Purpose: Cybersecurity advocates safeguard their organizations by promoting security best practices. However, little is known about what constitutes successful advocacy.

Methodology: We conducted 28 in-depth interviews of cybersecurity advocates.

Findings: Effective advocates not only possess technical acumen, but also interpersonal skills, communication acumen, context awareness, and a customer service orientation.

Originality: We are the first to define and enumerate competencies for the role of cybersecurity advocate.

Implications: Non-technical skills are deemphasized in cybersecurity training, limiting career progression into the cybersecurity advocate role for existing security professionals and those from other disciplines. We suggest improvements for professional development that encourage greater security workforce diversity.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8628570PMC
http://dx.doi.org/10.1108/ics-08-2020-0131DOI Listing

Publication Analysis

Top Keywords

cybersecurity advocates
8
cybersecurity
6
advocates discovering
4
discovering characteristics
4
characteristics skills
4
skills emergent
4
emergent role
4
role purpose
4
purpose cybersecurity
4
advocates safeguard
4

Similar Publications

In response to the increasing significance of artificial intelligence (AI) in healthcare, there has been increased attention - including a Presidential executive order to create an AI Safety Institute - to the potential threats posed by AI. While much attention has been given to the conventional risks AI poses to cybersecurity, and critical infrastructure, here we provide an overview of some unique challenges of AI for the medical community. Above and beyond obvious concerns about vetting algorithms that impact patient care, there are additional subtle yet equally important things to consider: the potential harm AI poses to its own integrity and the broader medical information ecosystem.

View Article and Find Full Text PDF
Article Synopsis
  • The text discusses the importance of forecasting future health issues in the USA for effective planning and public awareness regarding disease and injury burdens.
  • It describes the methodology for predicting life expectancy, cause-specific mortality, and disability-adjusted life-years (DALYs) from 2022 to 2050 using the Global Burden of Diseases framework.
  • The forecasting includes various scenarios to assess the potential impacts of health risks and improvements across the country, focusing on demographic trends and health-related risk factors.
View Article and Find Full Text PDF

Promoting the Resilience of Health Care Information Systems-The Day Hospitals Stood Still.

JAMA Health Forum

November 2024

Department of Bioengineering, Department of Electrical & Computer Engineering, and Khoury College of Computing, Northeastern University, Boston, Massachusetts.

View Article and Find Full Text PDF

This study reviews the applications of big data (BD) and blockchain technology in modern food testing and explores their impact on educational reform. The first part highlights the critical role of BD in ensuring food safety across the supply chain, discussing various data collection methods, such as national and international food safety databases, while addressing the challenges related to data storage and real-time information retrieval. Additionally, blockchain technology has been explored for its ability to enhance transparency, traceability, and security in the food-testing process by creating immutable records of testing data, ensuring data integrity, and reducing the risk of tampering or fraud.

View Article and Find Full Text PDF

Application of zero trust model in preventing medical errors.

Front Health Serv

October 2024

Department of Research, Well Span Health, York, PA, United States.

Article Synopsis
  • Medical errors occur in various healthcare settings and can have serious effects on patients and their families.
  • The Zero Trust Model (ZTM), which restricts access to data and applications by default, has been effective in other industries and could help reduce medical errors in healthcare.
  • Implementing ZTM in healthcare could enhance patient safety by improving data privacy, monitoring access to critical systems, and providing solutions to common error causes, while also addressing increasing cybersecurity threats like ransomware.
View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!