www.proofpoint.com Open in urlscan Pro
2a02:e980:107::cf  Public Scan

URL: https://www.proofpoint.com/us/blog/security-awareness-training/how-build-sustainable-security-culture-drives-behavior-change
Submission: On December 16 via api from TR — Scanned from FR

Form analysis 4 forms found in the DOM

<form class="header-nav__search-form">
  <input type="text" class="header-nav__search-input" placeholder="">
  <input type="submit" class="header-nav__search-button" val="Search">
</form>

<form id="mktoForm_19277" data-mkto-id="19277" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1"
  class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft js-visible mkto-form-processed" data-asset-type="Blogs Subscribe" novalidate="novalidate"
  style="font-family: inherit; font-size: 16px; color: rgb(51, 51, 51); width: 1601px;">
  <style type="text/css"></style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 150px;">
          <div class="mktoAsterix">*</div>Business Email:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" placeholder="Business Email  *" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 200px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="blogInterest" class="mktoField mktoFieldDescriptor mktoFormCol" value="All Blog Posts" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Employees_Picklist__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="State" class="mktoField mktoFieldDescriptor mktoFormCol" value="State/Province" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="Website" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium_Detail__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="www-pfpt" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Industry" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Website" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="AnnualRevenue" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="demandbasesid" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="demandBase_Data_Source" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Primary_Product_Interest__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="UTM_Post_ID__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmcampaign" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmterm" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="db_employee_count" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Unsubscribed" class="mktoField mktoFieldDescriptor mktoFormCol" value="0" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="19277" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="309-RHV-619" placeholder=""><input type="hidden" name="Website_Conversion_URL__c" class="mktoField mktoFieldDescriptor"
    value="https://www.proofpoint.com/us/blog/security-awareness-training/how-build-sustainable-security-culture-drives-behavior-change" placeholder=""><input type="hidden" name="gAClientID" class="mktoField mktoFieldDescriptor"
    value="1546469547.1734367794" placeholder="">
  <style type="text/css"></style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 150px;">
          <div class="mktoAsterix">*</div>Business Email:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" placeholder="Business Email *" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 200px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="blogInterest" class="mktoField mktoFieldDescriptor mktoFormCol" value="All Blog Posts" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Employees_Picklist__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="State" class="mktoField mktoFieldDescriptor mktoFormCol" value="State/Province" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="Website" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium_Detail__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="www-pfpt" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Industry" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Website" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="AnnualRevenue" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="demandbasesid" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="demandBase_Data_Source" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Primary_Product_Interest__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="UTM_Post_ID__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmcampaign" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utmterm" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="db_employee_count" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Unsubscribed" class="mktoField mktoFieldDescriptor mktoFormCol" value="0" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Submit</button></span></div>
</form>

<form data-mkto-id="19277" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1"
  class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft" data-asset-type="Blogs Subscribe" novalidate="novalidate"
  style="font-family: inherit; font-size: 16px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

<form data-mkto-id="19277" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1"
  class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft js-visible mkto-form-processed" data-asset-type="Blogs Subscribe" novalidate="novalidate"
  style="font-family: inherit; font-size: 16px; color: rgb(51, 51, 51); width: 1600px; visibility: hidden; position: absolute; top: -500px; left: -1000px;"></form>

Text Content

Skip to main content
English (Americas)
Search
Login
 * Platform
 * Products
 * Solutions

Proofpoint
Contact

Search

 * Platform
 * Products
 * Solutions
 * Partners
 * Resources
 * Company

Search
Login
English (Americas)
Platform
Products
Solutions
Partners
Resources
Company
Protect People
Multi-layered, adaptive defenses for threat detection, impersonation, and
supplier risk.
Email Security
Impersonation Protection
More products
Defend Data
Transform your information protection with a human-centric, omni-channel
approach.
Enterprise DLP
Adaptive Email DLP
Insider Threat Management
Intelligent Compliance
Mitigate Human Risk
Unlock full user risk visibility and drive behavior change.
Security Awareness
Augment Your Capabilities
Managed Services
Product Packages

More Protect People Products
Account Take-Over and Identity Protection
Secure vulnerable identities, stop lateral movement and privilege escalation.
Adaptive Email Security
Stop more threats with a fully integrated layer of behavioral AI.
Secure Email Relay
Secure your application email and accelerate DMARC implementation
Solutions by Use Case
How Proofpoint protects your people and data.
Authenticate Your Email
Protect your email deliverability with DMARC.
Combat Email and Cloud Threats
Protect your people from email and cloud threats with an intelligent and
holistic approach.
More use cases
Solutions by Industry
People-centric solutions for your organization.
Federal Government
Cybersecurity for federal government agencies.
State and Local Government
Protecting the public sector, and the public from cyber threats.
More industries
Comparing Proofpoint
Evaluating cybersecurity vendors? Check out our side-by-side comparisons.
View comparisons


SOLUTIONS BY USE CASE

How Proofpoint protects your people and data.
Change User Behavior
Help your employees identify, resist and report attacks before the damage is
done.
Combat Data Loss and Insider Risk
Prevent data loss via negligent, compromised and malicious insiders.
Modernize Compliance and Archiving
Manage risk and data retention needs with a modern compliance and archiving
solution.
Protect Cloud Apps
Keep your people and their cloud apps secure by eliminating threats and data
loss.
Prevent Loss from Ransomware
Learn about this growing threat and stop attacks by securing ransomware's top
vector: email.
Secure Microsoft 365
Implement the best security and compliance solution for Microsoft 365.


SOLUTIONS BY INDUSTRY

People-centric solutions for your organization.
Higher Education
A higher level of security for higher education.
Financial Services
Eliminate threats, build trust and foster growth for your organization.
Healthcare
Protect clinicians, patient data, and your intellectual property against
advanced threats.
Mobile Operators
Make your messaging environment a secure environment.
Internet Service Providers
Cloudmark email protection.
Small and Medium Businesses
Big-time security for small business.


PROOFPOINT VS. THE COMPETITION

Side-by-side comparisons.
Proofpoint vs. Abnormal Security
Proofpoint vs. Mimecast
Proofpoint vs. Cisco
Proofpoint vs Microsoft
Proofpoint vs. Microsoft Purview
Proofpoint vs. Legacy DLP


PARTNERS

Deliver Proofpoint solutions to your customers.
Become a Partner

Archive Extraction Partners
Learn about Extraction Partners.
GSI Partners
Learn about our global consulting.
Technology and Alliance Partners
Learn about our relationships.
Social Media Protection Partners
Learn about the technology and....
MSP Partners
Learn about our MSP solutions.
Portal Login


RESOURCES

Find reports, webinars, blogs, events, podcasts and more.
Resource Library

Blog
Keep up with the latest news and happenings.
Webinars
Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.
Cybersecurity Academy
Earn your certification to become a Proofpoint Certified Guardian.
Podcasts
Learn about the human side of cybersecurity.
New Perimeters Magazine
Get the latest cybersecurity insights in your hands.
Threat Glossary
Learn about the latest security threats.
Events
Connect with us at events to learn how to protect your people and data from
ever-evolving threats.
Customer Stories
Read how our customers solve their most pressing cybersecurity challenges.


COMPANY

Proofpoint protects organizations' greatest assets and biggest risks: their
people.
About Proofpoint

Why Proofpoint
Learn about our unique people-centric approach to protection.
Careers
Stand out and make a difference at one of the world's leading cybersecurity
companies.
News Center
Read the latest press releases, news stories and media highlights about
Proofpoint.
Privacy and Trust
Learn about how we handle data and make commitments to privacy and other
regulations.
Environmental, Social, and Governance
Learn how we apply our principles to positively impact our community.
Support
Access the full range of Proofpoint support services.


PLATFORM

Discover the Proofpoint human-centric platform.
Learn More

Nexus
Detection technologies to protect people and defend data.
Zen
Protect and engage users wherever they work.
Search Proofpoint
Try searching for
Email Security Phishing DLP Email Fraud
Select Product Login
 * Support Log-in
 * Proofpoint Cybersecurity Academy
 * Digital Risk Portal
 * Email Fraud Defense
 * ET Intelligence
 * Proofpoint Essentials
 * Sendmail Support Log-in

Select Language
 * English (Americas)
 * English (Europe, Middle East, Africa)
 * English (Asia-Pacific)
 * Español
 * Deutsch
 * Français
 * Italiano
 * Português
 * 日本語
 * 한국어

Blog
Security Awareness Training
Create a Strong Security Culture: How to Turn Good Security Habits into Second
Nature for Your Employees


CREATE A STRONG SECURITY CULTURE: HOW TO TURN GOOD SECURITY HABITS INTO SECOND
NATURE FOR YOUR EMPLOYEES

Share with your network!

