Book Image

Transformational Security Awareness

By : Perry Carpenter
Book Image

Transformational Security Awareness

By: Perry Carpenter

Overview of this book

When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. If your organization is stuck in a security awareness rut and is using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes, then you need this book. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization.
Table of Contents (9 chapters)

Index

  • A
  • Adams, Douglas, 283
  • Albee, Ardath, 72–73
  • ambassadors, 160
  • Ames, Kevin, 169
  • Amin, Mo, 311–312
  • analogies, 195
  • anonymity, 150–151
  • Appreciate: Celebrating People, Inspiring Greatness (Sturt, Nordstrom, Ames, Beckstrand), 169
  • Ariely, Dan, 132
  • Art of Deception (Mitnick), 298, 304
  • attachment, 168
  • attention, spotlight of, 41
  • attentional blindness, 41
  • audience, 70
    • segmentation, 71–74
  • audits, 11–14, 16
    • FFIEC, 12
  • authority (Caldini's principles), 265
  • awareness, 27–28
    • culture and, 142
  • B
  • Bales, Susan, 110
  • Bank Protection Act, 11
  • Beckstrand, Gary, 169
  • behavior, 118
    • ability, 120–121
    • culture and, 142
    • designing for, 125
    • guardrails, 132
    • habits, 130–132
    • measuring effectiveness, 133–134
    • motivation, 122
    • password management, 123–125
      • behavior groups, 126–128
      • debugging behavior, 128–129
      • designing for behavior, 125
      • designing for larger issue, 129–130
    • prompts, 119–120
      • power prompts, 122–...