{"id":2273,"date":"2020-02-20T09:32:47","date_gmt":"2020-02-20T09:32:47","guid":{"rendered":"http:\/\/kusuaks7\/?p=1878"},"modified":"2024-01-04T15:46:41","modified_gmt":"2024-01-04T15:46:41","slug":"the-hard-truth-around-cyber-security-awareness-programmes","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/the-hard-truth-around-cyber-security-awareness-programmes\/","title":{"rendered":"The Hard Truth Around Cyber Security Awareness Programmes"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2273\" class=\"elementor elementor-2273\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-81a4a84 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"81a4a84\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-575e2edc\" data-id=\"575e2edc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f17daa elementor-widget elementor-widget-heading\" data-id=\"0f17daa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2 style=\"text-align: center\"><\/h2>\n<h2>5 key points to drive culture change around cyber security<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1639bca elementor-widget elementor-widget-text-editor\" data-id=\"1639bca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCulture and governance are key to drive change around cyber security behaviours, but too many awareness programmes focus simply on superficial technical gimmicks. Let\u2019s start by deconstructing 3 clich\u00e9s which have been dominating the security awareness arena for the past decade.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5c2357 elementor-widget elementor-widget-heading\" data-id=\"a5c2357\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Clich\u00e9 #1 \u2013 Cyber Security is Everybody\u2019s Responsibility<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0ea56a elementor-widget elementor-widget-text-editor\" data-id=\"e0ea56a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAt face value, this is truly a very dangerous argument to manipulate. To answer it using another clich\u00e9, there is a fine line between something being everybody\u2019s responsibility, and the same thing becoming <a href=\"https:\/\/corixpartners.com\/assign-information-security-responsibilities-and-accountabilities-blog\/\" rel=\"noopener\">nobody\u2019s responsibility<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a7bce1 elementor-widget elementor-widget-text-editor\" data-id=\"4a7bce1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe key here is to acknowledge that while each employee may have a role to play in securing the firm\u2019s assets, those roles do vary from function to function, and failure to communicate with each staff member in meaningful ways in the context of their own job will simply not work: Telling HR staff who receive CVs by email everyday not to open attachments is a waste of time.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01d3c55 elementor-widget elementor-widget-text-editor\" data-id=\"01d3c55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nAlso, it is essential to acknowledge that the level of engagement of each employee around cyber security will depend entirely on the level of engagement the employee has with the firm, its culture and its values. It is a natural instinct to protect what you care about. Conversely, it can be a hard job to convince disengaged staff, or staff who see senior management constantly allowed to skip the rules, while they have to adhere to stricter measures.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-346976f elementor-widget elementor-widget-text-editor\" data-id=\"346976f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSo it may well be that in some form \u201cCyber Security is Everyone\u2019s Responsibility\u201d, but the message cannot be generic and has to be structured appropriately. In addition, the example has to come from the top and must be relayed without exception by all middle-management layers for the message of good practice to work through the fabric of the firm.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a433892 elementor-widget elementor-widget-text-editor\" data-id=\"a433892\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThat\u2019s often the most common flaw of many cyber security awareness campaigns: They are owned by the cyber security team and structured horizontally towards all staff, instead of being owned by a board member and structured to cascade vertically through line management. Ownership for Cyber Security has to start at the top. Period. One <a href=\"https:\/\/corixpartners.com\/cyber-security-revisiting-board-questions\/\" rel=\"noopener\">board member<\/a> should be visibly in charge, and part of their compensation package should ride on it, as we advocated in an earlier article.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea3b88f elementor-widget elementor-widget-text-editor\" data-id=\"ea3b88f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHR management should be involved as well, and they have a key role to play: Specific key responsibilities and accountabilities around cyber security should be distributed across staff members and articulated formally in role descriptions. Staff should be incentivised through compensation and by middle-management to address those aspects of their roles as an integral part of their job, not as a piece of meaningless management jargon.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-277832d elementor-widget elementor-widget-text-editor\" data-id=\"277832d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tReaders may think this is just idealistic and cannot work in most firms, because those layers of management simply would not be interested or would not understand cyber security sufficiently to articulate a meaningful vision around it.