Blogs A CISO-Approved Security ...
March 29, 2021
Director of Marketing at Living Security · LinkedIn
Stale training videos and recycled phishing tests don't change behavior. They just check a box. A truly effective program evolves, adapting to new threats and keeping content fresh. But to build a program that actually reduces human risk, you need resources. This is where your security awareness program proposal becomes critical. This guide will help you craft a data-driven training budget proposal that secures executive buy-in. We'll show you how to articulate a sophisticated plan that proves value and gets the green light.
The yearly overhaul of your security awareness initiative means that Security Awareness Program Owners like you need to be strategic... since big changes often mean determining a different security awareness budget each year.
It can be nerve-racking organizing a new annual proposal for your Chief Information Security Officer (CISO)— hoping to get the green light to take to the big wigs. In this post, we’re here to explain why it doesn’t have to be. Here are a few tips to win the heart and mind of your all-too-important CISO when submitting an IT security awareness budget.
We get it, your CISO is your boss. You want to do your job well and impress them, but proposing your new security awareness budget doesn’t have to be intimidating. It’s important to remember that your CISO wants your program to succeed just as much as you and has your organization's overall best interests in mind.
If you’re getting budgetary pushback, remember that you and your boss are both playing on the same team. Your CISO is your coach (not your rival!) and you’re the top player, helping to orchestrate the moves. Instead of arguing with the person calling the final shots, ask your CISO how you can rework the plan to balance both of your objectives and concerns.
Winning over your CISO is one thing. To spark interest amongst your stakeholders or the C-suite, you’ll need to take a different approach. Earn organization-wide buy-in for your security initiative with these tips.
While organizing your IT budget proposal, you may find it difficult to prove the ROI of your initiatives. It’s no secret that cybersecurity awareness training effectiveness isn’t easy to measure, but it’s your job to assign value to your goals.
Remember that your CISO needs to take this proposal to the executives for final approval and that you must speak in terms of what the C-suite wants from the security program. Speak to the desires of both your CISO and top management by:
It looks good to be on top of the latest cybersecurity awareness training trends—that is, so long as they’re supported by solid data. Prove that your initiatives are cutting-edge while founded on proof by including important statistics and findings from other industry leaders.
You may get buy-in for your short training video series by sharing a study that shows microlearning creates 50% more engagement. Or you might recommend a cyber escape room and include social proof, listing a few other big companies like Mastercard who are using them for both team building and security education.
It's a stark reality that the vast majority of security incidents trace back to human action. In fact, research shows that human error is a factor in up to 95% of all data breaches. This statistic is a powerful tool in your budget proposal. It reframes your security awareness program from a simple training initiative to a critical defense against the organization's most significant threat. Use this data to position your program as a direct countermeasure to the primary way attackers infiltrate your company. A proactive program can reduce the success of phishing attacks by as much as 90%, demonstrating a clear and measurable return on investment that directly impacts your organization's security posture.
Beyond mitigating direct threats, a well-structured security awareness program is essential for compliance. Your CISO is keenly aware that frameworks like NIST, ISO 27001, SOC 2, and PCI DSS require documented security training. Failing to meet these mandates can result in failed audits, hefty fines, and reputational damage. Frame your budget request as a necessary investment to maintain compliance and streamline the audit process. A proactive, year-round security program isn't just about checking a box; it's about building a defensible security culture. With 89% of companies reporting improved security outcomes from comprehensive training, you can show that your plan is a proven strategy for satisfying regulators and genuinely strengthening security.
When your CISO takes your security awareness training proposal to the C-suite, they’ll want to know their return on investment before approving any budget. The top dogs think in terms of money savings and risk reduction, so work with your CISO to calculate some projections for your efforts (or the true cost of not doing something).
A few core metrics to keep in mind are your developmental costs (how long it’ll take you and employees to complete the training), revenue loss should you have downtime recovering from a breach, reputational loss, etc. You may also want to include comparative pricing, to prove you’re getting more bang for your buck by investing in one security training vendor vs. another, for example.
