This article evaluates the NCSC’s Cybersecurity Risk Management Guidance through the lens of human factors and cyber psychology. While the framework excels in technical prevention, it falls short in addressing the human elements crucial to recovery, such as morale, stress, and organisational culture. Recommendations include integrating resilience-focused metrics, adapting attack trees for human-centric scenarios, balancing prevention with recovery, and leveraging cyber psychology insights. These enhancements would align the guidance with the realities of human behaviour, creating a more effective and comprehensive approach to cyber risk management.
Continue reading “Human Factors and Cyber Psychology Applied to the NCSC’s Guidance on Risk Management”The Human Factor in Supply Chain Resilience: Insights from McKinsey Through a Cyber Psychology Lens
Supply chains are often viewed as logistical systems of processes, technologies, and networks. However, at their core, they are fundamentally human. As McKinsey’s latest report “Supply Chains: Still Vulnerable” highlights, the psychology of decision-making, trust, and risk perception plays an equally critical role in supply chain resilience. Ignoring these human factors can undermine even the most sophisticated technological solutions.
Continue reading “The Human Factor in Supply Chain Resilience: Insights from McKinsey Through a Cyber Psychology Lens”The Intersection of Cyber Psychology and Security: Key Takeaways, Podcast, and Full Transcript
In a recent episode of the CYBR Perspective podcast, Sevgi Aksoy, lead Cyber Psycology Research Consultant at Psyber, Inc. discussed the growing role of psychology in cyber security. From understanding cognitive biases to managing stress in high-stakes environments, this conversation reveals how human behaviour shapes the world of cyber defence. Below, you’ll find an article summarising the key takeaways for quick reference, followed by the podcast itself and a full transcript.
Continue reading “The Intersection of Cyber Psychology and Security: Key Takeaways, Podcast, and Full Transcript”