Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How CISOs and CIOs Can Create an Inclusive Cybersecurity Business Culture
Cybersecurity

How CISOs and CIOs Can Create an Inclusive Cybersecurity Business Culture

Robert WoodBy Robert WoodSeptember 9, 2022Updated:September 9, 20224 Mins Read
Facebook Twitter LinkedIn Email
How CISOs & CIOs Can Create An Inclusive Cybersecurity Business Culture
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Security cannot succeed unless we work with and through other teams. This fact is especially true in the application security space. Security teams need to find creative ways of engaging development teams for a variety of reasons in conversation and partnership. Security teams are not patching servers. They aren’t updating libraries. They aren’t fixing the pentest findings. Security teams need to be able to accomplish their work by convincing other teams at times that a security issue should be fixed over another feature.

This article will touch on several ways that security teams can engage in developer outreach. It’s not recommended to jump in and start doing all these things right away; start small, experiment, adapt, and grow.

Using Competition to Attract the Developer Community

People love games. There are a lot of fun ways to create friendly competition between teams while simultaneously fostering security awareness and building relationships. Hosting a security-themed hackathon is a lot of work but can be very appealing to the developer community.

Some training platforms have begun to release gamified challenges related to secure coding or related topics. Sometimes these are a hit, sometimes they’re a total flop. It’s good to experiment and take a human-centered design approach. The big thing in a competitive sense is to try to make it fun. If people are having fun, they will come back for more.

Security Champion Programs

Security champion programs have been happening for a number of years now. As such, there is a good body of work on how to begin such a program and, more importantly, how to sustain and grow it. I believe that one of the most important elements of any security champion program is the ongoing engagement and growth paths provided to its volunteers. If people don’t have time properly carved out, incentives properly aligned, and actual engagement with the security team, then the program will almost certainly die out and will likely be counterproductive.

Run well, though, and a champion program can be a powerful means of scaling developer engagement across an organization.

Call Outs and Positive Affirmation

Most people appreciate being recognized for the good work they’re doing; positive affirmation works in relationships and it works in organizational dynamics. If you’re on the security team and you recognize a particular developer or a team that is doing things that you would be thrilled to see everyone doing, make sure you recognize it. This could include proactively seeking out bugs and fixing them, setting up more security tools and actively using them, engaging with the team on threat models, or any number of other activities.

There are a lot of ways that security teams can recognize others. Below are a few that I’ve personally used to great effect:

  • Notable mentions at large meetings, such as all hands or in newsletters
  • Passing around a physical trophy of sorts to create a fun kind of competition (a shield, engraved trophy, big hat, etc.). This one worked better pre-Covid when there was more of an emphasis on in-office culture, but there are plenty of virtual ways to recognize people in a similar way.
  • Handing out challenge coins or gift cards
  • T-shirts or other kinds of swag that can be displayed by the recipient

Concluding Thoughts

Security teams need other teams. We can’t function through policy and mandates, not well anyways. To operate effectively, security teams need to engage and build relationships with other teams and leaders. The three areas above are really just a starting point to get ideas going on how to begin this outreach. The most important thing, in my experience, is to be intentional and consistent.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity featured security teams
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions

May 22, 2025

SAP Says Reports of Applications’ Death Are Greatly Exaggerated!

May 22, 2025

How SAP Is Redefining Enterprise AI with Unified Data and Strategic Partnerships | Tinder on Customers

May 22, 2025

Cprime’s Strategy for AI-Native Transformation: Operating Models, Agents, and ServiceNow

May 22, 2025
Add A Comment

Comments are closed.

Recent Posts
  • IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions
  • SAP Says Reports of Applications’ Death Are Greatly Exaggerated!
  • How SAP Is Redefining Enterprise AI with Unified Data and Strategic Partnerships | Tinder on Customers
  • Cprime’s Strategy for AI-Native Transformation: Operating Models, Agents, and ServiceNow
  • SAP: Agents Will Enhance Apps, Not Turn to CRUD

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.