hbr.org
Open in
urlscan Pro
13.224.249.26
Public Scan
Submitted URL: http://bit.ly/43qb6Cz
Effective URL: https://hbr.org/2023/05/building-an-effective-cybersecurity-training-program
Submission: On May 31 via api from SG — Scanned from SG
Effective URL: https://hbr.org/2023/05/building-an-effective-cybersecurity-training-program
Submission: On May 31 via api from SG — Scanned from SG
Form analysis
1 forms found in the DOMGET /search
<form action="/search" method="get">
<div class="search-container ">
<input type="hidden" name="search_type" value="search-all">
<input class="pts pbm search-box-desktop" autocomplete="off" name="term" data-type="search-input" placeholder="Search hbr.org">
<input class="search-box-mobile" autocomplete="off" name="term" placeholder="Search hbr.org">
<button>
<svg aria-labelledby="title" viewBox="0 0 24 24">
<title>Search</title>
<g>
<path d="M24.06,23.22l-6.38-6.38a10.11,10.11,0,1,0-.85.85l6.37,6.37ZM1.2,10.13A8.93,8.93,0,1,1,10.13,19,8.94,8.94,0,0,1,1.2,10.13Z"></path>
</g>
</svg>
</button>
<a href="#" class="clear-search-box do-not-show" js-target="clear-search-box">CLEAR</a>
</div>
<div class="backdrop-white width-100pct zindex-highest hide top-header--search-suggest" data-purpose="search-auto-suggest">
<div class="font-gt-america">
<ul class="no-bullet ptm mbs" data-container="results">
<li class="pbm pts line-height-normal font-size-15 darker-medium-gray"></li>
<li class="pbm pts line-height-normal font-size-15 darker-medium-gray"></li>
<li class="pbm pts line-height-normal font-size-15 darker-medium-gray"></li>
<li class="pbm pts line-height-normal font-size-15 darker-medium-gray"></li>
<li class="pbm pts line-height-normal font-size-15 darker-medium-gray"></li>
<li class="pbl pts line-height-normal font-size-15 darker-medium-gray has-border-bottom"></li>
<li class="ptl font-size-xsmall text-gray-light font-bold">SUGGESTED TOPICS</li>
<li class="pbm pts line-height-normal font-size-15 darker-medium-gray no-bullet"></li>
<li class="pbm pts line-height-normal font-size-15 darker-medium-gray no-bullet"></li>
<li class="pbm pts line-height-normal font-size-15 darker-medium-gray no-bullet"></li>
</ul>
</div>
</div>
</form>
Text Content
Navigation Menu Cybersecurity and digital privacy | Building an Effective Cybersecurity Training Program Subscribe Sign In Account Menu Search Menu Close menu Search CLEAR * * * * * * * SUGGESTED TOPICS * * * Explore HBR * Diversity * Latest * The Magazine * Ascend * Podcasts * Video * Store * Webinars * Newsletters Popular Topics * Managing Yourself * Leadership * Strategy * Managing Teams * Gender * Innovation * Work-life Balance * All Topics For Subscribers * The Big Idea * Data & Visuals * Reading Lists * Case Selections * HBR Learning * Subscribe My Account * My Library * Topic Feeds * Orders * Account Settings * Email Preferences * Log Out * Sign In * * * * Subscribe Diversity Latest Podcasts Video The Magazine Ascend Store Webinars Newsletters All Topics The Big Idea Data & Visuals Reading Lists Case Selections HBR Learning My Library Account Settings Log Out Sign In YOUR CART Your Shopping Cart is empty. Visit Our Store Guest User Subscriber My Library Topic Feeds Orders Account Settings Email Preferences Log Out Reading List Reading Lists Diversity Latest Magazine Ascend Topics Podcasts Video Store The Big Idea Data & Visuals Case Selections HBR Learning You have 1 free articles left this month. You are reading your last free article for this month. Subscribe for unlimited access. Create an account to read 2 more. Cybersecurity and digital privacy BUILDING AN EFFECTIVE CYBERSECURITY TRAINING PROGRAM It’s critical to schedule time for simulated exercises and “scrimmages.” by * Dustin Updyke by * Dustin Updyke May 25, 2023 Anton Vierietin/Getty Images * Tweet * Post * Share * Annotate * Save * Get PDF * Buy Copies * Print Summary. Just as sports teams practice and train for upcoming games, your organization should be constantly and consistently practicing and training for cybersecurity events, building the muscles and skills they’ll need to respond when a cyber-attack inevitably happens....more Leer en español Ler em português * Tweet * Post * Share * Annotate * Save * Get PDF * Buy Copies * Print In the movie Any Given Sunday, Al Pacino gives a memorable speech to his losing football team. The speech highlights a critical lesson for teams: Trust in themselves and their teammates is critical for success. Just as elite sports teams depend on trust among players to perform at their best, cybersecurity relies on trust in computers, people, and organizations. We trust computers to perform reliably and