IDG Contributor Network: How to establish a security culture within IT

IDG Contributor Network: How to establish a security culture within IT

Most corporations suffer from the delusion that a small team of cybersecurity experts buried within the bowels of IT (or elsewhere) can protect the other 99%+ of the company’s workforce from exposing business-sensitive or business-critical information to malicious external actors.  Unfortunately, this same delusion exists within many IT shops.  95%+ of the IT staff members blithely assume that the security team (which may only represent 5% or less of the total IT staff) will keep them all out of trouble.  These delusions have proven to be false many, many times but they persist nevertheless.

In the current age of widespread security awareness, almost every enterprise has established a security program.  A security program consists of policies established by the CISO or ranking security leader, operational controls that enforce the policies, work rules and procedures that implement the controls, tools that support the rules and procedures, and a security operations team that employs the tools to monitor the rules and procedures and audit the consistency and effectiveness of the controls.  This sounds complicated but the key components of a successful security program are well understood by most IT shops and have been implemented to one degree or another in most enterprises.

A security program and a security culture are two different things.  In a security culture employees have an informed understanding of the cybersecurity threats that confront their companies.  They understand the motivations and intents of the malicious actors that operate within their industries or markets.  Cybersecurity issues and concerns are routinely discussed in normal business meetings such as quarterly business reviews, business strategy sessions, budget planning meetings, MA evaluations, etc.  They’re not confined to periodic meetings that are dedicated solely to security because leaders and staff members understand that security is an inherent part of everyday business operations.  Employees working within a true security culture take an active role in implementing and enforcing security safeguards.

9 warning signs of bad IT architecture and see why these 10 old-school IT principles still rule. | Sign up for CIO newsletters. ]

Some might argue that it’s impossible to establish a true security culture in large, diversified companies operating in multiple geographic locations but there’s abundant evidence to the contrary.  Most financial service companies are hyper-focused on risk management and have developed effective security cultures.  Companies that depend upon the use of internally developed intellectual property – such as pharmaceutical firms – are equally circumspect about cybersecurity.  Pervasive and conspicuous security cultures exist in many large multinational firms.

IT should set the example

It’s impossible to establish a security culture within a corporation if such a culture doesn’t already exist within IT.  IT is responsible for too many of the pathways and processes that can be manipulated by malicious actors to avoid playing a central role in cybersecurity defense.  If the entire IT organization doesn’t take its cybersecurity responsibilities seriously, what hope can there really be for establishing such a culture throughout the enterprise?

While IT cannot establish an enterprise-wide security culture on its own, it should provide an example of such a culture that other functional departments can emulate.  Unfortunately, this is rarely the case.  There are too many IT shops in which security responsibilities have been delegated to a small team of security professionals and are largely ignored by other staff members.  Many IT groups outside the security team routinely dismiss, disregard or debate instructions to insert more rigorous safeguards into their existing technology stacks or operational procedures.  Furthermore, it’s not uncommon for individual staff members to express dismay or indifference when asked to assist in the resolution of security-related audit issues or the response to specific security incidents.  Security training is frequently regarded as a waste of time and an unwarranted intrusion on an individual’s other, more pressing responsibilities.

Leave a comment

Contact Us


    Please use this form to contact us or email us at [email protected]

    Address

    Singapore CBD

    Phone-no

    +65 8714 2780