Whitepaper

Behavioural change by using SOC use cases

About this whitepaper

All of our behaviour is recorded in the systems and applications we use every day. Even though this data  is valuable for security awareness programs, today it remains unused for that purpose. Humans are the easiest, cheapest and fastest route to success for hackers. This article discusses the power of (log)data from existing IT sources and how that data can be converted into use cases that contribute to security awareness and (cyber)safe behaviour.

Download

Register and download your whitepaper

This whitepaper discusses the power of (log)data from existing IT sources and how that data can be converted into use cases that contribute to security awareness.