Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business ResilienceSecurity Education & Training

The first line of defense: Why employees are the key to stronger cybersecurity

By Dan Callahan
enterprise wide cybersecurity training
January 21, 2021

“Don’t click there. Don’t do that.” Employees know the drill. Cybersecurity teams hope these warnings will keep employees from doing something that will put the organization at risk. And, rightfully so. Research conducted in 2016 showed that 91% of cyber-attacks start with a phishing email. The number of insider threat incidents has also increased – by 47% over the last two years. Whether there is malicious intent or not, statistics like these are why security teams view their employees as a gateway for hackers to infiltrate the network.

In 2020, enterprises have undergone enormous change. Many employees now work from homes spread out around the globe. The pandemic has created a fundamental shift in how workers connect to their company networks, use their company-issued devices, and complete their tasks.

With all of these additional distractions, ensuring your teams are cyber aware is more critical than ever before. Will they be as diligent and cautious in the comfort of their own home? Will the vast increase in access points give attackers another advantage in this never-ending chess match?

With all these changes, it’s time for a new approach to cybersecurity awareness training.

Here are four ways to create training that positions employees as the first line of defense:

Empower your teams

You’ve made the technology investments to make breaching the organization through traditional IT methods complex and challenging. So, cyber criminals may take a different route – hoping an employee will make a mistake.

Show employees that attackers aren’t just throwing darts at the wall, but they’re specifically targeting certain employees for certain reasons. Based on each person’s role, have them think about what they have access to? What things they may be saying publicly, perhaps on social media, that could be used against them or the company? How could that access be beneficial to a hacker? As an individual, an employee can make an enormous impact on an organization – both positively and negatively – when it comes to cybersecurity. No one wants to be the weakest link. Empower everyone within the enterprise to view themselves as the armor on the perimeter that can stop attacks before they start.

Provide insight on the adversary

Many current cybersecurity awareness training programs tell employees about the warning signs to watch out for. But for this training to resonate, employees need to understand why these attacks are occurring in the first place. What are attackers trying to do? How are they trying to do it? Take them inside the mind of the adversary. Show them the research, reconnaissance and how campaigns are designed and customized for an individual employee – using their emotions and behaviors against them. When your teams see the details from the attacker’s vantage point, they have a stronger grasp of the situation and are more well-positioned to discover these tactics when the attack attempts occur.

Make it real

Training must be relevant to each employee’s role and each company’s industry. How do you translate the impact of a cybersecurity breach to workers within a manufacturing factory or power plant? Make it real. IT and OT (operational technology) environments are more digitally connected than ever. While that has many benefits for production and efficiency, if a breach happens on the IT side, that connectivity means an attacker can pivot laterally – shutting down systems, causing physical damage and impacting people and communities at large. To show employees the impacts of this converged risk, speak their language. Ensuring physical safety means ensuring cyber safety. What should workers be aware of? What does a potential breach or hacking attempt look like – in the world of OT?

Create a cyber-aware culture

From the top down, leadership must speak about the importance of cybersecurity – not just during cybersecurity awareness month, but year-round. Creating a culture that champions good cyber-hygiene and prioritizing it within every new technology implementation or business transformation will resonate with employees. Leading by example with a progressive approach to training can earn buy-in from the organization more effectively.

The training that instills fear (bad things can happen, so don’t click here and don’t do that) does not resonate. It’s time for security leaders to translate the risk of a cyberattack into normal terms. Risk is around us all the time, but employees who are situationally aware will always have cyber safety in the back of their minds. Focus on culture, applicability, education, and empowerment.

 

KEYWORDS: cyber security cyber security awareness cyber security initiatives cybersecurity training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan Callahan is Cybersecurity Training Director at Capgemini North America.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • code-enews

    Don't Shift Left, Start Left: Why Developers Should Be the First Line of Defense

    See More
  • Two security cameras attached to gray wall

    First Line of Defense: The Role of Modern VMS in Supercharging Investigations

    See More
  • rackspace-wargames

    Moving to a State of Resiliency: Why War Games Are the Key

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing