Building a Cybersecurity Culture That Works
Practical perspective from an IT leader working across operations, security, automation, and change.
10 minute read with practical, decision-oriented guidance.
Leaders and operators looking for concise, actionable takeaways.
Every IT leader I have worked with has the same complaint: "We run the training, people pass the quiz, and then click the phishing link the following week."
Building a cybersecurity culture is not about compliance checkboxes or annual e-learning modules. It is about fundamentally shifting how your organisation thinks about risk. The difference between organisations that suffer catastrophic breaches and those that catch threats early almost always comes down to culture, not technology.
This guide shares practical, battle-tested strategies for building a cybersecurity culture that changes behaviour, not just awareness scores.
Why Most Security Awareness Programmes Fail
Traditional security awareness training follows a predictable pattern. Once a year, employees sit through a presentation or click through an online module. They learn about password hygiene, phishing red flags, and data classification. They pass a quiz. Then nothing changes.
The problem is not the content. It is the approach. Annual training treats cybersecurity as an event rather than a habit. Behavioural science tells us that one-off interventions rarely produce lasting change. You would not expect a single gym session to make someone fit, yet we expect a single training session to make someone security-conscious.
Research from the SANS Institute consistently shows that organisations with mature security cultures experience 70% fewer security incidents than those relying on compliance-driven training alone. The difference is not budget or tools. It is sustained, embedded, culturally reinforced behaviour.
The Three Failure Modes
From my experience leading IT teams, security awareness programmes typically fail in one of three ways:
- The compliance trap - Training exists solely to satisfy audit requirements. Nobody measures whether behaviour actually changes.
- The fear approach - Security teams use scare tactics and punishment. Employees learn to hide mistakes instead of reporting them.
- The technology fallacy - Leadership assumes tools will compensate for human error. They invest in email filtering but neglect the human layer.
Each of these creates a false sense of security. The organisation believes it has addressed the human element when, in reality, it has simply documented that it tried.
What a Strong Cybersecurity Culture Looks Like
A genuine cybersecurity culture has observable characteristics. You can walk into an organisation and sense it within days.
People report incidents without fear. In a healthy security culture, employees flag suspicious emails, admit to clicking dodgy links, and ask questions about unfamiliar processes. There is no shame in making a mistake. The shame is in hiding one.
Security is part of business decisions. When launching a new product or onboarding a new vendor, security considerations are raised naturally, not bolted on as an afterthought. Project managers ask about data flows. Marketing teams question third-party tracking scripts.
Language matters. Security teams talk about risk in business terms, not technical jargon. They say "this could cost us three days of revenue" rather than "the CVE has a CVSS score of 9.1." Communication bridges the gap between technical reality and business impact.
Leaders model the behaviour. When the CEO uses multi-factor authentication, when directors challenge suspicious requests, when the board asks informed questions about cyber risk, it signals that security matters at every level.
A Practical Framework for Culture Change
Building cybersecurity culture is a long game. You will not transform an organisation in a quarter. But you can make measurable progress with a structured approach. Here is the framework I have used across multiple organisations.
1. Measure Your Starting Point
Before changing anything, understand where you are. Run an anonymous survey measuring:
- How comfortable employees feel reporting security incidents
- Whether they can identify common threats (phishing, social engineering, suspicious USB devices)
- Their perception of the security team (helpful partner or bureaucratic blocker?)
- How often they encounter security guidance in their daily work
This baseline gives you something concrete to improve against. Without it, you are guessing.
2. Make Reporting Safe and Simple
The single most impactful change you can make is removing barriers to incident reporting. If someone clicks a phishing link and is afraid to tell anyone, you have lost your most valuable detection mechanism: the human sensor.
Implement a one-click reporting button in your email client. Create a dedicated Slack or Teams channel for security questions. And critically, publicly thank people who report incidents. "Sarah in finance spotted a sophisticated phishing attempt this morning and reported it within minutes. That is exactly what we need" goes further than any training module.
I have seen organisations reduce their average incident detection time by over 60% simply by making reporting psychologically safe.
3. Embed Security Into Daily Workflows
Security awareness should not be a separate activity. It should be woven into existing processes:
- Onboarding: New starters get a 30-minute security orientation on day one, covering real examples of attacks that targeted the organisation (anonymised if needed).
- Team meetings: A two-minute "security moment" at the start of monthly team meetings. Share a recent phishing attempt, a news story about a breach, or a quick tip.
- Project kickoffs: Include a security checklist in project templates. Not a 50-page risk assessment, but five practical questions about data handling and access control.
- Performance reviews: Include security awareness as a competency. Not as a stick, but as recognition that security-conscious behaviour is valued.
The goal is frequency and relevance. Short, regular touchpoints beat long, infrequent sessions every time.
4. Use Phishing Simulations Intelligently
Phishing simulations are valuable when done correctly and counterproductive when done badly.
Do: Run monthly simulations with increasing sophistication. Track improvement over time. Use failures as coaching opportunities, not punishment. Share aggregate results transparently.
Do not: Name and shame individuals who fail. Use simulations that are deliberately misleading to the point of being unfair. Run simulations without follow-up education for those who click.
The best approach I have seen combines simulation with immediate, constructive feedback. When someone clicks a simulated phish, they see a brief, friendly explanation of what they missed and one specific thing to look for next time. No alarm bells. No disciplinary notes. Just learning.
