5 November<br>2023.<br>Tidmarsh, David. \u201cCISO Learning: Key CISO Roles, Skills, and Certifications.\u201d<br>EC-Council, 29 March 2023, https:\/\/www.eccouncil.org\/cybersecurityexchange\/executive-management\/essential-ciso-learnings\/. Accessed 5<br>November 2023.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chief Information Security Officer strategic planning for the betterGerkeil OwensCYSE200T- The human factor in cybersecurity As a Chief Information Security Officer (CISO) according to (Tidmarsh) I would havevarious roles and responsibilities depending on the company I work for. In this case I will have a tight budget and I must carefully weigh the trade-off between&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/2023\/11\/20\/the-human-factors-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":27534,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/posts\/284"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/users\/27534"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/posts\/284\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}