Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementLogical SecurityCybersecurity News

Beyond Talking the Talk: Building Cybersecurity into a Company’s DNA

By Wesley Simpson
leadership
March 8, 2018

Security is constant. It’s fast-paced with a high burnout rate, and many companies continue to struggle with implementing basic security controls. Given the overwhelming reality of resources and time that are already being dedicated to a company’s security strategy, how can organizations begin to build security into a company’s DNA in a realistic way?

While it may seem onerous or unrealistic to some, it is possible to create more than a cyber-aware culture. Changing the fabric of a company’s DNA is more than just a Pollyanna goal, it’s a necessary reality. But it will take time and leadership buy-in. The very basic building blocks require a shift in the way companies think about accountability. It starts with making everyone in the organization responsible for cybersecurity.

Let’s be clear that there is a difference between corporate culture and a company’s DNA. The DNA encompassing everything that relates to the very fibers of the organization. All those aspects of the company that we don’t think about it. When we talk about building cyber into the company DNA, we want it to be part of the normal day-to-day operations. Security needs to be part of what we are investing into the organization and people throughout the year. So that limited resources of time and money never diminish the way the company values security, it must be part of the corporate development life cycle.

When security is a part of the profit and loss statement, it inherently becomes a priority of the company’s goals. These are the ideas and behaviors we need to be going after in order to make security a priority for the organization.

So, what are some realistic steps you can take today? Here are a few ways to rebuild a company’s DNA and make a real difference in the way employees, the C-Suite, and the board value security.

  • Have a security team. Whether you have the resources to have an internal team or you need to outsource, there are options available within your budget. But you have to first take security seriously enough to recognize that you need a security team. When building the team, it’s also important to define what security even mean to the organization. What types of IP risks do you have on hand? How would a data leak impact the business? In addition to potential financial losses, you also have to consider the cost of your reputation. Take the time to answer these questions and reflect on what it will mean if you don’t value security. Think about what it will mean to customers if you don’t have security.
  • Craft measurable goals. One measurable goal that any organization can set today is to reduce the number of threats or phishing attacks. That’s something that with full transparency, the whole company can see and track. Set goals that tie back to the employees so that they can understand security and how their behavior impacts the organization. Measure month over month to determine whether the training is helping, and if you find that people are constantly clicking in phishing exercises, do something else. Employees need to intrinsically be thinking about what they do day in and day out and how their actions meet the goals of the organization. Internal acts cause breaches, but teaching employees to think about security at the office or at home will reduce the ways in which they potentially expose the organization to nefarious actors.
  • Start security at the on-boarding process. Security training isn’t a one and done exercise. Rather, effective security training happens throughout the entire year. There should not be a month that goes by where you can’t show your employees how they are doing. If they are shy of the goals, then offer mitigation steps to correct actions. Harness and leverage every single employee in the company because security in not only the responsibility of the CISO or security team. It’s every single employee, from the janitor to the head of finance. And you can’t be successful without every employee, so continually invest in them and tailor the training to them by eliminating the fear of being fired for making a mistake. Remove the fear and educate them.
  • Create extensions to the security team. Call them liaisons, advocates, champions. Whichever label you choose, make sure that you are using and harnessing the strengths of all of the employees. There is a global problem that they are trying to solve, which can happen if each team across the organization has a security advocate whose goal is to get that message out. These security liaisons are available to answer questions or address concerns within their own departments. These extensions of the security team can be that right hand to help further, teach, promote and bring awareness.

As exciting as it is to meet your goals, it’s also important to remember that bad things are going to happen. Employees want to do the right thing and help, so leverage the teachable moments. This is where the employees are really going to learn and excel. You don’t want them to be scared to speak up, so don’t underestimate the motivating power of rewards to nurture open communication.

It’s time to move beyond the foolhardy assumption that it’s not going to happen to me. Like so many organizations, you may not know where to start because security is so complicated. Accept that you feel overwhelmed, but then take the small steps to make security in your organization a top priority. There is no advantage to keeping security segmented into one particular area, fomenting this internal challenge that positions security as someone else’s job.

Of course, without buy-in and unyielding support from the C-suite and board of directors, it doesn’t work. This is a disruptive type of change, and to foster it needs a lot of top-level support. To nurture that, the CEO has to be out front with the bull horn. If that isn’t happening, security will be an uphill battle.

 

 

KEYWORDS: c-suite cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ws image front

Wesley Simpson has more than 25 years of business experience including positions in IT, product management, policy and procedure development, budgeting, vendor negotiations, and client development and relationships for Turner Broadcasting System, Delta Airlines, Bank of America, IBM and Fidelity Investments. Simpson has been responsible for leading the development of IT organizations and global services, while also working in the field of software development and digital asset management for various Fortune 500 companies. As COO, Simpson oversees the operational aspects of contracts with all business partners, collaborates with the Executive Director and senior management to support (ISC)2 programs and services, and is responsible for the development and implementation of a business template for the regional offices. Simpson attended a Master’s program at Lesley College and George Washington University, holds a B.S. in Accounting from the University of Massachusetts and various technical certifications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber learning freepik

    Why schools need to incorporate endpoint management into their proactive cybersecurity strategy for 2021 and beyond

    See More
  • executive stands in front of skyscraper

    Embracing a company culture of cybersecurity starts at the top

    See More
  • key lock

    Building, managing, and transforming security into a business enabler

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing