homepage
Open menu
Contact Sales
Go one level top
  • Train and Certify
    Free Course Demos

    Free course demos allow you to see course content, watch world-class instructors in action, and evaluate course difficulty.

    Train and Certify
    Immediately apply the skills and techniques learned in SANS courses, ranges, and summits
    Learn More
    • Overview
    • Courses
      • Overview
      • Full Course List
      • By Focus Areas
        • Cloud Security
        • Cyber Defense
        • Cybersecurity and IT Essentials
        • DFIR
        • Industrial Control Systems
        • Offensive Operations
        • Management, Legal, and Audit
      • By Skill Levels
        • New to Cyber
        • Essentials
        • Advanced
        • Expert
      • Training Formats
        • OnDemand
        • In-Person
        • Live Online
      • Free Course Demos
    • Training Roadmaps
      • Skills Roadmap
      • Focus Area Job Roles
        • Cyber Defense Job Roles
        • Offensive Operations Job Roles
        • DFIR Job Roles
        • Cloud Job Roles
        • ICS Job Roles
        • Leadership Job Roles
      • NICE Framework
        • Security Provisionals
        • Operate and Maintain
        • Oversee and Govern
        • Protect and Defend
        • Analyze
        • Collect and Operate
        • Investigate
        • Industrial Control Systems
      • European Skills Framework
    • GIAC Certifications
    • Training Events & Summits
      • Events Overview
      • In-Person Event Locations
        • Asia
        • Australia & New Zealand
        • Latin America
        • Mainland Europe
        • Middle East & Africa
        • Scandinavia
        • United Kingdom & Ireland
        • United States & Canada
      • Live Online Events List
      • Summits
    • OnDemand
    • Get Started in Cyber
      • Overview
      • Degree and Certificate Programs
      • Scholarships
      • Free Training & Resources
    • Cyber Ranges
  • Enterprise Solutions
    New Cyber Trends & Training in 2023

    This eBook offers a glimpse into the key threats that are expected to emerge as forecasted by SANS experts.

    Enterprise Solutions

    Build a world-class cyber team with our workforce development programs.

    Learn More
    • Overview
    • Group Purchasing
    • Build Your Team
      • Assessments
      • Private Training
      • By Industry
        • Health Care
        • Industrial Control Systems Security
        • Military
    • Leadership Training
      • Leadership Courses
      • Executive Cybersecurity Exercises
  • Security Awareness
    2023 Security Awareness Report

    Empowering Security Awareness teams with industry benchmarking, program growth, and career development.

    Security Awareness
    Increase your staff’s cyber awareness, help them change their behaviors, and reduce your organizational risk
    Learn More
    • Overview
    • Products & Services
      • Security Awareness Training
        • EndUser Training
        • Phishing Platform
      • Specialized
        • Developer Training
        • ICS Engineer Training
        • NERC CIP Training
        • IT Administrator
      • Risk Assessments
        • Knowledge Assessment
        • Culture Assessment
        • Behavioral Risk Assessment
    • OUCH! Newsletter
    • Career Development
      • Overview
      • Training & Courses
      • Professional Credential
    • Blog
    • Partners
    • Reports & Case Studies
  • Resources
    Security Policy Templates

    In collaboration with security subject-matter experts, SANS has developed a set of security policy templates for your use.

    Resources
    Enhance your skills with access to thousands of free resources, 150+ instructor-developed tools, and the latest cybersecurity news and analysis
    Browse Here
    • Overview
    • Webcasts
      • Webinars
      • Live Streams
        • Wait Just An Infosec
        • Cybersecurity Leadership
        • SANS Threat Analysis Rundown (STAR)
    • Free Cybersecurity Events
      • Free Events Overview
      • Summits
      • Solutions Forums
      • Community Nights
    • Content
      • Newsletters
        • NewsBites
        • @RISK
        • OUCH! Newsletter
      • Blog
      • Podcasts
        • Blueprint
        • Trust Me, I'm Certified
        • Cloud Ace
        • Wait Just an Infosec
      • Summit Presentations
      • Posters & Cheat Sheets
    • Internet Storm Center
    • Research
      • White Papers
      • Security Policies
    • Tools
    • Focus Areas
      • Cyber Defense
      • Cloud Security
      • Digital Forensics & Incident Response
      • Industrial Control Systems
      • Cyber Security Leadership
      • Offensive Operations
      • Open-Source Intelligence (OSINT)
  • Get Involved
    Join the Community

    Membership of the SANS.org Community grants you access to cutting edge cyber security news, training, and free tools that can't be found elsewhere.