December 16, 2024 Sara Pan

Last year, 74% of breaches involved human factors, like users behaving in risky
ways or maliciously. No doubt, it’s a challenge to address any type of insider
threat—whether it stems from human error and oversight or from more sinister
intentions. However, when you foster a strong security culture you can
significantly reduce these incidents. 

But creating a strong security culture isn’t easy. For starters, the concept of
security culture itself can often feel vague. And this is partly because there
aren’t any standardized metrics to measure it. Some organizations assess culture
through phishing simulation click rates or reporting rates; others rely on
training completion rates or the speed at which assignments are finished.  

In this blog post, we’ll explore what security culture truly means, why it’s
critical to your organization, and the key steps that you can take toward
building a strong, sustainable culture at your own organization. 


WHAT IS SECURITY CULTURE? 

Proofpoint defines security culture as the beliefs, values and attitudes that
shape how employees behave when it comes to protecting their organizations from
cyberattacks.  

This concept was first outlined by MIT researchers Keman Huang and Keri Pearlson
in 2019. Notably, an organization’s security culture will be weak if its
employees don’t see the value in security best practices, or if they view
cybersecurity negatively like if they think of it as an obstacle to their
productivity. 


WHAT’S A GOOD WAY TO MEASURE SECURITY CULTURE? 

Our goal is to make the concept of security culture more concrete. So, we’ve
broken it down into three critical aspects: 

 1. Responsibility. In other words, employees feel like they should take a
    proactive role in preventing security incidents.  
 2. Importance. Employees believe that cyber threats are a material risk to the
    success of the organization. What’s more, these threats could impact them
    personally.  
 3. Empowerment. Employees feel empowered to act because they have a working
    knowledge of cybersecurity and policy. If they make a wrong security
    decision, they trust that their organization will resolve any issue
    quickly.  

 

The Proofpoint model of cybersecurity culture sits at the nexus of three key
factors. 

If an organization wants to gauge where their security culture stands, it can
conduct a security culture survey. This can help with estimating the likelihood
that employees will make security-aware decisions and take the appropriate
actions.  

At the end of the day, the goal is to drive positive behavior change. Employees
should feel encouraged to help keep their organization safe by adopting security
best practices. 


WHY IS SECURITY CULTURE IMPORTANT? 

As highlighted in the Proofpoint 2024 State of the Phish report, 96% of working
adults who took risky actions were aware that what they were doing was risky.
This result challenges the traditional belief that people engage in risky
behavior due to a lack of security knowledge. It also explains why training
alone is not enough—and why building a strong security culture is so essential. 

Security culture is about how people perceive, engage with and follow security
practices and policies. It shapes their decisions, like how they handle
sensitive data or respond to potential phishing emails. Ultimately, it’s their
decisions that impact an organization’s overall security posture. 

A strong security culture helps mitigate human risks by giving people the right
tools as well as the right knowledge so that they know what’s risky and can
avoid those behaviors. It also motivates them to follow best security practices
because they understand the value of security, the risks involved, and the
consequences of non-compliance.  

A robust security culture also fosters employee accountability. In our 2024
State of the Phish report, 60% of people either weren’t sure or didn’t believe
that they were responsible for helping to protect their organization. When
people understand the impact that their actions have on their organization’s
security posture, then they are more likely to take ownership. This sense of
accountability is crucial. 


WHAT ARE THE KEY ELEMENTS OF A STRONG SECURITY CULTURE? 

Here are some key elements of a strong security culture: 

 * Committed leadership. Executives recognize that security is vitally
   important. As a result, they incorporate security it into their business
   decisions. This sets the tone for the entire organization and ensures that
   security is proactively pursued and not just an afterthought. 
 * Engaged and aware employees. Employees are not only security-aware, but
   they’re actively engaged in in security awareness training initiatives.
   Because they understand the risks and potential consequences of neglecting
   security best practices, they are eager to learn and apply them. 
 * Clear accountability. Employees at all levels understand that they play a
   critical role in keeping their organization safe. They don’t view security as
   someone else’s responsibility. 
 * Trust and openness. Employees feel comfortable reporting security issues. And
   they’re not afraid to admit their mistakes; they don’t worry that they’ll be
   punished. Rather, they see the security team as a resource that can help when
   needed.  


HOW CAN YOU FOSTER A STRONG SECURITY CULTURE? 

