Cybersecurity
February 18, 2025

Lessons in Building a Security Improvement Program

Cyber Resilience Strategy
Security Posture
Incident Management
long exposure image of man walking by blue panels

Organizations of all sizes face the challenge of evolving their cybersecurity strategies, making a one-size-fits-all approach ineffective due to varying vulnerabilities, risk tolerances, and resources. A Security Improvement Program (SIP) is a tailored strategy to enhance defenses based on specific needs and cybersecurity maturity.

A crucial component of a SIP is the inclusion of exercises and targeted upskilling. These training activities help measure the effectiveness of security initiatives, respond to threats, identify vulnerabilities, and improve organizational resilience.

Stress-Testing Security: Exercises simulate complex threat scenarios to assess cybersecurity measures and responses to significant incidents.

Precision Training: Targeted upskilling addresses specific skills or response mechanisms within an organization's cybersecurity framework. It can be tailored to departments, individuals, threats, or vulnerabilities.

How SIPs can address unique security challenges

Company X: A startup facing phishing attacks focused on security awareness training and endpoint protection. Like many smaller organizations, phishing attacks and unpatched vulnerabilities are major threats. Its Security Improvement Program should focus on closing these gaps through Security Awareness Training and evaluating endpoint detection tools.

Typical objectives:

  • Increase awareness
  • Remediate vulnerabilities
  • Investigate new security tools

Tracking progress requires collecting detailed metrics to measure the time required to remediate vulnerabilities and employee performance in phishing simulations. With these data points, companies can deploy targeted upskilling to see how employees reacted to simulated phishing attacks and whether the time to patch vulnerabilities improved.

Company Y: An established company with a fully staffed Security Operations Center (SOC), Alert fatigue from multiple false positives can slow down responses to actual threats. In this situation, a SIP should focus on reducing incident volume by filtering out low-priority alerts and improving SOC efficiency.

Metrics to track:

  • Incident response rate
  • False positive rates
  • Analyst efficiency

These metrics should be measured through periodic exercises to gauge the effectiveness of its program and continuously improve SOC operations.

Company Z: A more established organization with proven SOC capabilities, the goal should be to implement continuous improvement to further enhance response capabilities, such as Mean Time to Respond (MTTR) and Time to Containment for reported issues.

Goals:

  • Reduce the time it takes to identify, respond to, and contain threats.
  • Improve overall incident management workflows.

Its SIP should measure how quickly its SOC can identify and contain threats during targeted upskilling, using insights to continually refine its response protocols.

Determining Relevant Metrics for a Security Improvement Program (SIP)

A successful SIP requires identifying relevant metrics to measure its effectiveness. Organizations must carefully select cybersecurity metrics that directly match with their specific business objectives, such as:

  • Align with business goals: Link cybersecurity metrics to business targets, e.g., prioritize downtime reduction with response and containment time measurements.
  • Focus on risk reduction: Monitor vulnerability exposure reduction metrics such as patch time.
  • Consider industry standards: Follow NIST or ISO benchmarks for best-practice-aligned metrics.
  • Tailor metrics to security maturity: Consider company maturity when selecting metrics, e.g., basic metrics for startups and MTTR for mature firms.

By selecting metrics that closely align with their SIP goals, organizations can track progress more effectively and make data-driven decisions to improve security.

Challenges in Implementing Security Improvement Programs

While SIPs offer significant benefits, organizations may encounter challenges during implementation. Smaller firms often face resource constraints and should prioritize high-impact initiatives. To address alert fatigue, automated incident triage and tuned detection systems can help manage alert overloads in SOCs. Cultural resistance can be mitigated through ongoing training to help employees adapt to new security practices. Finally, regular simulations are essential to keep SIPs updated against evolving cyber threats.

Addressing Challenges:

  • Prioritize high-impact initiatives
  • Implement automated incident triage
  • Provide ongoing training
  • Conduct regular simulations

The Power of a Tailored Approach

Each of the examples above demonstrates that Security Improvement Programs are not cookie-cutter solutions. An organization’s SIP should reflect its unique stage of cybersecurity maturity and address its specific challenges, whether that’s improving awareness training, reducing alert noise, or accelerating response times.

Additionally, organizations can create and run customized cyber exercises and targeted upskilling to measure and track key metrics, and adapt their strategies over time to stay ahead of evolving threats.

But one thing remains clear: a well-crafted, flexible, and metrics-driven Security Improvement Program could be your organization’s key to staying resilient and proactive. Complacency isn’t an option; organizations need to revisit and refine its program regularly to ensure they can effectively address cyber gaps.

Lessons in Building a Security Improvement Program

Organizations of diverse scopes grapple with the challenge of evolving their cybersecurity strategies –and a one-size-fits-all approach often falls short, given the varying vulnerabilities, risk tolerances, and resources different organizations possess. A Security Improvement Program (SIP) provides a customized strategy to bolster defenses, tuning into unique needs and cybersecurity maturity.

