Culture

How does your team enable cross-functional security conversations?

What strategies are you using to get your organization talking more about security?

Businesses are paying closer attention to security issues, and there is increased media coverage of security-related events and losses. However, some security teams still operate in isolation and struggle to work effectively with other functions to manage, mitigate and respond to risks.

There are several tactics that teams can employ to work and communicate better cross-functionally.

Cross Functional Security Conversations.jpg

Does security risk management in your organization suffer from a silo problem?

The Enterprise Security Risk Management approach is built on the foundation of taking a holistic view of organizations and the varied risks they face. This requires cross-functional communication and collaboration to adequately assess, mitigate and manage security risks. 

 

Unfortunately, many people still see their organization as lacking sufficient knowledge sharing and collaboration between different departments. This has significant consequences to business operations, with silos leading to communication and productivity problems and failures. 

 

The problem is particularly pronounced for security risks, with the increasing complexity of threats organizations are facing, and the impact of those threats growing exponentially due to our interconnected world.

 

How is your organization reducing functional silos and increasing collaboration?

Security Risk Management Silo Problem

How do you begin to understand your security risk culture?

As the old adage goes, “culture eats strategy for breakfast”. A great security risk management strategy will go nowhere if your organization doesn’t have the right culture to implement it.

So how do you go about understanding what your culture is, and what the gaps are between this and where you want to be? Chances are, you’ve already got the data you need to back up what you’ve seen from your experiences and conversations. You can use this data to highlight behaviors, outcomes, trends and hotspots in your organization’s security risk management.

 How have you addressed understanding and changing security culture in your organization?

culture data.png