INDEX

2FA (two-factor authentication) 21, 36

ABC approach 1, 1415, 17, 19, 20, 88, 1002, 10718

Accelerated Learning 2930, 37

access control 589, 64

active awareness 6, 7, 10, 19

AIDA (awareness, interest, desire and action) 109

annual training 8, 36

anti-phishing training 612, 64

anti-virus software 63, 64

artefacts 71, 73, 81, 82, 85, 104, 111, 112, 11617

assumptions, challenging 99100

audience, knowing your 367, 41

automated tools 56

availability heuristic 98

awareness

ABC approach 1, 1415, 17, 19, 20, 107, 1089, 11215, 117

Accelerated Learning 2930, 37

balancing awareness, training and education 57

building 2638

clicking links 1, 2, 5, 9, 11, 13, 18, 21, 27, 30, 32, 34

communication problems 1011

cultural awareness 734

culture’s role in 78

current perceptions 12

data breaches 16, 1819, 20, 31

defining terms 45, 6, 17

delivery of 710

Extended Parallel Process Model 312, 33

fear appeals 21, 26, 303, 34, 38

Feynman technique 279, 30, 37

focussing on ourselves alone 1213

hacking 3, 18, 30, 312, 334

importance to employees 23, 11

knowing your audience 367

myths of 24

need for 1617

perennial challenge of 115

phishing attacks 3, 4, 5, 9, 10, 16, 18, 19, 212, 30, 34, 36

raising 67, 9, 1722, 269, 35, 367, 64, 74, 1045

responsibility for 2

security fatigue 356, 38

self-efficacy 335, 36

senior-level engagement 1920

situational awareness 18, 25, 76

understanding 1625

utilising metrics 22, 23, 25

utilising resources 224

B2B (business to business) teams 71

B2C (business to consumer) teams 71

behaviour

ABC approach 1078, 11017

awareness-raising programmes 202

changing 1314, 5264

culture’s role in 758

defining 39, 401

identifying 11012

information security policy 41, 50, 525, 64

measuring 446, 50

myths of awareness 3

nudging 13, 63

phishing attacks 401, 4950, 52, 57, 58, 612, 64

planned behaviour 42, 43, 50, 51, 54

protection motivation theory 434, 50, 51

psychology 39, 41, 434, 50, 52, 56, 5860

punishment/reinforcement models 567, 59, 61, 634

reliability and validity 39, 478

research methods 39, 4850

social experiments 39, 467

specific cybersecurity behaviours 5763

techniques for changing behaviour 5563

theories of 39, 414

understanding 3951

best practice 17, 64

board involvement 96

brand audits 745

budgets 7, 23, 97, 1001

BYOD (bring your own device) 63

Carlzon, Jan 111

CBT (computer-based training) 7, 9, 23

CEOs (chief executive officers) 14, 92, 94, 95

champions 234, 25, 29, 36, 71, 93, 95, 116

choice architecture 824, 87

CISM (Certified Information Security Manager) 7

CISOs (chief information security officers)