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e58cd5 elementor-widget elementor-widget-text-editor\" data-id=\"9e58cd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThey may well be right in many cases, but it is also the role of the CISO to stimulate, structure and support that type of engagement.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f364ea5 elementor-widget elementor-widget-text-editor\" data-id=\"f364ea5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nOf course, firms looking to engage in that type of top-down approach to cyber security awareness development will need to have the right CISO in terms of personal profile, personal gravitas and management experience, or may need to evolve their security organisation to bring in a broader <a href=\"https:\/\/corixpartners.com\/new-profile-ciso\/\" rel=\"noopener\">CSO<\/a> role.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72d6823 elementor-widget elementor-widget-text-editor\" data-id=\"72d6823\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nThose necessary exchanges between the security leadership team and senior management will constitute a fundamental awareness programme just by themselves, but any security awareness development campaign can only be truly successful with a visible and credible board member as a figurehead.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc3a2cb elementor-widget elementor-widget-text-editor\" data-id=\"dc3a2cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIf senior management \u2013 including HR management \u2013 or middle-management are not prepared to engage in a meaningful manner with the fundamental aspects of security good practice, any message anybody may try to drive towards the staff could simply prove to be an expensive waste of money.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32871eb elementor-widget elementor-widget-heading\" data-id=\"32871eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Clich\u00e9 #2 \u2013 People are the Weakest Link<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3679128 elementor-widget elementor-widget-text-editor\" data-id=\"3679128\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThey may well be, but the key is to understand why and how in the context of each firm, before jumping to ready-made solutions, in particular with tech vendors.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0573a5 elementor-widget elementor-widget-text-editor\" data-id=\"b0573a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt has to start from a sound examination of the threats each business is facing. The insider threat may well be a widespread high-ranking business threat in financial services, not so much maybe in logistics or retail.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-631635c elementor-widget elementor-widget-text-editor\" data-id=\"631635c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOf course, in all firms there will be people who have access to sensitive business information and may be tempted or coerced in certain circumstances to leak it out. But the key here is to understand and address their potential motivations in doing so.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af47cef elementor-widget elementor-widget-text-editor\" data-id=\"af47cef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThose motivations \u2013 quite often \u2013 will be rooted in corporate culture, management styles and governance problems. As many areas you are not likely to address through a \u201ctraditional\u201d tech-focused cyber security awareness programme\u2026\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eee25e4 elementor-widget elementor-widget-text-editor\" data-id=\"eee25e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt is worth repeating this one more time: Staff will protect the firm with a natural instinct, if they care about it and share its values and its purpose \u2013 economically, and increasingly socially as well.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da1d053 elementor-widget elementor-widget-text-editor\" data-id=\"da1d053\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIf that sense of care is not there, if the corporate or management culture is toxic, if employees don\u2019t have a sense that they know where the business is going, either because it is not well managed, or because its industry sector at large is not doing well, a broader communication initiative addressing staff disengagement is required and specialised or siloed awareness programmes focusing simply on cyber security are not likely to succeed.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9789d94 elementor-widget elementor-widget-text-editor\" data-id=\"9789d94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe key will be to bring staff onboard with a valid corporate purpose they can understand and endorse. The need to protect the firm in general as well as its information assets could be one aspect but immersed into a broader campaign aimed at developing a real sense of belonging with employees.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9c44b2 elementor-widget elementor-widget-text-editor\" data-id=\"d9c44b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHere again, HR, corporate communications and senior management at large have a key role to play. One senior executive must visibly own and drive the initiative. Once again, this cannot be siloed and left to the CISO and their team.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7af48a6 elementor-widget elementor-widget-heading\" data-id=\"7af48a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Clich\u00e9 #3 \u2013 This is all about \u201cAwareness\u201d<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d264fee elementor-widget elementor-widget-text-editor\" data-id=\"d264fee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHow can it be that some firms \u2013 and their CISOs \u2013 still believe that their staff \u2013 apparently \u2013 do not KNOW what to do to protect their organisation from cyber threats?