October 16, 2017 By Kevin Beaver 3 min read

Information security programs are often measured by the number of things that happened or did not happen. There are metrics for network attacks, malware, cloud security and so on. That’s all well and good because, as Peter Drucker said, “What’s measured gets improved.” However, there’s no ready-made metric for security culture.

A large part of running a successful security shop is implementing the proper systems, measuring effectiveness and then doing what’s necessary to get better over time. Still, when you see all these big breaches that are impacting enormous corporations, government agencies and other organizations you assume would have their security in order, it begs the question: What’s going on?

The Problem With Security Culture

I don’t think it’s a lack of technical controls. Most of the big breaches that we’re hearing about take place in organizations that have spent untold dollars building out their security infrastructure. They have the most advanced perimeter controls, mobile security, cloud, you name it — it was budgeted, the money was spent and yet bad things still happen.

I don’t think it’s due to lack of expertise, either. I’m humbled every time I talk to IT or security professionals working for my clients or elsewhere in industry. I’m constantly reminded of just how little I know and how smart so many people in this industry really are.

So if it’s not technology and it’s not people, what is it? I’m convinced that the problem has to do with a lack of security culture. I’ve seen this at a relatively small level with many of my midsize enterprise clients. I’ve worked with many of them from the very beginning, and I’ve seen how their management’s interest in security can, over time, help build out a remarkably robust security program. Contrast that with other, larger organizations where I’m often brought in after the security program has already been established, and it’s night and day. The former is a model example of a thriving security culture, while the latter is an example of what not to do.

Culture Trumps Technology, People and Strategy

These challenges are pervasive across so many organizations and government agencies. When it comes to security culture, larger enterprises tend to be either:

  1. Set in their ways — focused on the business rather than embracing modern IT and security initiatives; or
  2. So rife with politics and bureaucracy that nothing can possibly get done, regardless of how much money is thrown at the problem.

Sometimes, a lack of security culture is a result of both of these afflictions. As hard as it is to define and measure, culture will determine how successful your security program is — whether or not management likes it or wants to see it that way.

Culture is more important than technology, the people you have working on your security team and the paperwork many organizations require to create the facade of security. Culture goes beyond the day-to-day tactical work that you’re doing. It even trumps strategy: You can have a mission statement and well-written goals, but what counts the most is what leadership does and reflects upon its employees.

Don’t Let Poor Security Culture Cause the Next Big Breach

If you go back and do a root cause analysis on most of the big breaches that have occurred, you’ll find that many of them stemmed from a culture working against the best interests of security. I have friends who currently work with or have worked with some of the very organizations that made headlines for suffering security incidents. I’m hearing from these people firsthand just how bad the culture is and how many hurdles they have to jump through to get anything done in terms of security. It’s a wonder that even more security breaches aren’t occurring, given all of the nonsense that’s going on.

Executives should make sure that their IT and security teams are addressing the basics and staying on top of security testing, remediation and oversight. Beyond that, security is ultimately up to you. Make it known that you take security seriously and hold people accountable when needed. Unless and until they see that you buy into the security culture and walk your talk, none of the paper pushed, processes implemented or money spent in the name of security really matters.

Listen to the podcast series: A CISO’s Guide to Obtaining Budget

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today