Threat actors' tenacity to disrupt: Examination of major cybersecurity incidents
The exponential growth in the interconnectedness of people and devices, as well as the
upward trend in cyberspace usage will continue to lead to a greater reliance on the internet …
upward trend in cyberspace usage will continue to lead to a greater reliance on the internet …
[HTML][HTML] Towards an Innovative Model for Cybersecurity Awareness Training
H Taherdoost - Information, 2024 - mdpi.com
The rapid evolution of cybersecurity threats poses a significant challenge to organizations
and individuals, necessitating strengthening defense mechanisms against malicious …
and individuals, necessitating strengthening defense mechanisms against malicious …
Human errors: A cybersecurity concern and the weakest link to small businesses
T Ncubukezi - Proceedings of the 17th International Conference …, 2022 - books.google.com
Cybersecurity is essential for all organizations, especially during this menacing Covid-19
global pandemic. The sudden transition of leaving the offices to work from home–the'new …
global pandemic. The sudden transition of leaving the offices to work from home–the'new …
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
Purpose This paper aims to discuss the experiences designing and conducting an
experiential learning virtual incident response tabletop exercise (VIRTTX) to review a …
experiential learning virtual incident response tabletop exercise (VIRTTX) to review a …
Bridging the cyber security skills gap: Using tabletop exercises to solve the CSSG crisis
Recent breaches like the WannaCry ransomware attack in 2017 are evidence of the rapidly
evolving cyber security threat landscape. They demonstrate the ability of cybercriminals to …
evolving cyber security threat landscape. They demonstrate the ability of cybercriminals to …
A novel autonomous container-based platform for cybersecurity training and research
Cyberattacks, particularly those targeting systems that store or handle sensitive data, have
become more sophisticated in recent years. To face increasing threats, continuous capacity …
become more sophisticated in recent years. To face increasing threats, continuous capacity …
Success factors for designing a cybersecurity exercise on the example of incident response
Exercises are a resource intensive form of providing participants learning, capability testing
and validation of plans and procedures. As exercises commonly are used in the field of …
and validation of plans and procedures. As exercises commonly are used in the field of …
[PDF][PDF] Exploring the effectiveness of cybersecurity training programs: factors, best practices, and future directions
S Nasir - Proceedings of the Cyber Secure Nigeria Conference, 2023 - researchgate.net
Cybersecurity education is essential in equip** individuals with the proper knowledge and
skill sets to protect devices, computers, networks and data from cybersecurity risk. This …
skill sets to protect devices, computers, networks and data from cybersecurity risk. This …
A personalized learning theory-based cyber-security training exercise
Current enterprises' needs for skilled cyber-security (CS) professionals have prompted the
development of diverse CS training programs and offerings. It has been noted that even …
development of diverse CS training programs and offerings. It has been noted that even …
[PDF][PDF] Early startup methodologies in gas plant commissioning: An analysis of effective strategies and their outcomes
Gas plant commissioning is a critical phase in the lifecycle of gas facilities, where the
transition from construction to operational readiness occurs. Early startup methodologies …
transition from construction to operational readiness occurs. Early startup methodologies …