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e6213c elementor-widget elementor-widget-text-editor\" data-id=\"4e6213c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMany people \u2013 at individual level \u2013 have experienced fraud attempts or virus attacks; data breaches and cyber-attacks are constantly in the news, and many online platforms and service providers have strengthened considerably various of their security measures, for example around multi-factor authentication; increasingly, people are getting used to those additional layers of security in their everyday life.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4032b3b elementor-widget elementor-widget-text-editor\" data-id=\"4032b3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMore importantly, security good practices have been well established for 2 decades and have not evolved that much: \u201cDon\u2019t write down your password\u201d meant the same 10 or 20 years ago\u2026\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7fb01f elementor-widget elementor-widget-text-editor\" data-id=\"f7fb01f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAnd large firms have spent collectively hundreds of millions across the last 2 decades on so called \u201csecurity awareness\u201d programmes, not to mention governments and their agencies.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bfe5b1 elementor-widget elementor-widget-text-editor\" data-id=\"3bfe5b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSo where did it go wrong with those programmes?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff799a6 elementor-widget elementor-widget-text-editor\" data-id=\"ff799a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe problem is that most of those \u2013 over time \u2013 have focused too much on making sure people simply KNOW what to do around security, and not so much in giving them incentives to ACT on it, or dealing with the roadblocks preventing staff from enacting good practice.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b56044e elementor-widget elementor-widget-text-editor\" data-id=\"b56044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tJust \u201cknowing\u201d what to do to protect your organisation is simply not enough; only the right actions and behaviours can protect the business, so \u201cawareness\u201d by itself is never going to be sufficient without incentives to act and \u2013 where necessary \u2013 culture change.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4168d18 elementor-widget elementor-widget-text-editor\" data-id=\"4168d18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn addition, as detailed above, many of those programmes have often fallen short of expectations by being too generic and not rooted in the right cultural context.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2052587 elementor-widget elementor-widget-text-editor\" data-id=\"2052587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFake phishing campaigns are a good example of where it goes wrong: They have been all the rage for the past few years but often they contribute to the build-up of a \u201cnasty\u201d culture around cyber security: Employees feel tricked and embarrassed, and those are not emotions which are likely to build a favourable ground in which to root good security practices.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e209950 elementor-widget elementor-widget-text-editor\" data-id=\"e209950\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSending random emails, forcing people to follow online training programmes, putting up posters or distributing mouse-mats may well put ticks in compliance boxes but what does that achieve in real life?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d26d702 elementor-widget elementor-widget-text-editor\" data-id=\"d26d702\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSuccess criteria (\u201cWhat-Good-Looks-Like\u201d) remain vague, qualitative or anecdotal in many campaigns (for those that are not designed as a pure box-checking exercise to address some cheap audit point)\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa322b3 elementor-widget elementor-widget-text-editor\" data-id=\"aa322b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThat shouldn\u2019t be the case, and as a matter of fact, the issue of metrics should be central to any cyber security awareness programme and built in from the start.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-555bec5 elementor-widget elementor-widget-text-editor\" data-id=\"555bec5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBut it is a really difficult topic, which is why it is frequently side-stepped.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17402bd elementor-widget elementor-widget-text-editor\" data-id=\"17402bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe only way to address this is a meaningful manner \u2013 for firms large enough to do this \u2013 is to fall back on traditional marketing and polling methods:\n<ul>\n \t<li>Build representative panels of employees across the firm<\/li>\n \t<li>Measure their level of \u201csecurity awareness\u201d through questionnaires and interviews, in a structured way prior to launching the campaign<\/li>\n \t<li>Design the campaign to be centred on key findings highlighted by panels and interviews, and deploy it<\/li>\n \t<li>Measure levels of security awareness again and compare<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db489b3 elementor-widget elementor-widget-text-editor\" data-id=\"db489b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOf course, as well as difficult, this may be expensive, and priced-in from the start, it may well push any programme out of an acceptable budgetary bracket.