SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsThe purpose of this post is to walk you through and enable you to create a strong metrics framework for your security awareness program.
The purpose of this post is to walk you through and enable you to create a strong metrics framework for your security awareness program. After reading this post you will be able to measure impact, demonstrate value to your leadership and align your program with their strategic priorities.
Defining Awareness
First, what is a security awareness program? It is a structured approach to managing an organization’s human risk. You can gauge and measure the maturity of an awareness program by using the Security Awareness Maturity Model. This blog post assumes you have a mature program (at least Stage Three of the maturity model) and are actively partnered with, or are a part of your security team. Mature awareness programs manage human risk by answering three key questions in this order.
Over time, technology, threats, and business requirements change. As such, your organization's human risks, in coordination with your security team, should be reviewed and updated at least annually.
What to Measure
Once you look at security awareness and managing human risk through this lens it becomes much easier to identify what metrics you should be focusing on. Measure what you care about. What do you care about? Your top human risks and the behaviors that most effectively manage those risks. To date, I’ve been hesitant to suggest to organizations exactly what risks and behaviors they should focus on, as risks are often unique to each organization. However, in this post I’m going to try and do just that.
I’m doing this for two reasons. One, my concern is that too many organizations simply don’t have the data / resources to identify their top human risks, as such they don’t know where to start. Two, I’m seeing in many cases it doesn’t matter as almost all the data resources I have been researching such as the annual Verizon DBIR Report, CISA Essentials, and this year’s NCSA / CybSafe Report point to the same finding, most organizations share the same top three human risks – Phishing, Passwords and Updating. As such, I’m going to define these risks, the behaviors that manage these risks, and how to measure those behaviors. Consider this a starting point. If you don’t have any data on your top human risks, this is a fantastic place to start. If you do have the data you need, modify this list as you see fit.
One thing you should decide beforehand is if you want to measure and track behavior by individual or by role / department / business unit. If tracking at the individual level be sure you are taking measures to protect the information and privacy of every individual. Depending on the size of your organization and the amount of data you are collecting, you may also need to partner with someone in your organization who specializes in data analytics / business intelligence to help you normalize / analyze findings. Phishing
Phishing for three years now has been the number one driver of breaches at a global level (2021 Verizon DBIR Report – p15). No matter the number of technical controls we throw at this problem, cyber attackers simply adapt and bypass them. As such we need to teach people how to identify and report these attacks. So, what do we measure? After people have been trained, measure their susceptibility to phishing attacks. Of our top human risks this one is the simplest to measure and why it is such a common metric.
Passwords
For several years now passwords continue to also be a primary driver of breaches. Cyber attackers have changed their TTPs (Tactics, Techniques and Procedures), moving from gaining access or lateral movement by continually hacking into and infecting systems to using legitimate accounts to more easily pivot and traverse through a victim organization while avoiding detection. As such, both strong passwords and the secure use of those passwords have become key.
On a scale of 1 – 5, how likely would one of your co-workers share their password with a fellow employee.
If you are unable to launch your own survey, partner with Human Resources and see if you can add several security questions to any type of HR led Employee Engagement or Pulse surveys. Another option is to leverage your Security Ambassadors or security portal.
Updating
Of the three human risks we cover, this one may not apply. We want to ensure the computers and devices people are using, and the applications and apps installed on them, are updated and current. For some organizations this is not an issue as people do not have admin rights or control over work issued devices, instead their devices are actively patched by IT. However, for many organizations this is an issue as so many people are now working remotely from home and are often using personal devices or home networks for work access. There are several ways to measure this.
Strategic Metrics
Once you start collecting metrics on peoples’ behaviors, you can use this data to better understand and manage your overall human risk. Three key uses include
You can also demonstrate the strategic value of your program to leadership by aligning behavior with what leadership really cares about.
Summary
This list is neither exhaustive nor perfect, but it’s a starting point. There are a huge number of other metrics you can measure, and sources of data for those metrics.
The key however is not to measure everything, instead you are better off measuring your most useful metrics. And to do that, you first need to know what your top human risks are and the behaviors that manage those risks. To learn more about measuring human risk, consider the two-day SANS MGT433 Managing Human Risk course or the advanced five day SANS MGT521 Security Culture course.
Visit SANS Security Awareness for more information on how to build and mature your security awareness program.
Lance revolutionized cyber defense by founding the Honeynet Project. Over the past 25 years, he has helped 350+ organizations worldwide build resilient security cultures, transforming human risk management into a cornerstone of modern cybersecurity.
Read more about Lance Spitzner