Engagement Strategies for Cybersecurity Human Risk Management

Engagement Strategies for Cybersecurity Human Risk Management

Aug 16

Lev Lesokhin
Lev Lesokhin Lev Lesokhin is an experienced business technologist, a former software developer, consultant, and tech executive. Having started his career at MITRE, Lev has had many touch-points with cybersecurity thought leaders over the years. In his current role as OutThink's Executive Vice President for Technology and Analytics, he works with customers and industry leaders to build a quantitative framework for evolving security awareness into human risk management.
View Profile
Share

Engagement Strategies for Cybersecurity Human Risk Management

The Cybersecurity Human Risk Management Forum roundtable in New York City brought together participants from leading organizations such as Mass Mutual, Natixis, Apple Bank, Goldman Sachs, and Columbia University for an in-depth discussion on managing the complex risk of human-IT interaction. As we waded into a discussion about the way security engagement relates to secure behaviors, the conversation diverged into several threads, including security awareness, outcome metrics, and leadership involvement in security management.

Engagement Signals in Cybersecurity Human Risk Management - Learner Feedback

Early in the discussion, the group came onto the topic of security friction. Users often chafe under the yoke of restrictive security policies - how security controls can get in the way of doing the job. The net effect of this friction is that people just bypass these controls. One of the CISOs in the room shared an anecdote from a past role (to be clear, NOT one of the companies in the room) of a security colleague figuring out his own way to bypass the firewall in order to get to certain online services. Policy resistance is a natural human tendency, even if said human is on the very team meant to implement the policy.
The key, it turns out, is to engage IT users in understanding the sources of security friction, and then to mutually find solutions that get the business process working in a secure way. The holy grail is to get that level of business engagement to such a state where the business reaches out to the security team proactively, asking for help to build security into new projects from their start.

Engagement Metrics vs. Outcome Metrics for Security

One of the CISOs in the room pointed out the importance of measuring the impact of awareness programs. One way to measure impact has traditionally been through phishing simulations. The status quo of measuring completions as the only specific and relevant metric continues to be the uncomfortable norm. Engagement is important for the security team to measure, but likely not a metric for company leadership to track.
Outcome metrics came up as a viable alternative to training completion rates. Metrics like dwell time measure meaningful resilience capabilities and can be continually improved. There are several others that will be the subject of a future post.
Example Outcome Metrics:
Dwell time: Time between the first click and phishing report.
Reporting rate: Percentage of phishing emails reported.
Reduction in policy violations: Fewer incidents of security control bypassing.

Fostering Security Awareness Engagement in the Business Leadership

The topic of engaging business leadership in managing security in a human-centric way always comes up in these roundtables. Today’s session did not disappoint. The consensus around the table was that cybersecurity Human Risk Management is a risk the business needs to own, and the CISO’s role is to advise the business leadership how to manage this risk.
One of the CISOs took us in the direction of having role-based training for the business leaders in the organization. Upon reflection, this is really a matter of the CISO having a serious conversation with the relevant business leaders to level set the role and responsibilities of the business owner in setting company culture and strategy for collective ownership of security risk. This needs to be an ongoing conversation between business and security leaders in order to truly engage at the executive level. Leadership’s involvement is critical, as noted by Gartner.

Incorporating Security Awareness Champions for Team Engagement

Another take on engagement is to run an effective security champion, or ambassador, program. Our CHRM Research Report spells out the behavioral segmentation of OutThink’s entire learner base, showing that 24% of learners turn out to be Security Champions. Running a process that identifies each individual’s behavioral segment can help identify the best candidates for a security champion program.
The members of the roundtable agreed that champions will often appear more approachable than the CISO’s organization for questions about security or even feedback to the security team. Best case for engagement in this vein is to foster discussions about secure processes and behaviors inside and among the teams in the business. Security champions should nurture and facilitate such conversations.

In-Training Engagement

Engagement in security awareness training is critical for the training to be successful. While it may seem like a good idea to force engagement through gamification or interactive content, forced engagement can turn into a net negative. If a busy executive is forced to play a “security game” in order to consume irrelevant content, this experience will only build resentment towards the security team.
This has the opposite effect of all the forms of engagement described in this post. Engagement has to be real because the content is hyper-targeted and relevant. It cannot be forced atop “one size fits all” content.
Of course, we want to avoid the bottom right quadrant of this Engagement-Completion matrix. But we do want to track the learners that do fall into that bottom right category: their lack of engagement tells us something useful. For those who show themselves to be high-risk IT users through their actions, this insight can help the security team intervene in time to prevent an adverse event from happening.

