Which of the following is most important for measuring effectiveness of the security awareness program?

Editor's note: The following is a guest article from Richard Addiscott, senior research director at Gartner.

Phishing attacks, stolen credentials, business email compromise and other threats that take advantage of the potential for human error continue to plague businesses. As cyberthreat actors look to exploit these weaknesses to infiltrate systems, increasing an organization's security awareness can be the difference between blunting an attack and experiencing an enterprisewide disruption to critical business operations.

Yet, security and risk management leaders face an ongoing challenge in demonstrating to themselves and to senior executives that the investment in a security awareness program is actually reducing organizational risk. 

Traditional metrics such as training participation, course completion and phishing simulation click-through rates are useful for measuring employee participation in the security awareness program's curriculum. But on their own, these metrics do nothing to prove that the enterprise program is shifting the behavior of the workforce in a way that reduces cyber risk levels.

A failure to demonstrate the effectiveness of the enterprise security awareness program can result in a decrease in the hard-won executive support that's critical to ensuring organizationwide participation in the program. This will make it harder to secure the ongoing financial or resourcing support required to maintain momentum and reduce organizational risk. 

Here are three ways that security and risk management leaders can assess the effectiveness of their security awareness programs and prove to stakeholders that programs are helping to adjust end user behavior — in turn, reducing human-borne risk for the business. 

1. Establish a security awareness vision

An effective security awareness program is designed in pursuit of driving behavioral change among end-users. A clear vision statement and culture charter can help to identify and articulate what this change should look like. 

To develop this vision, security leaders should first identify the desired security practices they want to see embedded into end users' day-to-day actions. This would include statements like: 

  • All end-users check the URL of links before clicking them.

  • Employees only transfer sensitive information via secure, approved channels.

  • End users follow security policy regardless of from which devices they are working.

Then, establish a cross-functional team of volunteer representatives from various business units to build a clear vision statement for the security awareness program. By using a cross-functional working group, it's more likely that the desired security behaviors will be articulated in a way that resonates with the broader workforce, not just the security team.

The vision statement must align with desired business outcomes, too. Simple examples include statements such as: "Our people are our greatest security weapon," or "We are a security-conscious workforce." 

After developing the vision statement, the cross-functional team should leverage the list of desired security practices and articulate signature behaviors that would be on display if the security awareness program achieved its desired vision.

Signature behaviors are those that clearly reflect positive intent and support by end users for realizing the security awareness vision. For example, if the desired practice is to check links before clicking them, the corresponding signature behavior could be: "We are alert to suspicious emails and report them to the IT service desk." 

To introduce these new practices, security leaders should combine the new security awareness vision and signature behaviors into a single document called a security culture charter. After being presented to the executive team for sign-off, the charter can be disseminated across the organization via channels such as targeted emails, lunch and learn sessions, posters and desktop screensavers, or security champion networks.

2. Develop outcome-driven metrics

Most computer-based security awareness training platforms offer reports on training completion rates or phishing simulation click rates. While it's important to know who is completing the training, such reports lack information on its effectiveness in reducing risk.  

The key objective for any enterprise security awareness program should be to shape employee behavior so that it reduces the likelihood and impacts of security incidents. Outcome-driven metrics (ODM) measure such outcomes and ties them back to measurable protection benefits.SRM leaders should use ODM to indicate an operational and/or benefit outcome aligned to the behavioral statements crafted as part of the security awareness vision and culture charter.

For example, operational outcomes derived from key behavioral indicators could include: 

  • Percentage completion of mandatory security awareness training reflects if people are completing the training as required.

  • Quarter-on-quarter increase in the number of phishing emails reported to the service desk reflects whether people are retaining the training material provided and changing their behavior.

  • Percentage completion of non-mandatory security awareness training reflects end-user willingness to invest additional time and effort to further their skills and knowledge.

​​3. Link operational outcomes to business benefits

Once the operational outcome metrics data has been collated, the next critical element is to link these insights to business drivers. Start by measuring the impact of human-borne cyber risks and mapping them to benefit outcomes, such as:

  • Number of cybersecurity incidents caused by data misuse

  • Number of cybersecurity incidents caused by human error

  • Completion rates for non-mandatory security awareness training

Should any of the benefit outcome metrics above not show signs of improvement over two or more reporting periods, it indicates potential issues with the security awareness training program. This enables security leaders to improve the program proactively, without losing any significant momentum on the culture change underway.

The next step is to take these benefit outcomes and link them to the business drivers and benefits that are of interest to the organization's senior executives. Determine how the metrics and narrative used can be linked to the business strategy and associated business drivers, such as revenue/growth, cost management, risk and brand reputation.

Putting this all together, look at phishing awareness training as an example of how to demonstrate the measurable business benefits of a specific security awareness training activity.

This approach can be used for various security awareness training activities to provide information that will help build an executive perspective of the effectiveness of the security awareness program. Having a clear vision and using outcome-driven metrics linked to measurable business benefits is key to maintaining support for the program in the long-term.

Which of the following is most important for measuring the effectiveness of a security awareness program?

Which of the following is MOST important for measuring the effectiveness of a security awareness program? To truly judge the effectiveness of security awareness training, some means of measurable testing is necessary to confirm user comprehension.

How to measure the success of your security awareness program?

The only way to accurately measure security awareness training's success is by developing a measurement methodology that incorporates tests, verifications, interviews, simulated events, and employee feedback.

Which of the following is most important to the success of an information security program?

Studies have shown that senior management's commitment to information security initiatives is the single most critical element that impacts an information security program's success.

Which indicator is will help to understand the effectiveness of an information security awareness training?

Key performance indicators (KPIs), such as intrusion attempts, security incidents and time used to detect and mitigate threats, are just a few effective ways to measure the success of a cybersecurity program.

Toplist

Latest post

TAGs