When talking ROI, this is the perfect opportunity to bring your CISO in for guidance and validation of your sources and calculations. You don’t want them doing the math for you, but they can and should be involved in the process.
Shockingly in this day and age, many organizations are still doing a poor job tracking their security awareness program’s results. But without proper tracking, you have flimsy ground to stand on when proving the success of your initiative. That means trouble next year when trying to get a new security awareness budget approved!
Not only should you be tracking your company’s progress to impress your CISO and C-suite, but you also need this information to make proactive long-term improvements to your program. The bottom line is, you need this info to make data-driven decisions and make your training even more engaging, educational and effective all around!
Really want to impress your CISO? Here are 10 questions they don’t always know the answer to. If you can help them find a solution within your proposal, you’re sure to “wow.”
Phishing simulations are a direct way to gauge how your employees respond to threats. While tracking the click rate on these simulated attacks is a critical starting point, the more powerful indicator is the report rate. A rising report rate signals a healthy security culture where employees feel empowered to act as a line of defense. Effective training can reduce how often people fall for phishing attacks by up to 90% and deliver a significant return on investment. Presenting a clear plan to track these metrics shows your CISO that you are focused on changing behavior, not just checking a compliance box.
While it’s a basic metric, tracking training completion rates is essential for demonstrating program reach and meeting compliance requirements. Your CISO will want to see that the resources allocated are being used across the organization. However, it's important to frame this metric correctly. A 100% completion rate doesn't automatically translate to a 100% secure workforce. Position completion rates as a foundational metric, a prerequisite for the more impactful goal of behavioral change. This shows you understand that true success lies not in who finished a module, but in how that training influences their actions when faced with a real threat.
To truly impress your CISO, move beyond isolated metrics and present a plan to measure holistic human risk. This involves correlating data across multiple systems to get a complete picture. Instead of just looking at who clicks on a phishing link, a modern approach analyzes signals across employee behavior, identity and access systems, and real-time threat intelligence. This allows you to identify which individuals pose the greatest risk, not because they failed a simulation, but because they have elevated access, are being actively targeted by adversaries, and are exhibiting risky behaviors. This is the foundation of Human Risk Management, shifting the focus from awareness to measurable risk reduction.
A successful security program is more than a series of annual training modules. It’s a strategic initiative designed to produce measurable changes in behavior and a quantifiable reduction in risk. Building this kind of program requires a thoughtful structure that moves from initial assessment to continuous optimization. By following a clear framework, you can create a program that not only meets compliance requirements but also builds a resilient security culture. This structured approach ensures your efforts are targeted, your budget is justified, and your impact is visible to leadership and the entire organization. It transforms security awareness from a checkbox activity into a core business function that protects your most valuable assets.
Laying the groundwork for your program is the most critical phase. A solid foundation ensures that every subsequent action is aligned with clear objectives and based on real data, not assumptions. This initial framework involves understanding your current risk landscape, defining what success looks like, securing the necessary support from leadership, and creating a launch plan that generates enthusiasm and participation. Getting these steps right will set the stage for a program that delivers lasting results and demonstrates clear value from day one, making it easier to maintain momentum and secure future investment.
Before you can map out your journey, you need to know your starting point. Establishing a baseline is about understanding what your employees already know, think, and do about security. You can start by using tools like quizzes and initial phishing simulations to gauge current awareness levels and susceptibility. A comprehensive baseline also looks at past security incidents and correlates data across employee behavior, identity and access systems, and real-time threat intelligence. This gives you a complete picture of your organization's human risk, allowing you to identify high-risk groups and tailor your program accordingly.
Vague goals lead to vague results. Instead of aiming to simply "improve security awareness," set specific, measurable objectives that align with your organization's risk posture. A great goal might be to "reduce phishing simulation click rates to under 5% within 12 months" or "decrease incidents related to credential compromise by 20% in the next fiscal year." These outcome-focused metrics are what matter to your CISO and the board. They shift the conversation from training completion rates to tangible risk reduction, making it easier to prove the program's value and ROI.
Your program needs a champion in the C-suite. To secure executive buy-in, you must frame your security awareness program as a strategic investment, not just a cost center. Present a clear business case that explains how preventing a single major incident can save the company far more than the entire cost of the training initiative. Use your baseline data and measurable goals to show leaders that you have a data-driven plan to reduce specific risks. When they see a clear connection between the program and protecting the bottom line, they are much more likely to provide the support and resources you need.
A great program that no one knows about is destined to fail. Treat your launch like an internal marketing campaign to build excitement and encourage participation. Use multiple channels like company-wide emails, posters, and messages on internal communication platforms to announce the program. Clearly explain what employees can expect and, more importantly, what’s in it for them. Highlighting the program's benefits, such as protecting their personal information and contributing to the company's success, can significantly increase engagement from the very beginning.
With your framework in place, the next step is to focus on the content and delivery of your training. The most effective programs cover the highest-risk areas with content that is both relevant and engaging. This means moving beyond generic, one-size-fits-all modules and toward a more personalized approach. By combining a core curriculum that addresses universal threats with customized delivery methods, you can ensure that your security messages resonate with employees, stick in their minds, and translate into secure behaviors when it matters most.
Your training content should focus on the most common threats that lead to security incidents. A strong core curriculum will always include topics like identifying phishing attempts, creating and managing strong passwords, practicing safe online habits, and understanding the importance of protecting sensitive data. These topics address the primary vectors for human-driven breaches. By ensuring every employee has a solid understanding of these fundamentals, you can significantly strengthen your organization's first line of defense against cyberattacks.
How you deliver the training is just as important as the content itself. To combat training fatigue, make the experience interactive and enjoyable. Incorporating elements like gamification, leaderboards, and rewards for positive security behaviors can make learning feel less like a chore and more like a challenge. More importantly, a truly modern security awareness and training program adapts to the individual. It delivers targeted micro-training based on an employee's specific role, access level, and observed risky behaviors, ensuring the content is always relevant and effective.
A phased rollout allows you to build momentum, gather data, and refine your approach over time. Breaking the implementation into manageable 30-day stages prevents you from overwhelming both your team and your employees. This methodical approach ensures a smooth launch and provides early opportunities to demonstrate progress. It also allows you to be agile, making data-driven adjustments to the program based on initial results and feedback, which ultimately leads to a more effective and impactful initiative in the long run.
The first month is all about setting the stage. This is when you assemble your core team, configure your training platform, and communicate the upcoming program to the organization. The most important activity during this phase is to conduct your baseline phishing simulation. This initial test provides the critical data you need to measure improvement over time. It gives you a clear, unbiased snapshot of your organization's current susceptibility before any training has been delivered, setting a benchmark for success.
Now it's time to go live. Begin rolling out your core training modules, keeping them short and focused. Consider a weekly cadence of micro-learning sessions to keep employees engaged without disrupting their workflow. This is also the time to introduce any job-specific training for higher-risk departments. Towards the end of this period, send a second phishing simulation. Comparing the results to your baseline will provide an early indicator of the program's effectiveness and generate positive momentum.
The third month is focused on analysis and refinement. Dive into the data from your training modules and phishing tests to see which teams are showing the most improvement and which may need additional support. This is also the perfect time to solicit feedback from employees through surveys to understand what’s working and what isn’t. Use these insights to optimize your training plan and prepare a report for your CISO that highlights early wins and demonstrates the program's initial impact on risk reduction.
Ultimately, the goal of any security awareness program is to foster a strong, positive security culture. This goes beyond training and checklists; it’s about creating an environment where employees feel empowered and responsible for security. A positive culture is built on trust, encouragement, and shared ownership. When security is seen as a collective responsibility rather than a top-down mandate, employees are more likely to become proactive partners in defending the organization against threats.
When an employee clicks a phishing link or makes another security mistake, it should be treated as a learning opportunity, not a reason for punishment. A no-blame approach encourages employees to report incidents without fear of reprisal. This open communication is invaluable, as it gives your security team early visibility into potential threats. Punishing mistakes only drives behavior underground, making it much harder to detect and respond to real attacks.
Instead of focusing on mistakes, celebrate successes. A culture that rewards good security hygiene is far more effective than one that punishes lapses. Publicly recognize employees who report phishing emails or identify potential security risks. Simple rewards, like a gift card or a company-wide shout-out, can go a long way in reinforcing desired behaviors. This positive reinforcement shows employees that their efforts are valued and encourages others to follow their lead.
If you want employees to report suspicious activity, the process must be simple and intuitive. A complicated reporting process is a major barrier that discourages participation. Implement a clear, one-click "report phish" button in your email client and establish a straightforward channel for reporting other potential security concerns. When reporting is easy, employees are far more likely to do it, turning your entire workforce into a powerful network of threat sensors.
You can’t be everywhere at once. A security champions program builds a network of security advocates embedded within different departments across the organization. These are enthusiastic employees who receive extra training and act as the local go-to person for security questions. Champions help tailor security messaging for their teams, promote best practices, and provide valuable feedback to the security department, helping to scale your efforts and embed security deeply into the company culture.
Sometimes it can be intimidating to ask for better cybersecurity tools or tracking because it feels like you’re taking away from your educational budget. But why do you think they tell you during flight safety training to put on your own air mask before helping your neighbor? In order to empower your team, you first must have the resources you need to properly help them.
When planning your security awareness budget, don’t be afraid to ask for the software and support you need to do your job effectively. If you need to work with a partner for assigning metrics to your program’s success, scope that into your IT budget. If you need a better training module that’s more modern and relevant, don’t settle for less than what you think will truly make an impact.
It’s your responsibility to find the best educational cybersecurity materials and to measure their effectiveness, but it’s not necessarily your job to generate all the supportive resources yourself.
That’s why we designed Campaign in a Box.
Think of it like a starter toolkit for Security Awareness Program Owners, providing them with themed monthly initiatives, including blogs, emails, and other pre-written content to educate your team without the heavy lift.
My CISO wants to see a clear ROI. What are the most important factors to include in my calculation? When calculating your return on investment, think beyond the simple cost of a potential breach. You should present a business case that includes the cost of employee time for training, the potential for lost revenue and productivity during an incident, and the financial penalties associated with failing compliance audits. Frame the investment not just as a preventative measure but as a direct contributor to operational stability and risk reduction, which are metrics the C-suite values highly.
My training completion rates are high, but our phishing click rate isn't improving much. How do I explain this? This is a common challenge and a perfect opportunity to shift the conversation toward more meaningful metrics. Explain that while completion rates confirm program reach and satisfy basic compliance, they don't measure actual behavior change. Use this to advocate for tracking more sophisticated indicators, like the phishing report rate. A rising report rate is a powerful sign that employees are becoming active defenders, which is a much stronger indicator of a healthy security culture than just finishing a module.
How can I frame my budget request as a strategic investment instead of just another operational cost? Connect your program directly to the organization's primary business goals. Instead of focusing only on the threats you're preventing, highlight what you're protecting: customer trust, brand reputation, and uninterrupted business operations. Present your plan as a business enabler that reduces the risk of costly downtime and data loss. When you show how a proactive security culture supports revenue and growth, your proposal becomes a strategic investment, not just a line item on a spreadsheet.
A "no-blame" culture sounds good, but how do I ensure there's still accountability for risky behavior? A no-blame approach is about the initial mistake, not a free pass for repeated risky actions. The goal is to make employees feel safe reporting an incident without fear of immediate punishment, which gives your security team critical visibility. Accountability comes next. It involves using the incident as a data point to provide personalized, targeted micro-training that addresses that specific employee's knowledge gap. It's about correction and education, not retribution.
The idea of measuring holistic risk by correlating data is compelling. What's a realistic first step to start doing this? You don't need to analyze all 200 signals on day one. A great starting point is to correlate just two data sets: identity and behavior. Begin by identifying which employees or roles have the most privileged access to critical systems. Then, compare that list against your phishing simulation results. This simple act of cross-referencing helps you immediately identify your highest-risk individuals, allowing you to focus your initial efforts where they will have the greatest impact.