By Robert Siciliano, ProtectNowLLC.com, CSP, CSI
Within the world of Governance, Risk, and Compliance (GRC), security awareness training is often relegated to a perfunctory, annual exercise—a compliance checklist item that senior leadership signs off on and promptly forgets. This approach is not just ineffective; it is negligent. If an organization cannot effectively manage its largest risk vector—its people—then its entire GRC framework is fundamentally flawed.
The GRC Paradox: Why Compliance-Based Training Fails
The root of the problem lies in the motivation behind most current training programs. They are driven by compliance—the need to demonstrate to an auditor or regulator that "we trained our people." This approach, however, completely misses the point of risk management.
Most contemporary training is insufficient because it treats employees as passive recipients of dry, technical information. The training is often too long, too infrequent, and filled with IT jargon that disconnects the content from the employee’s actual day-to-day life.
As a result, employees retain almost nothing, and their behavior remains unchanged. In a high-risk world, insufficient training should not be tolerated; it must lead to accountability and consequences. When an organization has a policy that dictates best practices—such as using a corporate password manager or multi-factor authentication (MFA)—the decision to willfully ignore that policy is a risk failure, not a training failure.
If an employee's inaction or misjudgment—after having been properly trained and informed—leads to a significant breach or financial loss, that person’s security compliance record must be viewed with the same gravity as a violation of any other core company policy. To govern risk effectively, GRC frameworks must ensure that individuals are not only trained but are held accountable for practicing the security behaviors required by corporate policy.
Governance Mandate: Shifting Accountability to the Board
To instill this level of accountability, the mandate for effective security awareness must originate at the highest level: the Board and Executive Leadership. This is fundamentally a Governance issue.
Executive leadership must officially declare that:
When security practices become a matter of formal governance, it allows the Chief Risk Officer (CRO) and Chief Information Security Officer (CISO) to align the training program with corporate risk appetite. It sets the stage for the true cultural shift necessary to defend the organization.
The Risk Factor: Why Employees Resist and How to Fix It
A major reason why current training fails to mitigate risk is employee resistance. This resistance stems not from malice, but from three core human realities that GRC professionals must acknowledge:
To address this profound human risk factor, the training program must be radically reoriented to focus on the individual. This is the difference between a failing technical training approach and a successful human-centric risk approach.
The Human-Centric Solution
The fix is a behavioral model—such as the CSI Protection Certification model—that is built on three core tenets:
This human-centric approach is the ultimate risk control because it weaponizes the employee's self-interest against the attacker’s social engineering tactics.
Quantifying the Human Risk: Training as a Measurable GRC Control
For GRC professionals, the true validation of this overhauled awareness program lies in its measurability. To justify the investment and solidify the program as a core risk control, it must produce hard data that informs the overall risk register.
The goal is to transition from the easily spoofed metric of "100% of employees completed the annual training" to quantifiable data that demonstrates a reduction in human risk exposure.
Here are 3 key metrics for GRC reporting:
This is the most direct measure of the program’s success. It must track more than just the initial "click rate" on simulated phishing campaigns. A robust PVI should track:
This metric directly measures the effectiveness of the governance mandate. Instead of relying on self-reporting, measure the adoption of critical security tools:
Ultimately, the ROI of a security awareness program is measured in the costs avoided. The CISO should work with the CFO to establish a baseline of potential loss (e.g., average wire transfer amounts, value of exposed PII/PHI). The successful reduction in key fraud metrics—such as the number of suspicious wire transfer attempts, successful BEC fund diversions, or identity theft claims following a data leak—represents the hard-dollar ROI of the training program.
This approach transforms the awareness program from a cost center into a business enabler that directly reduces the organization's financial and regulatory risk exposure.
Conclusion
The era of insufficient, compliance-driven security awareness training must end. For GRC leaders, the path forward is clear: treat the human risk vector with the seriousness it deserves.
By establishing a governance mandate that ensures accountability, by adopting a human-centric modelthat drives personal investment, and by utilizing hard metrics that quantify the reduction in exposure, security awareness training moves out of the IT department's silo and into the heart of the GRC framework. This shift is not merely about better security; it is about providing the measurable, verifiable defense required to secure the organization in the face of continuous, targeted threats.
Stop managing human error and start governing human defense.