3 steps for driving a strong cybersecurity culture

Companies need to be strong and intentional when shaping their cyber protection approach.

A strong security culture is a force multiplier for behaviors, beliefs and messages; it represents a critical social component that will either work for or against a company. (Photo: Melinda Nagy/stock.adobe)

News that CNA Financial was the victim of a recent cyberattack once again proves that no company, even a large insurer, is immune to these dangers. The company was the target of a very sophisticated attack that disrupted everything from its email systems to its network and website.

A positive security culture is a force multiplier for behaviors, beliefs and messages; it represents a critical social component that will either work for or against you. An important consideration here is that you already have a security culture whether you realize it or not. Just because you may not have been mindful in terms of establishing and nurturing a desired security culture doesn’t mean that one doesn’t exist.

Culture is organic

A security culture lives and breathes within every organization. The question is, how strong, intentional and sustainable is your security culture, and what do you need to do about it?

A security culture is the codification of the security-related beliefs, behaviors and values of an organization and each subgroup within it — such as divisions, departments, regions, age groups and the like.

Security culture isn’t “owned” by security leaders just as the customer service culture isn’t owned by your call center. Culture is owned by the entire organization — and should be defined and nurtured by senior leaders.

The group establishes a social norm strengthened by expectations, pressures and rewards. People within the group identify with the different artifacts that comprise the culture. A healthy security culture exists when an organization’s security-related beliefs, behaviors and values have been codified into social expectations.

Managing a security culture requires an approach that works with the realities of human nature and social dynamics. Efforts to shape culture should be adaptive and multilayered to proactively engage, influence, and manage the mindset and behaviors exhibited by the various population groups within an organization. This is done by weaving together elements of innovative training; the active use of psychological, behavioral and social triggers; and technology-based guardrails for when users step out of bounds.

When done effectively, your culture-shaping efforts become a force multiplier for the influence of your security team by helping to embed security values and behaviors throughout your organization. Here are three steps for driving a strong security culture.

Step 1: Assessing and understanding the culture as it currently exists

Don’t start to influence your security culture without thoroughly understanding what it currently is. There are several ways to gather information to help understand your current culture including:

In most cases, using more than one of these sources will help build a richer understanding of the existing culture. This can then provide a starting point from which to identify opportunities for improvement. In gathering this information, make sure to build in opportunities to collect and segment the data based on sociographic/demographic data points to help identify cultural attributes based on factors such as age, gender, location, department and length of employment. This also provides an opportunity to identify areas where more attention may be needed.

Step 2: Establish a system of culture carriers

While senior leaders play a significant role, culture shifts won’t occur organization-wide at all levels without a system of “culture carriers” — individuals who are part of the organization and can help spread and support desired messages faster and further than you could without their influence. In social media parlance, it helps messages go viral.

Force multipliers are the other people, groups and social structures in an organization beyond the leadership team. They are a critical distribution network and the key to promoting the culture’s overall sustainability. Your security team, even with the assistance of the leadership team, cannot control culture; rather, they can play a part in influencing it, helping to set the tone, and providing resources and support.

Where do they come from? You should cast a wide net when seeking culture carriers, using a variety of means to identify them — and to allow them to self-identify. For instance:

Ideally, these should be people who are already respected and influential within their departments and peer groups — they carry social influence. They’re individuals who your security and leadership team can leverage to capitalize on their social currency and position.

In addition to helping to spread security culture messages organization-wide, culture carriers can also play an important role in serving as a conduit to bring the security and organizational leadership team stories, ideas, concerns and issues that may be surfacing across the organization that these leaders might otherwise have had little visibility into.

Step 3: Design structures, pressures, rewards and rituals

To help ensure that the desired security culture will resonate, it’s important to build in structure, pressures, rewards and rituals.

The power of culture lies in the fact that humans are social creatures. People are shaped by others around them. Their thoughts, attitudes, beliefs and behaviors are molded by their peer group. By first identifying the current state of your security culture; then finding culture carriers to help shape attitudes and behaviors; and finally designing structures, pressures, rewards and rituals, you can ultimately move toward the goal of instilling a strong security culture that is owned by the entire organization.

Perry Carpenter is the author of “Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors” (Wiley, 2019). He is the chief evangelist and security officer for KnowBe4, the world’s largest security awareness training and simulated phishing platform.

Related: