Hey everyone, #NIST is throwing a party, and you're invited! It's the Human-Centered Cybersecurity party, which will explore the critical role that humans play in it. 🎉 Let's be real, folks: the human element is one of the most critical components to security success or failure. We've seen time and time again how a simple mistake or lack of oversight can lead to major security breaches, costing companies millions. Take the recent case of #Raytheon facing a hefty $200M settlement. One example of a blunder is an employee taking their work laptop containing extremely sensitive weapon information on a personal trip to Russia! Yikes! It's clear that cybersecurity requires a cultural shift and a massive dose of reality about human behavior. Let's all come together and find better ways to protect each other from the one thing we can't escape - our own human nature. #CMMC #ITAR #compliance #cybersecurity #secops #governance #GRC #risk
Procellis Technology Inc’s Post
More Relevant Posts
-
Leadership | Learning & Development | Change Management | DEI Advocate | Human Resources | Knowledge Management | Strategist | Organizational Development | Talent Management | Cybersecurity & Privacy
🗣️Understanding human behavior, motivations, and vulnerabilities is crucial in developing effective security strategies. This multifaceted approach can bridge the gap between technology and human behavior, ultimately enhancing overall cybersecurity resilience. 👏🏻 #communityofpractice #humancentered #securityawareness #securityculture #behavioralscience #cybersecurity #ADDIE
Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest
nist.gov
To view or add a comment, sign in
-
This is a good idea for bridging the gulfs that exist between academics and industry practitioners. I’ve joined. #cybersecurity #usablesecurity #hunancenteredcybersecurity
Human-Centered Cybersecurity Researcher at National Institute of Standards and Technology. Views and opinions are my own.
Join the new National Institute of Standards and Technology (NIST) Human-Centered Cybersecurity Community of Interest! This is an online forum where practitioners and researchers (and anyone, really!) can connect and share information about the human element of cybersecurity. https://lnkd.in/gRXuXtzM
Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest
nist.gov
To view or add a comment, sign in
-
Cybersecurity Executive | General Counsel | Artificial Intelligence | Emerging Technologies | Geopolitical Context | Privacy | Diversity, Equity, & Inclusion | Lead by Example | Risk Focus | Global
“Human-centered cybersecurity (also known as ‘usable security’) involves the social, organizational, and technological influences on people’s understanding of and interactions with cybersecurity. By taking a human-centered cybersecurity (HCC) approach, we can both improve people's cybersecurity experiences and achieve better cybersecurity outcomes, which is so important in today’s digitally interconnected world.” https://lnkd.in/exGq7ACj
Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest
nist.gov
To view or add a comment, sign in
-
Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest: Human-centered cybersecurity (also known as ‘usable security’) involves the social, organizational, and technological influences on people’s understanding of and interactions with cybersecurity. By taking a human-centered cybersecurity (HCC) approach, we can both improve people's cybersecurity experiences and achieve better cybersecurity outcomes, which is so important in today’s digitally interconnected world. At NIST, we understand the value of making connections, listening, and interactivity. We also understand that researchers and practitioners want to hear directly from each other—and #cyber #cybersecurity #informationsecurity #channelpartners #nist
Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest
nist.gov
To view or add a comment, sign in
-
🚀 "Top 50 Cybersecurity Thought Leader 2024 | GDPR & ISO 27001 SOC2 Specialist | Incident Response Leader | vCISO | Co-Author of ICO Certified GDPR Scheme | Founder of GDPR LinkedIn Group (30,000+ Members)| Speaker
🚨 Deepfakes: The New Challenge for Cyber Incident Response 🚨 Deepfakes are a growing threat, reshaping the landscape of cyber incident response. Delayed response times slow down critical decision-making. False positives lead to improper handling or ignoring legitimate threats. Deepfakes demand a new approach to cyber incident response. Here are 5 strategies to adapt: 1. Integrate AI-Driven Detection Tools - Use AI to spot deepfakes early and reduce response delays. 2. Enhance Verification Protocols - Establish rapid verification processes to confirm the legitimacy of critical communications. 3. Update Incident Response Plans - Include deepfake-specific response strategies to handle incidents swiftly and effectively. 4. Train Employees Regularly - Ensure all staff are educated on recognizing and responding to deepfake threats. 5. Collaborate with Partners - Work with law enforcement, cybersecurity firms, and industry peers to stay ahead of evolving threats. Deepfakes are more than a tech issue; they’re a pressing business risk. Act now to strengthen your defenses.
To view or add a comment, sign in
-
Reader in Corporate and Financial Law Director, LLM International Commercial and Technology Law The University of Manchester Law School
Resource Dependency Theory and Cybersecurity Regulation Cybersecurity is becoming an important asset and capability in the ever more digitalised infrastructure. Building cybersecurity ecosystems to manage threat and opportunities of the future requires multiple approaches and collaborations such as public-private partnership. As AI is been anticipated to be dominating our future, yet how AI systems are secure by design need also a pro-innovation and resilient framework for us to be future-ready. In this paper, Rachael Ntongho and Dr Joseph Lee use resource dependence theory – treating cybersecurity as competitive asset and capability – to analyse what accountability and governance frameworks should be in place to catalyse the acquisition of cybersecurity assets such as provided by cybersecurity enterprises; and how collaborations between firms such as threat information sharing and training (eg AI federated training) may foster cybersecurity ecosystems. How to remove barriers to threat information sharing? How to enhance hardware and software supply chain security as seen in EU DORA? What are the roles of board directors, chief cybersecurity officer, and relevant cyber-risk committees? We also highlight the difficulties of detecting cyber vulnerabilities and avoiding black swan in the decentralised cyber space where firms have fewer resources to identify, deter, protect against, and respond to cyber incidents. This may also cause problem in accessing cybersecurity data. Not knowing you have been cyber-attacked is worst than you know you have been. https://lnkd.in/dN-5n9Sz #Cybersecurity, #cybervulnerabilities, #blackswan, #cyberresilience, #cybersecurityecosystems, #AI #quantumcomputing #cybersecurityenterprises
Resource Dependency Theory and Cybersecurity Regulation
papers.ssrn.com
To view or add a comment, sign in
-
Cybersecurity delves deep into understanding human behavior alongside technology. 🧠 Dive into the psychology of cybersecurity and uncover how human actions shape security in our latest blog post. https://lnkd.in/ga_M4Pdv #Cybersecurity #HumanBehavior #SocialEngineering
Cracking the Code of Human Behavior in Cybersecurity
redrocktg.com
To view or add a comment, sign in
-
🔐 The Future of Cybersecurity: What Will Become Obsolete? 🔐 I recently delved into an intriguing discussion on the Cybersecurity subreddit, pondering the imminent obsolescence of current practices. Here are some key predictions from the thread: - Passwords: With passkeys and biometrics gaining ground, traditional passwords may soon become relics of the past. - SMS 2FA: Security vulnerabilities like SIM-swapping are propelling a shift towards more secure app-based or hardware 2FA solutions. - Manual SOC Work: Automation tools are revolutionizing low-level tasks, reshaping the landscape of security incident management. - Security Questions: Outdated recovery methods such as security questions might make way for smarter, AI-driven alternatives. - VPNs: Zero-trust models' rising popularity could diminish the relevance of VPNs for remote access. - Manual Patching: AI and automation are poised to streamline vulnerability management, reducing manual intervention. What do you anticipate will vanish from the cybersecurity realm in the next 5 years? Reddit Thread : https://lnkd.in/gQGix-Qi #Cybersecurity #RedditInsights #Innovation #AI #Automation #FutureOfWork
From the cybersecurity community on Reddit
reddit.com
To view or add a comment, sign in
-
Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest Human-centered cybersecurity (also known as ‘usable security’) involves the social, organizational, and technological influences on people’s understanding of and interactions with cybersecurity. By taking a human-centered cybersecurity (HCC) approach, we can both improve people's cybersecurity experiences and achieve better cybersecurity outcomes, which is so important in today’s digitally interconnected world. At NIST, we understand the value of making connections, listening, and interactivity. We also understand that researchers and practitioners want to hear directly from each other—and from @NIST
Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest
nist.gov
To view or add a comment, sign in
-
| Cyber Security Consulting | Regulatory Compliance | Security Architecture | Technical Program Management
AI Security Incident Collaboration Playbook - First of it's kind, will be developed by CISA in collaboration with JCDC and Industry Partners. This will be a good stating point for Australia's critical infrastructures to address risks, threats, vulnerabilities, and mitigations concerning AI-enabled systems in national critical infrastructure. Link to more details here : https://lnkd.in/gSWpEytJ #aisecurity #securityinai #criticalinfrastructure #socplaybook
Joint Cyber Defense Collaborative (JCDC) Artificial Intelligence Cyber Tabletop Exercise | CISA
cisa.gov
To view or add a comment, sign in
870 followers