{"id":1454,"date":"2020-01-13T16:39:08","date_gmt":"2020-01-13T16:39:08","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=1454"},"modified":"2021-04-12T02:55:38","modified_gmt":"2021-04-12T02:55:38","slug":"creating-organizational-cybersecurity-culture","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/","title":{"rendered":"Creating A Cybersecurity Culture In Your Organization"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p class=\"Body\">It was only a few years ago when many viewed cybersecurity as a compliance-based checkbox exercise. Thankfully, cybersecurity has since matured into a threat- and risk-based collaborative process that is ongoing for many organizations.<\/p>\n<p>Unfortunately, a major piece of this cultural shift, the very cybersecurity culture of the organization, hasn\u2019t always followed suit. Consider how many organizations you have been a part of, participated in, or heard about where cybersecurity was the focal point for their technical operations team yet individuals within the organization were blamed when policies and procedures weren\u2019t followed. How many times have you heard the term \u201cthe problem exists between computer and chair\u201d or something along those lines?<\/p>\n<p>Changing the culture of an organization isn\u2019t easy. In fact, I would argue it\u2019s the one aspect of\u00a0 cybersecurity awareness that is the most difficult to achieve. You can\u2019t simply force a new solution or provide a team with training \u2013 it goes far beyond that. It takes dedication, understanding of motivations, identification of behaviors that need changing, and \u2013 above all else \u2013 a willingness to participate. Within this article, we will begin exploring these ideas that are necessary to change an organization\u2019s culture. We\u2019ll do so knowing that a holistic understanding of your people is required if you wish to successfully shift the very nature of the corporate philosophy.<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><h2 style=\"text-align: left;\"><span style=\"color: #003366;\"><strong>What is the current state of cybersecurity culture?<\/strong><\/span><\/h2>\n<\/div><div class=\"fusion-text fusion-text-3\"><p>Some may argue that an organization which claims to have never been hacked has a great culture.\u00a0 The same folks would likely say that a company that has fallen victim to a public breach has a poor cybersecurity culture. I\u2019d argue that it\u2019s not that easy. Consider the first organization. What if they have been breached but simply don\u2019t know it? As for the other firm, what if this latest incident was a precursor to launching a massive remediation program that moves the company into a far more secure state?<\/p>\n<p>From an outside point of view, it is next to impossible to understand an organization\u2019s security culture. This is because the people make up the culture, and, in order to approach this seismic shift, you must first obtain a complete understanding of their perceptions of security.<\/p>\n<p>This leads us to define security culture within an organizational context:<\/p>\n<p>The fundamental understanding of what cybersecurity includes, the roles and responsibilities necessary for a strong security culture, and the security posture of the organization itself.<\/p>\n<p>Looking at one example, I spoke with individuals that said, \u201cI don\u2019t need to worry too much at work on what I open or click because they have controls to protect me.\u201d They truly believed that while at the office, they could click on any link, open any attachment, and the security controls in place would protect them 100% of the time. Speaking from my experience as a security professional, there\u2019s no truth to this perspective. The reality is that each and every individual within an organization plays an important part in enhancing the cybersecurity defense team, regardless of the security measures an organization uses to mitigate risk<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h2><span style=\"color: #003366;\"><strong>Addressing the misconceptions<\/strong><\/span><\/h2>\n<\/div><div class=\"fusion-text fusion-text-5\"><p>In regard to the above misunderstanding, we need to look at the internal messaging that is coming across to our employees and ensure those words provide an accurate view of an employee\u2019s role as it pertains to security. At times, a focus on \u201chow\u201d something comes across to non-technical persons is needed to truly understand where an organization stands. Often, this is achieved with the help of a designated group within each department. These individuals are typically referred to as business or cybersecurity champions.<\/p>\n<\/div><div class=\"fusion-text fusion-text-6\"><h2><span style=\"color: #003366;\"><strong>Addressing the cultural gaps<\/strong><\/span><\/h2>\n<\/div><div class=\"fusion-text fusion-text-7\"><p class=\"Body\">Once a holistic view of the culture is acquired, you can begin identifying the specific behaviors that need to be addressed. This can be accomplished by knowing which threats are likely targeting the organization, such as CFO fraud or phishing attacks. In order to target these gaps, you must identify the specific behavior you wish to address. Using CFO fraud as an example, let\u2019s examine further.<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\"><h2><span style=\"color: #003366;\"><strong>Targeting CFO fraud<\/strong><\/span><\/h2>\n<\/div><div class=\"fusion-text fusion-text-9\"><p class=\"Body\">Below are example sessions on targeting CFO fraud that\u2019s perpetrated through email. Each session looks at a different aspect to demystify actors and their motivations and explore ways to protect against this threat. Please note that this is not a complete list of approaches.<\/p>\n<\/div><div class=\"fusion-text fusion-text-10\"><ul>\n<li>Session 1 \u2013 Demystifying Hackers: Hold a session to introduce what a \u201chacker\u201d is, including white hat, grey hat, and black hat hackers. Discuss and demonstrate the different motivations of each group and assess the potential risks associated with these types of hackers.<\/li>\n<li>Session 2 \u2013 Understanding Social Engineering: Take a deeper look at the different types of hackers, their motivations, and how participants can build storylines to convince others to take certain actions. They can specifically focus on campaigns for winning prizes, sales campaigns that specify \u201clast chance\u201d or \u201cclearance\u201d events, notifications from schools regarding events, and even bank calls that require identification from the receiver.<\/li>\n<li>Session 3 \u2013 Building a Phishing Campaign: Understand how to carry out a phishing campaign and use tools like the Social Engineering Toolkit or PowerShell Empire. This can be done in conjunction with the previous session\u2019s storylines, and the phishing attempts can be sent among participants within a controlled lab or test environment.<\/li>\n<li>Session 4 \u2013 Protection against attacks: Take a full circle approach and tailor to your environment. Even in a lab scenario, this session can highlight the need for participants to proactively engage in attacks prior to taking action. With the example of a malicious link, discuss the technical controls that could stop the attack. Allow the participants to vote on if the link was believed to be malicious or not and provide a demonstration of what happens if it were. This session can also be used to train participants on how to draft an email that doesn\u2019t appear to be suspicious, which often happens without realization.<\/li>\n<li>Session 5 \u2013 Phishing and Vishing used in CFO fraud: All previous sessions were used to build the foundational knowledge of motivations, methods, and types of attacks. This session goes into further depth of a specific situation. The benefit is that everyone already has a baseline of knowledge, so they will be more willing and able to participate even if it might be a situation they\u2019re less likely to find themselves in. Even so, it\u2019s important to keep it applicable to everyone by using examples of authorities like a bank or vendor.<\/li>\n<li>Internal Marketing: Throughout these sessions, the marketing team can build posters and highlight habits taught within the session to reinforce that behavior. Consider notices that highlight the difference between \u201cinfluence\u201d and \u201cmanipulation\u201d in regard to causing someone to take action. You can also have a poster that focuses on the three \u201cR\u2019s\u201d of malicious actors: ruins, riches, and reputation. I have found this framing to be a great way to describe a malicious actor\u2019s motivations.<\/li>\n<li>Security controls: While teaching employees ways to spot and protect against a threat can prove beneficial, it remains imperative that the organization employ technical controls to assist in this effort as well. When trying to catch a malicious email, for example, you should disable macros or reduce to only trusted sources, block known malicious domains, and block emails that are sent multiple times to the same person. All of these functions are achievable by an email filter. You can also set firewall rules to disable unusual activities, which does require an existing baseline knowledge of the organisation.<\/li>\n<li class=\"Body\">Additional Resources: Within the organization, you can host reporting buttons for phishing and\/or post FAQs to aid in the identification of phishing attempts and help employees understand what actions to take if a phishing email or fraud attempt is received at home.<\/li>\n<\/ul>\n<\/div><div class=\"fusion-text fusion-text-11\"><h2><span style=\"color: #003366;\"><strong>Motivations of participants<\/strong><\/span><\/h2>\n<\/div><div class=\"fusion-text fusion-text-12\"><p>Traditionally, organizations focused on external or extrinsic motivations to entice persons to alter their working habits and change the company culture. This may take the form of chastisement for failing to complete your timesheet within the prescribed time frame or facing punishment for accidentally clicking a phishing email.\u00a0 Conversely, it could be a reward received if a desired action was taken \u2013 e.g. if you received recognition for reporting that phishing email to your management instead of clicking the link.\u00a0 \u00a0What social science tells us is that this is actually the best way to <u>violate<\/u> your original goal, since the motivation isn\u2019t within the action taken; it\u2019s in the response to said action. Ultimately, when the reward goes away, so too does the action.<\/p>\n<p>There is a time and place for external motivators, such as when short term engagement is desired, when a new solution is launched, or when you\u2019re looking for volunteers to join a testing team. While this method isn&#8217;t necessarily a \u201cbad\u201d way of motivating, it needs to be understood that unless followed up with a desire to make these changes, the engagement ends when the rewards do.<\/p>\n<p>Identifying participants and the overall culture of the organization\u2019s internal motivations, known as intrinsic motivation, can enhance the program with long term engagement and lead to noticeable change in problem behaviors. By looking at the individuals and why they\u2019re motivated to take a different action, you can effectively build that cultural change. Granted, it isn\u2019t an easy or quick solution, but it can get you where you need to be.<\/p>\n<p>The article \u201c<a href=\"https:\/\/www.tutordoctor.com\/blog\/2018\/march\/extrinsic-motivation-works-until-it-doesn-t-how-\/\" target=\"_blank\" rel=\"noopener noreferrer\">Extrinsic Motivation Works (Until It Doesn\u2019t): How To Cultivate Intrinsic Motivation<\/a>\u201d discusses motivating students for long term engagement. It rejects the use of quick and easy solutions like bribery, rewards, and threats. What stands out to me is that instead of approaching awareness training like a teacher, encouraging and motivating our employees to want to learn and feel safe to make mistakes in doing so, we often think, \u201cit\u2019s their job\u201d and they should simply get it done. In fact, cybersecurity is a completely different skill set from their daily job, and creating a safe environment that examines individuals\u2019 needs and wants in an effort to encourage participation is actually the approach that should be taken.<\/p>\n<p><em>Editor\u2019s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of ITEGRITI, Inc.<\/em><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":1456,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179,13,2180],"tags":[839],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Create A Cybersecurity Culture in your Organization<\/title>\n<meta name=\"description\" content=\"When exploring how to create a cybersecurity culture, organizations first need a holistic understanding of their people and their perceptions of security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Creating A Cybersecurity Culture In Your Organization\" \/>\n<meta property=\"og:description\" content=\"When exploring how to create a cybersecurity culture, organizations first need a holistic understanding of their people and their perceptions of security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-13T16:39:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T02:55:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"675\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Zoe Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RoseSecOps\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/\"},\"author\":{\"name\":\"Zoe Rose\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/8fec04d3edbc87b981f6b06f773f8b9c\"},\"headline\":\"Creating A Cybersecurity Culture In Your Organization\",\"datePublished\":\"2020-01-13T16:39:08+00:00\",\"dateModified\":\"2021-04-12T02:55:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/\"},\"wordCount\":2238,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png\",\"keywords\":[\"8 Minute Read\"],\"articleSection\":[\"Compliance\",\"Cybersecurity\",\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/\",\"name\":\"How to Create A Cybersecurity Culture in your Organization\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png\",\"datePublished\":\"2020-01-13T16:39:08+00:00\",\"dateModified\":\"2021-04-12T02:55:38+00:00\",\"description\":\"When exploring how to create a cybersecurity culture, organizations first need a holistic understanding of their people and their perceptions of security.