September 28, 2015 By Kevin Beaver 3 min read

Human beings are complex creatures of habit. We do the things we do, by and large, because that’s the way that we’ve always done them. The same can be said of cultures in our society and even in the organizations for which we work. In terms of long-term business viability, culture is everything — especially as it relates to information security. Culture, good or bad, is the ultimate determinant of whether a business can build and sustain a resilient network environment and stay out of hot water in terms of information risk.

The Importance of Security Culture

A strong security culture is both a mindset and mode of operation. One that’s integrated into day-to-day thinking and decision-making can make for a near-impenetrable operation. Conversely, a security culture that’s absent will facilitate uncertainty and, ultimately, lead to security incidents that you likely can’t afford to take on.

This often happens because everyone is literally working in silos — you know, the very thing that those of us in the industry are quick to proclaim is bad for security. Rather than being helpful and doing what they can to truly improve security, these people are often doing what’s in their own best interests, sometimes even to sabotage each other or the overall business. I’ve seen it across many roles, from network admins to chief information officers (CIOs) and many others in between.

Recently, I was speaking with a colleague about a large organization that he was doing some work for. He noticed how everyone under the IT umbrella, including those responsible for security, were super upbeat and motivated when it came to security projects. Everyone was working toward the same goals, and it showed in where they stood technically and operationally. I’ve seen this as well, and it really stands out.

Regardless of the size or industry of the business, there are some organizations that just click, and everyone seems to be moving in the same direction in terms of information security and privacy. More often, however, I’ve seen just the opposite: Where there may be a champion for security, but his or her words are falling on deaf ears. Those situations don’t usually end well.

What Can Be Done?

Do what you must to minimize the disconnect, apathy, silos and self-interests related to information security. A big part of this involves creating a security training program that’s periodic and consistent. Another part that’s often missing is to encourage and support security training among IT and security staff members, as well as software developers and quality assurance professionals. A reward system that’s tied into compensation can serve as a great motivator. The key is that everyone must be on board.

It all starts at the top. Executive management that’s interested in fostering a positive security culture — and does so without fail — is mandatory if the risks of a breach are to be minimized. However, this layer is often absent or minimal at best. People are quick to blame executives for their lack of support. But in many cases, accountability and responsibility are just as much in the hands of IT and security staff members. People choosing to work in a vacuum rather than assimilate into something bigger that’s working toward the organization’s goals creates just as many security problems as disinterested executives.

Your employees — managers, peers and subordinates alike — are all watching to see what you do. Not unlike how children watch what their parents do and how they handle things in their daily lives, your employees are looking to see if your actions speak louder than your words. Do what’s right and get started now. This stuff takes time.

Subscribe to the Security Intelligence Podcast on iTunes and never miss an episode

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today