The People Problem: Strengthening Cybersecurity Through Proper Training
()
About this ebook
In a world where digital threats loom large and cyberattacks dominate headlines, it's easy to get caught up in the latest technological advancements and cutting-edge security tools. We pour vast amounts of money into fortifying our digital fortresses, convinced that we've safeguarded our organizations and ourselves against the perils of the digi
Jerrod Pickering
Dr. Jerrod Pickering brings a wealth of knowledge and experience to the fields of education and cybersecurity. He has made significant contributions through his diverse roles from teacher through district administrator. As an external consultant, Dr. Pickering has traveled extensively, collaborating with financial institutions to strengthen their security posture and ensure compliance with industry regulations, providing him with invaluable insights into safeguarding critical information. Certified as an Information Systems Auditor by ISACA, he upholds industry standards and best practices. Dr. Pickering's written works on cybersecurity topics serve as authoritative resources, complemented by his engaging presentations at conferences and webinars. He passionately advocates for comprehensive workforce education and fosters a secure digital environment. With an unwavering commitment to cybersecurity, Dr. Jerrod Pickering emerges as a leading authority, leaving a profound impact on protecting critical information in our interconnected world.
Related to The People Problem
Related ebooks
Guardians of the Virtual Realm: From Protection to Penetration: Navigating Cybersecurity and Ethical Hacking Techniques Rating: 0 out of 5 stars0 ratingsCybersecurity in the Age of Espionage: Protecting Your Digital Life Rating: 0 out of 5 stars0 ratingsCybersecurity For Beginners: Learn How To Defend Against Online Threats Rating: 0 out of 5 stars0 ratingsNavigating New Cyber Risks: How Businesses Can Plan, Build and Manage Safe Spaces in the Digital Age Rating: 0 out of 5 stars0 ratingsDynamic Tensions: Essays on Balancing Privacy, Security and Identity in the 21st Century Rating: 0 out of 5 stars0 ratingsCybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5Cybercrime: Protecting your business, your family and yourself Rating: 0 out of 5 stars0 ratingsThe Five Anchors of Cyber Resilience: Why some enterprises are hacked into bankruptcy, while others easily bounce back Rating: 0 out of 5 stars0 ratingsMobilizing the C-Suite: Waging War Against Cyberattacks Rating: 0 out of 5 stars0 ratingsSafeguarding the Digital Fortress: A Guide to Cyber Security: The IT Collection Rating: 0 out of 5 stars0 ratingsCan. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity Rating: 5 out of 5 stars5/5Managing Online Risk: Apps, Mobile, and Social Media Security Rating: 0 out of 5 stars0 ratingsCC Certified in Cybersecurity The Complete ISC2 Certification Study Guide Rating: 0 out of 5 stars0 ratingsSecurity: The Human Factor Rating: 0 out of 5 stars0 ratingsWhat You Should Know About Cybersecurity Rating: 0 out of 5 stars0 ratingsThe True Cost of Information Security Breaches and Cyber Crime Rating: 0 out of 5 stars0 ratingsUltimate Cyberwarfare for Evasive Cyber Tactics Rating: 0 out of 5 stars0 ratingsDIS Unleashed: The Evolution of Digital Immune Systems Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 1: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsBEYOND CHECKBOXES Rating: 0 out of 5 stars0 ratingsThor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsInformation and Knowledge Security Governance and Management Rating: 0 out of 5 stars0 ratingsDigital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 0 out of 5 stars0 ratingsCarry On: Sound Advice from Schneier on Security Rating: 4 out of 5 stars4/5Building a Practical Information Security Program Rating: 5 out of 5 stars5/5Protecting Your Assets: A Cybersecurity Guide for Small Businesses Rating: 0 out of 5 stars0 ratingsBreaking Into IT: Your Roadmap to Success in the Tech Industry Rating: 0 out of 5 stars0 ratingsCyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratings
Business For You
