Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How to create a security-first culture

By Manoj Srivastava
security-culture-freepik1170x658.jpg
March 21, 2022

No one will argue the importance of a security strategy to protect a company against ever-evolving cybersecurity threats. Yet, getting buy-in from an organization’s stakeholders can be difficult due to staff that is stretched too thin and budgetary constraints. IT professionals have a double burden when it comes to making a case for security best practices. First, they need leadership to invest in security technology, and second, they have to convince employees that they’re part of the solution. With most people resistant to change, it can be challenging to foster a security-first culture, but it must be done.


When seatbelts were first introduced in the 1980s, only 14% of Americans regularly wore them despite the fact that the National Highway Traffic Safety Administration (NHTSA) required them in new cars as of the late 1960s. Even though seatbelts could save lives, they were met with tremendous resistance and the belief they were an infringement on personal freedom. Eventually, drivers and passengers alike accepted the life-saving device and no one questions wearing them today.


Engage employees in security awareness training

The same concept of changing mindsets applies to engaging workers in security awareness training. Employees are the first line of defense, but often they’re busy with pressing work responsibilities and view these exercises as a chore or task. This is where a learning management system can help by offering dynamic security content to get personnel invested in keeping the company safe from cyberattacks. Companies can access a set of phishing campaign kits, video lessons and customizable simulations that test, train and measure employees’ security awareness level. Campaigns can even be automated to direct phishing simulations to specific groups and then reports are generated to measure results. Different campaigns and messaging can target specific people, and phishing simulations can be scheduled for specific timeframes to prevent staff from warning each other.


Additionally, to keep people interested in the exercises, it needs to be easy, short and visual. Typically, 15-20 minutes is the ideal timeframe so participants will remember what they learned. An online quiz should immediately follow the training to confirm comprehension and retention and offer a report that summarizes results. A key benefit of involving employees is that they will feel empowered and responsible for ensuring the organization’s security.


Implement solutions to get the job done

Adopting a security-first culture means realizing it’s people-first to counter threats. Single Sign-On (SSO) along with solutions for phishing and password management (password managers or vaults) can also strengthen an organization’s security posture. SSO boosts protection because users only need one set of credentials to log in to their applications.


Phishing continues to be a favored mode of attack and these types of emails are getting more sophisticated. Phishing prevention requires a comprehensive strategy that accounts for artificial intelligence (AI), email security and cybersecurity awareness training. AI-based monitoring software analyzes email communications for behaviors that include the devices’ external senders and employees, who and when they message, and from where. Profiles of trusted email senders are generated from the collected data and then used to compare incoming emails to these profiles to verify the sender and detect and prevent phishing attacks. Malicious emails are automatically quarantined, so recipients don’t get harmful messages.


Another tool that supports a security-first culture is a password management platform that offers client centralized password management. Employees who use emails, spreadsheets and even sticky notes to store or share passwords could lead to a compromise that can bring an organization to a standstill. Besides being unsafe, it also becomes difficult to locate them when needed. But as part of a password management offering, passwords and other confidential information can be safely stored and quickly accessed. Additionally, these solutions create permissions and audit trails to restrict sensitive data to authorized users only. With access control, it becomes transparent who is accessing and updating information, and who is using what passwords.


A layered approach is best

Besides engaging employees in security training and implementing tools to support efforts, it’s also essential to incorporate a layered approach that takes physical security into consideration. Physical controls limit physical access to IT systems, for example, locked doors. The server room is another area that should be protected with restricted access, video monitoring and even security gates.


As part of a layered security architecture, cybersecurity solutions should also provide regular vulnerability scanning, patch management and also monitor for compromised credentials. A security operations center (SOC) keeps round-the-clock tabs on an organization’s IT infrastructure — from its networks and devices to its appliances — wherever they may live.


It is also critical to have a business continuity and disaster recovery (BCDR) solution in case the day everyone dreads does come. A BCDR tool will help recover data and ensure the organization can get back online in a timely manner. Finally, key technologies should be automated to free up time to focus on more important tasks.

 

Creating a security-first culture starts with an organization’s people and that means they must be up-to-date on the latest threats by receiving regular security awareness training. To further strengthen security awareness, organizations need to invest in solutions for anti-phishing, identity access management (MFA, SSO, Password Managers), BCDR and approach security from a comprehensive, layered approach. The more measures in place — employee training, cybersecurity solutions and physical controls — the lower the possibility cyberattackers will find a way in and wreak havoc on an organization. And if they were to find a way and cause havoc, BCDR gives you resiliency to recover from the worst.

KEYWORDS: business continuity cyber security risk management security awareness security culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Manoj Srivastava is the General Manager, Security, for Kaseya’s ID Agent and Graphus companies. He is the co-founder and former CEO of Graphus before it was acquired by Kaseya.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • meeting-enews

    How to Create a Culture of High Performance in Your Security Personnel

    See More
  • 5 mins with julian waits

    5 minutes with Julian Waits - How Security Operations Center leaders can create a culture of growth

    See More
  • Startup employees

    5 steps to creating a security-first culture in startups

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!