consistently, just as we trust our teammates to excel in their organizational roles. As with sports, building trust within a cybersecurity team is essential for success. By emphasizing reliable and repeatable behavior, individuals and teams can develop the confidence needed to perform effectively in any situation they encounter. Our expertise at the CERT Division of Carnegie Mellon’s Software Engineering Institute is in Cyber Workforce Development. Our work helps organizations acquire the skills they need as a team to combat cyber threats. In many ways, business leaders function as coaches, helping employees develop crucial skills to make the organization successful. Just as sports teams must train and practice to build trust and cohesion, businesses must do so to ensure high productivity in an evolving workplace. We believe that individual training and team exercises can help create a clear business advantage. Through repetitive drills and practice, individual players can become subject matter experts on particular tools or techniques, while teams can collectively respond in the best possible manner to any scenario they’re likely to confront. Your organization should be constantly and consistently practicing and training for cybersecurity events, building the muscles and skills they’ll need to respond when an attack inevitably occurs. Insight Center Collection MANAGING CYBER RISK Exploring the challenges and the solutions. IDENTIFY KEY CYBERSECURITY SKILLS FOR YOUR ORGANIZATION Just as coaches defines the style of play for their teams, developing an effective cybersecurity training program requires identifying the specific skills and knowledge needed to confront cyber threats in a way that aligns with the organization’s goals and objectives. There are several ways to do so. * Conduct a skills-gap analysis by comparing your workforce’s skills to those needed to confront cyber threats. The National Institute of Standards and Technology’s (NIST’s) NICE Cybersecurity Workforce Framework is a helpful resource for identifying the skills and knowledge needed for an effective cybersecurity team. Reviewing your security policies, procedures, and protocols is another good starting point. * Review industry standards with organizations such as NIST and CISA to ensure that your organization is aligned with the best practices in your industry, and incorporate those practices into your cybersecurity training program. For example, there are special controls for organizations handling certain kinds of data, such as health care data and personal identifiable information, so certain industries need to adhere to regulations such as Personal Identifiable Information (PII) or the Health Insurance Portability and Accountability Act (HIPPA). * Engage with departments and leaders within your organization to understand their specific cybersecurity concerns and challenges. For example, a global sales force must consider its use of data in light of legislation such as the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Speaking to each department leader will provide insight into the specific training needs at all organizational levels. DEVELOP A PERFORMANCE IMPROVEMENT PLAN TO MEET YOUR STRATEGY Once you have identified the skills and knowledge needed to combat cyber threats, the next step is to develop a comprehensive training and exercise program to improve them. Here are steps that can be taken to develop an effective program: * Design simulations to cover a range of scenarios, including phishing, ransomware, and social-engineering attacks. * Like blocking and tackling practice in football, begin with simple scenarios that focus on core concepts, and gradually increase the complexity of the scenarios. Focus on building skills and confidence before tackling more-difficult threats. * Focus simulations on real-world scenarios that teammates are likely to encounter in their daily work. This helps to build confidence about responding to specific threats and ensures that individuals are prepared to act accordingly. After each exercise, provide feedback and discuss what worked well and what could be improved. Helping teammates learn from their mistakes and improve their responses is one of the most valuable takeaways from any training event. EXECUTE AN ONGOING CAMPAIGN OF EFFECTIVE TRAINING AND EXERCISES Great athletes train regularly. Businesses must likewise prioritize ongoing skills development to remain competitive as technologies and cyber threats change rapidly. Here are some key considerations. * Training and exercise budgets should not be sacrificed in cost-cutting measures. Investing