Cyber Security Is A Team Sport

Webinar, Survey Finds IT Most Likely To Own Security

Add bookmark
Security Champions

Who owns cyber security for the organization? This is a question suited for both organizations that are standing up their first security program as well as for existing security leaders seeking further maturity in an existing program.

Cyber Security Hub hosted a webinar with Code42 to explore how cyber security can become an integral part of enterprise behavior and culture. Cyber security is still viewed as an IT issue that often means InfoSec gets bolted on rather than bolted in to the company’s operations and culture. The typical owners of enterprise cyber security are IT or security.

This “bolted on” behavior has left security teams sometimes feeling like they are alone in a silo. Isolation can lead to struggles working with other departments and conveying the need for collaboration on security messages. However, the security team does not have to be the only ones spreading awareness and best practices for cyber hygiene. Security has touchpoints with every part of the organization including Legal, Risk, HR, Operations and more.

See Related: Sharing Stakeholder Knowledge Between Enterprise Cyber And HR Executives

Identifying Enterprise Secure Champions

This presents an opportunity to identify key stakeholders across the organization to help make security everyone’s responsibility. Some of these potential “champions” will be obvious from their leadership role. Others may be part of the workforce that are merely intrigued by the work that the cyber security team does, and want to offer assistance.

When considering the organizational pillars of people, process, information and technology, the activities and scope of modern enterprise security are so much more than the technologies. While cyber practitioners need to have an intimate understanding of software and systems, too many security teams focus on purchasing tools without a process or partnership in place. Deployment and support must be effective and enabling the organization’s business objectives.

This realization leads to less focus on technology and more on people and process. For example, an increase in collaboration leads to improved diversity of ideas and ultimately a more informed set of outcomes that also enhance processes.

The old-school cyber security approach of a castle surrounded by a moat as the primary means of defense no longer works. The concept of a physical security perimeter has all but disappeared. The workplace is not only collaborative, but it is also mobile, virtual and distributed without physical boundaries. User access and applications must accommodate this change as well as the security processes necessary to protect data.

See Related: Successful Cyber Budgets And Risk Reduction With Diverse Stakeholders

Security Practices Evolve With The Organization

As the enterprise grows, the workforce can no longer be the front lines for identifying new threats, such as phishing attacks. This parallels the change in development, which has evolved from a waterfall process to agile, continuous deployment. Security should avoid being the enforcer and saying “no,” which will not endear security teams to the rest of the business.

The webinar also addressed several questions related to identifying security champions including:

  • The biggest barriers to getting cooperation from other teams
  • Whether it is more important to start with process or technology first
  • Suggestions for collaborating in a multinational, cross-border environment
  • The best approach to pitching the importance of security to your stakeholders

See Related: Webinar - How To Create Enterprise Security Champions


Upcoming Events

Automotive Cyber Security, Connectivity & SDV Week 2025

18th - 20th November, 2025

Van der Valk Hotel Berlin Brandenburg, Germany

Automotive Cyber Security, Connectivity & SDV Week 2025

Digital Identity Week

1st - 2nd September 2026

Sydney, Australia

Digital Identity Week

Latest Webinars

From Dependencies to Defences: Navigating Software Supply Chain Security

2025-09-24

11:00 AM - 12:00 PM SGT

Learn how to defend your software supply chain from dependency threats and build resilient security...

Unpacking global regulatory frameworks to enhance third-party operational resilience

2024-11-14

11:00 AM - 12:00 PM EST

Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu...

Preventing financial and reputational risk with process intelligence

2024-05-23

11:00 AM - 12:00 PM EDT

Learn how to manage risk stemming from poorly controlled processes in a collaborative way

Recommended