skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors Preview this item
ClosePreview this item
Checking...

Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors

Author: Perry Carpenter
Publisher: Indianapolis, IN : Wiley, 2019.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Perry Carpenter
ISBN: 9781119566373 1119566371 9781119566380 111956638X
OCLC Number: 1100071283
Notes: Includes index.
Description: 1 online resource (341 pages) : illustrations
Contents: Foreword xxiIntroduction xxiiiI The Case for Transformation 11 You Know Why 3Humans Are the Last Line of Defense 4Data Breaches Tell the Story 6Auditors and Regulators Recognize the Need for Security Awareness Training 11Traditional Security Awareness Program Methods Fall Short of Their Goals 14Key Takeaways 16References 172 Choosing a Transformational Approach 19Your "Why" Determines Your "What" 20Down the Rabbit Hole 21Outlining the Key Components and Tools of a Transformational Program 24A Map of What's to Come 28Part 1 in a Nutshell 30Part 2 in a Nutshell 30Part 3 in a Nutshell 31Key Takeaways 32Notes and References 32II The Tools of Transformation 353 Marketing and Communications 101 for Security Awareness Leaders 37The Communications Conundrum 38The Marketing Connection 40Defining Marketing 44Embedding Your Messages 53Get the Right Message to the Right Person at the Right Time 70Campaigns: If You Aren't Reinforcing, Your Audience Is Forgetting 76Tracking Results and Measuring Effectiveness 76Know When to Ask for Help 77Key Takeaways 78Notes and References 78Additional Reading 814 Behavior Management 101 for Security Awareness Leaders 83Your Users Aren't Stupid, They're Human 85Thinking, Fast and Slow 87System 1 Thinking 88System 2 Thinking 91Working with Human Nature Rather Than Against 93The Nuts and Bolts of Shaping Behavior 96The Fogg Behavior Model 97The Problem with Motivation 103Nudge Them in the Right Direction 103Frames: Why Context Is Everything 109Designing and Debugging Behavior 117Being Intentional with Target Groups 117Debugging Behaviors 118Design "Power Prompts" Wherever Possible 122Password Management Example, Continued 123Habits Make Hard Things Easier to Do 130Thinking About Guardrails 132Tracking Results and Measuring Effectiveness 133Key Takeaways 134Notes and References 135Additional Reading 1375 Culture Management 101 for Security Awareness Leaders 141 Security Culture is Part of Your Larger Organizational Culture 144Getting Started 147Understanding Your Culture's Status Quo 149Go Viral: Unleash the Power of Culture Carriers 156Cultures in (Potential) Conflict: Remember Global and Social Dynamics 164Cultural Forces 165Structures 167Pressures 167Rewards 169Rituals 169Tracking Results and Measuring Effectiveness 171Key Takeaways 171Notes and References 172Additional Reading 1746 What's in a Modern Security Awareness Leader's Toolbox? 175Content Is King: Videos, Learning Modules, and More 176Big Box Shopping: A Content Analogy 178Types of Content 181Experiences: Events, Meetings, and Simulations 186Meetings, Presentations, and Lunch-and-Learns 187Tabletop Exercises 188Rituals 189Webinars 190Games 190Simulated Phishing and Social Engineering 191Other Simulations and Embodied Learning 192Interactions with Other Technologies 193Relationships: Bringing Context to Content and Experiences 194Be Intentional and Opportunistic, Always 195Stories and Analogies 195Tapping into Cultural Trends 195Opportunistic Campaigns Based on New Organizational Initiatives and Current Events 196The Critical "At Home" Connection 197Use Your Metrics and Anecdotes to Help Tell and Reinforce Your Story 197Key Takeaways 198Notes and References 1987 Voices of Transformation: Interviews with Security Awareness Vendors 201Anna Collard, Popcorn Training 201Chris Hadnagy, Social Engineer 204Drew Rose, Living Security 209Gary Berman, The CyberHero Adventures: Defenders of the Digital Universe 211Jason Hoenich, Habitu8 214Jim Shields, Twist and Shout 217Kai Roar, CLTRe 219Lisa Plaggemier, InfoSec Institute 221Masha Sedova, Elevate Security 224Stu Sjouwerman, KnowBe4 226Tom Pendergast, MediaPRO 228Winn Schwartau, The Security Awareness Company (SAC) 231Reference 236III The Process of Transformation 2378 Living Your Awareness Program Through the Eyes and Lives of Your Audience 239A Learner Journey Map: Awareness in the Context of Life 240Key Takeaways 248Notes and References 2489 Putting It All Together 251Before You Begin 252The Five Secrets of Security Awareness Success 252Tips for Gaining Buy-In 259Leverage Cialdini's Principles of Persuasion 264Making Adjustments 269Thoughts About Crafting Campaigns 269Thinking Through Target Groups 271Be Intentional with Recognition and Reward 277Assembling Your Culture Carriers 277Measuring Your Success 278What Does the Future Hold? 279Key Takeaways 280Notes and References 28110 Closing Thoughts 283Leverage the Power of Community. 283Be a Lifelong Learner 285Be a Realistic Optimist 290Conclusion 29111 Voices of Transformation: Interviews with Security Awareness Program Leaders 293Bruce Hallas, Marmalade Box 294Carlos Miro, MUFG Union Bank 296Dr. Cheryl O. Cooper, Sprint Corporation 298Krina Snider, Sprint 302Mark Majewski, Quicken Loans 305Michael Lattimore, Independent Consultant 307Mo Amin, Independent Consultant 311Prudence Smith, Senior Cyber and Information Security Consultant and Industry Speaker 313Thom Langford, (TL)2 Security 320Tory Dombrowski, Takeform 323Appendix: Seven Key Reminder Nudges to Help Your Recall 329Index 331
Responsibility: Perry Carpenter.

Abstract:

Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them' Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization.-Find out what you need to know about marketing, communication, behavior science, and culture management -Overcome the knowledge-intention-behavior gap -Optimize your program to work with the realities of human nature -Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness -Put effective training together into a well-crafted campaign with ambassadors -Understand the keys to sustained success and ongoing culture change -Measure your success and establish continuous improvements Do you care more about what your employees know or what they do' It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1100071283<\/a>> # Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:MediaObject<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1100071283<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/inu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/business_&_economics_production_&_operations_management<\/a>> ; # BUSINESS & ECONOMICS--Production & Operations Management<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/computer_networks_security_measures<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/computers_information_technology<\/a>> ; # COMPUTERS--Information Technology<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/computers_operating_systems_general<\/a>> ; # COMPUTERS--Operating Systems--General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Person\/carpenter_perry<\/a>> ; # Perry Carpenter<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them\' Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That\'s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization.-Find out what you need to know about marketing, communication, behavior science, and culture management -Overcome the knowledge-intention-behavior gap -Optimize your program to work with the realities of human nature -Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness -Put effective training together into a well-crafted campaign with ambassadors -Understand the keys to sustained success and ongoing culture change -Measure your success and establish continuous improvements Do you care more about what your employees know or what they do\' It\'s time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/9115041149<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1100071283<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/rbdigital.rbdigital.com<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5763515<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2116156<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.vlebooks.com\/vleweb\/product\/openreader?id=none&isbn=9781119566373<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.vlebooks.com\/vleweb\/product\/openreader?id=none&isbn=9781119566359<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1002\/9781119566380<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781119566373<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781119566380<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1100071283<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Person\/carpenter_perry<\/a>> # Perry Carpenter<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Carpenter<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Perry<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Perry Carpenter<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/business_&_economics_production_&_operations_management<\/a>> # BUSINESS & ECONOMICS--Production & Operations Management<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"BUSINESS & ECONOMICS--Production & Operations Management<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/computer_networks_security_measures<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/computers_information_technology<\/a>> # COMPUTERS--Information Technology<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Information Technology<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9115041149#Topic\/computers_operating_systems_general<\/a>> # COMPUTERS--Operating Systems--General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Operating Systems--General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/inu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"inu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781119566373<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1119566371<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781119566373<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781119566380<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"111956638X<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781119566380<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1100071283<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1100071283<\/a>> ; # Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-04-17<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n