{"id":300,"date":"2024-11-17T18:09:01","date_gmt":"2024-11-17T18:09:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/?p=300"},"modified":"2024-11-17T18:09:01","modified_gmt":"2024-11-17T18:09:01","slug":"thinking-like-a-ciso-allocating-funds","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/2024\/11\/17\/thinking-like-a-ciso-allocating-funds\/","title":{"rendered":"Thinking Like a CISO: Allocating Funds"},"content":{"rendered":"\n<p>Thinking like a Chief Information Security Officer, the most benefit to be gained in allocating funds would come from ensuring that the employees who operate the cyber realm of the company are trained, and the digital space is protected. 70% of the cyber defense budget would go to training employees whilst the remaining 30% would be allocated towards cyber security technologies.<\/p>\n\n\n\n<p><strong>Top Security Threat \u2013 Improperly Trained Employees<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A report showed that 82% of data breaches involved a human element (Alder, 2022). A majority of those data breaches were likely caused by something as simple as a phishing attempt. Phishing is the act of stealing sensitive data and credentials by pretending to be a trustworthy source, such as a false webpage or other things of that nature (Cloudflare). Phishing scams were one of the topmost reported cybercrimes in 2020 causing loses exceeding 4.2 billion dollars (FBI). Those numbers can be decreased, and security flaws be mitigated by ensuring employees are properly trained, and from that training, employees can recognize when they are being duped. A study showed that the phish-prone percentage (PPP), after one year of ongoing training, dropped from 32.4% to just 5% (Alder, 2022<a href=\"https:\/\/www.hipaajournal.com\/study-confirms-security-awareness-training-significantly-reduces-susceptibility-to-phishing-attacks\/\"><\/a>). This indicates that training is necessary and very effective.<\/p>\n\n\n\n<p><strong>Further Mitigation &#8211; Cybertechnology<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Technology also plays a critical role in cyber threat prevention. Because of this, a strong security policy and clear operating procedures would be crucial in protecting information. Things like a firewall, endpoint protection, and ensuring regular scheduled updates happen to plug vulnerabilities in a timely manner, would all be implemented (Fortinet). Endpoint protection being most important as it protects the entire network rather than just a single device like antivirus does (Fortinet). Anything left over from the budget would include things like MFA technology and continuous monitoring to allow organizations to respond to threats in real time (https:\/\/secureframe.com\/blog\/continuous-monitoring-cybersecurity).<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>A CISO should address the technological as well as the human aspect when dealing with defending an organization. Hands on training and ensuring compliance with training requirements would benefit an organization significantly. They would be able to recognize attacks and alert the security team of the attempt who would then be able to disseminate that information to everyone in the organization. Utilizing whatever is leftover for technology would cover all bases and ensure proper protection and operation of the system.<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<ol>\n<li>Alder, S. (2022).&nbsp;<em>Study Confirms Security Awareness Training Significantly Reduces Susceptibility to Phishing Attacks<\/em>. HIPAA Journal.&nbsp;<a href=\"https:\/\/www.hipaajournal.com\/study-confirms-security-awareness-training-significantly-reduces-susceptibility-to-phishing-attacks\/\">https:\/\/www.hipaajournal.com\/study-confirms-security-awareness-training-significantly-reduces-susceptibility-to-phishing-attacks\/<\/a><\/li>\n\n\n\n<li>Bonnie, E. (2024).&nbsp;<em>7 Benefits of Continuous Monitoring &amp; How Automation Can Maximize Impact<\/em>. Secureframe.&nbsp;<a href=\"https:\/\/secureframe.com\/blog\/continuous-monitoring-cybersecurity\">https:\/\/secureframe.com\/blog\/continuous-monitoring-cybersecurity<\/a><\/li>\n\n\n\n<li>Cloudflare.&nbsp;<em>What is a phishing attack?<\/em>&nbsp;Cloudflare.&nbsp;<a href=\"https:\/\/www.cloudflare.com\/learning\/access-management\/phishing-attack\/\">https:\/\/www.cloudflare.com\/learning\/access-management\/phishing-attack\/<\/a><\/li>\n\n\n\n<li>FBI. (2021).&nbsp;<em>FBI Releases the Internet Crime Complaint Center&nbsp;2020 Internet Crime Report, Including COVID-19 Scam Statistics<\/em>. FBI.&nbsp;<a href=\"https:\/\/www.fbi.gov\/news\/press-releases\/press-releases\/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics\">https:\/\/www.fbi.gov\/news\/press-releases\/press-releases\/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics<\/a><\/li>\n\n\n\n<li>Fortinet.&nbsp;<em>What Is Endpoint Security? How Does It Work?<\/em>&nbsp;Fortinet Inc.&nbsp;<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-endpoint-security\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-endpoint-security<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Thinking like a Chief Information Security Officer, the most benefit to be gained in allocating funds would come from ensuring that the employees who operate the cyber realm of the company are trained, and the digital space is protected. 70% of the cyber defense budget would go to training employees whilst the remaining 30% would&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/2024\/11\/17\/thinking-like-a-ciso-allocating-funds\/\">Read More<\/a><\/div>\n","protected":false},"author":24660,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/posts\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/users\/24660"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/posts\/300\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}