A SIP is fundamentally composed of exercises and tailored upskilling. These activities form the bedrock for gauging security initiative effectiveness, prompt threat responses, discovering vulnerabilities, and fostering robust organizational resilience.

  • Stress-Testing Security: Exercises effectively mimic complex threat scenarios, offering a yardstick for measuring cybersecurity protocols and reactions to significant incidents.
  • Precision Training: This focuses on specific skills or response mechanisms within a cybersecurity framework. Designed to be flexibly adapted to departments, individuals, threats, or vulnerabilities.

Addressing Security Challenges with SIPs - A Case-Based Approach

Company X: For startups, grappling with frequent phishing attacks is commonplace, making the urgency for security awareness training and endpoint protection palpable. A bespoke SIP should zero in on these gaps through Security Awareness Training and evaluating endpoint detection tools.

Typical objectives:

  • Increase awareness
  • Remediate vulnerabilities
  • Investigate new security tools

Implementing a metrics-centric approach allows these goals to be easily tracked, by noting the time required for vulnerability remediation and assessing employee performance during phishing simulations. Leveraging these data points would enable targeted upskilling and gauge its efficiency in deflecting phishing attacks and improving vulnerability patch times.

This context can be extended to more complex organizations such as Company Y: This established company with a fully equipped Security Operations Center (SOC) could fall prey to alert fatigue due to multiple false positives, slowing their responses to actual threats. In this scenario, a SIP should focus on reducing incident volume by filtering out low-priority alerts, thereby enhancing SOC efficiency.

Metrics to track:

  • Incident response rate
  • False positive rates
  • Analyst efficiency

Company Z: For organizations like this, with established SOC capabilities, the goal is continuous improvement, honing response skills like Mean Time to Respond (MTTR), and Time to Containment for reported issues.

Key Objectives:

  • Reducing threat identification, response, and containment time.
  • Optimizing overall incident management workflows.

Ensuring Success in SIP Implementation: Identifying Relevant Metrics and Addressing Challenges

For any SIP to be successful, relevant metrics must be identified to measure its effectiveness. Organizations must carefully handpick metrics that directly engage with their specific objectives.

A successful SIP configuration will:

  • Align with business goals.
  • Focus on risk reduction.
  • Adhere to industry standards for best-practice-aligned metrics.
  • Tailor metrics to security maturity level.

Meeting Challenges Head-on:

While SIPs offer massive benefits, roadblocks occur while deploying them. Small firms often face resource restrictions and should thus prioritize initiatives that deliver maximum impact. Alert fatigue can be mitigated through automated incident triage and tuned detection systems. Cultural resistance can be addressed through continuous training, helping employees seamlessly adjust to new security practices. Lastly, conducting regular simulations is crucial in keeping SIPs updated against evolving threats.

Confronting these challenges requires:

  • Prioritizing high-impact initiatives
  • Implementing automated incident triage
  • Providing ongoing training
  • Conducting regular simulations

Why a Tailored Approach Works:

It's clear that SIPs aren't cookie-cutter solutions. They need to mirror an organization’s unique stage of cybersecurity maturity and effectively address its specific challenges. Customized cyber exercises and targeted upskilling should be used to measure key metrics, adapting strategies over time to stay ahead of evolving threats.

Organizations cannot afford complacency; they need to constantly revisit and refine their program to ensure they can effectively address cyber gaps. A well-designed, adaptable, and metrics-focused SIP could be the key to your organization staying resilient and proactive in the face of emerging cybersecurity threats.

To learn more about the key components of SIPs, see real-world examples, and get practical guidance for implementation, check out our eBook: Building a Smarter Security Improvement Program.

 

Trusted by top companies worldwide
to enhance cybersecurity

Trusted by some of the world’s biggest brands, we’re committed to taking your cybersecurity readiness to the next level - and we’re just getting started.

What Our Customers
Are Saying About Immersive

Realistic simulation of current threats is the only way to test and improve response readiness, and to ensure that the impact of a real attack is minimized. Immersive’s innovative platform, combined with Kroll’s extensive experience, provides the closest thing to replication of a real incident — all within a safe virtual environment.

Paul Jackson
Regional Managing Director, APAC Cyber Risk, Kroll

The speed at which Immersive produces technical content is hugely impressive, and this turnaround has helped get our teams ahead of the curve, giving them hands-on experience with serious vulnerabilities, in a secure environment, as soon as they emerge.

TJ Campana
Head of Global Cybersecurity Operations, HSBC

We no longer worry about managing infrastructure, leaving us free to build great courses.

Daniel Duggan
Director, Zero-Point Security

Ready to Get Started?
Get a Live Demo.

Simply complete the form to schedule time with an expert that works best for your calendar.