Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Strategies

Cybersecurity awareness metrics: What to measure and how

  • Lance Spitzner
  • April 28, 2022
Courtesy: Brett Sayles
Total
0
Shares
0
0
0
0

Defining Awareness

First, what is a cybersecurity awareness program? It is a structured approach to managing an organization’s human risk. You can gauge and measure the maturity of an awareness program by using the Security Awareness Maturity Model. Mature awareness programs manage human risk by answering three key questions in this order.

  1. Human risks: You cannot manage all human risk. As such you must assess, identify and prioritize your organization’s top human risks. This should be a data-driven process in partnership with key groups within security such as the incident response, security operations, cyber threat intelligence or risk management teams.
  2. Behaviors: We need to prioritize behaviors, the fewer behaviors we focus on the more likely people will change those behaviors, and at a lower cost to your organization.
  3. Change: How do we motivate and enable people to change those behaviors? One of my favorite behavior change models is the BJ Fogg Behavior model.

Over time, technology, threats and business requirements change. As such, an organization’s human risks, in coordination with its security team, should be reviewed and updated annually.

What to measure

Once you look at cybersecurity awareness and managing human risk through this lens it becomes easier to identify what metrics you should be focusing on. Measure what you care about. Your top human risks and the behaviors that most effectively manage those risks. I’ve been hesitant to suggest to organizations exactly what risks and behaviors they should focus on, as risks are often unique to each organization.

The concern is that too many organizations simply don’t have the data/resources to identify their top human risks, as such they don’t know where to start. I’m seeing in many cases it doesn’t matter as almost all the data resources I have been researching such as the annual Verizon DBIR Report, CISA Essentials, and this year’s NCSA/CybSafe Report point to the same finding, most organizations share the same top three human risks – phishing, passwords and updating. As such, I’m going to define these risks, the behaviors that manage these risks, and how to measure those behaviors.

One thing you should decide beforehand is if you want to measure and track behavior by individual or by role/department/business unit. If tracking at the individual level be sure you are taking measures to protect the information and privacy of every individual. Depending on the size of your organization and the amount of data you are collecting, you may also need to partner with someone in your organization who specializes in data analytics/business intelligence to help you normalize / analyze findings.

Phishing

Phishing for three years now has been the number one driver of breaches at a global level (2021 Verizon DBIR Report – p15). No matter the number of technical controls we throw at this problem, cyberattackers simply adapt and bypass them. As such we need to teach people how to identify and report these attacks. So, what do we measure? After people have been trained, measure their susceptibility to phishing attacks. Of our top human risks this one is the simplest to measure and why it is such a common metric.

  1. Click rates: Measure the overall click rate of your organization. When you first roll out phishing training this number will drop fast, perhaps from a 20% click rate to less than 2% click rate for more basic phishing templates. Once you are at around 2-3% click rate you may need to start using more difficult / targeted phishing templates. Most phishing vendors support a tiered approach enabling you to use different categories of phishing difficulty. Remember, your goal is not a 0% click rate, as once you hit 2% or less click rate with basic, beginner level phishing lures, your first-time clickers are primarily new hires, and this is a training event for them.
  2. Repeat click rates: For many organizations this is their most valuable phishing metric as this measures your repeat clickers – the people who are not changing behavior and represent a far greater risk to your organization.
  3. Reporting rates: If you are training and enabling your workforce to report suspected phishing emails, this helps develop your Human Sensor network. For this, it’s not so much the number of people that report that is key, but how fast your security team gets the first reports. The sooner people report a suspected incident, the faster the security team can respond and manage potential incidents. People who report represent the most resilient of your workforce, as they are not only identifying attacks, but enabling the security team to respond and secure the entire organization more proactively.

Passwords

For several years now passwords continue to also be a primary driver of breaches. Cyber attackers have changed their TTPs (Tactics, Techniques and Procedures), moving from gaining access or lateral movement by continually hacking into and infecting systems to using legitimate accounts to more easily pivot and traverse through a victim organization while avoiding detection. As such, both strong passwords and the secure use of those passwords have become key.

