What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.
Dr. Humayun Zafar, CEH, CISM, CRISC, PCIPProfessor of Information Security and Assurance
The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.
- 5 stars76%
- 4 stars18%
- 3 stars3.20%
- 2 stars0.40%
- 1 star2.40%
来自CYBERSECURITY AND THE X-FACTOR的热门评论
Very good content. It helped me learning more about the behaviour change models! Enjoyed it
There is a lot of practical and actionable information in this course related to cybersecurity. I would highly recommend anyone interested in their organization's cybersecurity take this course!
Great course, understanding that our biggest security threat is our own behaviour is key to building cybersecurity.
The course gave an insight about how people become the front line of security defense.
关于 Cybersecurity: Developing a Program for Your Business 专项课程
Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.