Atjaunināt sīkdatņu piekrišanu

E-grāmata: Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors

3.89/5 (18 ratings by Goodreads)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 03-May-2019
  • Izdevniecība: John Wiley & Sons Inc
  • Valoda: eng
  • ISBN-13: 9781119566359
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 24,42 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Bibliotēkām
  • Formāts: EPUB+DRM
  • Izdošanas datums: 03-May-2019
  • Izdevniecība: John Wiley & Sons Inc
  • Valoda: eng
  • ISBN-13: 9781119566359
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Expert guidance on the art and science of driving secure behaviors 

Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. 

When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about.

 Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization.

•    Find out what you need to know about marketing, communication, behavior science, and culture management

•    Overcome the knowledge-intention-behavior gap

•    Optimize your program to work with the realities of human nature

•    Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness

•    Put effective training together into a well-crafted campaign with ambassadors

•    Understand the keys to sustained success and ongoing culture change

•    Measure your success and establish continuous improvements

Do you care more about what your employees know or what they do? It’s time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book. 

Foreword xxi
Introduction xxiii
I The Case for Transformation 1(34)
1 You Know Why
3(16)
Humans Are the Last Line of Defense
4(2)
Data Breaches Tell the Story
6(5)
Auditors and Regulators Recognize the Need for Security Awareness Training
11(3)
Traditional Security Awareness Program Methods Fall Short of Their Goals
14(2)
Key Takeaways
16(1)
References
17(2)
2 Choosing a Transformational Approach
19(16)
Your "Why" Determines Your "What"
20(1)
Down the Rabbit Hole
21(3)
Outlining the Key Components and Tools of a Transformational Program
24(4)
A Map of What's to Come
28(4)
Part 1 in a Nutshell
30(1)
Part 2 in a Nutshell
30(1)
Part 3 in a Nutshell
31(1)
Key Takeaways
32(1)
Notes and References
32(3)
II The Tools of Transformation 35(202)
3 Marketing and Communications 101 for Security Awareness Leaders
37(46)
The Communications Conundrum
38(2)
The Marketing Connection
40(36)
Defining Marketing
44(9)
Embedding Your Messages
53(17)
Get the Right Message to the Right Person at the Right Time
70(6)
Campaigns: If You Aren't Reinforcing, Your Audience Is Forgetting
76(1)
Tracking Results and Measuring Effectiveness
76(1)
Know When to Ask for Help
77(1)
Key Takeaways
78(1)
Notes and References
78(3)
Additional Reading
81(2)
4 Behavior Management 101 for Security Awareness Leaders
83(58)
Your Users Aren't Stupid, They're Human
85(2)
Thinking, Fast and Slow
87(6)
System 1 Thinking
88(3)
System 2 Thinking
91(2)
Working with Human Nature Rather Than Against
93(3)
The Nuts and Bolts of Shaping Behavior
96(7)
The Fogg Behavior Model
97(6)
The Problem with Motivation
103(14)
Nudge Them in the Right Direction
103(6)
Frames: Why Context Is Everything
109(8)
Designing and Debugging Behavior
117(16)
Being Intentional with Target Groups
117(1)
Debugging Behaviors
118(4)
Design "Power Prompts" Wherever Possible
122(1)
Password Management Example, Continued
123(7)
Habits Make Hard Things Easier to Do
130(2)
Thinking About Guardrails
132(1)
Tracking Results and Measuring Effectiveness
133(1)
Key Takeaways
134(1)
Notes and References
135(2)
Additional Reading
137(4)
5 Culture Management 101 for Security Awareness Leaders
141(34)
Security Culture Is Part of Your Larger Organizational Culture
144(3)
Getting Started
147(17)
Understanding Your Culture's Status Quo