Over 12 months of well-run simulations, most organisations see click rates drop from 25-30% to under 5%.
5. Empower Security Champions
You cannot scale culture change through the security team alone. You need allies embedded across the business.
Identify volunteers from each department who are interested in security. Give them additional training, access to threat intelligence briefings, and a direct line to the security team. These security champions become the local experts who answer questions, spot risks, and reinforce good practice within their teams.
The champion model works because people are more likely to listen to a trusted colleague than to someone from a central IT function they rarely interact with. A security champion in the sales team who says "watch out for this invoice scam doing the rounds" carries more weight than an email from IT.
6. Communicate Like a Human
The fastest way to kill a cybersecurity culture is to communicate like a compliance department. Nobody reads 2,000-word security policies. Nobody remembers 47 rules for password creation.
Instead:
- Tell stories. "Last month, a company similar to ours lost two million pounds because someone approved a payment based on a spoofed email. Here is how to spot one."
- Keep it short. Weekly security tips should be three sentences maximum.
- Use humour. A funny poster in the kitchen about password reuse will do more than a formal policy document.
- Be visual. Infographics, short videos, and memes are more shareable and memorable than text-heavy guidance.
The UK's National Cyber Security Centre produces excellent, plain-English guidance that serves as a model for how to communicate security concepts without drowning people in jargon.
Measuring Cultural Change
You cannot manage what you do not measure. Track these indicators quarterly:
- Phishing simulation click rates - Your most direct behavioural measure
- Incident reporting volume - An increase is good (it means people are reporting more, not that more incidents are happening)
- Time to report - How quickly do employees flag suspicious activity?
- Survey scores - Repeat your baseline survey annually to track perception changes
- Shadow IT discovery rate - Are employees proactively disclosing unapproved tools?
Present these metrics to the board alongside traditional security metrics. Executives respond well to trend lines showing cultural improvement. It demonstrates that the organisation is building resilience, not just buying tools.
For a deeper look at how the CISO role is evolving to encompass this kind of strategic work, the shift from technical guardian to business partner is directly relevant here.
The Role of Leadership
Culture flows downhill. If the executive team treats security as someone else's problem, the rest of the organisation will follow suit.
IT leaders must secure visible executive sponsorship for cybersecurity culture initiatives. This means:
- Board-level reporting on security culture metrics alongside financial and operational metrics
- Executive participation in security exercises and tabletop scenarios
- Budget allocation that reflects the priority placed on human factors, not just technology
- Consistent messaging that security is everyone's responsibility, backed by action
When I have seen cybersecurity culture programmes fail, the root cause is almost always lack of sustained leadership commitment. The initial enthusiasm fades, the budget gets redirected, and the programme quietly dies.
The same principle applies to Zero Trust Architecture, where success depends on organisational buy-in rather than technology procurement.
Quick Wins to Start This Week
If you are reading this and thinking "where do I even begin?", here are five actions you can take immediately:
- Set up a one-click phishing report button in your email client. Most platforms (Outlook, Gmail) support this natively or through add-ons.
- Run a baseline phishing simulation to understand your current click rate. Services like KnowBe4, Proofpoint, or even open-source tools like GoPhish make this straightforward.
- Create a security tips channel in your messaging platform. Post one tip per week. Keep it casual.
- Add a security moment to your next team meeting. Share a recent real-world breach story and ask "could this happen to us?"
- Thank someone publicly for reporting a security concern. Set the tone that reporting is valued.
None of these require budget approval. None require new technology. They require intent, consistency, and a genuine belief that your people are your strongest defence, not your weakest link.
The Long Game
Building a cybersecurity culture is not a project with a start and end date. It is an ongoing commitment that evolves as threats change, as your organisation grows, and as new technologies create new risks.
The organisations that get this right treat cybersecurity culture as a core business capability, not an IT initiative. They invest in it continuously, measure it rigorously, and celebrate it visibly.
Your security tools will stop a significant proportion of threats. But the threats that get through, the sophisticated social engineering attacks, the carefully crafted phishing campaigns, the insider risks, these are the ones where culture is your last and best line of defence.
Start small. Be consistent. Measure everything. And remember: the goal is not perfect security. The goal is an organisation where everyone understands their role in protecting it.
That is a cybersecurity culture that actually works.
Share this post
About the author
Daniel J Glover
IT Leader with experience spanning IT management, compliance, development, automation, AI, and project management. I write about technology, leadership, and building better systems.
Continue exploring
Keep building context around this topic
Jump to closely related posts and topic hubs to deepen understanding and discover connected ideas faster.
Explore topic hubs
Related article
Compliance Automation Strategy
How IT leaders can automate compliance monitoring to reduce audit burden, cut costs and maintain continuous regulatory readiness.
Related article
DLP Strategy for IT Leaders
A practical guide to building a data loss prevention strategy that protects sensitive information without crippling productivity.
Related article
API Security Best Practices
A practical guide to API security for IT leaders covering authentication, authorisation, rate limiting and the OWASP API Top 10.
Related article
Cyber Insurance for IT Leaders
A practical guide to cyber insurance for IT leaders - what policies cover, how to reduce premiums, and why it matters for your security strategy.
Let's Work Together
Need expert IT consulting? Let's discuss how I can help your organisation.
Get in Touch