Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Your Toughest Challenge for 2017

By Kevin Coleman
November 28, 2016

Now that the Thanksgiving holiday is behind us in the United States, most in enterprise security look toward the coming year.

There is no shortage of challenges facing CSOs and CISOs. As we rapidly bring 2016 to a close and look ahead at 2017, there are two questions that perhaps are the most frequently asked. The first is, what can I do in 2017 to get the biggest bang for my buck? The second question is what will be my biggest challenge in 2017?  Those are two tough questions, and we struggle year after year addressing these two issues. Even though these questions have been asked in the past, this time it is different. This time, the answer to both questions is the same! So by addressing the biggest challenge in 2017, you get twice the bang for the buck. 

We have all seen cybersecurity tools and techniques continuously improved and made our parameter much more secure than they have been in years past. We have made great strides hardening our parameters. Give that reality, cyber attackers have shifted more of their attention to attacking today’s weakest link: the workforce and your cybersecurity staff.  The answer may be to harden your workforce. Traditionally, hardening is a term and technique that has been applied to hardware, software and systems. Today, it is different: it means hardening the human aspect of the cybersecurity issue.

The need to harden the workforce is shared by Gen. Gregory Touhill, the first U.S. Chief Information Security Officer, Office of Management and Budget.

He notes that CSOs and CISOs should partner with their HR department and their internal training department to develop a program (NOT JUST TRAINING) to promote positive workforce cybersecurity behaviors. The more that employees know about all attack techniques, the more they can protect themselves and their family members. 

One innovative approach to this concept was a contest for the reporting of phishing emails, where the first employee to report a phishing email scheme is entered into a monthly drawing for a $25 Starbucks card or similar. After that, the individual that was first to warn of the largest phishing attack experienced that year by the organization gets dinner for two at a local hot-spot. Get creative!!!

Hardening of the workforce requires time, training and ongoing reinforcement of the critical role they play in protecting the assets of their organization from cyberattacks. If internal and external customer services is always job #1; job #2 has to be protecting customers (internal and external) as well as your employer from the devastation that all too frequently accompanies successful phishing attempts and cyberattacks. You have to get and retain  attention and keep cybersecurity in the front of the workforce’s minds as they go about their jobs. That will be not only your biggest challenge, but a challenge that is unending and requires innovation, creativity and continuous attention. 

Your hardening efforts do not stop and end with the workforce. Reducing the attack surface area and reinforcing the remaining surface area are also essential, given the current and projected cyber threat environment for 2017 and beyond. 

KEYWORDS: cyber security security training

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing