Summary of The Unaddressed Gap in Cybersecurity: Human Performance

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

The Unaddressed Gap in Cybersecurity: Human Performance summary
Start getting smarter:
or see our plans




  • Comprehensive
  • Analytical
  • Well Structured


Cybersecurity breaches cost companies millions of dollars each year, forcing many firms to consider increasing investment in security technology. Stephen Wilson, Dean Hamilton and Scott Stallbaum point instead to gaps in human performance as the root cause of many of these failures. Corporate leaders should establish high-reliability cybersecurity operations (HRCOs) to embed disciplined behaviors and hypervigilance into the corporate culture to address the human performance gap prevalent in many businesses.

About the Authors

Stephen A. Wilson is cofounder and managing partner at consulting firm Wilson Perumal & Company where Dean Hamilton is chief technology officer and partner, and Scott Stallbaum is a manager.



Firms are looking to increase investment in security technology to counter costly cybersecurity failures.

Every year, companies fall victim to cybercrime. As security breaches become more costly, companies turn to advanced technology; yet in many breaches, human error leads to the breakdown in security. In 2015, for example, cybercriminals accessed 80 million customer records from health insurer Anthem after an employee fell for a phishing scam. In 2019, hackers broke through a misconfigured firewall at bank holding company Capital One and obtained 106 million customer records.

While engaging new security technology...

More on this topic

Customers who read this summary also read

The Malicious Use of Artificial Intelligence
The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet
Are You Managing Your Risks from Social Media?
Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem
Building the Government Workforce of the Future
So much for the decentralized internet

Comment on this summary