Security Awareness Blog: Category - Security Awareness Planning

Book Review - John Kotter's "Leading Change"

I just finished reading John Kotter's amazing book Leading Change, a resource I absolutely recommend for anyone involved in the world of security awareness. John Kotter is one of the world's leading experts on culture change with over 30 years experience in this field and a graduate of both Harvard and MIT. His book takes … Continue reading Book Review - John Kotter's "Leading Change"


American vs. European Reporting - Creating a Sense of Urgency

One of the first steps in attempting to change culture is creating a sense of urgency. Without a strong sense for a need for change, especially at the senior level, it is difficult to change peoples' beliefs, attitudes and behaviors. The excellent book Leading Change by John Kotter does an outstanding of explaining an … Continue reading American vs. European Reporting - Creating a Sense of Urgency


Guest Blog Post: Health Wearables

Editor's Note: This is a guest Blog Post from Kelli Tarala. This is the first in a series of blog posts from her about wearable devices and healthcare. Have you seen friends and coworkers wearing wrist bands with blinking lights and wondered what these bracelet-looking things are all about? They are part of the emerging … Continue reading Guest Blog Post: Health Wearables


Start With Simplest Behaviors First

A common challenge I run into when helping others build a security awareness program is trying to decide on what human risks to focus on. You only have so much time and resources to communicate to others, and people can only remember so much. If you can only change 10 behaviors this year, which 10 … Continue reading Start With Simplest Behaviors First


Influence: Science and Practice

I just finished the book "Influence: Science and Practice" by Dr. Robert Cialdini. Dr. Cialdini is considered by many as one of the leading experts in influence, or what our community calls "Social Engineering". This is a powerful book, as you not only learn the techniques that cyber attackers can use against your organization, but … Continue reading Influence: Science and Practice