    Get Involved
    Help keep the cyber community one step ahead of threats. Join the SANS community or begin your journey of becoming a SANS Certified Instructor today.
    Learn More
    • Overview
    • Join the Community
    • Work Study
    • Teach for SANS
    • CISO Network
    • Partnerships
    • Sponsorship Opportunities
  • About
    Our Mission

    To empower current and future cybersecurity practitioners around the world with immediately useful knowledge and capabilities, we deliver industry-leading community programs, resources and training.

    About
    Learn more about how SANS empowers and educates current and future cybersecurity practitioners with knowledge and skills
    Learn More
    • SANS
      • Overview
      • Our Founder
      • Awards
    • Instructors
      • Our Instructors
      • Full Instructor List
    • Mission
      • Our Mission
      • Diversity
      • Scholarships
    • Contact
      • Contact Customer Service
      • Contact Sales
      • Press & Media Enquiries
    • Frequent Asked Questions
    • Customer Reviews
    • Press
    • Careers
  • SANS Sites
    • Australia
    • Brazil
    • France
    • India
    • Japan
    • Middle East & Africa
    • Singapore
    • United Kingdom
  • Log In
  • Join
    • Account Dashboard
    • Log Out
  • Contact Sales
  1. Home >
  2. Blog >
  3. Building the Human Risk Dream Team
370x370_Lance-Spitzner.jpg
Lance Spitzner

Building the Human Risk Dream Team

Managing human risk is a team effort.

September 22, 2023

I was inspired by a thread started by Cathy Click, head of Security Awareness at FedEx. She asked a fantastic and inspiring question, what would the perfect Security Awareness / Culture team look like? If I truly wanted to manage my organization’s human risk, who would I need to manage that effort? I felt this was a fantastic question and wanted to share my perspective. I fully realize not all organizations have the resources to support such a diverse team I describe below, but this is something I would love to see organizations strive for.

The Team Itself

First, managing human risk is a team effort. Data driven reports for over the past three years repeatedly demonstrate that people have become the primary attack vector - the human element is involved in 75-85% of all breaches globally. To address what is in many ways the greatest risk to organizations today, we need a team of people.

  • Full-time Lead: First and foremost, whomever is in charge of your program should be dedicated full-time to this effort. If you assign your program to someone who already has multiple other responsibilities, at best your effort will be compliance focused. Yes, you will check the box but no you will not be able to engage and secure your workforce. Step number one, whoever oversees your human risk program needs to be dedicated to it full time.
  • Report to CISO: Second, that individual and their team needs to be part of the security team. Managing human risk is part of managing your overall cyber risk, as such we need to be part of the security team. If your program is part of and reports to departments such as Audit, Privacy, Legal, Human Resource or Training then your effort will be siloed from the security team and be a compliance focused initiative. When working with organizations on managing human risk one of the first things I ask is where does their Security Awareness / Culture / Human Risk team report? Even better, it’s important that this team report directly to the CISO. The more likely the team reports directly to the CISO, the better they can help all the security initiatives through the lens of people.

Key Members of the Team

As for members of the team, here are the key skills I see as important to managing human risk. In a perfect world you would have a specific team member with each of these skills, dedicated full-time to the human side of cybersecurity. More likely you have certain individuals that share several of these skills.

  • Communications: First and foremost, securing your workforce starts with engaging your workforce. If your workforce is not listening to you (a common problem for security) it’s very hard to train and enable them. Communications is a field specializing how to engage people in their own terms. One option I see organizations take is actually having someone from their Communications department assigned to work with the security team, in some cases they are even embedded into and assigned to work with the security team full time. Their job is to take whatever the security team wants to communicate (new security policies, tool rollouts, security announcements and updates, etc.) and translate it into simple terms that anyone can understand and act on. I often see people with backgrounds in Marketing, Journalism or Public Relations also in this type of role.
  • Organizational Change: You need someone that understands how people think and act, who has expertise in human nature. However instead of having someone who specializes in what drives behavior at the individual level, consider an expert in what drives peoples behavior at an organizational level. This field of study is called Organizational Change. These are professionals that understand fields such as behavioral economics, behavior models, influence and human psychology. But they are also experts in change models such as ADKAR that provide a framework for changing peoples behaviors and beliefs at an organizational level. These are the experts in architecting your security program to work with human nature, not fight human nature.
  • Instructional Designer: Adult Learning Theory is the study and expertise in how adults learn. Instructional Designers are experts in applying that knowledge to design, develop and implement training that drives your desired outcomes. These are your experts in leveraging such as the ADDIE framework, Learning Objectives and the Kirkpatrick Evaluation model. They help you design training that engages, motivates and enables people to exhibit the skills and behaviors you want.
  • Data Analytics: Metrics are a powerful tool to help you not only manage your program but demonstrate its value to leadership. You most likely want to ally yourself with someone that has an ability to take all your different data points and provide actionable metrics you can both leverage but also share with leadership.
  • Project Manager: You need someone with the ability to help manage all of this, to include developing partnerships with other departments.
  • Additional Leads: You may also need to bring on board additional professionals to help with specialized projects, such as someone to lead a Security Champions initiative, Phishing Simulation program or perhaps specific outreach efforts such as a DevSecOps training for your Developer.