149(7)
Go Viral: Unleash the Power of Culture Carriers
156(8)
Cultures in (Potential) Conflict: Remember Global and Social Dynamics
164(1)
Cultural Forces
165(6)
Structures
167(1)
Pressures
167(2)
Rewards
169(1)
Rituals
169(2)
Tracking Results and Measuring Effectiveness
171(1)
Key Takeaways
171(1)
Notes and References
172(2)
Additional Reading
174(1)
6 What's in a Modern Security Awareness Leader's Toolbox?
175(26)
Content Is King: Videos, Learning Modules, and More
176(10)
Big Box Shopping: A Content Analogy
178(3)
Types of Content
181(5)
Experiences: Events, Meetings, and Simulations
186(8)
Meetings, Presentations, and Lunch-and-Learns
187(1)
Tabletop Exercises
188(1)
Rituals
189(1)
Webinars
190(1)
Games
190(1)
Simulated Phishing and Social Engineering
191(1)
Other Simulations and Embodied Learning
192(1)
Interactions with Other Technologies
193(1)
Relationships: Bringing Context to Content and Experiences
194(1)
Be Intentional and Opportunistic, Always
195(2)
Stories and Analogies
195(1)
Tapping into Cultural Trends
195(1)
Opportunistic Campaigns Based on New Organizational Initiatives and Current Events
196(1)
The Critical "At Home" Connection
197(1)
Use Your Metrics and Anecdotes to Help Tell and Reinforce Your Story
197(1)
Key Takeaways
198(1)
Notes and References
198(3)
7 Voices of Transformation: Interviews with Security Awareness Vendors
201(36)
Anna Collard, Popcorn Training
201(3)
Chris Hadnagy, Social Engineer
204(5)
Drew Rose, Living Security
209(2)
Gary Berman, The CyberHero Adventures: Defenders of the Digital Universe
211(3)
Jason Hoenich, Habitu8
214(3)
Jim Shields, Twist and Shout
217(2)
Kai Roar, CLTRe
219(2)
Lisa Plaggemier, InfoSec Institute
221(3)
Masha Sedova, Elevate Security
224(2)
Stu Sjouwerman, KnowBe4
226(2)
Tom Pendergast, MediaPRO
228(3)
Winn Schwartau, The Security Awareness Company (SAC)
231(5)
Reference
236(1)
III The Process of Transformation 237(92)
8 Living Your Awareness Program Through the Eyes and Lives of Your Audience
239(12)
A Learner Journey Map: Awareness in the Context of Life
240(8)
Key Takeaways
248(1)
Notes and References
248(3)
9 Putting It All Together
251(32)
Before You Begin
252(17)
The Five Secrets of Security Awareness Success
252(7)
Tips for Gaining Buy-In
259(5)
Leverage Cialdini's Principles of Persuasion
264(5)
Making Adjustments
269(1)
Thoughts About Crafting Campaigns
269(9)
Thinking Through Target Groups
271(6)
Be Intentional with Recognition and Reward
277(1)
Assembling Your Culture Carriers
277(1)
Measuring Your Success
278(1)
What Does the Future Hold?
279(1)
Key Takeaways
280(1)
Notes and References
281(2)
10 Closing Thoughts
283(10)
Leverage the Power of Community
283(2)
Be a Lifelong Learner
285(5)
Be a Realistic Optimist
290(1)
Conclusion
291(2)
11 Voices of Transformation: Interviews with Security Awareness Program Leaders
293(36)
Bruce Hallas, Marmalade Box
294(2)
Carlos Miro, MUFG Union Bank
296(2)
Dr. Cheryl O. Cooper, Sprint Corporation
298(4)
Krina Snider, Sprint
302(3)
Mark Majewski, Quicken Loans
305(2)
Michael Lattimore, Independent Consultant
307(4)
Mo Amin, Independent Consultant
311(2)
Prudence Smith, Senior Cyber and Information Security Consultant and Industry Speaker
313(7)
Thom Langford, (TL)2 Security
320(3)
Tory Dombrowski, Takeform
323(6)
Appendix: Seven Key Reminder Nudges to Help Your Recall 329(2)
Index 331
PERRY CARPENTER is the Chief Evangelist and Strategy Officer for KnowBe4, the world's most popular security awareness and simulated phishing platform. A former security awareness researcher and CISO advisor at Gartner Research, he now works closely with Kevin Mitnick, arguably the world's most famous hacker. Perry frequently addresses management audiences at major cybersecurity conferences.