![Defence middle managers decide department priorities don’t apply to them](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1722826552641-G7VYUVB6P76V8S93D3QQ/mitchel-lensink-vXptgB3qyys-unsplash.jpg)
Defence middle managers decide department priorities don’t apply to them
Leaders need a new place to begin their analysis of the reform problem.
![From awareness to behaviour change: The micro-foundations of cybersecurity culture](https://images.squarespace-cdn.com/content/v1/64bc6daa4061be2bf5d68eaa/1690666838532-9BBYOGWVHQYI1FENJKXH/From+awareness+to+behaviour+change.jpeg)
From awareness to behaviour change: The micro-foundations of cybersecurity culture
People, culture, and behaviour remain the core risk in cyber security assessments and post-incident analyses. How well do we treat the risk of human behaviour in cyber security?