resources.infosecinstitute.com
Open in
urlscan Pro
162.159.135.42
Public Scan
Submitted URL: https://click.e.infosecinstitute.com/?qs=c47480c17f765482c616a1f11a609131d26100074995fed705fb6413bec3dc3d8e7fc17c805ce2e3db24d4afdd73...
Effective URL: https://resources.infosecinstitute.com/topic/reducing-cybersecurity-risks-with-strong-awareness-reporting/?utm_source=marketing%20cloud...
Submission: On March 24 via api from US — Scanned from DE
Effective URL: https://resources.infosecinstitute.com/topic/reducing-cybersecurity-risks-with-strong-awareness-reporting/?utm_source=marketing%20cloud...
Submission: On March 24 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMhttps://resources.infosecinstitute.com
<form class="position-relative" action="https://resources.infosecinstitute.com">
<input type="text" placeholder="Search" name="s">
<button type="submit" class="fas fa-search"></button>
<div class="fas fa-times close-search" id="close-search"></div>
</form>
POST https://resources.infosecinstitute.com/wp-comments-post.php
<form action="https://resources.infosecinstitute.com/wp-comments-post.php" method="post" id="commentform" class="comment-form">
<p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message" aria-hidden="true">Required fields are marked <span class="required" aria-hidden="true">*</span></span></p>
<p class="comment-form-comment"><label for="comment">Comment <span class="required" aria-hidden="true">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></p>
<p class="comment-form-author"><label for="author">Name <span class="required" aria-hidden="true">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" required="required"></p>
<p class="comment-form-email"><label for="email">Email <span class="required" aria-hidden="true">*</span></label> <input id="email" name="email" type="text" value="" size="30" maxlength="100" aria-describedby="email-notes" required="required"></p>
<p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="text" value="" size="30" maxlength="200"></p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="62447" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
</form>
Text Content
* Boot camps & training * Awareness & anti-phishing * Community * * * * Topics * Certification Prep * Cyber Work * About us * * * Back * Industry insights * Phishing * Hacking * Capture the flag (CTF) * Professional development * Security awareness * Penetration testing * Cyber ranges * General security * Management & compliance * Malware analysis * MITRE ATT&CK™ * News * Application security * Digital forensics * View all * * Back * * * Back * (ISC)² CISSP * CompTIA A+ * EC-Council CEH * ISACA CDPSE * (ISC)² CCSP * CompTIA Network+ * ISACA CISA * Microsoft Azure * (ISC)² CSSLP * CompTIA Security+ * ISACA CISM * PMP * Cisco CCNA * CompTIA CySA+ * ISACA CRISC * Other * CMMC * CompTIA CASP+ * ISACA CGEIT * View all * * Back * Cyber Work Podcast * Cyber Work Applied * Cyber Work Live * * Back * Contact us * Contributors 1. Topics 2. Industry insights 3. Reducing cybersecurity risks with strong awareness reporting Industry insights REDUCING CYBERSECURITY RISKS WITH STRONG AWARENESS REPORTING February 21, 2022 by Patrick Mallory Share: AddThis Sharing Buttons Share to FacebookFacebookShare to TwitterTwitterShare to RedditRedditShare to LinkedInLinkedIn Although cybersecurity has always been a top concern for business executives, the rapid and dramatic shift to a remote and flexible work environment has put this form of risk at the forefront of their minds. Regardless of industry or location, nearly half of all executives surveyed in a recent MetricStream report noted that cybersecurity was their top business risk. At the same time, a look at the top passwords in use, which all involve a series of sequential numbers or keystrokes — showcases just how significant the divide is between principle and practice. Unfortunately, lax and insecure passwords are often the tip of the iceberg to understand the role and importance of cybersecurity awareness training. This program should enforce good password hygiene and provide and encourage safe browsing, email, mobile, and other security best practices. So whether your organization is just beginning to establish its cybersecurity awareness program or if you’re looking to take it to the next level, here are some key things your training may be missing. SHOULD YOU PAY THE RANSOM? Download The Ransomware Paper for real-world ransomware examples, mistakes and lessons learned. DOWNLOAD NOW MEASURING THE IMPACT OF A CYBERSECURITY AWARENESS PROGRAM According to