Category: Cybersecurity

  • Understanding and Mitigating Insider Threats

    Introduction Organizations are known to invest heavily into defending against cyberattacks, physical breaches, and criminal actors. Yet one of the most significant and regularly underestimated risks comes from within the organization, the trusted insider. Employees, contractors, and partners are essential to operations, and appear to be a trusted party within the organization. This alongside their…

  • Assessing and Strengthening Organizational Culture

    Assessing and Strengthening Organizational Culture Strengths and Weaknesses Understanding the organization’s culture is foundational to building an effective cybersecurity program. Culture determines how employees follow policies, view risk, and react to security incidents. My priority would be to conduct a structured cultural assessment using a combination of qualitative and quantitative methods together for decision-making to…

  • Philosophy Application: Cybersecurity Law and Ethics

    Kant: Duty, Universal Rules, Categorical Imperative Kants powerful moral theory, which is known as deontology, argues that morality is grounded on duty and good will. For Kant, the only thing that is good without qualification is the intention to do right. Consequences do not actually determine morality – only the intention behind the action. An…