Engagement After Security Awareness Training

The level of actual engagement the security team generates with the employee base is most meaningful, of course, outside and after the training interaction. Actual engagement can be seen in a variety of forms:
Providing feedback on security controls: Teams share experiences with control friction, either through champions or directly.
Interacting with training nudges: Employees respond to follow-ups, such as explaining why they clicked on a phishing simulation.
Involving the security team in new initiatives: Business teams proactively seek advice from the security team to ensure new projects are secure from the start.
All in all, stimulating employee engagement in security awareness training programs is a holistic, organization-wide effort that requires a layered approach.

Engagement is a Pillar of Cybersecurity Human Risk Management

Engagement is obviously critical for the security team to move up the Cyber HRM maturity journey. But engagement with training content is only one form of engagement, and perhaps the spark that starts the journey. There are many other ways the CISO should measure and seek engagement between employees and the business. We’ll continue writing about different approaches and strategies security leaders can take to foster employee engagement with their cybersecurity awareness programs.
To discover more actionable strategies for Human Risk Management, visit the CHRM Forum and explore how OutThink’s innovative solutions can support your security journey.
Enjoyed this blog post? Share it with someone!Share
Related Articles
Risk Quantification for Cybersecurity Human Risk Management
Lev Lesokhin
13/12/2024

Risk Quantification for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Empowering Organizations with Adaptive Security Awareness Training
Roberto Ishmael Pennino
07/11/2024

Empowering Organizations with Adaptive Security Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Awareness Training for Remote Workforces
Roberto Ishmael Pennino
25/10/2024

Cybersecurity Awareness Training for Remote Workforces

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management Gets Adaptive
Lev Lesokhin
08/10/2024

Human Risk Management Gets Adaptive

Read More about AI-Native Cybersecurity Human Risk Management
What is Cybersecurity Human Risk Management? What You Need to Know
Lev Lesokhin
23/09/2024

What is Cybersecurity Human Risk Management? What You Need to Know

Read More about AI-Native Cybersecurity Human Risk Management
Engagement Strategies for Cybersecurity Human Risk Management
Lev Lesokhin
16/08/2024

Engagement Strategies for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Enhance Your Phishing Training With Outthink
Lavinia Manocha
02/08/2024

Enhance Your Phishing Training With Outthink

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training for Frontline Workers
Lavinia Manocha
26/07/2024

Adaptive Security Awareness Training for Frontline Workers

Read More about AI-Native Cybersecurity Human Risk Management
The Role of Security Awareness Training After IT Outages
Lev Lesokhin
26/07/2024

The Role of Security Awareness Training After IT Outages

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management's Eight Dimensions of Secure Behavior Segmentation
Lev Lesokhin
25/07/2024

Human Risk Management's Eight Dimensions of Secure Behavior Segmentation

Read More about AI-Native Cybersecurity Human Risk Management
State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business
Lev Lesokhin
18/07/2024

State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training: Unlearning and Relearning Routines
Lev Lesokhin
10/07/2024

Adaptive Security Awareness Training: Unlearning and Relearning Routines

Read More about AI-Native Cybersecurity Human Risk Management
Did You Think Your Password Was Secure? Let’s Talk Password Security
Lev Lesokhin
24/05/2024

Did You Think Your Password Was Secure? Let’s Talk Password Security

Read More about AI-Native Cybersecurity Human Risk Management
Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework
Lev Lesokhin
23/05/2024

Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework

Read More about AI-Native Cybersecurity Human Risk Management
Password Security: Why the UK is Banning Generic Passwords
Lev Lesokhin
17/05/2024

Password Security: Why the UK is Banning Generic Passwords

Read More about AI-Native Cybersecurity Human Risk Management
Instagram Security Awareness Training: A Step-by-Step Guide
Lev Lesokhin
10/05/2024

Instagram Security Awareness Training: A Step-by-Step Guide

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Human Risk Management Forum Kicks Off in London
Lev Lesokhin
18/04/2024

Cybersecurity Human Risk Management Forum Kicks Off in London

Read More about AI-Native Cybersecurity Human Risk Management
Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step
Rory Attwood
31/01/2024

Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step

Read More about AI-Native Cybersecurity Human Risk Management