Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Advanced persistent training : take your security awareness program to the next level
Schroeder J., Apress, New York, NY, 2017. 92 pp. Type: Book (978-1-484228-34-0)
Date Reviewed: Jan 18 2018

How does one bridge the gap between security training best practices and actual daily compromising actions? How does one break shortcut security bad habits? Are training seminars just something to be endured without having any meaningful impact? If you face these issues, this 92-page book is for you.

Schroeder begins with a chapter on active feedback and habit coaching to create new habits. Next, he addresses behavioral modification and persistence feedback. While each of these chapters is less than ten pages, that does not mean that the process is easy. Changing patterns of thinking is difficult. Metrics and measures occupy a chapter.

There is not one educational format for everyone. Do you know the different learning styles of traditionalists, baby boomers, generation X, and millennials? Schroeder explains, and provides a methodology to customize the material. Creating a security culture follows with some case study examples. The final step is supporting new habits and testing those habits over time.

An appendix contains brief interviews with leaders at Wombat Security Technologies, PhishLine, Rapid7, and Curricula concerning what they do and how to implement third-party training. A number of other firms and individuals are credited with providing insights. There is a list of references, a comprehensive index, and an opportunity to purchase the ebook.

The reader is left with the feeling that bad security habits may be changed; however, one has to undertake some hard work to achieve it. This road map to success is an encouraging short read.

More reviews about this item: Amazon

Reviewer:  Brad Reid Review #: CR145784 (1803-0142)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Training (K.6.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy