{"id":22784,"date":"2022-08-08T14:38:59","date_gmt":"2022-08-08T14:38:59","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22784"},"modified":"2022-08-08T14:54:14","modified_gmt":"2022-08-08T14:54:14","slug":"cybersecurity-culture-change-needed","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/","title":{"rendered":"Cybersecurity Training and Tech Aren&#8217;t Enough; &#8216;Culture Change&#8217; Needed"},"content":{"rendered":"\n<p>Companies spend a staggering amount of money on <a href=\"https:\/\/www.esecurityplanet.com\/products\/\">cybersecurity products<\/a> to defend their networks and data from hackers, but a couple of industry pros say that money is wasted if companies don&#8217;t change their internal cybersecurity culture.<\/p>\n\n\n\n<p>In September 2021, <a href=\"https:\/\/cybersecurityventures.com\/cybersecurity-spending-2021-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Ventures<\/a> anticipated in a report that the total global cybersecurity spending would exceed a staggering $1.75 trillion by 2025. The report projected another year of growth in investment for the sector, this time at 15%.<\/p>\n\n\n\n<p>Companies continue to invest in protecting their increasingly digitalized business assets. From <a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\">Internet of Things (IoT) devices<\/a> to the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cnap-platforms-the-next-evolution-of-cloud-security\/\">cloud<\/a> and hybrid work <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoints<\/a>, cybersecurity spending has also grown and shifted since COVID-19 changed the way the world works.<\/p>\n\n\n\n<p>\u201cIn 2004, the global cybersecurity market was worth just $3.5 billion,\u201d said Steve Morgan, founder of Cybersecurity Ventures. \u201cNow it\u2019s one of the largest and fastest-growing sectors in the information economy.\u201d<\/p>\n\n\n\n<p>Security executives have been adding features focusing on <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero-trust technology<\/a>, automation, responsive <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soar\/\">SOAR platforms<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-access-service-edge-sase\/\">secure access service edge (SASE)<\/a> models, and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/deception-technology\/\">deception technology<\/a>, among others.<\/p>\n\n\n\n<p>But that technology can at best limit damage if the human element doesn&#8217;t improve.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">Best Cybersecurity Awareness Training for Employees<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Key to Cyber Defense is Security Culture<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.pwc.com\/gx\/en\/issues\/cybersecurity\/global-digital-trust-insights.html\" target=\"_blank\" rel=\"noreferrer noopener\">PwC\u2019s 2022 Global Digital Trust Insights<\/a> report reveals that the spending trend for cybersecurity shows no signs of slowing down. In fact, 69% of surveyed organizations predict an increase in their security spending for 2022.<\/p>\n\n\n\n<p>But two veteran security experts, Peter Carpenter and Kai Roer, at <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">employee cybersecurity training<\/a> leader KnowBe4 say business leaders are overlooking a hacker\u2019s primary way into a system: vulnerable and exploitable human workers. They say that the best defense against cyber threats is in an organization\u2019s security culture.<\/p>\n\n\n\n<p>Their latest book, <a href=\"https:\/\/www.amazon.com\/dp\/1119875234\/\" target=\"_blank\" rel=\"noreferrer noopener sponsored nofollow\">The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer<\/a>, combines the insight of 35 years of security culture experience with data-driven insights from over 40,000 global organizations. They believe that promoting security awareness isn\u2019t enough; organizations must \u201cbake security into their culture.\u201d<\/p>\n\n\n\n<p>Carpenter spoke to <em>eSecurity Planet<\/em> about the importance of a strong security culture. Carpenter said organizations have become experts in technology-based security tactics such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">firewalls<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\">email gateways<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/antivirus-vs-epp-vs-edr\/\">endpoint protection<\/a>, and more. However, despite advanced defenses, organizations still face massive data breach problems.<\/p>\n\n\n\n<p>\u201cTechnology-based defenses have made it so difficult to hack into organizations that cybercriminals are increasingly turning to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">social engineering<\/a> (tricking humans) to accomplish their goals,\u201d Carpenter said.<\/p>\n\n\n\n<p>The industry has to direct as much effort into preparing human-based defenses as they have their technology defenses. Carpenter\u2019s recommendation is to put more intentional time, effort, and investment into building this layer of defense.<\/p>\n\n\n\n<p>\u201cThis means focusing on our cybersecurity ABCs: awareness, behavior, and culture,\u201d Carpenter said.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Improving Cybersecurity Communication and Metrics<\/h2>\n\n\n\n<p>Carpenter revealed a simple formula that describes the basic flow of executive communication and is designed to improve every cybersecurity message. It all starts with the information that creates a narrative or story. The story is vital for workers to identify with the issues. This way they will remember concepts better.