Wednesday, 4 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Security > What Goes Into a Strong Cybersecurity Culture? | DCN
Security

What Goes Into a Strong Cybersecurity Culture? | DCN

Last updated: February 8, 2024 4:24 pm
Published February 8, 2024
Share
cybersecurity padlock icons overlayed on a company meeting
SHARE

IT leaders widely acknowledge that a strong cybersecurity culture is essential for maintaining an organization’s security. It’s defined as a collective effort that serves as the main defense against cyber threats. 

Despite the importance of cybersecurity culture, however, organizations face various challenges that can easily weaken it. ITPro Today’s “State of Cybersecurity in 2023” study, which polled 142 IT professionals, found the following:

  • About three-quarters of respondents cited budget constraints as a top obstacle to improving cybersecurity strategies.
  • Thirty-six percent pointed to staffing issues as a top challenge.
  • Twenty-one percent reported that their organizations had yet to implement the principle of least privilege.
  • Thirty-six percent said that their organizations had not implemented zero trust.

Related: A Guide to Cloud Resilience: Maximize Security, Minimize Downtime

Insufficient staffing, constrained budgets, and a failure to adhere to security best practices elevate the risk of a breach. In addressing these challenges, organizations must consider the human side of security. While the term “cybersecurity culture” is often proposed as a remedy, what exactly does this term entail, and how can organizations successfully cultivate it?

Creating a Culture of Responsibility

CISOs and security teams are often assumed to bear the responsibility of creating and implementing an organization’s security practices. The reality is that true security extends beyond these teams. An organization cannot be deemed secure unless every member understands their role in maintaining its security. This sense of collective responsibility forms the foundation of an organization’s cybersecurity culture. 

Related: Sweden’s Riksbank Turns to Police Following Cyber-Attack On Tietoevry Data Center

According to Yoav Nathaniel, CEO of Silk Security, a cybersecurity culture should ensure that every employee is educated on security risks and held accountable for contributing to risk-level reduction efforts. Since each employee plays a part in protecting an organization, the security team should serve as mentors and set expectations for the organization’s cybersecurity culture. The security team must teach every employee to not only spot and avoid phishing and malware attempts but also to understand the proper protocols for reporting such incidents.

See also  Mitre Opens Lab to Test US Government’s Artificial Intelligence | DCN

Even when there is no immediate threat, a strong cybersecurity culture prioritizes proactive measures rather than simply responding once a threat is reported. To that end, Igor Volovich, vice president of compliance strategy at Qmulos, said that continuous security monitoring and thorough compliance assessments are important.

“[A culture rooted in cybersecurity] involves integrating real-time data analysis into everyday cybersecurity practices, ensuring that compliance is not just a box-checking exercise but a dynamic, ongoing process,” Volovich said. “Creating this culture requires a shift from traditional, periodic compliance assessments to a model where compliance and security data are continuously monitored and analyzed, allowing for immediate identification and remediation of risks.” 

Who Is Responsible? And For What?

As organizations evolve, many have shifted their approach to security management, moving away from centralized IT structures toward a more distributed workforce model. “IT used to be that there were one to three teams that were responsible for all of IT and security, which meant ownership and alignment were fairly simple,” Nathaniel explained. “Nowadays, organizations may build thousands of applications across hundreds of engineering teams or have international divisions with all sorts of system standards, which is changing the way cybersecurity is getting done.”

Every individual who interacts with IT introduces technology risks, making it crucial for organizations to strategically define IT risk ownership and responsibilities, Nathaniel added.  “Well-defined risk ownership can make it significantly easier for security teams to facilitate and delegate risks to their rightful owners.”

With that said, the CISO and security teams are often crucial in developing security best practices and educating employees on how to identify and avoid threats. Employees are frequently considered the weakest link in an organization’s security, which is why they must learn to recognize and report malicious emails, encrypt sensitive data, use strong passwords, and stay informed about evolving cloud security threats.

See also  Microsoft Sales Top Estimates, Cloud Growth Disappoints Some | DCN

In addition to education, it’s vital to instill a sense of social responsibility in cybersecurity. This is best achieved when employees feel respected, supported, and engaged in their work. 

While security teams are responsible for identifying, mitigating, and taking preventative measures against cyber risks, it’s not their responsibility to own an organization’s overall risk. Many CISOs seek executive buy-in before stepping into the role, ensuring they are not expected to take on cybersecurity responsibilities and liabilities alone. 

