« FedRAMP: A progress report from a 3PAO | Main | There’s Testing, Then There’s VirusTotal »

30 November 2012


ITProsperity Blog

Do you generally take into account optimizing the content for search systems?

John Deere

It is not just the lack of training, because I saw many of the security team effort between users by word of mouth. In order for them to understand the risks.

Alexandre Cezar

Hi David,

You´re right. Change the user culture isn´t a easy task. Far from it...
But I believe that this cultural change must come, and for some people it´ll come naturally through specific awareness training. For others it´ll come by need.
Knowing that they´re accountable for their actions will make them more responsible too.

David Broda

Great point.
I do believe you are right but still ... how do we make the user accountable ?
Maybe regulations and laws can help (and should help) but we are speaking about changing the user "culture".

The comments to this entry are closed.

About the (ISC)² Blog

As the certifying body for more than 100,000 information security professionals worldwide, (ISC)² believes in the importance of open dialogue and collaboration. (ISC)² established this blog to provide a voice to certified members, who have significant knowledge and valuable insights that can benefit other information security professionals and the public at large.

The (ISC)2 blog gives members a forum to exchange ideas and inspires a safe and secure cyber world by supporting the advancement of the information security workforce via a public exchange with a broad range of information security topics.

Whether an (ISC)² member chooses to participate in the (ISC)² blog is his or her own decision. The postings on this site are the author's own and don't necessarily represent (ISC)²'s positions, strategies or opinions. (ISC)² monitors the blog in accordance with the (ISC)² Blog Guidelines, but the bloggers are responsible for their own content – common sense and intelligence should prevail.

Other than links to the (ISC)2 website, (ISC)² does not control or endorse any links to products or services provided in this blog and makes no warranty regarding the content on any other linked website.

Those who post comments to (ISC)² blogs should ensure their comments are focused on relevant topics that relate to the specific blog being discussed. (ISC)² reserves the right to remove any post or comment from this site. Should you find objectionable content in this blog, please notify us as soon as possible at blog@isc2.org

Please click here for FAQs.

Please click here for the Blog Guidelines.