Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Moving to measure a cyber-aware culture

By Charaka Goonatilake
insider threat
May 19, 2021

We have all been served by a surly retailer whose made us feel that their job and life would be easier, if it weren’t for the customers. Alas, sometimes it feels the same applies in cybersecurity. Life would be so much better, if not for those pesky employees.

We all know the stats – employees are the biggest cybersecurity risk. A joint study from Stanford University Professor Jeff Hancock and security firm Tessian revealed that nine in 10 (88%) data breach incidents are caused by employees’ mistakes. And this is costly. Research from Ponemon found that, in 2020 alone, data breaches cost a business an average of $3.86 million.

To date, businesses have tried to mitigate against this threat with awareness, training and policies. But as the statistics clearly demonstrate, this isn’t always effective. The situation hasn’t been eased by the COVID-19 pandemic.

Approximately a year ago, countries were thrown into lockdown with little to no notice. Employees immediately needed access to company data and systems from their own homes. In businesses with minimal or no existing remote working capabilities, IT and security teams needed to rapidly roll out solutions, carefully balancing reducing risk with usability.

Locking everything down too tightly may tempt employees to try and find workarounds so that they can just get on with their jobs, an effect which could only be exacerbated when everyone was under increased pressure and trying to adjust to the situation. Risk appetites had to be adjusted enable BAU to continue and it was key to give data-driven insight for leadership so they could manage this with all the facts in their possession.

As the lines between home and work continue to blur and everyone is feeling the pressure of the ongoing global situation, it becomes easier to make mistakes, potentially opening the door to attackers. People can be an excellent defense against attacks when they are well trained and not subject to undue stresses, so in these challenging times its important businesses take care of their teams, so they can help take care of the business. A key way to address this is actively measuring the cyber-awareness culture.

 

A cyber-awareness culture

A cyber awareness culture is not about the psychology of human errors. By that I mean it’s not about delving into ‘why’ employees are not following policies, or ‘why’ they are reluctant to report mistakes they may have made. It’s about moving away from blame and creating a fundamental shift in the relationship between security and users – whereby users become security assets, rather than security liabilities.

This requires empowering people to become part of the solution. And to make them care, we have to listen and empathize. If someone views cybersecurity as an imposition; something that hinders them from doing their job, then they aren’t going to prioritize giving it the respect they need. We need to engage the workforce and make security relevant for them and their job.

One way to achieve this is to come at security from identifying personal motivators. Analogies about how cyber affects them in their personal life can help make it applicable in the workforce. These types of exercises also help identify ‘champions’ – people who do ‘get it’ and are happy to help educate others in their team and drive a cyber-aware culture.

 

Measuring cyber-awareness

Measuring a cultural shift means going beyond the basics. We don’t know if staff are becoming more cyber aware by checking the standard metrics, such as who has completed it. The real question isn’t whether staff have completed it – moreover it’s did they engage with the training, and was it effective? More in-depth security questionnaires can help with that, and it’s not just the answers the count – it’s how quickly they identify the right response, and how their response rate changes over time to demonstrate an increasing understanding. You’ll also see cyber-awareness paying dividends when new policies are introduced, and they are embraced rather than being ignored.

 

Looking ahead

Building human cyber resilience isn’t easy, but it’s a worthwhile endeavour. CybSafe, a data analytics company, explain it well in its whitepaper “Measuring Cyber Security”: Understanding an [organization]’s security culture is an integral part of understanding its overall risk profile; it’s possible, for example, for an individual to know what to do, to hold a positive attitude towards security and yet to behave in an insecure manner thanks to a corrosive culture of mistrust, individualism or unrealistic expectation.

Awareness of the human factor risk is just one element in understanding your overall security and risk posture. With this overlay information – added to a human-centric program, you’ll soon move to a positive relationship where users can be part of the solution, and a cyber awareness culture can finally be realized.

KEYWORDS: cyber security insider risk insider threats risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Charaka jpeg
Charaka Goonatilake is CTO at Panaseer.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Creating Risk-Aware Culture through Privacy by Design

    See More
  • Closing the cyber skills gap requires a culture of continuous learning

    See More
  • identity management freepik

    Moving from ‘working at from home’ to a hybrid work experience

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • November 19, 2025

    From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

    When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing