<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ethics Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/ethics/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/ethics</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Sat, 29 Mar 2025 13:08:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>ethics Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/ethics</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Lessons from Sun Tzu’s &#8220;The Art of War&#8221; in Cybersecurity: Timeless Wisdom or Outdated Tactics?</title>
		<link>https://jeanchristophvonoertzen.com/sun-tzu-the-art-of-war</link>
					<comments>https://jeanchristophvonoertzen.com/sun-tzu-the-art-of-war#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 29 Mar 2025 13:08:40 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[security strategy]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1742</guid>

					<description><![CDATA[<p>Introduction Sun Tzu’s &#34;The Art of War&#34; is a legendary strategic treatise written more than 2,500 years ago. Its enduring principles of warfare strategy have transcended military boundaries, influencing disciplines from business management to competitive sports. In today’s digital age, its relevance is increasingly apparent in the cybersecurity landscape, particularly for CISOs of medium-sized enterprises, [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/sun-tzu-the-art-of-war">Lessons from Sun Tzu’s &#8220;The Art of War&#8221; in Cybersecurity: Timeless Wisdom or Outdated Tactics?</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/sun-tzu-the-art-of-war/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Unlock Effective Cybersecurity: Simplify Policies with the Clarity of the OSI Model</title>
		<link>https://jeanchristophvonoertzen.com/unlock-effective-cybersecurity-simplify-policies-with-the-clarity-of-the-osi-model</link>
					<comments>https://jeanchristophvonoertzen.com/unlock-effective-cybersecurity-simplify-policies-with-the-clarity-of-the-osi-model#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 18 Mar 2024 23:01:59 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<category><![CDATA[security policy]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1336</guid>

					<description><![CDATA[<p>TL;DR Diving into the essence of effective cybersecurity, this article shines a light on the transformative power of simplifying policy language, inspired by the OSI model&#8217;s structured communication layers. It goes beyond theoretical insights, offering actionable strategies for CISOs to demystify complex jargon and make cybersecurity policies accessible and engaging for every team member. Highlighting [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/unlock-effective-cybersecurity-simplify-policies-with-the-clarity-of-the-osi-model">Unlock Effective Cybersecurity: Simplify Policies with the Clarity of the OSI Model</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/unlock-effective-cybersecurity-simplify-policies-with-the-clarity-of-the-osi-model/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Leveraging Psychology in Cybersecurity: Strategies for SMEs</title>
		<link>https://jeanchristophvonoertzen.com/leveraging-psychology-in-cybersecurity-strategies-for-smes</link>
					<comments>https://jeanchristophvonoertzen.com/leveraging-psychology-in-cybersecurity-strategies-for-smes#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 13 Feb 2024 07:24:20 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[Psychologie]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1320</guid>

					<description><![CDATA[<p>TL;DR This article delves into the intersection of psychology and cybersecurity, emphasizing the critical role of human elements in developing a resilient security culture within SMEs. Key points include the pivotal nature of psychological theories like Hofstede&#8217;s Cultural Dimensions and BJ Fogg&#8217;s Behavior-Knowledge Gap model in understanding and influencing organizational behavior towards cybersecurity. It highlights [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/leveraging-psychology-in-cybersecurity-strategies-for-smes">Leveraging Psychology in Cybersecurity: Strategies for SMEs</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/leveraging-psychology-in-cybersecurity-strategies-for-smes/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ethical considerations in phishing tests: to inform employees or not?</title>
		<link>https://jeanchristophvonoertzen.com/ethical-considerations-in-phishing-tests</link>
					<comments>https://jeanchristophvonoertzen.com/ethical-considerations-in-phishing-tests#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 13 Jan 2024 12:25:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing simulations]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1305</guid>

					<description><![CDATA[<p>TL;DR This article delves into the ethical considerations in phishing tests, highlighting the balance needed between conducting realistic simulations and maintaining fairness in cybersecurity training. This article explores the complexities of conducting phishing simulations in the workplace. Key takeaways include the importance of transparency in fostering a positive security culture, building trust through clear communication, [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/ethical-considerations-in-phishing-tests">Ethical considerations in phishing tests: to inform employees or not?</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/ethical-considerations-in-phishing-tests/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
