Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementCybersecurity Education & TrainingSecurity Leadership and ManagementLogical Security

Cybersecurity Education & Training

8 best practices to improve cybersecurity program performance

By Haggai Polak
cybersecurity

Image via Pixabay

July 3, 2023

Amidst an ever-evolving cyber threat landscape, an organization's C-suite and board of directors must prioritize security as a core business objective. Understanding the value of cybersecurity and how it affects business performance is necessary at a time when public trust is vital and cyber breach headlines are at an all-time high.

As the risk landscape becomes considerably more complex, many businesses are still unprepared for the future. At many companies, resources are not expanding as quickly as cyber risks, and cybersecurity efforts are not keeping up with the digital transformation. The average number of attacks rose by 15.1% between 2021 and 2022, while the number of material breaches rose by 24.5%. Organizations also likely overlooked some attacks and neglected to disclose them, which would cause these figures to be understated.

Breaches carry many long-term consequences. One study found that the most significant consequence was reputational damage, followed by business disruption and the cost of the breach response. The organizations with the most significant breaches identified human error, misconfigurations, unknown assets, and poor cyber hygiene as the top four causes.  

So, what are the best actions organizations can take to manage and mitigate risk in an era of growing threats and limited resources? Which investments in people, processes and technology are the most successful? Let’s explore.

Modern cybersecurity requires a layered approach to combat the constant evolution of threat actors’ tactics. This is why a prioritization strategy is so important. Companies must first evaluate the cyber risks they currently or are likely to face and then rank the critical assets in importance. Then, the next step is to implement the best cybersecurity practices to meaningfully address these risks.  

Here are eight best practices to consider when seeking to reduce the likelihood of incidents and material breaches, or shorten the time to detect, respond to and mitigate an attack.

1. Increasing the level of cybersecurity maturity

When it comes to important metrics like the number of material breaches, the time it takes to notice a breach, and the time it takes to mitigate, organizations that have mastered the National Institute of Standards and Technology (NIST) cybersecurity framework perform better than others. They also tend to outsource other areas less, such as threat intelligence, firewall management, and risk assessment, since they have built their own internal team for these activities that collaborate across risk and security functions.

2. Ensuring that cybersecurity budgets are sufficient

With enterprises ramping up their security operations and the need for more investment in cybersecurity continuing to grow, the most challenging obstacle is often an inadequate budget. Organizations must persuade boards and CEOs to make that investment to achieve a better balance between digital growth and safety. While the lack of prioritizing cyber risk is expected to diminish over the next two years as boards and CEOs prepare for escalating threats, it's not likely to go away completely. This is particularly challenging for organizations experiencing rapid growth since they often move quickly to adopt new technology, take advantage of emerging digital market opportunities, and aren’t always stopping to effectively implement cybersecurity measures. 

3. Making cybersecurity people-centric

Humans and technology both play a significant role in cybersecurity. When businesses add a human layer of protection, cultivate a culture attentive to cybersecurity risks, offer more efficient training, and establish clear procedures for hiring and retaining cyber staff, they experience fewer breaches and quicker response times.

4. Utilize cutting-edge technology while limiting the number of products

Organizations that have never experienced a breach invest in various technologies, from the fundamentals like email security and identity management to more specialized options like cloud access security brokers, cyber risk models and SIEMs. Security leaders are more likely to adopt a multi-layered, multi-vendor strategy to monitor and manage risks through a robust infrastructure effectively.

5. Securing the supply chain

A report stated that 44% of companies using suppliers are more frequently exposed to significant cybersecurity concerns. Top performers in supply chain security are much more advanced in terms of time to identify, respond and mitigate. For instance, the same report also noted over half of organizations with great times to detect are more advanced in supply chain security. 

6. Protecting connected IT and OT assets

Organizations’ attack surfaces are growing due to the fusion of the physical and digital worlds. However, fewer significant breaches and quicker detection and response times occur in organizations that emphasize protecting interconnected IT and OT assets.

7. Utilizing intelligent automation

AI and machine learning combined with automation helps CISOs achieve their goals while freeing up staff from mundane tasks. And the importance of automation is only increasing. In the cybersecurity industry, there is fierce competition for talent, and automation can fill in the gaps when organizations don't have access to the staff they need. Automation also aids in retaining talent because people can avoid working on lower-level activities, making work less tedious. 

8. Doing more to measure performance

Currently, only four to five metrics are being tracked by organizations. Fewer incidents and material breaches occur for security executives and executive teams that are more diligent, meaning they monitor six or more metrics. They also react to attacks more quickly.

Undoubtedly one of the fastest-growing crimes is cybercrime, which continues to affect companies across all industries. Therefore, organizations must know the ins and outs of their cybersecurity posture. By following these best practices, they mitigate the potential for their name to end up in the headlines. 

KEYWORDS: artificial intelligence (AI) automation cyber security research security metrics supply chain cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Haggai Polak is Chief Product Officer at Skybox Security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • healthcare-freepik1170x658v57.jpg

    4 best practices to improve healthcare cybersecurity

    See More
  • computer-code.jpg

    8 identity management best practices to have in place

    See More
  • IAM-cyber-freepik1170x658v7.jpg

    8 best practices to harden identity and access management permissions

    See More

Events

View AllSubmit An Event
  • November 14, 2024

    Best Practices for Integrating AI Responsibly

    ON DEMAND: Discover how artificial intelligence is reshaping the business landscape. AI holds immense potential to revolutionize industries, but with it comes complex questions about its risks and rewards.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!