{"id":300,"date":"2023-04-12T15:56:56","date_gmt":"2023-04-12T15:56:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sblac\/?p=300"},"modified":"2023-04-12T15:56:56","modified_gmt":"2023-04-12T15:56:56","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sblac\/2023\/04\/12\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p><strong>BLUF Statement<\/strong><br>In this writing, I will be explaining how I would manage and distribute the amount of<br>money the company is working with. This will include : handling the funds that will go into the<br>tradeoffs for training, along with the cybersecurity technology that is added on. Then, last but not<br>least I will include the reason why I would handle the budget this way.<br><strong>Balancing Trade Offs<\/strong><br>When balancing the tradeoffs, I would first pinpoint which ones we are associated with.<br>Next, try to direct and lead the people that are involved, such as clients to ensure they understand<br>how much getting the additional technology will benefit them ( Robinson, 2019). Specifically<br>someone that is in a higher position, such as a security officer(me) should explain the concept<br>and help the customer understand. As a CISO, knowing the risk and important information that<br>comes along with adding such advanced technology is essential to being successful. Another<br>thing is that I would prioritize and focus on which goals or technology is most important.<br><strong>Distributing funds<\/strong><br>The reason I say this is because then you will have a guideline to follow when figuring<br>out which aspects to put the most money into.(Robinson, 2019) This way you are using the<br>budget wisely and not splurging on the less important parts of the company&#8217;s issues\/technology.<br><strong>Tradeoff Of Training<\/strong><br>I would ensure to inspire my trainees and employees to have a good energy level and stay<br>on top of their responsibilities. This will benefit them in taking care of the important things and<br>protecting themselves (Amos, 2022). Mainly pushing them to keep their tasks in check and<br>thoroughly do them, because if they do not then they put not only the company at risk, but also<br>themselves. Next, I would make them practice a good routine and utilize any tools they can get<br>their hands on. If someone puts their goals and training first, then they are bound to succeed,<br>therefore enforcing that will make them do well in the cybersecurity field.<br>Lastly, making them study group tasks or teaching them how to handle group occasions<br>would benefit them as well. (Amos, 2022)<br><strong>Conclusion<\/strong><br>In conclusion, getting the employees set up to know how to defend themselves and<br>protect the company as well as knowing the priorities for the company and correlating that with<br>the budget will lead to overall success. (Giordani, 2021) As long as there is a system or<br>procedure the company follows and being informed on how to manage the risks that may come<br>along with adding the things that are new to us are essential. This way we know how to combat<br>these risks when they come our way after adding these new technologies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF StatementIn this writing, I will be explaining how I would manage and distribute the amount ofmoney the company is working with. This will include : handling the funds that will go into thetradeoffs for training, along with the cybersecurity technology that is added on. Then, last but notleast I will include the reason why&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sblac\/2023\/04\/12\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":26126,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/users\/26126"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":304,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts\/300\/revisions\/304"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}