in employee development delivers enormous value, and no company can afford to underestimate the long-term financial costs of a cyber breach. * Planning and scheduling training and exercises is crucial; it allows teams to assess their performance. By regularly identifying areas for improvement, teams can plan and execute more effectively in the future. Additionally, taking the time to review and evaluate past performance can lead to more-informed decisions about which scenarios to exercise and which tools to use in future training sessions. * Team exercises should be done regularly and with the same tools, techniques, and procedures used in daily operations to build useful muscle memory in real-world situations. In his speech, Pacino says, “You find out life’s this game of inches; so is football.” So is cybersecurity. Every inch of progress counts. Today’s threats are more sophisticated and widespread than previous ones, and it’s not a question of if an organization will face a cyber-attack but when. That’s why it’s crucial for business leaders to prioritize cybersecurity training and exercise as a key component of their overall security stance. By identifying the specific skills and knowledge needed to effectively combat threats, planning and scheduling training and exercises, and engaging with key stakeholders to understand the specific training needs of their organization, businesses can build a stronger, more confident team. Investing in employee development through formal training programs and ongoing exercises can deliver enormous value and help businesses stay ahead of adversaries in the ever-changing cybersecurity landscape. New! HBR Learning Digital Intelligence Course Accelerate your career with Harvard ManageMentor®. HBR Learning’s online leadership training helps you hone your skills with courses like Digital Intelligence . Earn badges to share on LinkedIn and your resume. Access more than 40 courses trusted by Fortune 500 companies. Excel in a world that's being continually transformed by technology. Start Course Learn More & See All Courses READERS ALSO VIEWED THESE ITEMS * YOU AT WORK: DOING YOUR BEST WORK REMOTELY Tool Buy Now * HBR TOOLS: GOAL SETTING Tool Buy Now Read more on Cybersecurity and digital privacy or related topics Risk management and Developing employees * DU Dustin Updyke is a Senior Cybersecurity Researcher at Carnegie Mellon’s Software Engineering Institute’s CERT division. He develops realistic training and exercise programs for organizations to improve their cybersecurity readiness. * Tweet * Post * Share * Annotate * Save * Get PDF * Buy Copies * Print New! HBR Learning Digital Intelligence Course Accelerate your career with Harvard ManageMentor®. HBR Learning’s online leadership training helps you hone your skills with courses like Digital Intelligence . Earn badges to share on LinkedIn and your resume. Access more than 40 courses trusted by Fortune 500 companies. Excel in a world that's being continually transformed by technology. Start Course Learn More & See All Courses Read more on Cybersecurity and digital privacy or related topics Risk management and Developing employees RECOMMENDED FOR YOU WHERE TO FOCUS YOUR COMPANY'S LIMITED CYBERSECURITY BUDGET THE DIGITAL WORLD IS CHANGING RAPIDLY. YOUR CYBERSECURITY NEEDS TO KEEP UP. TO REGULATE BIG CORPORATIONS, UNDERSTAND HOW THEY GOT THAT WAY PODCAST HOW GENERATIVE AI CHANGES STRATEGY PARTNER CENTER Start my subscription! EXPLORE HBR * The Latest * All Topics * Magazine Archive * The Big Idea * Reading Lists * Case Selections * Video * Podcasts * Webinars * Data & Visuals * My Library * Newsletters * HBR Press * HBR Ascend HBR STORE * Article Reprints * Books * Cases * Collections * Magazine Issues * HBR Guide Series * HBR 20-Minute Managers * HBR Emotional Intelligence Series * HBR Must Reads * Tools ABOUT HBR * Contact Us * Advertise with Us * Information for Booksellers/Retailers * Masthead * Global Editions * Media Inquiries * Guidelines for Authors * HBR Analytic Services * Copyright Permissions MANAGE MY ACCOUNT * My Library * Topic Feeds * Orders * Account Settings * Email Preferences * Account FAQ * Help Center * Contact Customer Service FOLLOW HBR * Facebook * Twitter * LinkedIn * Instagram * Your Newsreader * About Us * Careers * Privacy Policy * Cookie Policy * Copyright Information * Trademark Policy Harvard Business Publishing: * Higher Education * Corporate Learning * Harvard Business Review * Harvard Business School Copyright © 2023 Harvard Business School Publishing. All rights reserved. Harvard Business Publishing is an affiliate of Harvard Business School.