Notice a skillset we don’t emphasize here? Cybersecurity. If you are focused on managing human risk, wouldn’t you want people that are experts in risk? Absolutely! Fortunately, you already have those experts, the rest of your security team. That is why it’s so critical for your human focused team to partner with and be part of the security team. Your security team can help to identify your organizations top human risks and the behaviors that manage those risks. Your security awareness / culture team focuses on motivating and enabling your workforce to exhibit those behaviors. It is this team effort that is key. In fact, this takes us to the last section of this post, partnerships.

Key Partnerships

Attempting to engage and secure your entire workforce is an organizational effort, and it requires strong partnerships with other departments within your organization. While we could list numerous departments, these are the key I like to start with.

  • Security: Securing your workforce starts with security, and that means a strong partnership with your entire security team. Some of the key sub-groups that your human risk team will need to work with include your Cyber Threat Intelligence (CTI) team, your Security Operations Center (SOC) and Incident Response. Teams like these provide critical data and intel on what the greatest human risks are, enabling you to prioritize and focus on managing your top human risks. In addition, your human risk team can also assist your security team. For example, helping your security team to create security policies that are easier to follow and simplifying communications so your workforce can actually understand what your security team is communicating.
  • Human Resources: HR is critical for several reasons. First, they often control the process of on-boarding new employees, to include any new training, which most likely include security training. While we all know that your initial employee training is not going to magically make anyone secure, those first impressions can drive peoples’ perceptions about security at your organization. In addition, HR are often the experts in culture and can help guide your team as you go beyond just securing peoples’ behaviors but driving and embedding a strong security culture. 
  • Communications: Similar to what we covered earlier, communications is the cornerstone to securing your workforce. Not only does your security team need to have strong security skills, but a trusted partnership with the Communications department enables those communications to effectively get out.

I would love to hear from you on what is missing or your suggestions. How can we improve the Dream Team when it comes to Managing Human Risk? If you would like to learn more about managing human risk, consider the three-day SANS MGT433 Managing Human Risk course.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Security Awareness
  • Security Management, Legal, and Audit

Related Content

Blog
CurriculumTile_340_x_340.png
Security Management, Legal, and Audit
October 24, 2023
SANS Cybersecurity Leadership Curriculum
Developing World Class Cybersecurity Leaders
MGT_Triad_370x370_Headshot.jpg
SANS Cybersecurity Leadership
read more
Blog
SSA_-_Blog_-_Building_a_Cybersecurity_and_Privacy_Learning_Program_-_340x340.jpg
Security Management, Legal, and Audit, Security Awareness
September 12, 2023
NIST’s SP800-50r1 – Building a Cybersecurity and Privacy Learning Program
Overall, this document is really about defining and meeting training requirements.
370x370_Lance-Spitzner.jpg
Lance Spitzner
read more
Blog
SSA_-_Blog_-_Parsing_the_2023_VZ_DBIR_for_the_Human_Element_-_340x340_Thumb.jpg
Security Management, Legal, and Audit
June 9, 2023
Parsing the 2023 VZ DBIR for the Human Element
Take a look at some of the most significant findings on the role of humans in breaches.
370x370_Lance-Spitzner.jpg
Lance Spitzner
read more
  • Register to Learn
  • Courses
  • Certifications
  • Degree Programs
  • Cyber Ranges
  • Job Tools
  • Security Policy Project
  • Posters & Cheat Sheets
  • White Papers
  • Focus Areas
  • Cyber Defense
  • Cloud Security
  • Cybersecurity Leadership
  • Digital Forensics
  • Industrial Control Systems
  • Offensive Operations
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • © 2023 SANS™ Institute
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn