As we close off Cybersecurity Awareness Month, let us examine how we can become the cyber GOAT: ‘greatest of all time’. Sure, there will be plenty this week on cybersecurity training, making security a priority, more investments into products and processes and all that fun stuff. But we’re not going to talk about that right now. We are going to talk about something different you may not see elsewhere. We are going to talk about success.

You see, no matter what strategies your organization decides to deploy — password safety, microlearning, security by design, hardening, you name it — success (not security, not safety, but success) is the glue. It is all those individual pieces of greatness building up to something larger than the sum of its parts.

Success is what you, as an individual and organization, should strive for. If you focus on security and safety, you miss the bigger picture. Those are goals. Success is a system. Success is:

That’s your platinum-level, all-access pass, nirvana state.

Turning Your Cybersecurity Skills Weaknesses Into Strengths

Wayne Gretzky had many incredible quotes, and we can apply many of them to cybersecurity training and strategy. One of the most relatable ones is: “When I was five years old, I played against 11-year-olds, who were bigger, stronger and faster; I just had to figure out a way to play with them.”

Folks, you may be up against nation-states, advanced persistent threats and cybercriminals who have no sense of law or common decency. Then, you are the five-year-old playing against 11-year-olds who are bigger, stronger and faster.

Therefore, to achieve success in the cybersecurity domain (the individual aspect) you have to define success in the organizational domain (the team aspect). Cybersecurity, albeit an important piece of the puzzle, is still just a piece. You see, it’s about being the best you can be individually, but also supporting the efforts to attain the prize. In the hockey universe, the prize is the Stanley Cup. Let’s see what we can learn about good cybersecurity training from good hockey.

A Team Outcome: The Way to Achieve Success

The Edmonton Oilers, from 1983 through to 1985, were the most dominant professional hockey team (insert debates regarding 1987 and 2014 Team Canada teams for most dominant ever). That team was graced with so much talent. The Oilers were so dominant, goalie Grant Fuhr racked up a record-setting 14 assists. The NHL had to change the rules for the coincidental minor 4-on-4 rule.

But their success was a function of their individual talents and aspirations becoming unified. It lead to something much larger: winning the Stanley Cup. Gretzky’s 200-plus point seasons are amazing feats but mean less without the championships. And Gretzky knew that individual talent meant nothing without that team cohesion. The same is true for cybersecurity awareness and training.

Good Cybersecurity Training Makes Your Teammates Full Partners

The book “Wayne Gretzky: The Making of the Great One” quotes Ken Dryden, legendary goalie from the dynastic 1970s Montreal Canadiens, on how Gretzky flipped his disadvantages to become strengths.

“He was, I think, the first Canadian forward to play a true team game,” Dryden begins, stating how teams, prior to Gretzky’s arrival into the NHL, focused on the player with the puck. “Gretzky reversed that. He knew he wasn’t big enough, strong enough or even fast enough to do what he wanted to do if others focused on him. Like a magician, he had to direct attention elsewhere, to his four teammates on the ice with him, to create the momentary distraction in order to move unnoticed into the open ice where size and strength didn’t matter … Gretzky made his opponents compete with five players, not one, and he made his teammates full partners to the game. He made them skate to his level and pass and finish up to his level or they would be embarrassed.”

The cybersecurity world can learn something from Gretzky’s approach to the game. If an adversary is playing against a few select players (your security operations center, your incident responders, your security staff) and taking advantage of those not playing the game (everybody else that is uninterested), it is easier for adversaries to succeed.

But if the bad actors are playing against your entire organization? That’s an entirely different story. With good cybersecurity training, you can become partners in success with your colleagues, and the wins will come naturally.

More from Data Protection

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today