<\/p>\n\n\n\n<p>\u201cThe person sharing information needs to find ways to connect the information to something bigger, broader, and more emotional than simple facts and figures,\u201d Carpenter said.<\/p>\n\n\n\n<p>The formula is:<\/p>\n\n\n\n<p>Information ? Story\/Narrative ? Transparency and Metrics ? Insight and Direction.<\/p>\n\n\n\n<p>In this formula, facts, figures, and supporting details should only be introduced in ways that support the broader story. It is also of vital importance, when introducing metrics, to interpret them transparently, clearly, and honestly. Metrics in cybersecurity and security culture can be victories, stumbling blocks, or challenges that move the story from one point of the plot to another. This is where insight and direction come into play.<\/p>\n\n\n\n<p>Measuring the security culture of an organization is increasingly important to gain a 360-vision into the company\u2019s strong and weak points. Carpenter\u2019s method to gauge a security culture goes well beyond others, measuring seven dimensions through technical and scientific approaches.<\/p>\n\n\n\n<p>\u201cWe break security culture into seven distinct, measurable dimensions. They are: attitudes, behaviors, cognition, communication, compliance, norms, and responsibilities,\u201d Carpenter explained.<\/p>\n\n\n\n<p>Each one of the dimensions can be measured by direct observation or by looking at evidence or data. One of the methods used is their proprietary Security Culture Survey. The survey includes a set of scientifically based questions that are designed to get to the heart of each of the seven dimensions.<\/p>\n\n\n\n<p>\u201cOne of the secrets to getting accurate answers in a survey like this is that we don\u2019t ask someone what their specific behavior or understanding is; instead, we ask them how they perceive other people or groups in their organization,\u201d Carpenter said, adding that such indirect questions invite greater honesty.<\/p>\n\n\n\n<p>The benefit of measuring the security culture of an organization in seven dimensions is it provides a much more detailed view of the issues that need to be addressed. Additionally, each dimension has a gravitational effect on the others. If an organization focuses on improving one or two dimensions, the others are expected to improve as well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting Your Data Through a Strong Security Culture<\/h2>\n\n\n\n<p>For years, technology-based tactics have been preached as the ultimate defense against cyberattacks. However, a <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon<\/a> report reveals that 82% of all breaches are linked to the human element. Organizations will continue to be exposed to attacks\u2014no matter how strong their cyber defenses are\u2014because sophisticated cyber criminals today are targeting the weakest links of a system: its workforce. These weak links can only be strengthened by strengthening the security culture.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">Top Cybersecurity Companies for 2022<\/a><\/p>\n\n\n\n<p><em>We may be compensated by affiliate links or sponsored partnerships that appear on this page, but any affiliation has no influence on our editorial content. For more info, visit our\u00a0<a href=\"https:\/\/technologyadvice.com\/terms-conditions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Terms of Use page<\/a>.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6db86871d4-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6db86871d4\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6db86871d4\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6db86871d4\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6db86871d4\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6db86871d4\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6db86871d4\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Companies spend a staggering amount of money on cybersecurity products to defend their networks and data from hackers, but a couple of industry pros say that money is wasted if companies don&#8217;t change their internal cybersecurity culture. In September 2021, Cybersecurity Ventures anticipated in a report that the total global cybersecurity spending would exceed a [&hellip;]<\/p>\n","protected":false},"author":293,"featured_media":22314,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[2369,3414,730,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[394,378,31789,68,392],"class_list":["post-22784","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cloud-security","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-email-security","b2b_product-endpoint-security","b2b_product-phishing-and-spear-phishing","b2b_product-staffing-training-and-certifications","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Training and Tech Aren&#039;t Enough; &#039;Culture Change&#039; Needed | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Employee training and cybersecurity defenses aren&#039;t enough, argues a new book; the entire organization needs to change.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Training and Tech Aren&#039;t Enough; &#039;Culture Change&#039; Needed | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Employee training and cybersecurity defenses aren&#039;t enough, argues a new book; the entire organization needs to change.