• Advertise
  • Contact Us
  • About Us
  • Supplier Directory
  • Login
  • Subscribe
  • Logout
  • My Profile
  • LOGISTICS
    • Air Cargo
    • All Logistics
    • Express/Small Shipments
    • Facility Location Planning
    • Freight Forwarding/Customs Brokerage
    • Global Gateways
    • Global Logistics
    • Last Mile Delivery
    • Logistics Outsourcing
    • LTL/Truckload Services
    • Ocean Transportation
    • Rail & Intermodal
    • Reverse Logistics
    • Service Parts Management
    • Transportation & Distribution
  • TECHNOLOGY
    • All Technology
    • Artificial Intelligence
    • Cloud & On-Demand Systems
    • Data Management
    • ERP & Enterprise Systems
    • Forecasting & Demand Planning
    • Global Trade Management
    • Inventory Planning/ Optimization
    • Product Lifecycle Management
    • Sales & Operations Planning
    • SC Finance & Revenue Management
    • SC Planning & Optimization
    • Sourcing/Procurement/SRM
    • Supply Chain Visibility
    • Transportation Management
  • GENERAL SCM
    • Business Strategy Alignment
    • Education & Professional Development
    • Global Supply Chain Management
    • Global Trade & Economics
    • HR & Labor Management
    • Quality & Metrics
    • Regulation & Compliance
    • SC Security & Risk Mgmt
    • Sustainability & Corporate Social Responsibility
  • WAREHOUSING
    • All Warehouse Services
    • Conveyors & Sortation
    • Lift Trucks & AGVs
    • Order Fulfillment
    • Packaging
    • RFID, Barcode, Mobility & Voice
    • Robotics
    • Warehouse Management Systems
  • INDUSTRIES
    • Aerospace & Defense
    • Apparel
    • Automotive
    • Chemicals & Energy
    • Consumer Packaged Goods
    • E-Commerce/Omni-Channel
    • Food & Beverage
    • Healthcare
    • High-Tech/Electronics
    • Industrial Manufacturing
    • Pharmaceutical/Biotech
    • Retail
  • REGIONS
    • Asia Pacific
    • Canada
    • China
    • Europe
    • Latin America
    • Middle East/Africa
    • North America
  • BLOG
  • PODCASTS
  • VIDEOS
  • WHITEPAPERS
Home » Blogs » Think Tank » The Critical Human Element in Cybersecurity Strategy

Think Tank
Think Tank RSS FeedRSS

SC Security & Risk Mgmt

The Critical Human Element in Cybersecurity Strategy

May 21, 2019
Eduardo Campos, SCB Contributor

The complexity of cybersecurity has grown exponentially as the number of interconnectable digital devices has risen. Because interdependent computer infrastructures support almost every organization today, protecting digital data has become crucial.

Thirty-seven percent of CEOs surveyed say significant risk lies within the extended business and key enterprise partners. And preventive measures alone aren’t sufficient anymore. The new environment demands vigilant monitoring and creative innovation. It requires all-stakeholder participation.

The human element is key. How well you vet, train and equip employees will make or break your cybersecurity system, your reputation with customers and partners, and perhaps even your business itself.

While 89 percent of the C-suite believes employees will responsibly safeguard information, 22 percent say their employees are unaware of offsite data policies. Devices most at risk are company cell phones (50 percent), company laptops (45 percent), and USB storage devices (41 percent).

In its report on 2018 Views From the C-Suite, A.T. Kearney found that 85 percent of companies experienced security breaches in the last year. Only 40 percent designed and implemented cybersecurity strategies in response.

In addition to focusing on employees, it’s important to bring the entire supply chain on board. Corporate leaders cite four top tactics to ensure viable cybersecurity:

  • Comprehensive information security measures,
  • Hiring highly skilled IT professionals,
  • Cybersecurity behavior analytics, and
  • Employee training programs.