the most recent Verizon Data Breach Investigations Report, about 22 percent of security incidents in 2021 can be traced back to human error from employees inside of an organization. This number has stayed roughly the same since 2018. Unfortunately, trends from most of this same period showed that organizational budgets for security awareness training were actually steadily increasing, growing from about $137 per employee in 2018 to $203, according to Mimecast. So how can the number of human-enabled attacks stay the same even as spending for security awareness training continues to increase? One answer could be that organizations could just decide to spend more even if they are not getting the proverbial awareness bang for their security buck. As with many other aspects of evaluating the return on investment of a strong cybersecurity program, evaluating the role and benefits of cybersecurity awareness can be difficult. While some organizations attempt to measure the number of threats blocked by existing security controls, phishing messages are scanned and deleted. The open rate of phishing-awareness campaigns in today’s high-risk environments — matched by high scrutiny of security budgets — isn’t enough. This challenge is one that Infosec’s Jordan Filip, Client Success team Lead, and Kevin Angeley, Senior Sales Engineer, have been working hard to help organizations overcome, which the two discussed in a recent Infosec Inspire Session. “We’ve realized that what customers need and should expect from their security awareness training program is the same level of enterprise-grade reporting that helps drive other parts of their business,” notes Angeley. “Since we’ve been collecting information and working with our customers to create and identify key performance indicators in their account, we’ve learned that success goes beyond the phishing rate you see on your dashboard.” OTHER INDICATORS OF THE STRENGTH OF YOUR SECURITY CULTURE Most organizations with security awareness programs are familiar with some of the more common phishing-related metrics, such as the report rate and the time to report. Many others also have methods to measure the impact of security awareness programs among their employees, such as collecting feedback from courses or surveys. However, with IBM reporting the average cost of a data breach is at an all-time high of $4.24 million, Angeley and Filip wanted to help organizations go beyond these metrics and use additional data analysis tools and key performance indicators to spot trends and measure success. While there are several dimensions to these metrics, Angeley and Filip believe that they all boil down to identifying ways to measure and increase engagement to mitigate security risk. “This is an important correlation because engaged learners learn more effectively, retain more, and are less likely to fall victim to a security attack,” emphasizes Angeley. COMPREHENSIVELY MEASURING SECURITY AWARENESS Angeley and Filip help organizations take advantage of Infosec’s Security Cultural Surveys, which measure the performance of security awareness programs with questions that tie back to five different domains. Able to be completed once a year or biannually, the five domains that Infosec’s Security Culture Survey covers include: Confidence: How learners feel about putting their security knowledge to practical use. These questions are a great way to identify the maturity of a security awareness program over time. * Sample Question: How confident are you that you would know what to do if you witnessed a cybersecurity incident? Responsibility: How well learners understand their role in implementing their organization’s cybersecurity program. * Sample questions can cover specific policies and procedures expected for employees in a specific functional role (i.e., human resources professionals keeping data private) Engagement: The number of employees completing the required cybersecurity awareness training on time and how relevant the program is to their role in the organization. * Sample Question: How relevant is the cybersecurity training you receive at work to your life and activities outside of work? Trust: How employees perceive IT and security in their organization and their perception of the strength of their existing security program. * Sample Question: How comfortable are you reaching out to your IT or security team for assistance? Outcomes: How well do employees understand the impact of a security incident on the health or reputation of their organization. * Sample Question: How seriously do