As we close off Cybersecurity Awareness Month, let us examine how we can become the cyber GOAT: ‘greatest of all time’. Sure, there will be plenty this week on cybersecurity training, making security a priority, more investments into products and processes and all that fun stuff. But we’re not going to talk about that right now. We are going to talk about something different you may not see elsewhere. We are going to talk about success.

You see, no matter what strategies your organization decides to deploy — password safety, microlearning, security by design, hardening, you name it — success (not security, not safety, but success) is the glue. It is all those individual pieces of greatness building up to something larger than the sum of its parts.

Success is what you, as an individual and organization, should strive for. If you focus on security and safety, you miss the bigger picture. Those are goals. Success is a system. Success is:

That’s your platinum-level, all-access pass, nirvana state.

Turning Your Cybersecurity Skills Weaknesses Into Strengths

Wayne Gretzky had many incredible quotes, and we can apply many of them to cybersecurity training and strategy. One of the most relatable ones is: “When I was five years old, I played against 11-year-olds, who were bigger, stronger and faster; I just had to figure out a way to play with them.”

Folks, you may be up against nation-states, advanced persistent threats and cybercriminals who have no sense of law or common decency. Then, you are the five-year-old playing against 11-year-olds who are bigger, stronger and faster.

Therefore, to achieve success in the cybersecurity domain (the individual aspect) you have to define success in the organizational domain (the team aspect). Cybersecurity, albeit an important piece of the puzzle, is still just a piece. You see, it’s about being the best you can be individually, but also supporting the efforts to attain the prize. In the hockey universe, the prize is the Stanley Cup. Let’s see what we can learn about good cybersecurity training from good hockey.

A Team Outcome: The Way to Achieve Success

The Edmonton Oilers, from 1983 through to 1985, were the most dominant professional hockey team (insert debates regarding 1987 and 2014 Team Canada teams for most dominant ever). That team was graced with so much talent. The Oilers were so dominant, goalie Grant Fuhr racked up a record-setting 14 assists. The NHL had to change the rules for the coincidental minor 4-on-4 rule.

But their success was a function of their individual talents and aspirations becoming unified. It lead to something much larger: winning the Stanley Cup. Gretzky’s 200-plus point seasons are amazing feats but mean less without the championships. And Gretzky knew that individual talent meant nothing without that team cohesion. The same is true for cybersecurity awareness and training.

Good Cybersecurity Training Makes Your Teammates Full Partners

The book “Wayne Gretzky: The Making of the Great One” quotes Ken Dryden, legendary goalie from the dynastic 1970s Montreal Canadiens, on how Gretzky flipped his disadvantages to become strengths.

“He was, I think, the first Canadian forward to play a true team game,” Dryden begins, stating how teams, prior to Gretzky’s arrival into the NHL, focused on the player with the puck. “Gretzky reversed that. He knew he wasn’t big enough, strong enough or even fast enough to do what he wanted to do if others focused on him. Like a magician, he had to direct attention elsewhere, to his four teammates on the ice with him, to create the momentary distraction in order to move unnoticed into the open ice where size and strength didn’t matter … Gretzky made his opponents compete with five players, not one, and he made his teammates full partners to the game. He made them skate to his level and pass and finish up to his level or they would be embarrassed.”

The cybersecurity world can learn something from Gretzky’s approach to the game. If an adversary is playing against a few select players (your security operations center, your incident responders, your security staff) and taking advantage of those not playing the game (everybody else that is uninterested), it is easier for adversaries to succeed.

But if the bad actors are playing against your entire organization? That’s an entirely different story. With good cybersecurity training, you can become partners in success with your colleagues, and the wins will come naturally.

More from Data Protection

Cost of a data breach: Cost savings with law enforcement involvement

3 min read - For those working in the information security and cybersecurity industries, the technical impacts of a data breach are generally understood. But for those outside of these technical functions, such as executives, operators and business support functions, “explaining” the real impact of a breach can be difficult. Therefore, explaining impacts in terms of quantifiable financial figures and other simple metrics creates a relatively level playing field for most stakeholders, including law enforcement.IBM’s 2024 Cost of a Data Breach (“CODB”) Report helps…

Cost of data breaches: The business case for security AI and automation

3 min read - As Yogi Berra said, “It’s déjà vu all over again.” If the idea of the global average costs of data breaches rising year over year feels like more of the same, that's because it is. Data protection solutions get better, but so do threat actors. The other broken record is the underuse or misuse of technologies that can help safeguard data, such as artificial intelligence and automation.IBM’s 2024 Cost of a Data Breach (CODB) Report studied 604 organizations across 17…

Cost of a data breach: The industrial sector

2 min read - Industrial organizations recently received a report card on their performance regarding data breach costs. And there’s plenty of room for improvement.According to the 2024 IBM Cost of a Data Breach (CODB) report, the average total cost of a data breach in the industrial sector was $5.56 million. This reflects an 18% increase for the sector compared to 2023.These figures place the industrial sector in third place for breach costs among the 17 industries studied. On average, data breaches cost industrial…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today