Office-resources-banner

How to implement a Cyber-Secure culture?

A Cyber-secure oriented company is essential for your Cybersecurity efforts

Cybersecurity is an important topic in every organisation, it's a constant concern for IT leaders and it can be a headache for IT professionals in general. The end-users can be affected as well, as usually are the ones who tend to get trapped clicking where they shouldn’t and opening suspicious emails. So, why still so difficult to have a company culture focused on Cyber-safe actions and attitudes? The answer is Leadership.

Leadership Matters

Nearly 40% of IT professionals cited their executive teams as the weakest link in their quest to secure the organization. This indicates not only a disregard by leaders of the importance of cyber awareness but also a chasm in the ability to create a cultural change within an organization. According to the NIST publication, Cyber Security is Everyone’s Job “Deep technical knowledge is not required from leaders; rather, they should model good personal security habits based on sound guidelines.”

It’s common for business leaders to see cyber management as the sole corporate protector against incidents and continue to treat cyber risk as mysterious, even scary. This kind of attitude perpetuates this theory by reserving “Incident Response” for IT leaders and Cyber Security Experts. Understanding best practices and cybersecurity basics such as industry frameworks and legislation, creating and reviewing policies and standards will get business leaders off the sidelines and on the field with their IT counterparts.

How to Revert the Situation

An important part of the Cybersecurity culture can be developed through training and constant investment in the team’s upskilling strategy. To be more precise and assertive with the Cybersecurity initiatives the National Initiative for Cybersecurity Education (NICE) is the recommended framework. NICE is focused on Cybersecurity awareness, education, training, and professional development. Its goals are to encourage and help increase Cybersecurity awareness and competence to build an agile, highly skilled Cybersecurity workforce capable of responding to a dynamic and rapidly evolving array of threats.

NICE has published the National Cybersecurity Workforce Framework (“the Framework”) to provide a common understanding and lexicon for Cybersecurity work that is to be used to describe all Cybersecurity work and workers irrespective of where or for whom the work is performed. The Framework is intended to be applied in the public, private, and academic sectors.

NICE Framework Explained

The NICE framework considers every momentum of the Cybersecurity journey and it can be easily adjusted to different corporate realities. 

Analyse

Specialty areas responsible for highly specialized review and evaluation of incoming Cybersecurity information to determine its usefulness for intelligence.

Job Areas include:

  • Threat Analysis
  • All Source Intelligence
  • Exploitation Analysis
  • Targets 

Collect and Operate

Specialty areas are responsible for specialised denial and deception operations and collection of Cybersecurity information that may be used to develop intelligence.

Job Areas include:

  • Collection Operations
  • Cyber Operations
  • Cyber Operations Planning 

Investigate

Specialty areas are responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence.

Job Areas include:

  • Digital Forensics
  • Investigation 

Operate and Maintain

Specialty areas are responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security.

Job Areas include:

  • Data Administration
  • Knowledge Management
  • Customer Service and Technical Support
  • Network Services
  • System Administration
  • Systems Security Analysis 

Oversight and Development

Specialty areas providing leadership, management, direction, and/or development and advocacy so that all individuals and the organization may effectively conduct Cybersecurity work.

Job Areas include:

  • Legal Advice and Advocacy
  • Education and Training
  • Information Systems Security Operations/Officer
  • Strategic Planning and Policy Development
  • Security Program Management/CISO 

Protect and Defend

Specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks.

Job Areas include:

  • Computer Network Defence (CND) Analysis
  • Incident Response
  • Computer Network Défense (CND) Infrastructure Support
  • Vulnerability Assessment and Management 

Securely Provision

Specialty areas concerned with conceptualizing, designing, and building secure IT systems, with responsibility for some aspect of the systems' development.

Job Areas include:

  • Information Assurance Compliance
  • Software Assurance and Security Engineering
  • Systems Security Architect
  • Technology Research and Development
  • Systems Requirements Planning
  • Test and Evaluation
  • Systems Development

Every company can develop a different approach to Cybersecurity, they might adjust some of the above strategies to adapt to their reality and goals. The main message here is that besides the field and the market, it's essential to engage the whole enterprise in the Cybersecurity effort. It’s a journey and not just a solution to be implemented, it needs to be part of the company culture too, led by leaders and managers.

Click below to know more about the NICE Framework

NICE Roadmap

Cybersecurity Training

In a fast-paced environment, investing in technical training is the best way to overcome the Cybersecurity challenges. At New Horizons Ireland we provide a wide range of Cybersecurity courses from different vendors and covering all paths that you might want to follow.

In the link below, you can check all our Cybersecurity paths and choose the best option for your career.

Cybersecurity Paths

Talk to one of our Account Managers to check all your options and possibilities. New Horizons Ireland courses are available in a variety of modalities to attend your needs, such as online live, instructor-led in our Dublin classroom and Mentored Learning, which is a convenient way to attend your course at your own pace and availability.

 

Free-Cybersafe-assessment-banner


True or false? A wireless device is immune to traditional wire-based attacks?

Take our FREE cybersecurity assessment to see how prepared your organisation is for cyber threats. The test is made up of 15 questions and will determine if you can recognise and avoid common issues like phishing, malware and nonsecure website. 
 

Take the quiz

Print
Categories: Cybersecurity
Rate this article:
5.0
Please login or register to post comments.

Theme picker

Loader

Categories

Subscribe to our Newsletter

cheat sheet resources

Subscribe to our Newsletter for all the latest cheat sheets and resources.

Subscribe

Tech-Events-Ireland-vertical