The time has come for cybersecurity strategy to evolve from being technology-centric to people-centric. Here are five key steps to achieve this strategy.

The time has come for cybersecurity strategy to evolve from being technology-centric to people-centric. Here are five key steps to achieve this strategy.