As CISOs face increasing pressure to prevent breaches and comply with changing regulations, some CISOs are requesting Directors and Officers (D&O) liability coverage, Nathaniel noted. CISOs also seek “organization-wide accountability that is aligned with the board of directors’ risk appetite.”

Making Sure Rules Are Followed

Even when security workers strive to provide employees with sufficient training, challenges inevitably come up. Many organizations cannot dedicate enough time or resources to continual cybersecurity training. Some employees may resist change when asked to engage IT differently, while others might not be interested in cybersecurity at all. Some employees might find the training inaccessible due to technology knowledge gaps or language barriers. 

An effective way to make security training more effective is to integrate it into everyday work, according to industry experts. When employees perceive cybersecurity as an integral part of their job rather than a mandatory day-long training session, they are more likely to feel a personal investment and individual responsibility.

Organizations are adopting training techniques that cater to different learning modalities. An example is the gamification of phishing and malware training. By incorporating elements of game design such as a point system, badges, levels, narratives, case studies, and “What Would You Do” scenarios, gamified training makes cybersecurity practices more enjoyable for many users. A gamified approach taps into participants’ competitive nature and may include interactive videos, simulated phishing attacks, puzzles, and role-playing activities. 

See also  Biden Signs Sweeping Executive Order Regulating AI | DCN

The Importance of Executive Buy-In 

Leadership is responsible for shaping and embodying an organization’s values, so higher-ups must prioritize cybersecurity and model security practices in what they say and do. Beyond emphasizing the importance of cybersecurity through actions and communication, leadership must be willing to allocate funds for cybersecurity initiatives, which tend to be expensive. The financial support ensures that security teams are adequately staffed, trained, and supported, mitigating the risk of burnout. 

Leadership also sets the tone on issues of transparency and regulatory compliance. Collaborating with security teams, leadership should establish clear expectations around compliance demands and implement protocols to monitor compliance. These protocols may involve conducting regular audits, implementing security controls, and using threat detection technologies. 

In the event of a breach, leaders should be prepared to promptly inform the public about any compromised data. Transparent communication strengthens trust with stakeholders over time and signals to security teams that leadership accepts collective responsibility. The approach ensures that the higher-ups are not exempt from taking responsibility in the aftermath of a breach, further reinforcing the organization’s commitment to cybersecurity.  

Source link

Contents
Creating a Culture of ResponsibilityWho Is Responsible? And For What?Making Sure Rules Are FollowedThe Importance of Executive Buy-In 
TAGGED: culture, Cybersecurity, DCN, Strong
Share This Article
Twitter Email Copy Link Print
Previous Article Where They Are Now and What's Next Where They Are Now and What’s Next
Next Article Footsteps in the sand along the ocean Retrieval-augmented generation, step by step
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Egregious Raises $1M in Pre-Seed Funding

Egregious, a London, UK-based supplier of an evaluation platform to defend people from AI misuse,…

January 30, 2025

SKALE Labs Launches FAIR, World’s First MEV-Resistant Layer 1 Built for AI Optimization

San Francisco, CA, June fifth, 2025, Chainwire   FAIR introduces native AI optimization to blockchain…

June 6, 2025

AI breakthrough in action detection technology

Researchers on the College of Virginia’s Faculty of Engineering and Utilized Science have engineered an…

October 17, 2024

Nectar Social Raises $10.6M in Pre-Seed and Seed

Nectar Social, a Seattle, WA-based supplier of an agentic social commerce platform for manufacturers, raised…

June 8, 2025

What will AI computing look like?

Ed Ansett, Founder and Chairman at i3 Options, takes a have a look at how…

March 4, 2024

You Might Also Like

Bokeh photo of inside a modern, open it department in a modern, bright office that has no people. rows of cubicles are visible with computers that are turned off. the office is mostly clean and bright but cobwebs are visible on the workstations.. the
Global Market

Work-from-office mandate? Expect top talent turnover, culture rot

By saad
Cloud computing concept with engineer using computer in office.
Global Market

DCN becoming the new WAN for AI-era applications

By saad
DETANGLE project supports EU cybersecurity regulations
Innovations

DETANGLE project supports EU cybersecurity regulations

By saad
EU cybersecurity
Innovations

EU Cybersecurity Act overhaul targets rising threats

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.