Book Image

Transformational Security Awareness

By : Perry Carpenter
Book Image

Transformational Security Awareness

By: Perry Carpenter

Overview of this book

When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. If your organization is stuck in a security awareness rut and is using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes, then you need this book. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization.
Table of Contents (9 chapters)

Culture Management 101 for Security Awareness Leaders

The importance of a strong cybersecurity culture cannot be understated. It transcends technologies, processes, and even people. It is bigger than security awareness. Security culture becomes ingrained everywhere you look and touch. It is aligned with the objectives of the business. Everybody doesn't just practice security, they also own it.

Dan Kaplan, Trustwave1

It's flashback time. Early in the previous chapter, I used a quote from BJ Fogg stating that, “Humans are lazy, social, and creatures of habit.” Throughout that chapter, and in previous chapters, I've referenced the social components of belief and behavior. Here is where the rubber really meets the road: culture. A positive security culture is a force multiplier for behaviors, beliefs, and messages; it represents a critical social component that will either work for you or work against you. And the ability to shape the security-related aspects...