These are three key principles for laying the foundation for a strong security
culture: 

 * Understand your organization. To start, you need to identify your key
   organizational risks as well as any microcultures that need to be addressed.
   This will help you to ensure cross-functional engagement. During this phase,
   you should also identify any behavior-driven risks and get feedback about key
   factors, like how much employees trust the security team. 
 * Build relationships. In the next phase, you collaborate with cross-functional
   leaders and influencers. Your goal is to build a network that includes people
   from key internal teams, such as HR, legal, compliance and corporate
   communications. Then, you work to get buy-in from the leadership team to gain
   support and resources. 
 * Make employees stakeholders. It’s important to regularly communicate the
   value and objectives of a security culture as well as your expectations. Part
   of this process is creating channels to gather employee feedback—both
   positive and negative. Make sure to give people opportunities to see that
   cyber safety is valuable for them personally. And give people a safe
   environment to learn and grow. 

These principles are detailed in Proofpoint’s ZenGuideä.  This comprehensive
guide is complete with a communication plan to help you achieve your
cybersecurity culture-building goals. 

   

Snapshot of the communication plan in Proofpoint’s ZenGuide.


HOW TO OVERCOME COMMON CHALLENGES  

It’s not easy create a strong security culture. Here are some tips to help with
common obstacles: 

 * Raise internal awareness. Not everyone shares the same level of security
   knowledge. Treat your program like a marketing campaign. Use a range of
   communication channels and mediums to reach your target audience. Tailor your
   message to make it relevant to their specific roles—and even to them
   personally. 
 * Use both quantitative and qualitative insights. If you want to build a
   compelling case for investing in a strong security culture, data from
   industry reports can help. However, a well-told story often resonates more
   deeply with people than just raw data. So, when you’re trying to justify
   costs or request additional resources, it’s a good idea to combine data with
   storytelling.  
 * Make sure communication goes both ways. Two-way communication means that
   employees are encouraged to voice their opinions and share their ideas. When
   people are encouraged to raise questions or concerns about security
   initiatives, there’s a sense of inclusion. This ensures that they don’t feel
   like responsibility is imposed from the top down. This is the best way to
   keep them engaged. 


CONCLUSION 

A strong security culture is essential for protecting an organization from
cyberattacks. And culture is shaped by people. It’s shaped by their attitudes
about security, their ideas about their responsibility and their empowerment to
act. Conversely, culture also directly impacts people—it shapes how they
perceive security practices and how well they follow them.  

To build a robust security culture, security teams must understand their
organizations. They must also foster relationships across departments and
empower employees as stakeholders in protecting the business. And they must
always keep in mind that it’s continuous effort that can start small. But done
right, it will build momentum over time. 


HOW CAN PROOFPOINT HELP? 

It takes a village to build a strong security culture. However, having a
comprehensive solution and a strategic partner can help you achieve the desired
effects faster. 

Proofpoint takes an adaptive human risk approach to driving sustained behavior
and culture change. Our unique DICE methodology, which stands for Detect,
Intervene, Change Behavior, and Evaluate, provides organizations with a proven
framework to change unsafe behavior and foster a security-conscious culture. 

 

Proofpoint’s ZenGuide uses the proven DICE methodology. 

Do you want more help upskilling your user base? Consider using Proofpoint
premium services. Our culture-driven security awareness and risk management
programs do more than simply help you check a box. Rather, they focus on
fostering real culture change and reducing risk.  

Proofpoint provides a value-added strategic partnership where we help you to
implement industry best practices. What’s more, we assist security teams in
their efforts to engage and motivate employees more effectively, which often
means using threat data and risk insights to bring cybersecurity into the real
world.  

Proofpoint’s ZenGuide enables lean security teams to automate and scale
personalized learning paths that are based on an individual’s unique risk
profile, behaviors and role. Check out our ZenGuide product page to learn more. 

For more tips on building a sustainable security culture, download our e-book
Beyond Awareness Training.  

Previous Blog Post



SUBSCRIBE TO THE PROOFPOINT BLOG

*
Business Email:




















Submit
*
Business Email:




















Submit
Products
 * Protect People
 * Defend Data
 * Mitigate Human Risk
 * Premium Services

Get Support
 * Product Support Login
 * Support Services
 * IP Address Blocked?

Connect with Us
 * +1-408-517-4710
 * Attend an Event
 * Contact Us
 * Free Demo Request

More
 * About Proofpoint
 * Why Proofpoint
 * Careers
 * Leadership Team
 * News Center
 * Privacy and Trust

© 2024. All rights reserved.
Terms and conditions Privacy Policy Sitemap
 * 
 * 
 * 
 * 
 *