Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Interlinking GenAI and Human Cyber Risk
Generative artificial intelligence Generative artificial intelligence, or GenAI, is the term used to describe data-led algorithms (such as ChatGPT) that can be used to create new content, including audio, code, images, text, simulations, and videos. Recent accelerated...
Experts speak out: Four reasons your cyber risk strategy needs a reboot
Blind spots and biases: Experts get real at IMPACT 2024 USA Even seasoned practitioners mess up sometimes. We all do. And when we do, we make our own lives harder, sure. But who else is affected? The people we’re supposed to be helping. It’s not your fault. Security...
2024 Gartner®, How to Make Your Cybersecurity Program More Defensible to Stakeholders
Gartner®, How to Make Your Cybersecurity Program More Defensible to StakeholdersCybSafe is proud to bring you cutting-edge research in cybersecurity. We’re highlighting a valuable report, Gartner®, How to Make Your Cybersecurity Program More Defensible to...
On demand webinar: Maximizing user engagement during Cybersecurity Awareness Month
ON DEMAND WEBINARMaximizing user engagement during Cybersecurity Awareness MonthTips, tricks, and experiences from the pros15:00 BST • 10:00 EDTRecent research has shown users in organizations that participate in Cybersecurity Awareness Month are significantly more...
Training derailed? Experts on the future of security awareness
“Don’t tell me not to click when clicking is my job!”: Saving people from security awareness training We’re born knowing very little, yet we need a lot of knowledge to live our lives. Learning is, therefore, a huge part of being human…and it’ll never not be a part of...
Cybersecurity Awareness Month needs a human touch, with only 42% satisfied with current training
Most Cybersecurity Awareness Month (CAM) activities are promoted and carried out individually online, with only 26% discussing upcoming events in meetings, and a newsletter being the most popular CAM activity (62%). Activities are mandatory in just 37% of the...
The hidden cost of cybersecurity’s “masculinity problem”
Is cybersecurity steeped in masculinity? (Spoiler: Yes. And it’s a bigger problem than we all realized.) Cybersecurity. On the face of things, it’s hardly the pinnacle of traditional masculinity. But it’s a man’s world. It’s undeniably. Overwhelmingly. Male. It’s a...
Security Awareness Engagement Toolkit
Security Awareness Engagement Toolkit Our Security Awareness Engagement Toolkit—revamped for Cybersecurity Awareness Month 2024 (CAM2024)—has everything needed to create a security awareness program to improve people’s security behaviors. Cybersecurity Awareness...
Demystifying the EU AI Act
The EU AI Act, also known as the Artificial Intelligence Act, is the world’s first comprehensive piece of legislation directly governing artificial intelligence (AI). It comes into effect in 2025 and brings with it strict requirements. Its objective is to ensure the...
The Impact of Workload on Phishing Susceptibility: An Experiment
Phishing is when social engineering is used to deceive a person into sharing sensitive information or downloading malware. Research on phishing susceptibility has focused on personality traits, demographics, and design factors related to the presentation of phishing....
The Behavior Grid: 35 ways behavior can change
This paper presents a new way of categorizing behavior change in a framework called the Behavior Grid. This preliminary work shows 35 types of behavior along two categorical dimensions. To demonstrate the analytical potential for the Behavior Grid, this paper maps...
Employee behavior: the psychological gateway for cyberattacks
Purpose – Cyberattacks have become a major threat to small and medium-sized enterprises. Their prevention efforts often prioritize technical solutions over human factors, despite humans posing the greatest risk. This article highlights the importance of developing...
Who cares about cybersecurity awareness month?
We asked a thousand users. Here’s what they said… 1/4 of respondents are aware of Cybersecurity Awareness Month 60% of the people who do not participate in CAM think their organization sees cybersecurity as unimportant 80% of participants are concerned with personal...
Cybersecurity Awareness Month participants show 50% higher trust in employer’s security stance
A quarter of respondents are aware of the existence of Cybersecurity Awareness Month (CAM) Of those who participate in CAM, 93% believe their organization sees cybersecurity as an important issue, compared to just 60% of those who don’t participate CAM participants...
Free Cybersecurity Awareness Month Planning Tool
Free Cybersecurity Awareness Month Planning Tool Cybersecurity Awareness Month 2024 (CAM2024) is around the corner… FREE SECURITY AWARENESS PLANNING TOOLDownload our planning tool We’ve released our FREE Security Awareness Planning Tool. Use it to map activities to...
On demand webinar: Maturing SA&T programs into human risk management strategies
ON DEMAND WEBINARMaturing SA&T programs into human risk management strategies.Taking control of your security with HRM.2005 called. They want their security awareness & training (SA&T) program back. Traditional SA&T programs often focus on...
IMPACT 2024: The findings
WHITEPAPERIMPACT 2024: The findings A showreel of fresh insight from IMPACT 2024 Hosted by CybSafe, IMPACT is the free, annual event that shines a spotlight on the latest research into human factors and cybersecurity. Imagine a room (or two) full of the world's...
Demonstrating security awareness value to senior stakeholders
Getting management buy-in by telling “data stories” and articulating outcomes You’re here because you want to reduce human cyber risk. When you started out in this industry, you probably expected something like: reduce risk, enjoy success and glory. By now you know...
On demand webinar: Human risk factors in cybersecurity
ON DEMAND WEBINARHuman risk factors in cybersecurity Understanding people, to reduce people-related security risks Lots of things make people more or less susceptible to cyberattacks. Cybersecurity practitioners work hard to influence those things to bring down...
Critical success factors for security education, training and awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives
Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of...
Human factors in remote work: examining cyber hygiene practices
The purpose of this paper is to investigate the cyber hygiene practices of remote workers. This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory,...