Blogs 4 Steps to Lasting Cyber ...
September 9, 2021
Director of Marketing at Living Security · LinkedIn
Chief Information Security Officers are constantly working to build a stronger security culture. But how do you prove your initiatives are actually working? The real goal isn't just "awareness." It's achieving lasting cyber security behaviour change. You need to see your people adopting safer cyber security behaviours every single day. Being able to clearly define and measure the impact of your programs is vital. It’s the only way to determine if you're truly shifting the culture and improving your organization's security posture. This is how you demonstrate real success.
But sometimes standard metrics don’t tell the full story. Sure, you can produce charts showing clicks on phishing emails, but how do you measure the unquantifiable, such as your employees’ perception of and care for your company’s security?
With the right determination and plan, subjective metrics like cultural change become easier to both measure and improve.
Here are four steps to do just that and drive true culture change around cybersecurity:
Traditional security training, with its annual compliance courses and one-size-fits-all videos, often falls short of creating real, lasting change. The issue isn't that employees lack knowledge. Most people are aware of common cybersecurity risks like phishing, yet they continue to make mistakes. This points to what experts call a "behavior gap," not a "knowledge gap." Simply informing people about threats is not enough to alter their actions when faced with a real-world scenario. True risk reduction comes from changing what employees do, not just what they know. The goal must shift from checking a box for awareness training to actively shaping secure habits and decision-making processes across the entire organization.
Addressing this behavior gap is the central challenge for modern security teams. Research confirms that influencing how people behave can significantly reduce security breaches, but it requires a more sophisticated approach than simple awareness campaigns. Instead of broad-stroke training, effective programs apply principles from behavioral science to build secure habits and motivate employees to make safer choices. This is where a data-driven strategy becomes essential. By analyzing signals across employee behavior, identity and access systems, and real-time threat intelligence, you can understand why certain risks exist. This insight allows you to move beyond awareness and deliver targeted, personalized interventions that guide individuals toward more secure actions, effectively closing the gap between knowing and doing.
Before you can start improving the behavior of your employees, you need a clear understanding of what your team is and isn’t doing well surrounding your security posture. How can you establish this baseline?
This upfront research will identify your organization's cybersecurity strengths while also highlighting areas that need improvement. Your findings should guide goal setting for short- and long-term improvement strategies.
Once you have a clear picture of your current security baseline, you can develop a specific, timely action plan for creating a more cybersecurity-conscious culture.
For example, you’ve discovered account credentials that can be easily compromised, so you’ve set a goal to roll out multifactor authentication (MFA). It's unlikely that you can flip a switch and turn on a new process overnight. In fact, you must decide the logistics of how you may introduce the new security policy. That might mean:
Successful change management can look different at every organization, but consider these practices as you get started:
A successful behavior change program is built on more than just policies and enforcement. It requires a deep understanding of human psychology and a commitment to ethical principles. To create lasting change, you need to move beyond simply telling people what to do and instead focus on helping them build secure habits because they genuinely want to. This approach fosters a culture of shared responsibility rather than one based on compliance and fear. By grounding your strategy in proven behavioral science models and a strong ethical framework, you can design interventions that are not only effective but also respectful of your employees, building trust and encouraging proactive participation in your security initiatives.
To truly reduce cyber risk, your goal should be to help people build secure habits and feel intrinsically motivated to protect the organization. Effective programs often draw from behavioral science frameworks, such as the B=MAP model, which states that Behavior is a product of Motivation, Ability, and a Prompt. To change behavior, you need to ensure employees are motivated to act securely, have the ability (the right tools and knowledge) to do so easily, and receive a timely prompt to trigger the action. This means making secure actions feel rewarding, perhaps through gamification, and providing frequent opportunities for practice with tools like regular phishing simulations. This method helps reinforce positive security behaviors until they become second nature.
Influencing employee behavior carries a significant responsibility. A modern Human Risk Management program must be built on a foundation of trust, which requires a strong ethical framework. Drawing inspiration from medical ethics, key principles like Autonomy, Justice, Nonmaleficence, Beneficence, Transparency, and Privacy should guide your initiatives. This means respecting employee choice, applying policies fairly across the organization, ensuring your program does no harm, and being transparent about what data you are collecting and why. The objective is to guide and support individuals, not to create a punitive surveillance culture. By upholding these principles, you create a program that employees will trust and actively participate in, strengthening your overall security posture.
When introducing a new initiative, how you communicate with each department to get them on board for security improvement is crucial. Empower department leaders to craft the “what’s in it for me?” message for their teams. Make sure to ask for feedback from department leaders on the wins accomplished through these changes; this communication is just as important as the change itself.
Read more about getting company-wide buy-in for your cybersecurity initiative here.
Be very clear on the exact behavior(s) that need to be changed. Let’s think back to the multifactor authentication example: if you want a department to be using MFA by the end of the month, a short document or video that explains the current authentication practices, the new expectation, and the steps team members will need to take to set up their account and verify their identity moving forward will be critical. This type of “how-to” content paired with the department leader’s strong message of why it matters to their team can go a long way.
The 80/20 rule applies directly to cybersecurity: a small number of high-risk behaviors cause the vast majority of security incidents. Instead of diluting your efforts with broad awareness campaigns, a focused strategy targets the critical few behaviors that pose the most significant threat. True risk reduction comes from changing what employees *do*, not just what they know. This requires moving past simple knowledge checks to drive measurable behavioral shifts that directly strengthen your security posture. The goal is to identify that critical 20% of behaviors and address them head-on, rather than spreading resources thinly across every potential vulnerability.
Pinpointing those critical behaviors requires a predictive, data-driven approach. A modern Human Risk Management program moves beyond guesswork by analyzing signals across multiple sources. By correlating data across employee behavior, identity and access systems, and real-time threat intelligence, you gain an evidence-based view of your organization's most significant vulnerabilities. This allows you to predict not only the riskiest actions but also the specific individuals or roles most likely to introduce risk. This targeted insight is the foundation for an efficient security program that prevents incidents before they happen.
For many organizations, these critical behaviors include failing to report phishing attempts, poor password hygiene, insecure data handling, and using unapproved software. By focusing targeted interventions on these specific actions, you can achieve a significant reduction in your overall risk profile. The Living Security Platform, for instance, uses its AI guide, Livvy, to not only identify individuals exhibiting these high-risk patterns but also to recommend and act on personalized interventions. This can include targeted micro-training or policy nudges, ensuring your efforts are concentrated on the people and behaviors that matter most to drive measurable change.
Part of the reason it's so hard to make lasting behavioral changes to improve security is the traditional “dumb employee” trope surrounding cyberescurity efforts. Historically, employees are made to feel powerless and stupid for not recognizing cyber threats; they are driven to change their actions using fear tactics. This heightened stress may work short-term, but this approach rarely encourages employees to make sustainable changes. Instead, it can lead to resentment toward and disinterest in your security program at large!
Instead of guilting employees for everything they're doing wrong, empower them by recognizing the things they are doing right and the progress they are making. When developing your security program, include rewards and recognition for employees to drive positive results and behaviors. Even security programs without a high budget can try these inexpensive yet highly effective incentivization tactics. You can even turn your cybersecurity awareness training into interactive, experiential games to boost engagement and foster higher retention of material.
Learn more about defining and enforcing specific behavioral changes in The 4-Step Guide to Cybersecurity Human Risk Management.
As cyber threats evolve, driven by AI and automation, our security strategies must also advance. Relying on traditional, reactive measures is like waiting for the alarm to sound after a break-in has already occurred. A proactive security posture is essential, and it’s powered by predictive intelligence. Instead of simply reacting to incidents, a modern approach uses data to predict who is most at risk and intervenes before a mistake happens. This shift allows you to anticipate threats, focus resources where they’re needed most, and prevent incidents from ever materializing. It’s about moving from a defensive stance to an offensive one, where you can see and address risks before they escalate into full-blown security events.
Threat actors are increasingly using AI to craft highly convincing phishing emails, develop evasive malware, and automate attacks at an unprecedented scale. These sophisticated threats can easily bypass conventional security filters and fool even the most cautious employees. To effectively counter these AI-driven attacks, organizations need to adopt AI in their own defense strategies. An AI-native approach to Human Risk Management can analyze vast amounts of data to identify the subtle patterns that indicate an emerging threat. By understanding the tactics used by attackers and correlating them with internal vulnerabilities, you can build a more resilient defense that adapts in real time to the changing threat landscape, protecting your organization from the next wave of cyber attacks.
The core of a predictive strategy lies in its ability to make human risk visible and measurable. True prevention starts with understanding the complex interplay of risk signals across your entire organization. An advanced platform can achieve this by correlating data from hundreds of indicators across employee behavior, identity and access systems, and real-time threat intelligence. This comprehensive view moves beyond just tracking who clicked on a phishing link. It helps you identify which individuals have elevated access, are being actively targeted by threat actors, and are exhibiting risky behaviors. This data-driven insight allows you to pinpoint your most significant risks and proactively intervene before an incident occurs, fundamentally changing your security posture from reactive to predictive.
Generic, one-size-fits-all security training is no longer effective. To truly change behavior, interventions must be personal and timely. This is where AI excels, by spotting risky behaviors, delivering personalized training, and gently guiding employees toward safer choices in real time. For example, when the Living Security Platform identifies a risky action, our AI guide, Livvy, can autonomously deliver a targeted micro-training module or a helpful nudge at the exact moment it’s needed. This approach reinforces secure habits without disrupting workflow, making security a natural part of an employee's daily routine. It fosters a stronger security culture by empowering people with the right knowledge at the right time, turning potential risks into learning opportunities.
Just as important as receiving company buy-in for your program is being able to show the results of everyone’s hard work. It’s vital to be able to track the organization’s progress—not only to demonstrate improvement but to make data-driven decisions regarding any potential changes or additions to the program.
It's crucial that you establish a scorecard or dashboard to be able to track your program’s impact. Successful cybersecurity awareness training requires clear, trackable metrics for measurable reporting; make sure to include the number and types of rewards given for team members who practice and encourage secure behaviors. Develop ways to assign values to soft metrics like “perceived safety,” which will help the leadership team understand how individual behaviors tie into the big picture.
As security incidents occur, use these as examples for on-the-spot learning opportunities. Remember that your team is human. 100% compliance with zero mistakes is unlikely to occur. The most important thing is to create a culture where employees feel comfortable reporting security incidents. This is far easier to achieve by never pushing fear of repercussions and, instead, empowering them to take action when they see a problem and thanking them for doing their part to better protect your organization.
Review the scorecard results regularly and communicate the results to your organization in periodic reviews to get others involved in championing security along your side. In order to create a positive culture around cybersecurity, you must be candid about what your team is excelling at and what they need to grow in. This transparency helps to instill personal responsibility.
While a scorecard is essential, its value depends entirely on the data you feed it. Traditional security awareness metrics, like phishing simulation click rates, only show a fraction of the story. A low click rate might mean your training is working, or it could simply mean your simulations are too easy. To truly measure cultural change and a shift in behavior, you need to look at metrics that reflect proactive engagement, not just passive avoidance.
Instead of focusing solely on who clicked a simulated phishing link, shift your primary metric to who reported it. Tracking report rates is a far better indicator of a healthy security culture. A click is a moment of failure, but a report is an act of proactive defense. When employees report suspicious emails, it shows they are engaged, vigilant, and feel empowered to be part of the solution. This metric helps you measure the growth of a security-positive mindset across the organization, moving away from a "gotcha" mentality and toward a collaborative security posture where everyone contributes to protecting the company.
Effective Human Risk Management requires a framework that assesses behavior change from multiple angles. Don't just measure if people completed a training module; measure if they actually know what to do, feel responsible for security, and actively participate in your program. A comprehensive approach tracks knowledge retention, changes in attitude toward security, and overall engagement. By correlating data across employee behavior, identity and access systems, and real-time threat intelligence, you can get a complete picture of your human risk. This data-driven foundation makes risk visible and measurable, enabling targeted interventions that effectively change behavior where it matters most.
As you continue to track security behaviors and change your internal culture around cybersecurity, you'll start to see an increasing number of opportunities to educate and empower your team.
This is your opportunity to use the data you've been collecting and apply it to boost your program’s success. Build in routine security awareness training sessions, cultural perspective workshops, and other team-building exercises designed to transform your security posture. With consistency, time, and dedication, you will start to see the results speak for themselves.