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png\",\"width\":675,\"height\":450,\"caption\":\"Creating a Cybersecurity Culture in your Organization\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Creating A Cybersecurity Culture In Your Organization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/8fec04d3edbc87b981f6b06f773f8b9c\",\"name\":\"Zoe Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3a81a5e3176af12c5e91824aa45ab60c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3a81a5e3176af12c5e91824aa45ab60c?s=96&d=mm&r=g\",\"caption\":\"Zoe Rose\"},\"description\":\"Zo\u00eb Rose is a highly regarded hands-on cyber security specialist, who helps her clients better identify and manage their vulnerabilities and embed effective cyber resilience across their organisation. Zo\u00eb is a Cisco Champion and certified Splunk Architect, who frequently speaks at international conferences. Recognised in the 50 most influential women in cyber security UK for the past two years, and the PrivSec 200, Zo\u00eb is quoted in the media, has presented on National News, has been featured in Vogue Magazine, and was the spokesperson for Nationwide\u2019s Over Sharing campaign that had a reach of 306 million citizens.\",\"sameAs\":[\"https:\/\/www.rosesec.com\/\",\"https:\/\/www.linkedin.com\/in\/zo-rose\/\",\"https:\/\/x.com\/RoseSecOps\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/zoe-rose\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Create A Cybersecurity Culture in your Organization","description":"When exploring how to create a cybersecurity culture, organizations first need a holistic understanding of their people and their perceptions of security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/","og_locale":"en_US","og_type":"article","og_title":"Creating A Cybersecurity Culture In Your Organization","og_description":"When exploring how to create a cybersecurity culture, organizations first need a holistic understanding of their people and their perceptions of security.","og_url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2020-01-13T16:39:08+00:00","article_modified_time":"2021-04-12T02:55:38+00:00","og_image":[{"width":675,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png","type":"image\/png"}],"author":"Zoe Rose","twitter_card":"summary_large_image","twitter_creator":"@RoseSecOps","twitter_site":"@itegriti","twitter_misc":{"Written by":"Zoe Rose","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/"},"author":{"name":"Zoe Rose","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/8fec04d3edbc87b981f6b06f773f8b9c"},"headline":"Creating A Cybersecurity Culture In Your Organization","datePublished":"2020-01-13T16:39:08+00:00","dateModified":"2021-04-12T02:55:38+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/"},"wordCount":2238,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png","keywords":["8 Minute Read"],"articleSection":["Compliance","Cybersecurity","Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/","url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/","name":"How to Create A Cybersecurity Culture in your Organization","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png","datePublished":"2020-01-13T16:39:08+00:00","dateModified":"2021-04-12T02:55:38+00:00","description":"When exploring how to create a cybersecurity culture, organizations first need a holistic understanding of their people and their perceptions of security.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Copy-of-Untitled.png","width":675,"height":450,"caption":"Creating a Cybersecurity Culture in your Organization"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/creating-organizational-cybersecurity-culture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Creating A Cybersecurity Culture In Your Organization"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/8fec04d3edbc87b981f6b06f773f8b9c","name":"Zoe Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3a81a5e3176af12c5e91824aa45ab60c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3a81a5e3176af12c5e91824aa45ab60c?s=96&d=mm&r=g","caption":"Zoe Rose"},"description":"Zo\u00eb Rose is a highly regarded hands-on cyber security specialist, who helps her clients better identify and manage their vulnerabilities and embed effective cyber resilience across their organisation. Zo\u00eb is a Cisco Champion and certified Splunk Architect, who frequently speaks at international conferences. Recognised in the 50 most influential women in cyber security UK for the past two years, and the PrivSec 200, Zo\u00eb is quoted in the media, has presented on National News, has been featured in Vogue Magazine, and was the spokesperson for Nationwide\u2019s Over Sharing campaign that had a reach of 306 million citizens.","sameAs":["https:\/\/www.rosesec.com\/","https:\/\/www.linkedin.com\/in\/zo-rose\/","https:\/\/x.com\/RoseSecOps"],"url":"https:\/\/itegriti.com\/kw022024\/author\/zoe-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1454"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=1454"}],"version-history":[{"count":8,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1454\/revisions"}],"predecessor-version":[{"id":2002,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1454\/revisions\/2002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/1456"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=1454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=1454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=1454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}