動画検索
関連広告
検索結果
Personal Anecdote
What I Need as a Parent
Many Subtleties to Risky Cyber Security Behavior
Stepping Stone Is Human Risk Management
Measuring the Effectiveness of Us Government Security Awareness Programs
Problem with Compliance Is that It Does Not Equal to Effectiveness
How Effectiveness Is Being Used
Seb Db the Security Behavior Database
Understand What Is the Human Risk
Adaptive Human Protection
How many employees would click a link in a phishing email? -There's a way to find out
Recognize a phishing attempt -Spelling and grammatical errors -Domain name and email inconsistencies -Unusual attachments -Request for personal information
Risky behavior -Modifying hosts file -Replacing a core OS file -Uploading sensitive files
Track and analyze security awareness metrics -Automated -Phishing click rates -Password manager adoption, MFA use, password sharing
Create a Security Awareness team -Determine roles for training, monitoring, policy creation, etc.
Create the training materials -Provided to users in different forms
Harnessing the Power of Mindfulness
Misconceptions about What Mindfulness Is
The Box Breathing Technique
Mindfulness Can Be the Difference in Your Cyber Security Program
The Benefits of Cyber Mindfulness
Cyber Mindfulness Also Reduces Stress and Frustration
Personal Accountability
Three Principles That You Can Follow To Integrate Cyber Mindfulness
Be Intentionally Cyber
Principle Number Two Which Is Be Empowering