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-08T14:38:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-08T14:54:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ray Fernandez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ray Fernandez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/\"},\"author\":{\"name\":\"Ray Fernandez\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422\"},\"headline\":\"Cybersecurity Training and Tech Aren&#8217;t Enough; &#8216;Culture Change&#8217; Needed\",\"datePublished\":\"2022-08-08T14:38:59+00:00\",\"dateModified\":\"2022-08-08T14:54:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/\"},\"wordCount\":966,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\",\"keywords\":[\"cloud security\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/\",\"name\":\"Cybersecurity Training and Tech Aren't Enough; 'Culture Change' Needed | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\",\"datePublished\":\"2022-08-08T14:38:59+00:00\",\"dateModified\":\"2022-08-08T14:54:14+00:00\",\"description\":\"Employee training and cybersecurity defenses aren't enough, argues a new book; the entire organization needs to change.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg\",\"width\":1088,\"height\":725,\"caption\":\"cloud security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Training and Tech Aren&#8217;t Enough; &#8216;Culture Change&#8217; Needed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422\",\"name\":\"Ray Fernandez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg\",\"caption\":\"Ray Fernandez\"},\"description\":\"Ray is a Content and Communication Specialist with more than 10 years of experience. He currently works as a Senior Copywriter for Wunderman Thompson and writes as a freelance technology journalist for several tech media. His work has been published in Microsoft, Slash Gear, Screen Rant, OOSKA News, Bloomberg, and Nature Conservancy, among other places.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/rfernandez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Training and Tech Aren't Enough; 'Culture Change' Needed | eSecurity Planet","description":"Employee training and cybersecurity defenses aren't enough, argues a new book; the entire organization needs to change.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Training and Tech Aren't Enough; 'Culture Change' Needed | eSecurity Planet","og_description":"Employee training and cybersecurity defenses aren't enough, argues a new book; the entire organization needs to change.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/","og_site_name":"eSecurity Planet","article_published_time":"2022-08-08T14:38:59+00:00","article_modified_time":"2022-08-08T14:54:14+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","type":"image\/jpeg"}],"author":"Ray Fernandez","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Ray Fernandez","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/"},"author":{"name":"Ray Fernandez","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422"},"headline":"Cybersecurity Training and Tech Aren&#8217;t Enough; &#8216;Culture Change&#8217; Needed","datePublished":"2022-08-08T14:38:59+00:00","dateModified":"2022-08-08T14:54:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/"},"wordCount":966,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","keywords":["cloud security","network security","security","Web security"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/","url":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/","name":"Cybersecurity Training and Tech Aren't Enough; 'Culture Change' Needed | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","datePublished":"2022-08-08T14:38:59+00:00","dateModified":"2022-08-08T14:54:14+00:00","description":"Employee training and cybersecurity defenses aren't enough, argues a new book; the entire organization needs to change.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Cloud-10-1088x725-1.jpeg","width":1088,"height":725,"caption":"cloud security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-culture-change-needed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Training and Tech Aren&#8217;t Enough; &#8216;Culture Change&#8217; Needed"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422","name":"Ray Fernandez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg","caption":"Ray Fernandez"},"description":"Ray is a Content and Communication Specialist with more than 10 years of experience. He currently works as a Senior Copywriter for Wunderman Thompson and writes as a freelance technology journalist for several tech media. His work has been published in Microsoft, Slash Gear, Screen Rant, OOSKA News, Bloomberg, and Nature Conservancy, among other places.","url":"https:\/\/www.esecurityplanet.com\/author\/rfernandez\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22784"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/293"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22784"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22784\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22314"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22784"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22784"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22784"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}