Data and metrics provide the map, but a strong, proactive culture is the engine that drives real behavioral change. A successful program moves beyond compliance checklists and fosters an environment where security is a shared value. This requires more than just training; it demands intentional cultivation of trust, clear leadership, and streamlined processes. When employees feel empowered and supported, they transition from being potential liabilities to becoming your most valuable security assets. The following principles are foundational to building that kind of resilient culture.
True security culture starts at the top. When leaders actively participate in and champion security initiatives, it sends a powerful message that this is a core business priority, not just an IT problem. This goes beyond approving budgets; it’s about modeling the desired behaviors. Company leaders who demonstrate a commitment to security by adhering to protocols, like using multi-factor authentication without complaint or openly discussing their own security learnings, set a powerful example. This visible commitment encourages everyone to prioritize security in their own actions, creating a ripple effect across the organization and reinforcing that secure practices are everyone’s responsibility. This leadership engagement is a critical signal for any cybersecurity behavior change program.
Your employees are on the front lines and will inevitably make mistakes. The critical question is whether they feel safe enough to report them. A culture of fear, where employees worry about punishment for clicking a phishing link or misconfiguring a setting, drives these incidents underground. This leaves your security team blind to active threats. Instead, you must foster psychological safety, where people can report mistakes or suspicious activity without fear of blame. When an employee reports an incident, it should be treated as a valuable piece of threat intelligence, not a personal failure. This approach transforms your entire workforce into a human sensor network, providing the real-time data needed to drive meaningful behavior change and prevent small errors from becoming major breaches.
People will always follow the path of least resistance. If your security protocols are complicated and disruptive, employees will find workarounds that often create new risks. The most effective way to ensure compliance is to make the secure way the easy way. This means designing security measures that integrate seamlessly into daily workflows rather than interrupting them. For example, implementing single sign-on (SSO) reduces password burdens, and a one-click "report phish" button in email is far more effective than asking users to forward messages as attachments with full headers. By removing friction and making secure actions a natural part of employees' routines, you dramatically increase adoption and build a security framework that works with human nature, not against it.
The only way to effectively inspire long-lasting behavioral changes about cybersecurity within your company’s culture is to remind your employees they are your greatest strength, not your greatest weakness.
That starts with managing your security risk at a human level and empowering employees to recognize their impact on your security.
Download our free guide, 7 Essential Trends Of Human Risk Management for 2021, to discover more ways to turn your team into advocates of your security culture.
My team completes their annual security training, so why do they still make risky decisions? This is a common frustration, and it points to a "behavior gap," not a knowledge gap. Most employees know what phishing is, but traditional training doesn't prepare them for real-world situations or build lasting habits. True risk reduction comes from shaping what people do instinctively, which requires a more dynamic approach than annual check-the-box courses.
How can I get a true baseline of my organization's security behaviors beyond just surveys? While surveys and interviews with leadership are good starting points, a truly accurate baseline requires a data-driven approach. The most effective way is to analyze signals across multiple systems. By correlating data from employee behavior, identity and access platforms, and real-time threat intelligence, you can see not just what people say they do, but what they actually do, and identify the highest-risk areas to focus on first.
How does AI help change employee behavior instead of just flagging it? AI's real power isn't just in identifying risk; it's in enabling personalized and timely interventions. An AI-native platform can spot a risky action as it's happening and autonomously deliver a specific micro-training or a helpful nudge at that exact moment. This just-in-time guidance helps reinforce secure habits in the context of an employee's daily workflow, making the secure choice the easiest one.
What metrics can I show my leadership team to prove our program is actually changing behavior? Move beyond simple click rates on phishing simulations, which only measure failure. A much stronger indicator of a healthy security culture is the phishing report rate. When employees actively report suspicious messages, it shows they are engaged and acting as a line of defense. Tracking this, along with metrics on knowledge retention and attitude shifts toward security, provides a comprehensive picture of real, measurable progress.
What is the most critical element for building a proactive security culture? It all starts with psychological safety. If employees fear punishment for making a mistake, they will hide it, leaving your security team blind to potential threats. You must create an environment where people feel safe to report incidents or ask questions without fear of blame. When a mistake is treated as a learning opportunity and a valuable piece of threat intelligence, you empower your entire workforce to become an active part of your defense.