How To Implement A New Cybersecurity Initiative – Your Roll-Out Plan For Day 1
Welcome back. Today we’re looking at how to implement a new cybersecurity initiative. Specifically, we’re putting a roll-out process together for day 1. This is the final post in a five-post series on helping risk management leaders gain internal alignment for a new cybersecurity initiative. The tools were designed to help make getting buy-in easier […]
Who Should You Gain Alignment With To Get A New Cybersecurity Initiative Approved – A Guide To Help
This is the fourth post in a five-post series that introduces a set of free tools to help risk management leaders gain internal alignment for a new cybersecurity initiative. The tools are designed to help make getting buy-in easier and faster. For a quick introduction to the full suite of tools, check out this post. […]
How To Implement A New Cybersecurity Initiative – A Change Management Guide To Help
This is the third post in a five-post series that introduces a set of free tools to help risk management leaders gain internal alignment for a new cybersecurity initiative. The tools are designed to help make getting buy-in easier and faster. For a quick introduction to the full suite of tools, check out the post […]
How To Gain Buy-In For A Cybersecurity Initiative – Focus On Stakeholder Benefits.
This is the second post in a five-post series that introduces a set of free tools to help risk management leaders gain internal alignment for a new cybersecurity initiative. The tools are designed to help make getting buy-in easier and faster. For a quick introduction to the full suite of tools, check out the post […]
4 Tools To Gain Internal Alignment For A New Cybersecurity Initiative
Hi there. This is the first post in a five-post series that introduces a set of free tools to help risk management leaders gain internal alignment for a new cybersecurity initiative. The tools are designed to help make getting buy-in easier and faster. The tools themselves are spreadsheet fill-in-the-blank templates with instructions to guide you […]
Cyber is People – How to Improve Your Most Overlooked Area for Risk
WHITEPAPER Cyber is People – How to Improve Your Most Overlooked Area for Risk Introduction In a 2016 paper for the International Journal of Human-Computer Interaction, a research team led by Leah Zhang-Kennedy noted that “Although computer security technologies are the first line of defense to secure users, their success is dependent on individuals’ behavior.”1 […]