CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Perry Carpenter
Author | Chief Evangelist at KnowBe4
Perry Carpenter is author of the recently published, “The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer.” [2022, Wiley] His second Wiley book publication on the subject. He is chief evangelist and security officer for KnowBe4 [NASDAQ: KNBE], the world’s largest security awareness training and simulated phishing platform.


African woman raising hand to ask question at team security awareness training
Cyber SecurityInsights

7 Tips for Launching a Security Awareness Training Program

January 30, 2023
Not all security awareness training programs achieve desired results. Here are items to consider when setting up your security awareness training program.
Read More
Hand holding cogwheels showing security culture and behavior design
Cyber SecurityInsights

Building a Security Culture With Behavior Design

November 23, 2022
Human error accounts for the vast majority of security breaches largely due to successful phishing campaigns. Here are tips on fortifying the human firewall via the Fogg model of behavior design.
Read More
Businessman chooses the padlock icon showing data breaches and security culture
Cyber SecurityInsights

We’re Spending Billions Each Year on Cybersecurity. So Why Aren’t Data Breaches Going Away?

August 1, 2022
Why despite the fact that businesses and governments spend billions of dollars to fight cyber attacks are businesses continuing to fall prey to data breaches? Companies must build and sustain a strong security culture.
Read More
Fishing hook on computer keyboard showing anti-phishing information security policies
Cyber SecurityInsights

3 Information Security Policies To Help Create a Strong Anti-phishing Foundation

March 11, 2022
No matter how boring or clichéd this might sound, information security policies and procedures are the pillars successful organizations are built on, setting the stage for a sound security culture and helping to create a foundation for a truly resilient organization.
Read More
Virtual locks over the globe showing defense for ransomware attacks
Cyber SecurityInsights

5 Defenses for 5 Ransomware Root Causes

December 6, 2021
Ransomware groups have shifted from the automated, ‘spray and pray’ tactics of yesterday to highly targeted, human-operated ransomware attacks, carefully crafted to find and encrypt your data and cause maximum critical service disruption.
Read More
Fish hook with keys on computer circuit board showing phishing and need for security awareness
Cyber SecurityInsights

What To Do When Your Organization Become the Victim of a Phishing Attack

July 20, 2021
Knowing the common manipulative tactics – exploiting every emotional hot button (anxiety, uncertainty, urgency) – used in phishing is the first step to understanding how to identify and deflect them; and it requires a repetitive process.
Read More
Young Caucasian man make notes working on laptop participating in security awareness campaign
Cyber SecurityInsights

4 Critical Elements of Effective Security Awareness Campaigns

April 9, 2021
A transformational communication program will move beyond one-size-fits-all messaging and approaches. Here we take a look at four critical elements of effective security awareness campaigns.
Read More
Man holding glasses while starting at laptop showing challenges of misinformation
Cyber SecurityInsights

Identifying—and Challenging—Your Cognitive Biases To Curb Misinformation

December 29, 2020
Entire populations are being manipulated through increasingly prevalent and hyper-compelling information typically spread via social media, designed to invoke emotion and exploit known biases and provoke a tsunami of misinformation.
Read More
Man holding fingers crossed behind his back showing threat of phishing and disinformation
Cyber SecurityInsights

Race Relations, Phishing, and the War Against Disinformation

September 24, 2020
The most sophisticated technology in the world is not enough to combat phishing scams. which aren’t designed to break through firewalls or circumvent email gateways or endpoint security.
Read More

Latest

Vehicles in motion on busy motorway showing digital license plates to track vehicles

Digital License Plates: Will This New Way to Track Vehicles Enhance or Undermine Privacy?

Bank of England building showing UK financial regulator stress test report on cyber insurance

UK Financial Regulator: Country’s Cyber Insurance Providers Lack Consistency in Risk Assessments, Modeling Capability

Financial charts showing LockBit ransomware attack impact on derivative trading

ION Group Ransomware Attack Impacts Derivative Trading in Global Markets

Electric system of car engine showing quantum computing impact on automotive cybersecurity

How Quantum Computing Could Affect the Automotive Landscape

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results