SlideShare una empresa de Scribd logo
1 de 14
WHAT IS MENTAL HEALTH?
Mental health encompasses
emotional, psychological, and
social well-being.
Facts about the mental health of cybersecurity experts
• 94% cyber security leaders have felt increased pressure to keep their company safe in
the last year.
• 91% cyber security professionals have experienced mental health issues during the past
2 years.
• Research shows that over 67% of cyber security leaders feel they do not have enough
talent on their team.
• Culture can be defined as the
habits, traditions and behavior
of people, groups and
organization
WHAT IS CULTURE?
Culture can be defined as the habits,
traditions and behavior of people, groups
and organization
DISCUSSION
DISCUSSION:
WHAT DO YOU KNOW ABOUT PSYCHOLOGY??
This is the scientific study of the human mind and its functions, especially those affecting
behavior in a given context.
Psychology also is the mental characteristic or attitude of a person or group
WHAT IS PSYCHOLOGY?
1. Clinical psychology
2. Cognitive psychology
3. Forensic psychology
4. Occupational psychology
5. Cyber psychology , etc.
DIFFERENT TYPES OF PSYCHOLOGY
LETS DIVE IN….
CYBERPSYCHOLOGY
CYBERPSYCHOLOGY
It encompasses all psychological phenomena associated with or affected by emerging
technology.
Cyberpsychology is the study of the human mind and behavior and how the culture of
technology, specifically the cyber world (the internet) affect them.
What do you see?
M E R C I !
T H A N K Y O U !
QUESTIONS ?

Más contenido relacionado

Similar a Cyber psychology: Understand your cyber security mental health culture

Introduction to psychology
Introduction to psychologyIntroduction to psychology
Introduction to psychology
lawrenceandre
 
lesson01-150711093418-lva1-app6891 (1).pdf
lesson01-150711093418-lva1-app6891 (1).pdflesson01-150711093418-lva1-app6891 (1).pdf
lesson01-150711093418-lva1-app6891 (1).pdf
Ayesha Yaqoob
 
1Psychology’s Roots, Big Ideas, and Critical Thinking Tools.docx
1Psychology’s Roots, Big Ideas, and Critical Thinking Tools.docx1Psychology’s Roots, Big Ideas, and Critical Thinking Tools.docx
1Psychology’s Roots, Big Ideas, and Critical Thinking Tools.docx
RAJU852744
 
Organizational Psychology
Organizational PsychologyOrganizational Psychology
Organizational Psychology
Jerom Emmnual
 
goals of psychology definition Quizlet psychology definition Quizlet psycholo...
goals of psychology definition Quizlet psychology definition Quizlet psycholo...goals of psychology definition Quizlet psychology definition Quizlet psycholo...
goals of psychology definition Quizlet psychology definition Quizlet psycholo...
ytpremium5233
 

Similar a Cyber psychology: Understand your cyber security mental health culture (20)

Models of mental health & illness
Models of mental health & illnessModels of mental health & illness
Models of mental health & illness
 
FeldmanEUP12e_PPT_Ch01.pptx
FeldmanEUP12e_PPT_Ch01.pptxFeldmanEUP12e_PPT_Ch01.pptx
FeldmanEUP12e_PPT_Ch01.pptx
 
Business Psychology
Business PsychologyBusiness Psychology
Business Psychology
 
Lesson 01
Lesson 01Lesson 01
Lesson 01
 
Factors contributing to mental health_compressed (1).pdf
Factors contributing to mental health_compressed (1).pdfFactors contributing to mental health_compressed (1).pdf
Factors contributing to mental health_compressed (1).pdf
 
Factors Contributing To Mental Wellness.
Factors Contributing To Mental Wellness.Factors Contributing To Mental Wellness.
Factors Contributing To Mental Wellness.
 
Humans Aren’t Computers: Effective Leadership Strategies for IT
Humans Aren’t Computers: Effective Leadership Strategies for ITHumans Aren’t Computers: Effective Leadership Strategies for IT
Humans Aren’t Computers: Effective Leadership Strategies for IT
 
Introduction to psychology
Introduction to psychologyIntroduction to psychology
Introduction to psychology
 
Intro Mod 11.pdf
Intro Mod 11.pdfIntro Mod 11.pdf
Intro Mod 11.pdf
 
lesson01-150711093418-lva1-app6891 (1).pdf
lesson01-150711093418-lva1-app6891 (1).pdflesson01-150711093418-lva1-app6891 (1).pdf
lesson01-150711093418-lva1-app6891 (1).pdf
 
INTRO TO PSY-1(2022).pptx
INTRO TO PSY-1(2022).pptxINTRO TO PSY-1(2022).pptx
INTRO TO PSY-1(2022).pptx
 
1. Discovering Psychology rev 24 Agustus 2021.pptx
1. Discovering Psychology rev 24 Agustus 2021.pptx1. Discovering Psychology rev 24 Agustus 2021.pptx
1. Discovering Psychology rev 24 Agustus 2021.pptx
 
Cover 1
Cover 1Cover 1
Cover 1
 
Intro of psychology GNM 1st yr_1.pptx GNM first year
Intro of psychology GNM 1st yr_1.pptx GNM first yearIntro of psychology GNM 1st yr_1.pptx GNM first year
Intro of psychology GNM 1st yr_1.pptx GNM first year
 
1Psychology’s Roots, Big Ideas, and Critical Thinking Tools.docx
1Psychology’s Roots, Big Ideas, and Critical Thinking Tools.docx1Psychology’s Roots, Big Ideas, and Critical Thinking Tools.docx
1Psychology’s Roots, Big Ideas, and Critical Thinking Tools.docx
 
The scope of psychology
The scope of psychologyThe scope of psychology
The scope of psychology
 
Introduction to Organizational Psychology
Introduction to  Organizational PsychologyIntroduction to  Organizational Psychology
Introduction to Organizational Psychology
 
Organizational Psychology
Organizational PsychologyOrganizational Psychology
Organizational Psychology
 
goals of psychology definition Quizlet psychology definition Quizlet psycholo...
goals of psychology definition Quizlet psychology definition Quizlet psycholo...goals of psychology definition Quizlet psychology definition Quizlet psycholo...
goals of psychology definition Quizlet psychology definition Quizlet psycholo...
 
Introduction To Work Psychology
Introduction To Work PsychologyIntroduction To Work Psychology
Introduction To Work Psychology
 

Más de EyesOpen Association

Más de EyesOpen Association (20)

COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATIONCOLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices
 
Gestion des Incidents: prendre le contrôle de votre processus
Gestion des Incidents: prendre le contrôle de votre processus Gestion des Incidents: prendre le contrôle de votre processus
Gestion des Incidents: prendre le contrôle de votre processus
 
Art du threat Modeling : Modéliser les menaces informatiques avec la méthode ...
Art du threat Modeling : Modéliser les menaces informatiques avec la méthode ...Art du threat Modeling : Modéliser les menaces informatiques avec la méthode ...
Art du threat Modeling : Modéliser les menaces informatiques avec la méthode ...
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
Zero Trust : How to Get Started
Zero Trust : How to Get StartedZero Trust : How to Get Started
Zero Trust : How to Get Started
 
CTFaaS pour la cybereducation
CTFaaS pour la cybereducationCTFaaS pour la cybereducation
CTFaaS pour la cybereducation
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...
 
Cybersecurity Competencies and the Future of Work
Cybersecurity Competencies and the Future of Work Cybersecurity Competencies and the Future of Work
Cybersecurity Competencies and the Future of Work
 
Approche de sécurisation des identités: Cas de Active Directory
Approche de sécurisation des identités: Cas de Active DirectoryApproche de sécurisation des identités: Cas de Active Directory
Approche de sécurisation des identités: Cas de Active Directory
 
Cyber threat intelligence avec Open CTI
Cyber threat intelligence avec Open CTI Cyber threat intelligence avec Open CTI
Cyber threat intelligence avec Open CTI
 
Le rôle de la sensibilisation et de la formation à la cybersécurité
Le rôle de la sensibilisation et de la formation à la cybersécuritéLe rôle de la sensibilisation et de la formation à la cybersécurité
Le rôle de la sensibilisation et de la formation à la cybersécurité
 
La sécurité des API: Quand les mauvais élèves entrent en piste.
La sécurité des API: Quand les mauvais élèves entrent en piste.La sécurité des API: Quand les mauvais élèves entrent en piste.
La sécurité des API: Quand les mauvais élèves entrent en piste.
 
Programme de cybersécurité : Implementer le framework NIST CSF en entreprise
Programme de cybersécurité : Implementer le framework NIST CSF en entrepriseProgramme de cybersécurité : Implementer le framework NIST CSF en entreprise
Programme de cybersécurité : Implementer le framework NIST CSF en entreprise
 
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
 
Report: Digital Transformation and Application Security Posture in West and C...
Report: Digital Transformation and Application Security Posture in West and C...Report: Digital Transformation and Application Security Posture in West and C...
Report: Digital Transformation and Application Security Posture in West and C...
 
Effective Information Security Risk and Controls Management
Effective Information Security Risk and Controls Management Effective Information Security Risk and Controls Management
Effective Information Security Risk and Controls Management
 
Cybersecurity in Mergers and Acquisitions (M&A)
Cybersecurity in Mergers and Acquisitions (M&A) Cybersecurity in Mergers and Acquisitions (M&A)
Cybersecurity in Mergers and Acquisitions (M&A)
 

Último

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Último (18)

Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 

Cyber psychology: Understand your cyber security mental health culture

  • 1.
  • 2. WHAT IS MENTAL HEALTH? Mental health encompasses emotional, psychological, and social well-being.
  • 3. Facts about the mental health of cybersecurity experts • 94% cyber security leaders have felt increased pressure to keep their company safe in the last year. • 91% cyber security professionals have experienced mental health issues during the past 2 years. • Research shows that over 67% of cyber security leaders feel they do not have enough talent on their team.
  • 4.
  • 5. • Culture can be defined as the habits, traditions and behavior of people, groups and organization WHAT IS CULTURE? Culture can be defined as the habits, traditions and behavior of people, groups and organization
  • 7. DISCUSSION: WHAT DO YOU KNOW ABOUT PSYCHOLOGY??
  • 8. This is the scientific study of the human mind and its functions, especially those affecting behavior in a given context. Psychology also is the mental characteristic or attitude of a person or group WHAT IS PSYCHOLOGY?
  • 9. 1. Clinical psychology 2. Cognitive psychology 3. Forensic psychology 4. Occupational psychology 5. Cyber psychology , etc. DIFFERENT TYPES OF PSYCHOLOGY
  • 12. CYBERPSYCHOLOGY It encompasses all psychological phenomena associated with or affected by emerging technology. Cyberpsychology is the study of the human mind and behavior and how the culture of technology, specifically the cyber world (the internet) affect them.
  • 13. What do you see?
  • 14. M E R C I ! T H A N K Y O U ! QUESTIONS ?