ABC approach 111

awareness 16, 19, 107

behaviour 55, 578, 603

culture 66, 71, 88, 89, 93, 96, 99, 105

CISSP (Certified Information Systems Security Professional) 7, 12

cognitive bias 66, 78

cognitive dissonance 72, 97

collaboration 95, 106, 11314

compliance 73, 76, 924, 98, 100

control systems 14, 73

coping appraisal 43

COVID-19 118

crises, responding to 989

cultural awareness 734

cultural web 34, 14

culture

ABC approach 88, 1002, 1079, 11117

awareness-raising programmes 202, 74, 1045

as barrier to change 945

building a security culture 11617

challenging assumptions 99100

changing 14, 89106

components of 713

control systems 14, 73

creating 14, 88106

cultural awareness 734

cultural forces 745

defining 667

external drivers of change 914

forming 801, 84

importance in security context 65, 867

influencing 826

internal drivers of change 94

learning 7882

myths of awareness 34

rituals and routines 14, 73, 82

role in awareness 78

role in decision-making and behaviour 758

stories and myths 14, 73, 103

top down approach 82, 88, 923

types of 6771

underestimating influence of 65

understanding 6587

vulnerability of 778

Cygenta 22, 34

data breaches 16, 1819, 20, 31, 35, 95, 99

decision-making 72, 73, 767, 108

dedicated resources 100

double-blind experiments 47

Dunning–Kruger effect 48, 60, 64

engagement journey 67

espoused values 71, 72, 73, 74, 75, 77, 79, 81, 84, 86, 92, 104

Extended Parallel Process Model 312, 33

FCA (Financial Conduct Authority) 82, 92

fear appeals 21, 26, 303, 34, 38, 41, 43

Feynman technique 279, 30, 37

formal statements 1045

formal/informal structures 78, 79, 81, 84

FUD (fear, uncertainty and doubt) 26

GDPR (General Data Protection Regulation) 46, 76, 89, 105

Gerstner, Louis 94

good practice 1, 1213, 25, 46

groupthink 11

hacking 3, 18, 30, 312, 334

HARK (Hypothesizing After the Results are Known) 46, 47

Hawthorne effect 46, 47, 49, 59

heroes 712, 85, 86, 108

heuristics 66, 77, 78, 97, 98

Hofstede, Geert 4, 689

HR (human resources) 36, 99, 102, 103

human behavioural tools 567, 64

‘human firewall’ 2, 3

IBM 94

IEC (International Electrotechnical Commission) 105

increasing engagement 67

individualism and collectivism 69, 75

induction programmes 7, 9, 36, 73, 85

indulgence and restraint index 69, 75

Information Security Forum (2020) 12

information security policy 41, 50, 525, 64, 105

insiders 1617

intranet 8, 910, 24

investment, obtaining 978

ISO (International Organization for Standardization) 89, 105

IT (information technology) 6, 11, 99100, 105

job titles and responsibilities 1056

Kahneman, Daniel 76

Kotter’s stages for change 901

KPIs (key performance indicators) 97

Leventhal, Howard 31

links, clicking 40, 49, 612, 118

awareness of 1, 2, 5, 9, 11, 13, 18, 21, 27, 30, 32, 34

long- and short-term orientation 69

macro-cultures 67, 6870, 71

MAS (Monetary Authority of Singapore) 93, 102

masculine and feminine societies 69

Maslow’s Hierarchy of Needs 71, 79

measuring behaviour 446, 50

‘merch’ 7, 8, 10, 108

metrics 22, 23, 25, 66, 75, 76

micro-cultures 68, 701

mobile security 623, 64

myths of awareness 24

national cultures 6870, 74, 75, 801, 845

NCSC (National Cyber Security Centre) 26, 33

negative conditioning 567

newsletters 8, 10, 105

NHS (National Health Service) 21, 33

NIST (National Institute of Standards and Technology) 45, 17, 20, 22, 33, 34, 35, 89, 105

normalcy bias 98

nudging 13, 63, 82

null hypothesis 49, 51

observer effect 47, 49

onion model 713

organisational cultures (culture type) 67, 70

passive awareness 6, 8, 10, 17, 37

passwords

carelessness with 30, 40, 42, 47, 49, 56, 58

password management 212, 28, 34, 36, 52, 58, 5960, 64

strength/weakness of 21, 27, 32, 334, 41, 57

PCI DSS (Payment Card Industry Data Security Standard) 105

phishing attacks

anti-phishing training 612, 64

awareness 3, 4, 5, 9, 10, 16, 18, 19, 212, 30, 34, 36

behaviour 401, 4950, 52, 57, 58, 612, 64

spear-phishing 19, 212, 34, 36

planned behaviour theory 42, 43, 50, 51, 54

positive conditioning 567

power distance ratio 68, 75, 91

promoting understanding 67

protection motivation theory 31, 434, 50, 51

psychology 302, 37, 39, 41, 434, 50, 52, 56, 5860

punishment/reinforcement models 567, 59, 61, 634, 103

raising awareness 67, 9, 1722, 269, 35, 367, 64, 74, 1045

ransomware 28, 36

recruitment and retention 1034

remote working 11516, 118

removable media 623, 64

resources, allocating and utilising 224, 1001

rewards and recognition, building 1023

risk assessment 66, 78

rituals and routines 14, 73, 80, 82

role modelling 1012, 105, 111

RSA conference (2020) 33

salience (or saliency) bias 98

SANS European Security Awareness Summit (2016) 29

SAS (Scandinavian Air Systems) 111

Schein, Edgar 713

Secure Summits survey (2017) 39, 446, 525, 58

security fatigue 356, 38

security websites 910

self-efficacy 335, 36

senior-level engagement 1920

Sinek, Simon 27

situational awareness 18, 25, 76

SMART (specific, measurable, achievable, relevant and time-bound) 49

social experiments 39, 467

social media 18, 27, 70, 81

social proof 19, 25, 70, 77, 78

software/security updates 43, 63, 64, 92

SP (Special Publication) 45, 17

spear-phishing 19, 212, 34, 36

start-up cultures 70, 82

stories and myths 14, 73, 80, 103, 104

sub-cultures 68, 70, 72, 94, 116

supporting action 67

symbols 71, 73, 85, 103, 116

Thaler, Richard 76

threat appraisal 43

uncertainty avoidance 68, 75

underlying assumptions 71, 723, 74, 77, 83, 84, 86

URL (Uniform Resource Locator) 11

USB (Universal Serial Bus) keys 47, 50, 623, 64, 11314

Verizon Data Breach Investigations Report (2020) 16

vision, creating a 90, 96

VPN (virtual private network) 116

WannaCry attack (2017) 21, 33

‘why’ questions 1617, 201, 27, 32, 74, 94, 10910

Witte, Kim 31

workstation locking 30, 32, 41, 42, 47, 56, 59, 64