A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security--humans
People-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change at the intersection of people and security. Esentially a complete security culture toolkit, this comprehensive resource provides you with a blueprint for assessing, designing, building, and maintaining human firewalls.
Globally recognized information security expert Lance Hayden lays out a course of action for drastically improving organizations' security cultures through the precise use of mapping, survey, and analysis. You'll discover applied techniques for embedding strong security practices into the daily routines of IT users and learn how to implement a practical, executable, and measurable program for human security.
- Features downloadable mapping and surveying templates
- Case studies throughout showcase the methods explained in the book
- Valuable appendices detail security tools and cultural threat and risk modeling
- Written by an experienced author and former CIA human intelligence officer
Table of contents
Part I: Understanding Your Security Culture
Chapter 1: Become a Culture Hacker!
Chapter 2: Strategy for Breakfast: The Hidden Power of Security Culture
Chapter 3: Organizational Culture: A Primer
Chapter 4: Security and Organizational BehaviorPart II: Measuring Your Security Culture
Chapter 5: Can Culture Be Measured?
Chapter 6: Culture, Norms, and Behaviors
Chapter 7: The Security Culture Diagnostic Toolkit (SCDT)
Chapter 8: Using the SCDTPart III: Transforming Your Security Culture
Chapter 9: Culture Hacking: Fear, Uncertainty, and Doubt
Chapter 10: Inductive vs. Deductive Transformation (Top Down vs. Bottom Up)
Chapter 11: The Security Value of Failure
Chapter 12: Focus on Complexity
Chapter 13: Focus on Failure
Chapter 14: Focus on Operations
Chapter 15: Focus on Resilience
Chapter 16: Focus on Expertise
Chapter 17: Measuring Your Transformation with the CFORE Scorecard
Chapter 18: Aligning CFORE with the SCDT
Chapter 19: Okay, now what?Appendices
Appendix A: Tools and Templates
Appendix B: Cultural Threat and Risk Modeling