Everything you need to understand, measure, and improve the human dimensions of your organisation's security posture.
Practical tools you can use right now to assess, plan, and improve.
A structured assessment of your organisation's cyber resilience posture. Understand where you stand, identify gaps, and get a prioritised improvement roadmap grounded in behavioural risk principles.
Take the assessment →Map out your Security Champions programme timeline, milestones, and key actions. An interactive planning tool to help you structure your programme from launch to maturity - with progress tracking.
Plan your journey →The Behavioural Cyber Risk Management Skills Framework - 7 domains, 30 competencies, 8 professional roles. Select your role to see your recommended target competency levels.
Explore framework →CyBehave's emerging research body investigating whether established human behavioural science frameworks can be meaningfully extended to understand, predict, and govern AI agent behaviour in cybersecurity contexts.
Explore the research →Research summaries and practical perspectives on the intersection of behavioural science and cybersecurity from the CyBehave research programme.
Read insights →Practical advice, expert perspectives, and applied guides on building security culture, managing human risk, and running effective Champions programmes.
Read articles →Guides, whitepapers, templates, and practical tools grounded in behavioural science and real-world security practice.
Showing 1–7 of 7 resources
This whitepaper explores the critical journey organisations must undertake to evolve from basic cybersecurity awareness programmes toward embedding secure behaviours and cultivating a mature security culture.
In the rapidly evolving landscape of cybersecurity, technical defences alone are insufficient to protect organisations from threats. This...
This white paper explores the application of the Behaviour Change Wheel (BCW), a systematic approach to understanding and influencing...
This white paper explores the application of Dual Processing Theory (DPT) in cybersecurity culture, emphasising the importance of transitioning employee responses to cyber threats from System 2 (deliberate and conscious) to System 1 (automatic and intuitive). It outlines how understanding DPT can enhance organisational defence mechanisms by creating behavioural interventions that simplify security processes, leverage nudges and prompts, and employ comprehensive training programs.
This white paper explores the application of the COM-B (Capability, Opportunity, Motivation – Behaviour) model, a framework from...
Choice architecture, derived from behavioural economics, involves designing the environment in which users make decisions to naturally...
Eighty-two per cent of security breaches involve a human element, yet most organisations measure training completion rates rather than actual security culture maturity. This framework solves that problem through rigorous, scientifically validated assessment across eight critical dimensions.
Comprehensive guides on behavioural security and human cyber risk management. Each book offers practical, evidence-based strategies grounded in psychology, behavioural science, and real-world application.
Put these tools and frameworks to work in your organisation.