The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5The Book of Beautiful Questions: The Powerful Questions That Will Help You Decide, Create, Connect, and Lead Rating: 4 out of 5 stars4/5Lying Rating: 4 out of 5 stars4/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Emotional Intelligence: Exploring the Most Powerful Intelligence Ever Discovered Rating: 5 out of 5 stars5/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5How to Get Ideas Rating: 5 out of 5 stars5/5Grant Writing For Dummies Rating: 5 out of 5 stars5/5Collaborating with the Enemy: How to Work with People You Don’t Agree with or Like or Trust Rating: 4 out of 5 stars4/5Financial Words You Should Know: Over 1,000 Essential Investment, Accounting, Real Estate, and Tax Words Rating: 4 out of 5 stars4/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Tools Of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers Rating: 4 out of 5 stars4/5Robert's Rules of Order: The Original Manual for Assembly Rules, Business Etiquette, and Conduct Rating: 4 out of 5 stars4/5Just Listen: Discover the Secret to Getting Through to Absolutely Anyone Rating: 4 out of 5 stars4/5High Conflict: Why We Get Trapped and How We Get Out Rating: 4 out of 5 stars4/5Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5Ask for More: 10 Questions to Negotiate Anything Rating: 4 out of 5 stars4/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5Summary of Eve Rodsky's Fair Play Rating: 2 out of 5 stars2/5
Reviews for The People Problem
0 ratings0 reviews
Book preview
The People Problem - Jerrod Pickering
The People Problem:
Strengthening Cybersecurity Through Proper Training
By Dr. Jerrod Pickering
©2023
About the Author
Dr. Jerrod Pickering is an accomplished professional with a diverse background in education and cybersecurity. Holding a Doctorate in Instructional Technology from Texas Tech University, he has made significant contributions to the field through his expertise and experiences.
With a career spanning various roles in the education sector, Dr. Pickering has served as a high school teacher, high school principal, and school superintendent. These roles have provided him with valuable insights into the challenges faced by educational institutions in maintaining robust cybersecurity practices.
In his capacity as an external consultant, Dr. Pickering has traveled extensively throughout the United States, collaborating with financial institutions to enhance their security posture. His primary focus has been on identifying areas of non-compliance with FFIEC guidelines and other state and federal banking regulations. His deep understanding of the industry's unique security requirements has made him a trusted advisor in the financial sector.
Not limited to external consulting, Dr. Pickering has also worked as an internal IT auditor for one of the world's largest financial institutions. This experience allowed him to gain firsthand knowledge of the intricacies involved in safeguarding critical information within complex organizational structures.
To further augment his professional qualifications, Dr. Pickering is a Certified Information Systems Auditor licensed by ISACA, demonstrating his commitment to upholding industry standards and best practices. Additionally, he holds a Security+ certification from CompTIA, further validating his expertise in the field of cybersecurity.
Dr. Pickering's contributions extend beyond his practical work. He is an accomplished writer, with numerous articles authored by him covering a wide range of cybersecurity topics addressed in this book. His written works serve as valuable resources for professionals seeking practical insights and strategies to navigate the evolving cyber threat landscape.
In recognition of his expertise, Dr. Pickering has been invited to present at both regional and national conferences, as well as deliver insightful webinars. These platforms allow him to share his knowledge and educate audiences on the importance of cybersecurity awareness and the role of education in fostering a cyber-resilient workforce.
Combining his passion for education and cybersecurity, Dr. Pickering advocates for comprehensive workforce education to address the knowledge gaps that exist outside the IT space. His dedication to raising awareness and promoting best practices underscores his commitment to fostering a secure digital environment for individuals and organizations alike.
Through his extensive experience, qualifications, and unwavering dedication, Dr. Jerrod Pickering continues to make a profound impact on the field of cybersecurity, positioning himself as a leading authority in safeguarding critical information in an increasingly interconnected world.
Introduction
In a world where digital threats loom large and cyberattacks dominate headlines, it's easy to get caught up in the latest technological advancements and cutting-edge security tools. We pour vast amounts of money into fortifying our digital fortresses, convinced that we've safeguarded our organizations and ourselves against the perils of the digital age. But there's a problem—an insidious vulnerability that continues to persist despite our best efforts: the human factor.
Welcome to The People Problem,
a book that examines the pivotal role people play in cybersecurity. Through personal experiences, observations, and hard-hitting statistics, we'll delve into the uncharted territory