Everyone gets phishing emails. Not everyone falls for them. Find out how vulnerable users are to today’s biggest cyber threats in our eighth annual State of the Phish report. This year’s report dives deep into today’s threats—and how prepared users are to face them. Get a wealth of data, insight and advice...
Most cybersecurity leaders know that people are their organizations’ biggest and most dynamic attack surface. So why is phishing still the threat type most likely to cause a data breach? Most training programs lack staying power and doesn’t promote lasting changes in behavior. Download this e-book to learn why...
David Pollino, former CISO of PNC Bank, joins two editors at ISMG to discuss what organizations can do to harden their cybersecurity defenses, how we need to think about our adversaries differently in today's threat landscape and how the "Great Resignation" is affecting cybersecurity.
We look at cybersecurity largely focused on the immediate future. But educator Gary Henderson says we need to look a little further ahead. He makes the case for educating teachers about cybersecurity so they can educate their students, who can then go on to use those best practices in their careers.
Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks.
But how can organisations reduce risk by making humans the strongest link in the cyber defense line?
View this UK & EU Leadership Session lead by the Tech...
Most security leaders know that an effective security awareness program can play an outsized role in reducing risk. But measuring—and communicating—the impact of your security awareness program to executives is not always easy. This e-book explores the ins and outs of security awareness programs to help you build,...
Garry Hargreaves, director of the NATO Communications and Information - or NCI - Academy, discusses the institution's mission to train and educate NATO’s cyber workforce by creating an "enduring NATO cyberspace curriculum."
Including psychology in cybersecurity educational awareness programs allows employees to recognize and trust their own instincts when dealing with a potential security incident, says Denise Beardon, head of information security engagement at international law firm Pinsent Masons.
To mark Cybersecurity Awareness Month, the National Cyber Security Alliance and U.K. based behavioral science and data analytics company, CybSafe, have released their Annual Cybersecurity Attitudes and Behaviors Report 2021, which uncovers key trends, behaviors and habits among tech users.
The latest edition of the ISMG Security Report features an analysis of attempts made by European law enforcement to encourage young cybercriminals to channel their skills in more ethical ways. Also featured: Fraud detection and response; inspiring behavioral change.
How your organisation can use behaviour science to reduce your organisation's security risk profile.
61% of cybercrime victims said they did not report the incident, seriously limiting organisations’ ability to identify and respond to cyber attacks.
And, alarmingly, 48% of respondents say they have never heard...
Of all the areas under his direction - business continuity, GRC, data governance - third-party risk is the most challenging, says Peter Gregory, senior director of cyber GRC at GCI General Communications Inc. "Their breach is my breach," he says, offering mitigation advice.
Technology alone it is not enough to protect you from modern cyber threats. Cybercriminals regularly exploit the human element. By focusing on changing people’s behaviour, cyber resilience can be achieved.
Download this white paper and learn about:
Tackling the human aspect of cyber security;
The psychology of...
By focusing on meaningful security metrics, organisations can benchmark, assess progress, and measure with a view to reducing the risk inherent in the human aspect of cyber security.
Download this white paper and learn:
Why metrics are so important;
What makes a metrics "meaningful";
How to use meaningful...