Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business ResilienceSecurity Education & Training

Personalization and behavior modeling: a new approach to security training

By Sai Venkataraman
Cybersecurity training should take a personalized approach for greater efficacy
April 23, 2021

With the necessity of remote work creating a deluge of additional cybersecurity risks in this COVID-era, and the financial and reputational consequences of experiencing a security incident at an all-time high, businesses are under enormous pressure to constantly and proactively protect their assets.

Untargeted security awareness may do more harm than good.

Security awareness can help businesses bolster their cybersecurity efforts and, as an added benefit, it can ensure compliance and adherence to best practices such as NIST, ISO 27001 and PCI-DSS. Historically, security awareness has largely involved implementing basic cybersecurity training, online learning modules and simulated phishing exercises. It can help employees learn to avoid clicking on common phishing scams, recognize that they have a role to play in enforcing cybersecurity and become more familiar with the nature of threats such as phishing.

Still, many cybersecurity awareness initiatives fall flat, as general awareness and phishing simulations can’t guarantee action. Equally detrimental to security awareness success is a lack of targeting. When training isn’t sufficiently personalized, employees fail to engage - or worse, they choose to ignore training campaigns and operate under the misguided assumption that they’d never fall victim to a security incident or because they see the training as a waste of valuable time.

By relying on untargeted, lengthy, and vague exercises that aren’t aligned with real-world or relevant situations, businesses risk having their security awareness efforts do more harm than good.

Best practices for next-generation training

To optimize cybersecurity training and build security awareness campaigns that are more relevant to today’s risk landscape, businesses should abide by the following best practices:

  • Distribute personalized content based on employees’ individual risk profiles, roles and awareness needs. Thanks to technological advancement, it’s relatively straightforward to hook into existing security and IT tools to better understand employees’ specific risk profiles. Security and IT tools also indicate when the last security incident occurred, which allows trainings to be appropriately timed. HR systems and Active Directories can determine each employee’s role, and employee surveys can confirm the awareness needs of each employee. By leveraging all of this data cumulatively, businesses can design highly personalized training and awareness campaigns that meet the unique needs of their organization.
  • Stop focusing solely on phishing. While common in security awareness and training initiatives, phishing simulation is a limited tool. What’s more, the world is moving away from email to other cloud-based tools. Businesses are better off combining any/all human actions that could lead to security incidents (e.g. actions taken on social media and other cloud-based tools) and teaching their employees the right behaviors across a variety of form factors. By using data collected via email, online, cloud security tools, and cloud productivity platforms, businesses can engage employees more holistically and effectively, as opposed to relying on antiquated phishing simulations that are often ignored.
  • Prioritize the tracking of key metrics. The specific metrics worth tracking in a training initiative depend on the organization, but some may find measuring at least 30 different metrics necessary. After all, it’s critical to be able to objectively delineate what tactics are working and, if those tactics aren’t working, leverage that information to immediately course correct. Integrating all measurements with other cybersecurity tools currently in use will make the tracking of key metrics even more productive.

Applying behavioral modeling to cybersecurity can facilitate positive change.

Equally important when establishing next-generation security training and awareness is taking into account behavior modeling, and applying it to cybersecurity to facilitate individual changes in employees’ behavior. Based on Stanford scientist B.J. Fogg’s research, the necessary elements of an individual behavior model can be divided into three principal categories:

  1. Motivation: According to Fogg, the three-core human motivational elements are pleasure/pain, hope/fear, and acceptance/rejection. In a business setting, executive communications and their actions set the ground rules, which helps create a like-minded community based on core corporate values. Defining specific cybersecurity policies is a crucial step in setting up the expectation of the desired behavior.

 

  1. Ability: Giving employees the right awareness and tools to help them perform their day-to-day tasks with ease is paramount. Furthermore, awareness education, development of skills to deal with adversaries, and security protection technologies with the right policies will empower employees to protect their organization from threats.

 

  1. Nudge: Even if employees possess the necessary motivation, ability, and skill, they still require constant reminders to apply their knowledge at the right moment until habits are formed. Continual communication and action from management will not only help motivate employees, it will also help remind employees of the organization’s corporate values and guidelines.

Combating cyber risk requires prioritizing employee education and engagement.

Ultimately, any successful cybersecurity strategy must incorporate personalization. When applied to security training and awareness, personalization emulates the effects of stop signs and lane assist technology: It forces employees (or drivers) -- all of whom work (or drive) differently and assume accidents could never happen to them -- to stop when required or proactively avoid accidents. By reducing the number of accidents that occur, personalization enables cybersecurity personnel to spend less time investigating incidents and repairing any damage, which lowers organizational costs and saves time for employees, too.

Combating cyber risk is an undoubtedly complex task, and there’s certainly no silver bullet to solve the slew of ever-changing security issues. However, by recognizing that human actions cause over 90% of security incidents, businesses have an opportunity to adjust their cybersecurity strategies and prioritize the most crucial element of any organization: the employees.

Fortifying security training and awareness with targeted personalization and behavior modeling will better equip employees to reduce businesses’ risk levels, while also serving as a key pillar of an organization’s cybersecurity posture. And in the ever-challenging COVID-19 era, personalization and behavior modeling allow existing budgets to be used to achieve stronger security outcomes with measurable ROI.

KEYWORDS: cyber security cybersecurity readiness training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sai headshot

Sai Venkataraman, Co-founder and CEO of SecurityAdvisor.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0121-Active-Feat-slide1_900px

    Recognize. Respond. Survive. A new approach to workplace violence prevention

    See More
  • network-security-freepik1170.jpg

    Nation-state attacks are hard to spot. It’s time for a new approach to threat detection

    See More
  • SEC0120-insider-Feat-slide1_900px

    Rethinking "Red Flags" - A New Approach to Insider Threats

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!