As we close off Cybersecurity Awareness Month, let us examine how we can become the cyber GOAT: ‘greatest of all time’. Sure, there will be plenty this week on cybersecurity training, making security a priority, more investments into products and processes and all that fun stuff. But we’re not going to talk about that right now. We are going to talk about something different you may not see elsewhere. We are going to talk about success.

You see, no matter what strategies your organization decides to deploy — password safety, microlearning, security by design, hardening, you name it — success (not security, not safety, but success) is the glue. It is all those individual pieces of greatness building up to something larger than the sum of its parts.

Success is what you, as an individual and organization, should strive for. If you focus on security and safety, you miss the bigger picture. Those are goals. Success is a system. Success is:

That’s your platinum-level, all-access pass, nirvana state.

Turning Your Cybersecurity Skills Weaknesses Into Strengths

Wayne Gretzky had many incredible quotes, and we can apply many of them to cybersecurity training and strategy. One of the most relatable ones is: “When I was five years old, I played against 11-year-olds, who were bigger, stronger and faster; I just had to figure out a way to play with them.”

Folks, you may be up against nation-states, advanced persistent threats and cybercriminals who have no sense of law or common decency. Then, you are the five-year-old playing against 11-year-olds who are bigger, stronger and faster.

Therefore, to achieve success in the cybersecurity domain (the individual aspect) you have to define success in the organizational domain (the team aspect). Cybersecurity, albeit an important piece of the puzzle, is still just a piece. You see, it’s about being the best you can be individually, but also supporting the efforts to attain the prize. In the hockey universe, the prize is the Stanley Cup. Let’s see what we can learn about good cybersecurity training from good hockey.

A Team Outcome: The Way to Achieve Success

The Edmonton Oilers, from 1983 through to 1985, were the most dominant professional hockey team (insert debates regarding 1987 and 2014 Team Canada teams for most dominant ever). That team was graced with so much talent. The Oilers were so dominant, goalie Grant Fuhr racked up a record-setting 14 assists. The NHL had to change the rules for the coincidental minor 4-on-4 rule.

But their success was a function of their individual talents and aspirations becoming unified. It lead to something much larger: winning the Stanley Cup. Gretzky’s 200-plus point seasons are amazing feats but mean less without the championships. And Gretzky knew that individual talent meant nothing without that team cohesion. The same is true for cybersecurity awareness and training.

Good Cybersecurity Training Makes Your Teammates Full Partners

The book “Wayne Gretzky: The Making of the Great One” quotes Ken Dryden, legendary goalie from the dynastic 1970s Montreal Canadiens, on how Gretzky flipped his disadvantages to become strengths.

“He was, I think, the first Canadian forward to play a true team game,” Dryden begins, stating how teams, prior to Gretzky’s arrival into the NHL, focused on the player with the puck. “Gretzky reversed that. He knew he wasn’t big enough, strong enough or even fast enough to do what he wanted to do if others focused on him. Like a magician, he had to direct attention elsewhere, to his four teammates on the ice with him, to create the momentary distraction in order to move unnoticed into the open ice where size and strength didn’t matter … Gretzky made his opponents compete with five players, not one, and he made his teammates full partners to the game. He made them skate to his level and pass and finish up to his level or they would be embarrassed.”

The cybersecurity world can learn something from Gretzky’s approach to the game. If an adversary is playing against a few select players (your security operations center, your incident responders, your security staff) and taking advantage of those not playing the game (everybody else that is uninterested), it is easier for adversaries to succeed.

But if the bad actors are playing against your entire organization? That’s an entirely different story. With good cybersecurity training, you can become partners in success with your colleagues, and the wins will come naturally.

More from Data Protection

Cost of a data breach 2023: Pharmaceutical industry impacts

3 min read - Data breaches are both commonplace and costly in the medical industry.  Two industry verticals that fall under the medical umbrella — healthcare and pharmaceuticals — sit at the top of the list of the highest average cost of a data breach, according to IBM’s Cost of a Data Breach Report 2023. The health industry’s place at the top spot of most costly data breaches is probably not a surprise. With its sensitive and valuable data assets, it is one of…

Cost of a data breach 2023: Financial industry impacts

3 min read - According to the IBM Cost of a Data Breach Report 2023, the global average cost of a data breach in 2023 was $4.45 million, 15% more than in 2020. In response, 51% of organizations plan to increase cybersecurity spending this year. For the financial industry, however, global statistics don’t tell the whole story. Finance firms lose approximately $5.9 million per data breach, 28% higher than the global average. In addition, evolving regulatory concerns play a role in how financial companies…

Advanced analytics can help detect insider threats rapidly

2 min read - While external cyber threats capture headlines, the rise of insider threats from within an organization is a growing concern. In 2023, the average cost of a data breach caused by an insider reached $4.90 million, 9.6% higher than the global average data breach cost of $4.45 million. To effectively combat this danger, integrating advanced analytics into data security software has become a critical and proactive defense strategy. Understanding insider threats Insider threats come from users who abuse authorized access to…

One simple way to cut ransomware recovery costs in half

4 min read - Whichever way you look at the data, it is considerably cheaper to use backups to recover from a ransomware attack than to pay the ransom. The median recovery cost for those that use backups is half the cost incurred by those that paid the ransom, according to a recent study. Similarly, the mean recovery cost is almost $1 million lower for those that used backups. Despite this fact, the use of backups is actually falling. This was one of the…