4 Levels of Human Factor Security with Roy Zur
Easy Prey28 Syys 2022

4 Levels of Human Factor Security with Roy Zur

Many believe that cybersecurity is for high tech professionals only. It's important to know that employees at every level can accidentally open the door to your network. Today's guest is Roy Zur. Roy is the founder and CEO of Thrive DX for Enterprise which is a global education company committed to transforming lives through digital skills training and solutions as well as addressing the human factor of cybersecurity training. Roy is a 15 year veteran of the Israeli Defense Force where he served as a major. Roy also serves as the adjunct professor in Risk Management and Cybersecurity. He is the founder and chairman of the non-profit Israeli Institute for Policy and Legislation and a member of the Forbes Business Council.

Show Notes:
  • [1:05] - Roy shares his background in cybersecurity and the different responsibilities he's had.
  • [2:27] - Roy describes the challenges experienced in the Israeli Defense Force.
  • [3:55] - It's not just about the training, it's also about the screening.
  • [6:30] - The rapid changes in cyber security makes maintaining the curriculum a challenge.
  • [9:13] - When finding people that qualify as candidates for this learning, there is a lot to learn. Roy describes parts of the program.
  • [11:47] - Many people are afraid of cyber security because it seems so complicated, but it is more of a human factor issue.
  • [13:08] - There are different groups within an organization that have access to data.
  • [14:34] - Roy defines the groups or levels of an organization.
  • [16:11] - Software developers and engineers have a huge responsibility.
  • [17:08] - Each group has to have an education about security and the type of skills they need will vary.
  • [18:47] - The method of learning is also different per level.
  • [20:21] - Giving employees the information they need and nothing more is crucial so they can spend their time working on their responsibilities.
  • [22:12] - Training for awareness which usually includes everyone in an organization takes about 2 hours a year but people don't always take it seriously.
  • [24:11] - Phishing simulations are very effective. Roy describes the most effective methods of training.
  • [26:15] - Full bootcamps can be up to 500 or more hours.
  • [27:25] - In Education, Bloom's Taxonomy plays a big role.
  • [29:11] - When you create new knowledge, you've completed the full cycle of truly learning something.
  • [30:58] - For most people, the motivation to complete cybersecurity training is simply for compliance.
  • [33:12] - These trainings have to be tied into the human factor of cybersecurity.
  • [36:36] - Small businesses are actually at more risk of being impacted more greatly by a data breach.
  • [39:10] - On Thrive DX's website, there are a lot of great resources available.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Jaksot(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Huhti 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Huhti 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Huhti 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Huhti 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Huhti 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Maalis 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Maalis 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Maalis 45min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
aihe
rss-ulkopoditiikkaa
the-ulkopolitist
viisupodi
rss-pinnalla
otetaan-yhdet
et-sa-noin-voi-sanoo-esittaa
radio-antro
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
rss-asiastudio
rss-uusi-juttu-mediastartupin-tarina
rss-vaalirankkurit-podcast
rss-kaikki-uusiksi