•
,
5 min. read

- Nearly all (96%) claim to be “at least moderately supportive of or invested in their organization’s cybersecurity mandate”
- 78% say the organization provides compulsory security training
- 88% say “they’re prepared to recognize and report threats like malware and phishing”
- Have requested to circumvent one or more security measures in the past year (49%)
- Use easy-to-remember passwords (77%)
- Click on phishing links (35%)
- Use default passwords for work applications (24%)
- Carry out an internal audit of executive activity over the past year. This could include internet activity, potential risky behavior such as phishing click-throughs that are blocked and interactions with security or IT administrators. Are there any noteworthy patterns such as excessive risk-taking or miscommunication? What are the lessons learned?
The most important goal of this exercise is to understand how wide the executive conduct gap is, and how it is manifest in your organization. An external audit may even be required to get a third-party perspective on things.
- Tackle the low-hanging fruit first. This means the most common types of bad security practices that are the easiest to fix. It could mean updating access policies to mandate two-factor authentication (2FA) for all, or establishing a data classification and protection policy that puts certain materials out of bounds for specific executives. As important as updating policy is communicating it regularly and explaining why it was written, in order to avoid executive confrontation.
The focus throughout this process should be on putting controls in place that are as unintrusive as possible, like automatic data discovery, classification and protection. That will help strike the right balance between security and executive productivity.
- Help executives to join the dots between security malpractice and business risk. One possible way to do this is by running training sessions which use gamification techniques and real-world scenarios to help execs understand the impact of poor cyber hygiene. It could explain how a phishing link led to the breach of a major competitor, for example. Or how a business email compromise attack tricked an executive into wiring millions of dollars to fraudsters.
Such exercises should focus not only on what happened, and what lessons can be learned from an operational perspective, but also the human, financial and reputational impact. Executives would be particularly interested to hear how some serious security incidents have led to their peers being forced out of their roles.
- Work on building mutual trust with senior leadership. This will take some IT and security leaders out of their comfort zone. As the report explains, it should mean “honesty and friendly support” rather than the “condemnation or condescension” that often follows when an employee makes a mistake.
The focus should be on learning from mistakes rather than singling out individuals. Yes, they should understand the consequences of their actions, but always within a framework of continuous improvement and learning.
- Consider a “white glove” cybersecurity program for senior leaders. Executives are more likely than regular employees to say their interactions with security feel awkward. Their cyber hygiene is worse, and they are a bigger target for threat actors. These are all good reasons to devote special attention to this relatively small coterie of senior leaders.
Consider a special point of contact for interactions with executives, and specially designed training and on/offboarding processes. The goal is to build trust and best practice, and reduce barriers to reporting security incidents.
BEFORE YOU GO: 6 steps to get the board on board with your cybersecurity program