Muutke küpsiste eelistusi
  • Formaat - PDF+DRM
  • Hind: 62,39 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful role of human behavior in shaping digital security outcomes.

Bridging the gap between behavioral science and cybersecurity, this book challenges the traditional reliance on purely technical defenses and explores why human error accounts for up to 95% of cybersecurity breaches. Drawing from psychology, cognitive science, and organizational behavior, Dr. Sachs provides a compelling framework for rethinking how individuals, teams, and systems interact in high-stakes digital environments.

Through real-world examples and practical strategies, the book examines how cognitive biases, decision fatigue, stress, and cultural dynamics influence security performance. Leaders will learn to recognize and mitigate biases like availability and confirmation bias, implement structured decision-making processes, and foster cultures that prioritize security without sacrificing usability or autonomy.

The book introduces the ‘Technology Strategy Needs Pyramid’, a human-centric model that moves beyond compliance to build mature, resilient, and ethically grounded cybersecurity ecosystems. From designing intuitive interfaces and leveraging behavioral analytics to implementing AI-driven adaptive defenses and ethical nudging, Dr. Sachs equips readers with actionable tools to align human tendencies with security goals.

Whether addressing insider threats, social engineering, or the limitations of legacy awareness training, Behavioral Insights in Cybersecurity advocates for a holistic approach that integrates technology, behavior, and culture. It is a must-read for cybersecurity leaders seeking to create sustainable, secure environments where people are not the weakest link—but the strongest asset.

This book is not just a guide—it’s a call to reimagine cybersecurity leadership through the lens of human behavior, ethics, and strategic decision-making.



Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful role of human behavior in shaping digital security outcomes.

Arvustused

Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dustin S. Sachs takes on one of the most persistentand often misunderstoodchallenges in cybersecurity: the role of human behavior. Rather than portraying users as the weakest link or reducing breaches to individual mistakes, Sachs makes a compelling, evidence-based case that human behavior is inseparable from effective security strategy. The book is firmly grounded in behavioral science and informed by real-world experience, making it especially relevant for leaders who recognize that technical controls alone cannot keep pace with todays evolving threat landscape.

One of the books most valuable contributions is its emphasis on cybersecurity as a cultural and decision-making issue, not merely a technical one. Sachs clearly illustrates how cognitive biases, decision fatigue, stress, and organizational pressures shape security outcomes in ways that are often predictableand avoidable. His discussion of bounded rationality, cognitive overload, and what he calls decision hygiene will feel familiar to practitioners who have watched well-intentioned policies fail simply because they did not align with how people actually think and work. The Technology Strategy Needs Pyramid stands out as a practical and thoughtful framework that helps organizations move beyond checkbox compliance toward resilience and ethically grounded security design.

The writing is approachable without being simplistic. Sachs draws effectively from psychology, neuroscience, and organizational behavior, yet he avoids drifting into theory for its own sake. Instead, he consistently anchors these concepts in practical examples drawn from SOC operations, leadership environments, and enterprise security programs. His treatment of issues such as alert fatigue, security awareness training, and leadership behavior reflects a clear understanding of day-to-day operational realities. Throughout the book, one message is clear: for cybersecurity professionals, understanding and influencing behavior is just as important as deploying firewalls or encryption protocols. Overall, Behavioral Insights in Cybersecurity is a mandatory read for todays cybersecurity leaders and practitioners. It challenges long-standing assumptions about users and places responsibility where it belongson leadership, design, and culture. This book is a valuable resource for CISOs, CIOs, risk leaders, educators, and graduate students who want to integrate behavioral science into cybersecurity strategy in a practical, sustainable way.

Dr. Tim Godlove

The title tells the story.

Sachs joins a growing and important cadre of deeply experienced cybersecurity experts with his clarion call for a cultural shift across the cybersecurity landscape. He argues that while technical expertise is a given organizations must also recognize and mitigate the behaviorshuman factors--that underpin close to 95 percent of cyber incidents. To make his case Sachs melds his unique expertise in both behavioral science and cybersecurity to demonstrate the nexus between the two worlds. Breaking down the stovepipes that separate them and integrating them into a coherent sustainable program means recognizing and mitigating the mental errors rooted in of deeply seeded cognitive biases that drive the behaviors.

These mental errors are not deliberate, but hardwired into how our brains, consciously or not, process information. For purely technical experts the behavioral science that drives the analysis may raise questions about its necessitywhy not just accept they exist and move on--but its not that easy. Sachs is asking technically savvy managers to rethink how they do business end to end and I would argue that reading is believing and skipping or skimming over the science will leave recalcitrant readers unconvinced and the stovepipes intact.

Sachs analysis is rooted in two important strengths.

A deep understanding of cognitive bias. Sachs draws on multiple well known sources to outline the most commonly understood cognitive biases that more often or not lead to poor outcomes and place a cybersecurity framework to explain their impact. Sachs raises the biases early on and then again throughout the book in differing contexts as he explains how to mitigate them as managers gradually reset their team.

and a well-tuned understanding of how to counter them. As he presses for cultural transformation Sachs introduces a wide range of often well-known management tools and models he has used to affect change, including for example, the work of John Kotter and Daniel Kahneman.

Sachs path is well structured. After Sachs details his social science orientation in the introduction and first two chapters he begins in Chapter Three to integrate the impact of human factorsbehaviorson the performance of cybersecurity teams that foreshadows later chapters. Here, for example, he first raises insider threats and social engineering.

Chapters 4 through 6 are the heart of Sachs analysis. He diagnoses applicable cognitive biases and makes detailed programmatic suggestions to mitigate them. Each chapter calls for rethinking a different dimension of their cyber programs and he includes road maps for implementation, lists to go by, and goals and short case studies to illustrate his points.

Chapter 4 emphasizes the importance of developing an organizational culture built around an agreed upon understanding of their organizations vision, mission and values.. I appreciated his reference to John Kotters seminal work on managing and leading change initiatives and the National Institute of Standards and Technology model that emphasizes a disciplined approach to governance and risk management.

Chapter 5 provides a more structured approach to balancing human factors and technology. Central of Sachs analysis his how he adapts Maslows well practiced Hierarchy of Needs to what he labels a Technology Needs Strategy Pyramid that illustrates progression toward building a shared operating environment. Skipping foundational layers "rushing to the shiny objects"leads to failed transformation initiatives.

Chapter 6 is entitled Decision Hygiene, a term less commonly used to describe how to minimize the impact of cognitive biases on decision making. Again, he reviews common biases and cites multiple mental models to wash decisions. Case studies again help make his points.

Chapters 7 through 9, respectively, look at managing the broad impact of AI on cyber security, balancing cyber security and privacy, and a look ahead.

Each chapter begins with a set of objectives and ends with a summary and bibliography. A final summary at the at the end of the book serves as one last clearly written reminder.

Jay Grusin, PhD

Chapter 1: Introduction to Behavioral Science and Cybersecurity
Chapter
2: Foundations of Behavioral Science
Chapter 3: Human Factors in
Cybersecurity
Chapter 4: Impacts on Organizational Culture
Chapter 5:
Technology Strategy Needs Pyramid
Chapter 6: Decision Hygiene in
Cybersecurity
Chapter 7: Applying AI and Emerging Tech to Behavioral Insights
Chapter 8: Ethical Considerations and Privacy
Chapter 9: Future Directions in
Behavioral Cybersecurity
Chapter 10: Summary
Dr. Dustin S. Sachs, DCS, CISSP, CCISO, is a leading voice at the intersection of cybersecurity and behavioral science. With over two decades of experience securing critical infrastructure and advising global enterprises, Dr. Sachs brings a unique blend of technical expertise and psychological insight to the evolving challenges of digital security. He currently serves as Chief Technologist and Senior Director of Programs at CyberRisk Alliance, where he spearheads strategic initiatives that empower cybersecurity professionals through communitydriven learning and innovation.

An awardwinning cybersecurity practitioner, academic, and thought leader, Dr. Sachs holds a Doctorate in Computer Science with a specialization in Cybersecurity and Information Assurance. His research explores decisionmaking in cyber supply chain risk and the psychological drivers behind organizational security behavior. He has served in key roles at Fortune 500 companies, led highimpact thirdparty risk programs, and taught graduatelevel cybersecurity courses, all while contributing to national cybersecurity discourse through leadership roles in ISC², Information System Audit and Controls Association (ISACA), and Federal Bureau of Investigation (FBI) InfraGard.

Dr. Sachs is passionate about demystifying human error and transforming it into strategic advantage. His work challenges traditional, complianceheavy security models, advocating instead for humancentric approaches that foster resilience, accountability, and adaptive security cultures. Whether designing frameworks, advising Chief Information Security Officers (CISOs), or mentoring the next generation of cybersecurity professionals, his mission is clear: to make cybersecurity not only stronger but smarter.

When hes not exploring the psychology of digital risk, Dr. Sachs is a devoted husband and father, endlessly inspired by curiosity, connection, and the pursuit of lifelong learning.