The new paradigm for cybersecurity is involve, convince, educate, convert, and reward. End users are often unfairly stereotyped as uncooperative, control averse, and unwilling to change behavior. At the same time, they are the weakest link in cybersecurity. Even deep technical experts can be as vulnerable as less-trained and prepared regular users.

A real-life example: Years ago, as the CISO of a wireless operator in South America, I was tasked with reducing the rising number of data leaks. A senior executive recommended heavy-handed enforcement of security policies. End-users, he said, had been noncommittal about security, and unresponsive to campaigns to improve internal controls.

I decided to take a contrarian stance. Experience had convinced me that to craft viable solutions, we had to engage all stakeholders — each individual impacted by policies, technologies, and decisions — not just those sitting in boardrooms.

Instead of punishing end-users and focusing solely on enforcing controls, we convened a series of meetings with employees to share best practices, determine their pain points, and give step-by-step guidance on how to properly employ security tools.

It turned out that many security policies were outdated due to a series of mergers. Moreover, users were dealing with a cumbersome 30-day password expiration practice by writing their access codes on Post-It notes. Ill-intentioned people thereby had been gaining unauthorized access. 

Based on feedback from employees, we updated policies and rewrote procedures and standards so that they were relevant and clear. Scorecards were used to track progress, and a reward system instituted. Data leaks dropped, and a feedback loop was established between users and the security department to keep the program relevant. End users were brought into the process, with educational loops to spot potential problems.

The experience reconfirmed that a design process that is stakeholder- and human-centered, relying on involving, educating, converting, and rewarding instead of punishing, produces the most comprehensive and sustainable cybersecurity solutions.

J. Eduardo Campos heads the consulting firm of Embedded-Knowledge Inc.

RELATED CONTENT

RELATED VIDEOS

Get regular updates!
Subscribe to our newsletter

Enjoy curated articles directly to your inbox.

Popular Stories

  • 1209_themarketforlogistics

    How an Investment Banker Views the Market for Logistics and Supply-Chain Tech

    Technology
  • 1115_chinarareearthminerals

    Podcast | Can China’s Monopoly on Rare Earth Minerals Be Broken?

    Sourcing/Procurement/SRM
  • 1206_howglobaltradersplan

    Podcast | How Global Traders Can ‘Plan for Crazy’

    Global Trade Management
  • 1210_cultureoffeargripsups

    ‘Culture of Fear’ Grips UPS: Workers Say Injuries Are Underreported

    Logistics
  • 1125_themodernfactory

    The ‘Modern’ Factory Remains a Dream for Many Manufacturers

    Technology

Digital Edition

55746

Subscribe today and receive the latest issue

Start Your Subscription

Case Studies

  • Energy Storage Company Saves $50 Million With Demand Planning

  • Locus Robotics Helps E-Retailer Deliver During Holiday Peak

  • Manufacturer Slashes Shipping Costs With AI Packaging Solution

  • Apparel Retailer Saves $45 Million With Reverse Logistics Solution

  • QuestaWeb Configures Fragrance Company’s Complex Procedures Into Its Advanced FTZ Software

Visit Our Sponsors

  • More From SCB
    • Featured Content
    • Video Library
    • Think Tank Blog
    • SupplyChainBrain Podcast
    • Whitepapers
    • Webinars
  • The Magazine
    • Digital Issue
    • Subscribe
    • Manage Your Subscription
    • 100 Great Partners Form
  • Resources
    • Newsletters
    • Events Calendar
    • SCB's Great Supply Chain Partners
    • Supplier Directory
    • Case Study Showcase
    • Supply Chain Innovation Awards
  • SCB Corporate
    • Advertise on SCB.COM
    • About Us
    • Privacy Policy
    • Contact Us

All content copyright © 2016 - 2018 Keller International Publishing Corp All rights reserved. No reproduction, transmission or display is permitted without the written permissions of Keller International Publishing Corp

Design, CMS, Hosting & Web Development :: ePublishing