Quantcast
Channel: Security Awareness – Security Catalyst
Browsing all 30 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Three Ways to Make Awareness Measurable

By Julie Fugett So much of what we do in information security is immediately measurable: how many packets did the firewall drop? How many security incidents did we handle this week? Elsewhere,...

View Article



Image may be NSFW.
Clik here to view.

Into the Breach – Audio Series – Chapter 1 (Breach: A Human Problem)

Welcome to the audio series of Into the Breach: Protect Your Business by Managing People, Information and Risk (click this link to learn more about this book and pick up a complete copy – to get...

View Article

Image may be NSFW.
Clik here to view.

Security From Scratch: Using Compliance For Good

by Dennis Kuntz “This isn’t just a legal compliance issue for us. We consider the privacy issue to be an opportunity to reinforce our brand image.” – Tom Warga, SVP and General Auditor, New...

View Article

RV Adventure inspired Awareness that Worksâ„¢

As the son of a son of a sailor I went out on the sea for adventure Expanding the view of the captain and crew Like a man just released from indenture As a dreamer of dreams and a travelin’ man I have...

View Article

Memo from users: educate, but don’t embarrass us

The moment we judge someone, we forfeit the ability to help. Seems like a lot of what is being promulgated in so-called “security awareness” today is nothing short of berating people with a list of...

View Article


Why people are not the problem in security and where to look (hint: grab a...

Do not put your faith in what statistics say until you have carefully considered what they do not say.  ~William W. Watt Over the last few years, we have been presented a series of reports, complete...

View Article

Image may be NSFW.
Clik here to view.

Why the definition of security awareness matters

Your paradigm is so intrinsic to your mental process that you are hardly aware of its existence, until you try to communicate with someone with a different paradigm. ~ Donella Meadows Considering the...

View Article

Image may be NSFW.
Clik here to view.

What a shopping carts reveals about security awareness

Tokens, Shopping Carts and Security Awareness What can grocery-shopping carts teach us about building security awareness that works to influence behavior change? Turns out perhaps more than imagined....

View Article


Image may be NSFW.
Clik here to view.

Uncovering my passion for security awareness and effective communication

Sixteen months ago, I was asked to share my “turning point” as a professional speaker and consultant. After taking the time to reflect about my turning point, write about it and share it, I learned...

View Article


Image may be NSFW.
Clik here to view.

How the mobile device security paper from Symantec yields insights on...

This morning, Symantec released a new paper written by Carey Nachenberg addressing Mobile Device Security [link]. Last week, John Harrison from Symantec offered me a preview and a briefing to discuss...

View Article

Image may be NSFW.
Clik here to view.

The Human Paradox Gap – Security Awareness Roundtable [Audio Download]

A common concern voiced in the industry is that people simply do not, and sometimes cannot, understand why they are asked to take actions for the sake of security. However, the challenge lies less with...

View Article

CSO Column: The Mic is Always On. Always.

A reflection on the challenges of open mics and social media — and how they impact our efforts — was the topic of an early column penned for CSO Online. Read the column here:...

View Article

Reconsidering Communication Series: why effectively communicating value...

“Good communication does not mean that you have to speak in perfectly formed sentences and paragraphs. It isn’t about slickness. Simple and clear go a long way.” ~ John Kotter The current challenges...

View Article


Image may be NSFW.
Clik here to view.

Three ways “effectively communicating value” can be measured

“The problem with communication is that it is too ‘squishy’ to be measured. It’s just easier to focus on technical efforts with project plans.” This is an actual comment from a client about the...

View Article

CSO Column: How your signature can propel your security career

This is a column inspired by a memorable experience at a car show. It also happens to be a personal favorite, since it’s inspired me to ensure my work is signature ready. See what I learned and...

View Article


CSO Column: Three reasons why asking risky questions reduces risk

From an otherwise innocent dinner table conversation, I penned this column examining the value of asking risky questions in the quest to reduce risk… what do you think? Read the column here:...

View Article

CSO Column: Is your definition of security holding you back?

A few years ago during a workshop, an exercise turned into a lesson learned for me. This column shares the story, the lesson learned and some tips on how you can improve your definition of security to...

View Article


(CSO) How security awareness leads to behavior change

I wrote this post to focus on the confusion about the role of security awareness in behavior change. The reality is that while awareness is an essential step, it is not enough to change behaviors....

View Article

Image may be NSFW.
Clik here to view.

Into the Breach – Audio Series – Chapter 1 (Breach: A Human Problem)

Welcome to the audio series of Into the Breach: Protect Your Business by Managing People, Information and Risk (click this link to learn more about this book and pick up a complete copy – to get...

View Article

Memo to the security team:educate, don’t embarrass us

The moment we judge someone, we forfeit the ability to help. Seems like a lot of what is being promulgated in so-called “security awareness“ today is nothing short of berating people with a...

View Article
Browsing all 30 articles
Browse latest View live




Latest Images