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4947df0 elementor-widget elementor-widget-text-editor\" data-id=\"4947df0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBut cutting out the metrics aspects \u2013 on grounds of costs \u2013 from a cyber security awareness programme should bring out a real management question to address: Is it worth spending large amounts on an initiative of that nature, knowing and accepting from the start that you won\u2019t be able to measure its success quantitatively?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ca689d elementor-widget elementor-widget-heading\" data-id=\"7ca689d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>5 key points to build a successful cyber security culture change programme<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29769e3 elementor-widget elementor-widget-text-editor\" data-id=\"29769e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn summary:\n<ul>\n \t<li><strong>A board member must visibly own the campaign and act as a figurehead<\/strong>, with the involvement of HR, corporate communications and the cyber security team: It can only work top-down. Accountabilities and responsibilities around cyber security must be clear.<\/li>\n \t<li><strong>Stay clear of empirical and ready-made solutions<\/strong>: Start with focus groups, questionnaires and interviews and measure upfront levels of staff security maturity and engagement with corporate values.<\/li>\n \t<li><strong>Centre your campaign on the findings of the initial survey and define success metrics from the start<\/strong> based on measured maturity levels: Your scope may need to be much broader than just cyber security to deliver on staff engagement if initial levels are low.<\/li>\n \t<li><strong>Make the messages specific, achievable and rooted in the real life of each team<\/strong>, driven by line management, NOT the CISO and their team<\/li>\n \t<li><strong>Build incentives for staff to ACT<\/strong>: It cannot be just about TELLING people what to do<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Culture and governance are key to drive change around cyber security behaviours, but too many awareness programmes focus simply on superficial technical gimmicks. Stay clear of empirical and ready-made solutions: Start with focus groups, questionnaires, and interviews and measure upfront levels of staff security maturity and engagement with corporate values. There are 3 clich&eacute;s that have been dominating the security awareness arena for the past decade. And here are 5 key points to build a successful cyber security culture change programme.<\/p>\n","protected":false},"author":529,"featured_media":3754,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[100],"ppma_author":[3178],"class_list":["post-2273","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-fraud-amp-risk"],"authors":[{"term_id":3178,"user_id":529,"is_guest":0,"slug":"jean-christophe-gaillard","display_name":"Jean-Christophe Gaillard","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_b55e5afa-fb86-428a-a054-3be0451df2a4-150x150.jpg","user_url":"https:\/\/www.corixpartners.com","last_name":"Gaillard","first_name":"Jean-Christophe","job_title":"","description":"Jean-Christophe Gaillard\u00a0is Managing Director and Founder at Corix Partners. He is also a Non-Executive Director with\u00a0<a href=\"https:\/\/www.stratasecurity.co.uk\/\">Strata Security Solutions<\/a>, a specialized cybersecurity firm. He has been co-president of the Cyber Security group of the\u00a0<a href=\"https:\/\/www.telecom-paristech.org\/\">Telecom Paris Tech alumni association<\/a>\u00a0since May 2016. He is the author of \u201c<a href=\"http:\/\/www.blurb.co.uk\/b\/9015902-cyber-security-the-lost-decade-2018-edition\" target=\"_blank\" rel=\"noopener\">Cyber Security: The Lost Decade<\/a>\u00a0\u2013 A Security Governance Handbook for the CISO and the CIO\u201d, He contributes regularly to\u00a0<a href=\"http:\/\/www.thedigitaltransformationpeople.com\/authors\/jc-gaillard\">The Digital Transformation People<\/a>,\u00a0<a href=\"http:\/\/www.business2community.com\/author\/jc-gaillard\">Business 2 Community<\/a>, and\u00a0<a href=\"https:\/\/www.iotforall.com\/\">IoTforAll<\/a>\u00a0platforms, as well as the\u00a0<a href=\"https:\/\/www.thebtn.tv\/\">Business Transformation Network<\/a>. He is an expert contributor on the\u00a0<a href=\"https:\/\/ciowatercooler.co.uk\/members\/jean-christophe-gaillard\/activity\/\">CIO Water Cooler<\/a>\u00a0and has previously published articles on\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/bridging-gap-security-it-operations\/\">InfoSecurity<\/a>\u00a0Magazine, \u00a0<a href=\"http:\/\/www.computing.co.uk\/ctg\/opinion\/2396800\/how-to-achieve-effective-cyber-security-in-a-hyperconnected-world\">Computing<\/a>, the C-Suite.co.uk,\u00a0<a href=\"http:\/\/www.informationsecuritybuzz.com\/?s=gaillard\">Info Sec Buzz<\/a>\u00a0and the\u00a0<a href=\"http:\/\/www.director.co.uk\/blog-cyber-insurance-what-do-you-think-youre-buying-20323\/\">IoD Director<\/a>\u00a0websites."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/529"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2273"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2273\/revisions"}],"predecessor-version":[{"id":35401,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2273\/revisions\/35401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3754"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2273"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}