Every organization allocates finite budgets to its key functions and expects a good return on investment (ROI) to operate its business successfully. The information security function is no different. With cyberthreats growing and related cyber risks increasing along with those threats, security executives are challenged to stretch their budgets and meet many competing priorities that result in risk reduction for the organization.

Cybercriminals are using innovative attack vectors such as social engineering, spear phishing and others to target employees, launch sophisticated attacks and breach security defenses. Employees are the best assets any organization has when fighting these threats. Using those assets to combat cyberthreats should be a key component of information security strategy and investments. However, this requires changing organizational culture and training employees.

User Awareness Campaigns and Training

Changing the culture requires business leaders to acknowledge and communicate the importance of information security across the organization. They must make safeguarding enterprise information assets a shared responsibility.

Information security should work with HR and internal communication teams to create and execute specific awareness campaigns on a regular basis, reinforcing leadership’s message. Running frequent campaigns — whether it is via email, posters, games, videos or fliers — will aid in building a risk-aware culture.

Metrics indicate that well-informed and trained employees do not easily fall prey to cyberattacks, whether it is responding to an email from an unknown sender, clicking a link in a suspicious email or opening an unknown attachment. Developing generic security training focused on enterprise policies and making it a part of the new employee onboarding is a good start.

In addition, security teams should work with HR to develop targeted training that changes employee behaviors and reinforces the shared responsibility each individual has in protecting enterprise assets. Mandatory periodic training focusing on relevant topics will strengthen the required behaviors.

Evaluating Risk Reduction Practices

Information security teams should collect metrics to determine the effectiveness of the training and to constantly improve it. One of the key metrics to gauge the effectiveness of the training is to determine whether there is a rise in the number of declared security incidents due to employee behavior. Other metrics can be collected by launching simulated targeted attacks against selected employees and capturing the results of those exercises. The conclusions can be used to encourage specific employees to retake the training courses or to tailor the training curriculum to be more effective.

Furthermore, information security teams can organize periodic lunch and learns to present new topics or discuss recent breaches. This works to reinforce and reiterate the important role every employee plays in protecting and managing the organization’s cyber risks. Security champions can be nominated for each department or business function to continue strengthening the message. Fostering a risk-aware culture and building a sense of shared responsibility among employees will have a direct impact on improving risk reduction and limiting the number of security incidents.

The End Result

Most of the time, implementing best-of-breed security technologies or re-engineering existing security processes takes significant effort and time. However, improving security awareness does not require significant investment or dramatic changes to existing business processes or technologies. It can be planned within a few weeks and quickly rolled out in a phased manner.

Information security teams can use an enterprise learning management system to create or refresh existing training material and establish communication processes to develop campaign materials. Making employees part of your cyber defense strategy requires low investment but provides the highest immediate return.

More from CISO

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network at risk. Yes, all those people can cause issues for cybersecurity. But the people who are usually blamed for cybersecurity issues wouldn’t have such an…

The Cyber Battle: Why We Need More Women to Win it

It is a well-known fact that the cybersecurity industry lacks people and is in need of more skilled cyber professionals every day. In 2022, the industry was short of more than 3 million people. This is in the context of workforce growth by almost half a million in 2021 year over year per recent research. Stemming from the lack of professionals, diversity — or as the UN says, “leaving nobody behind” — becomes difficult to realize. In 2021, women made…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…