  1. Strong passwords: Ensure people are adapting and using strong passwords. Length is the new entropy; passphrases are now highly encouraged. This can be tested by running brute force / cracking solutions against password databases.
  2. Password manager adoption: We in many ways have made passwords difficult, confusing, and even intimidating for people with various rules and policies. As such, organizations are starting to adopt password managers to make passwords simpler for their workforce. If your organization is/has deployed password managers, measure the password manager adoption, and use rate. What percentage of your workforce is using password managers? You should be able to pull this data from which ever department is deploying/managing password managers.
  3. Multi-factor authentication adoption: Like password managers, if you have rolled out MFA attempt to identify how much of your workforce has adopted it. MFA is especially important for critical or sensitive accounts. Once again, this information should be accessible from whomever is responsible for deploying the MFA solution, responsible for the logging of authentication systems, leads Identity and Access Management, or part of Operations or Security.
  4. Password reuse/password sharing: Are people reusing the same password across different work accounts (or even worse reusing work and personal accounts)? Or are people sharing their passwords with fellow co-workers? While this behavior sounds difficult to measure you can effectively measure both behaviors with a security behavior/culture survey. The key is using a scientific approach to how you both write and measure the survey results. For example, one way to measure password sharing would be to ask your workforce

Updating

Of the three human risks we cover, this one may not apply. We want to ensure the computers and devices people are using, and the applications and apps installed on them, are updated and current. For some organizations this is not an issue as people do not have admin rights or control over work issued devices, instead their devices are actively patched by IT. However, for many organizations this is an issue as so many people are now working remotely from home and are often using personal devices or home networks for work access. There are several ways to measure this.

  1. For any devices your organization issues, your operations, IT, or perhaps even vulnerability management teams should be able to remotely track the update status of those devices. In some cases, solutions such as MDM (mobile device management) may be installed on personal devices which can also track updating status.
  2. Your learning management system (LMS) or phishing platform may be able to automatically track the device, operating system and browser version of any device that connects to them.
  3. Assess and survey your workforce to determine if they understand the importance of updating and are actively updating their personal devices, to include enabling automatic updating.

Strategic metrics

Once you start collecting metrics on peoples’ behaviors, you can use this data to better understand and manage your overall human risk. Three key uses include:

  • Identify what regions, departments, or business units have the fewest secure behaviors and represent the greatest risk to the organization.
  • Identify what regions, departments, or business units are most successfully changing behavior…and why. Use lessons learned to apply to your less secure departments or regions.
  • When an incident does happen, understand whether that individual was trained. Was the department they were in one of the most secure or least secure departments or business units?

You can also demonstrate the strategic value of your program to leadership by aligning behavior with what leadership really cares about.

  1. Number of incidents: As people change behavior, the overall number of incidents should go down, such as number of infected devices due to people falling victim to phishing attacks or account take-overs due to bad passwords.
  2. Attacker dwell time: The time it takes to detect a successful cyber attacker in your organization should decrease as you develop a Human Sensor network. The less time an attacker is on your network (dwell time) the less damage they can do.
  3. Cost of incidents: By reducing the number of incidents, and the dwell time of successful attackers, we can reduce overall costs.
  4. Policy and audit violations: As behaviors change we should see a reduction in the number (or severity) of policy and audit violations.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Lance Spitzner

Lance Spitzner has over 20 years of security experience in cyber threat research, security architecture and awareness training and is a SANS senior instructor.

Related Topics
  • CFE Content
  • Featured
Previous Article
Richard Robinson, CEO of Cynalytica Inc.
  • IT/OT

Using Machine Learning to Protect OT: Expert Interview Series, Richard Robinson, Cynalytica

  • Gary Cohen
  • April 27, 2022
Read More
Next Article
  • Threats & Vulnerabilities

Throwback Attack: Ethical hackers take down a Google office building

  • Gary Cohen
  • April 28, 2022
Read More
You May Also Like
SwRI used programmable logic controllers (PLCs) connected to input/output (I/O) modules to a test network. Algorithms scanned the network for cyberattacks through data packets transferred over the Modbus/TCP protocol. Courtesy: Southwest Research Institute (SwRI)
Read More

IDS developed for industrial control systems

Six key constituents can drive targeted solutions to the ICS environment: 1. Audit and application of security policies and procedures; 2. Access controls with secure data transfers; 3. Threat detection of abnormal and malicious activity at all levels of the ICS infrastructure; 4. Risk management and mitigation; 5. Process sensors security and authentication; and 6. Resolution of key security problems that requires intrinsic relationship with vendors. Courtesy: MG Strategy+, Control Engineering
Read More

Six critical components of integrated cybersecurity for industrial control systems (ICS)

Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies
Read More

Securing the ICS: Measure solution effectiveness, maturity

elliTek's IIoTA MES Gateway Appliance. Courtesy: elliTek
Read More

Cybersecurity and IT/OT convergence: How important is your data?

Courtesy: Brett Sayles
Read More

NERC CIP checklist for identification and categorization of BES cyber assets

Read More

How serial-to-Ethernet converters help attackers breach cyber-physical assets

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More

An overlooked ICS cybersecurity gap for companies

Image courtesy: Brett Sayles
Read More

Improve legacy critical infrastructure protection

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT