The Security Culture Playbook. Perry Carpenter
Чтение книги онлайн.

Читать онлайн книгу The Security Culture Playbook - Perry Carpenter страница 2

СКАЧАТЬ href="#ulink_5a17fb56-10f2-54e4-814f-dae62eb5cb71">Does Culture Change Have to Be Difficult? Using Norms Is a Double-Edged Sword Failing to Plan Is Planning to Fail If You Try to Work Against Human Nature, You Will Fail Not Seeing the Culture You Are Embedded In Takeaways Chapter 12: Planning and Maturing Your Program Taking Stock of What We've Covered View Your Culture Through Your Employees' Eyes Culture Carriers Building and Modeling Maturity A Seat at the Table Takeaways Chapter 13: Quick Tips for Gaining and Maintaining Support You Are a Guide Sell by Using Stories Lead with Empathy, Know Your Audience Set Expectations Takeaways Chapter 14: Interviews with Security Culture Thought Leaders Alexandra Panaretos, Ernst & Young Dr. Jessica Barker, Cygenta Kathryn Djebbar, Jaguar Land Rover Lauren Zink, Boeing Mark Majewski, Rock Central Mo Amin, moamin.com Chapter 15: Parting Thoughts Engage the Community Be a Lifelong Learner Be a Realistic Optimist Conclusion

      7  Bibliography

      8  Index

      9  Copyright

      10  Dedication

      11  About the Authors

      12  Acknowledgments

      13  End User License Agreement

      List of Tables

      1 Chapter 12Table 12.1 Example Culture Maturity Indicators (CMIs) across various catego...

      List of Illustrations

      1 Chapter 1Figure 1.1 Organizations globally have invested massively on cybersecurity, ...Figure 1.2 Hacking the human yields the highest ROI for attackers.

      2 Chapter 2Figure 2.1 Cybersecurity spending has effectively ignored the main cause of ...

      3 Chapter 3Figure 3.1 Your program's focus will either produce limited benefit or be tr...Figure 3.2 Example visualization of a standard/generic maturity modelFigure 3.3 Another common maturity model visualizationFigure 3.4 The Security Culture Maturity Model

      4 Chapter 6Figure 6.1 Visualizing the seven dimensions of security cultureFigure 6.2 Use of shadow IT across regionsFigure 6.3 Employees struggle to properly classify information.

      5 Chapter 8Figure 8.1 The Security Culture Framework at a glanceFigure 8.2 Step 1: MeasureFigure 8.3 Step 2: InvolveFigure 8.4 Step 3: Engage

      6 Chapter 9Figure 9.1 An example graph depicting trends for awareness, behavior, and cu...

      7 Chapter 10Figure 10.1 Knowledge and attitudes each can influence behavior. But attitud...Figure 10.2 Three truths about human nature.

      8 Chapter 12Figure 12.1 The Security Culture Maturity Model (SCMM)Figure 12.2 KnowBe4's immense dataset provides unique value to inform our mo...Figure 12.3 Example data overlay with the SCMMFigure 12.4 Example of the SCMM showing maturity across organizational score...Figure 12.5 Example of the SCMM showing multiple CMIs of a single organizati...

      9 Chapter 13Figure 13.1 Example brainstorming worksheet for gaining supportFigure 13.2 Example brainstorming worksheet for gaining support (continued)...

      Guide

      1  Cover Page

      2  Title Page

      3  Copyright

      4  Dedication

      5  About the Authors

      6  Acknowledgments

      7  Introduction СКАЧАТЬ