you think a cybersecurity issue would be taken if you reported one at your workplace? HOW TO TAKE YOUR CYBERSECURITY AWARENESS PROGRAM TO THE NEXT LEVEL There is more to a strong cybersecurity awareness program than just phishing training, regular training, and at least an annual survey. So what are some of the recommendations that Angeley and Filip have for organizations to bolster their overall security programs? * Identify champions from across the functional areas within your organization that can act as an extension of your security team and help communicate across groups. * Focus on building trust in your organization’s IT and security teams by resolving issues that result in workarounds, highlighting successes, and recognizing staff that demonstrates your program’s values. * Find ways to keep security training new and relevant, including updated statistics case studies and gamifying the training to encourage healthy competition. * Refine training topics and regular communications based on organizational events or based on overall behavioral trends . * Engage managers and executives in helping to promote and encourage involvement in the security program. * Develop key performance indicators and a regular reporting mechanism to track the security program’s metrics over time. * Partner with other functional experts within your organization, such as the training and learning professionals within the Human Resource department. * Establish a consistent schedule to promote and highlight your security program, even utilizing a tool to automate the process and communications. SHOULD YOU PAY THE RANSOM? Download The Ransomware Paper for real-world ransomware examples, mistakes and lessons learned. DOWNLOAD NOW BRINGING IT ALL TOGETHER While there is broad agreement across organizations about the value and importance of cybersecurity, especially the role each employee plays, EY reported that only 29 percent of Fortune 100 companies utilize security awareness programs. Your organization can be different. Fortunately, you don’t have to lay the groundwork for a strong, measurable, and agile security awareness program on your own. Experts like Angeley and Filip, believe that taking a people-first approach and utilizing trusted and refined tools like the Infosec IQ Cybersecurity Culture Survey can help your organization be better prepared for the threats of tomorrow. SOURCES * Cybersecurity is Greatest Post-Pandemic Concern in 2021, According to MetricStream Risk Management Survey, PRNewswire * 2021 Data Breach Investigations Report, Verizon * Employee Negligence Remains the Biggest Threat in Data Breaches, Bitdefender * The ROI of Security Awareness Training, Mimicast and Osterman Research * Cost of a Data Breach Report 2021, IBM and the Ponemon Institute * What companies are disclosing about cybersecurity risk and oversight, EY Posted: February 21, 2022 Share: AddThis Sharing Buttons Share to FacebookFacebookShare to TwitterTwitterShare to RedditRedditShare to LinkedInLinkedIn Uh-oh! We've encountered a new and totally unexpected error. Get instant boot camp pricing Thank you! A new tab for your requested boot camp pricing will open in 5 seconds. If it doesn't open, click here. Author PATRICK MALLORY View Profile Patrick’s background includes cyber risk services consulting experience with Deloitte Consulting and time as an Assistant IT Director for the City of Raleigh. Patrick also has earned the OSCP, CISSP, CISM, and Security+ certifications, holds Master's Degrees in Information Security and Public Management from Carnegie Mellon University, and assists with graduate level teaching in an information security program. Patrick enjoys staying on top of the latest in IT and cybersecurity news and sharing these updates to help others reach their business and public service goals. THE RANSOMWARE PAPER We spent nine months collecting ransomware insights. See what we learned about: -Mistakes from those who paid -Challenges of a quick recovery -Future trends of ransomware GET REPORT In this Series * Reducing cybersecurity risks with strong awareness reporting * Could psychology be the key to cybersecurity awareness? Research points to yes * How IT pros can keep their organization on the cutting edge * Cyber talent diversity: It’s time to redefine the face of security * Cybersecurity and Windows 11: What you need to know * The NIST NICE Framework: How to improve cybersecurity role clarity and recruiting * The evolving role of cyber insurance as part of a layered security strategy * Log4j vulnerability explained: Zero-day attacks and how to contain them * Passwords and people: Your secret weapons against cybercriminals * Collaboration is key: IBM and Booz Allen Hamilton weigh in on attracting and retaining cyber talent * Finding the right MSSP for securing your business and training employees * Making the old new again: The power of experiential learning to build cybersecurity skills * 3 steps to get your business cybersecurity-ready in 2022 * The ransomware paper (part 3): New trends and future concerns * Inside phishing data: What works and doesn’t work with employee training * Your next security bug won’t even be in the software that you wrote * Security in Action Framework: Determine if an MSSP is a good fit for you * Most valuable cybersecurity skills to learn in 2022 * The ransomware paper (part 2): Real-life scenarios and lessons learned * Fixing the cybersecurity skills gap: Draw on wider talent pools * Why recent cyberattacks are shining a spotlight on the state of cybersecurity today * Adding cybersecurity services: 5 things MSPs need to know * Cybersecurity awareness: What it is and how to start * The most common cyber threats facing SMBs and how to prevent them * The ransomware paper (part 1): What is ransomware? * How gamification boosts security awareness training effectiveness * How to map MITRE ATT&CK against security controls * Cyber risks of digitizing legacy systems in healthcare environments * Death rays, Death Stars and deathware? * Attackers don’t hack in: They log in with your credentials * Which cybersecurity certifications are best for your career? * Predicting the October 2021 surprise * How to design the best cybersecurity training program for your enterprise * Cybersecurity is a public health crisis, so why don’t we treat it that way? * 3 tips to build a stronger cybersecurity team with Katie Boswell and Jason Jury * Is AI the cybersecurity skills shortage silver bullet? * Upskilling to deepen employee engagement & retention * Ask us anything about developing security talent and teams (session #2) * Ask us anything about security awareness, behavior & culture (session #2) * Influencing security mindsets to build a culture of cybersecurity * Gamification — Cybersecurity’s turn to play * Developing security talent and teams: A roundtable discussion * Close Your Skills Gap: Putting the NICE Workforce Framework for Cybersecurity to Work * Flip the funnel: Fixing the cybersecurity talent pipeline challenge * Security awareness behavior & culture: Ask us anything * Implementing global security awareness programs: Collaboration & cultural relevance * Rethinking the human factor in security awareness * Storytelling in cybersecurity: The impact of a great story (with Sarah Moffatt) * Cybersecurity Predictions For 2021 * Key findings from Infosec’s 2020 IT & security talent pipeline study * 3 steps to close your organization’s cybersecurity skills gap Related Bootcamps Incident Response JOIN THE QUEST FOR NEW SKILLS! * Get hands-on experience * Win over $1,000 in prizes * New challenges every month Join Monthly Challenge LEAVE A REPLY CANCEL REPLY Your email address will not be published. Required fields are marked * Comment * Name * Email * Website RELATED ARTICLES Industry insights COULD PSYCHOLOGY BE THE KEY TO CYBERSECURITY AWARENESS? RESEARCH POINTS TO YES March 21, 2022 Christine McKenzie Industry insights HOW IT PROS CAN KEEP THEIR ORGANIZATION ON THE CUTTING EDGE March 19, 2022 Seth Robinson Industry insights CYBER TALENT DIVERSITY: IT’S TIME TO REDEFINE THE FACE OF SECURITY March 14, 2022 Susan Morrow Industry insights CYBERSECURITY AND WINDOWS 11: WHAT YOU NEED TO KNOW March 13, 2022 Drew Robb * * * * * Topics Hacking Penetration testing Cyber ranges Capture the flag Malware analysis Professional development General security News Security awareness Phishing Management, compliance & auditing Digital forensics Threat intelligence DoD 8570 View all topics Certifications CISSP CCSP CGEIT CEH CCNA CISA CISM CRISC A+ Network+ Security+ CASP+ PMP CySA+ CMMC Microsoft Azure View all certifications Careers IT auditor Cybersecurity architect Cybercrime investigator Penetration tester Cybersecurity consultant Cybersecurity analyst Cybersecurity engineer Cybersecurity engineer Incident responder Information security auditor Information security manager View all careers Company Contact us About Infosec Work at Infosec Newsroom Partner program Newsletter Get the latest news, updates and offers straight to your inbox. * ©2022 Infosec Institute, Inc. * * Trademarks * Privacy Policy Infosec, part of Cengage Group