{"id":36063,"date":"2020-06-30T20:27:12","date_gmt":"2020-06-30T20:27:12","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=544261"},"modified":"2020-06-30T20:27:12","modified_gmt":"2020-06-30T20:27:12","slug":"are-you-promoting-security-fluency-in-your-organization","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/","title":{"rendered":"Are You Promoting Security Fluency in your Organization?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-1024x683.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-1536x1024.jpg 1536w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-2048x1365.jpg 2048w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/clouds-heaven-outdoors-space-479821-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"> <\/p>\n<p>Migrating to the cloud is hard. The PowerPoint deck and pretty architectures are drawn up quickly but the work required to make the move will take months and possibly years.<\/p>\n<p>The early stages require significant effort by teams to learn new technologies (the cloud services themselves) and new ways of the working (the shared responsibility model).<\/p>\n<p>In the early days of your cloud efforts, the cloud center of expertise is a logical model to follow.<\/p>\n<h2>Center of Excellence<\/h2>\n<p>A <a href=\"https:\/\/aws.amazon.com\/blogs\/enterprise-strategy\/using-a-cloud-center-of-excellence-ccoe-to-transform-the-entire-enterprise\/\">cloud center of excellenc<\/a><a href=\"https:\/\/aws.amazon.com\/blogs\/enterprise-strategy\/using-a-cloud-center-of-excellence-ccoe-to-transform-the-entire-enterprise\/\">e<\/a> is exactly what it sounds like. Your organization forms a new team\u2014or an existing team grows into the role\u2014that focuses on setting cloud standards and architectures.<\/p>\n<p>They are often the \u201cgo-to\u201d team for any cloud questions. From the simple (\u201cWhat\u2019s an <a href=\"https:\/\/aws.amazon.com\/s3\/\">Amazon S<\/a><a href=\"https:\/\/aws.amazon.com\/s3\/\">3<\/a> bucket?\u201d), to the nuanced (\u201cWhat are the advantages of <a href=\"https:\/\/aws.amazon.com\/rds\/aurora\/\">Amazon Auror<\/a><a href=\"https:\/\/aws.amazon.com\/rds\/aurora\/\">a<\/a> over <a href=\"https:\/\/aws.amazon.com\/rds\/\">RD<\/a><a href=\"https:\/\/aws.amazon.com\/rds\/\">S<\/a>?\u201d), to the complex (\u201cWhat\u2019s the optimum index\/sort keying for this <a href=\"https:\/\/aws.amazon.com\/dynamodb\/\">DynamoD<\/a><a href=\"https:\/\/aws.amazon.com\/dynamodb\/\">B<\/a> table?\u201d).<\/p>\n<p>The cloud center of excellence is the one-stop shop for cloud in your organization. At the beginning, this organizational design choice can greatly accelerate the adoption of cloud technologies.<\/p>\n<h2>Too Central<\/h2>\n<p>The problem is that accelerated adoption doesn\u2019t necessarily correlate with accelerated understanding and learning.<\/p>\n<p>In fact, as the center of excellent continues to grow its success, there is an inverse failure in organizational learning which create a general lack of cloud fluency.<\/p>\n<p><strong>Cloud fluency<\/strong> is an idea introduced by <a href=\"https:\/\/twitter.com\/forrestbrazeal\">Forrest Brazea<\/a><a href=\"https:\/\/twitter.com\/forrestbrazeal\">l<\/a> at A Cloud Guru that describes the general ability of all teams within the organization to discuss cloud technologies and solutions. Forrest\u2019s <a href=\"https:\/\/info.acloud.guru\/resources\/why-central-cloud-teams-fail-and-how-to-save-yours\">blog pos<\/a><a href=\"https:\/\/info.acloud.guru\/resources\/why-central-cloud-teams-fail-and-how-to-save-yours\">t<\/a> shines a light on this situation and is summed up nicely in this cartoon;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-544262\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/Image1.png\" alt width=\"570\" height=\"539\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/Image1.png 570w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/Image1-300x284.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/Image1-440x416.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/Image1-380x359.png 380w\" sizes=\"auto, (max-width: 570px) 100vw, 570px\"><\/p>\n<p><em>Our own <a href=\"https:\/\/twitter.com\/marknca\">Mark Nunnikhove<\/a><a href=\"https:\/\/twitter.com\/marknca\">n<\/a> also <a href=\"https:\/\/trendtalks.fyi\/cloud\/2020\/transformations-in-the-cloud\/\">spoke to Forres<\/a><a href=\"https:\/\/trendtalks.fyi\/cloud\/2020\/transformations-in-the-cloud\/\">t<\/a> on episode 2 of season 2 for <a href=\"https:\/\/trendtalks.fyi\/cloud\/\">#LetsTalkClou<\/a><a href=\"https:\/\/trendtalks.fyi\/cloud\/\">d<\/a>.<\/em><\/p>\n<p>Even though the cloud center of excellence team sets out to teach everyone and raise the bar, the work soon piles up and the team quickly shifts away from an educational mandate to a \u201cfix everything\u201d one.<\/p>\n<p>What was once a cloud accelerator is now a place of burnout for your top, hard-to-replace cloud talent.<\/p>\n<h2>Security\u2019s Past<\/h2>\n<p>If you\u2019ve paid attention to how cybersecurity teams operate within organizations, you have probably spotted a number of very concerning similarities.<\/p>\n<p>Cybersecurity teams are also considered a center of excellence and the central team within the organization for security knowledge.<\/p>\n<p>Most requests for security architecture, advice, operations, and generally anything that includes the prefix \u201ccyber\u201d, word \u201crisk\u201d, or hints of \u201chacking\u201d get routed to this team.<\/p>\n<p>This isn\u2019t the security team\u2019s fault. Over the years, systems have increased in complexity, more and more incidents occur, and security teams rarely get the opportunity to look ahead. They are too busy stuck in \u201cfirefighting mode\u201d to take as step back and <a href=\"https:\/\/sector.ca\/sessions\/are-we-setup-to-fail\/\">re-evaluate the organizational design structur<\/a><a href=\"https:\/\/sector.ca\/sessions\/are-we-setup-to-fail\/\">e<\/a> they work within.<\/p>\n<p>According to Gartner, for every 750 employees in an organization, one of those is dedicated to cybersecurity. Those are impossible odds that have lead to the massive security skills gap.<\/p>\n<h2>Fluency Is The Way Forward<\/h2>\n<p>Security needs to follow the example of cloud fluency. We need \u201csecurity fluency\u201d in order to import the security posture of the systems we built and to reduce the risk our organizations face.<\/p>\n<p>This is the reason that security teams need to turn their efforts to educating development teams. <a href=\"https:\/\/www.csoonline.com\/article\/3245748\/what-is-devsecops-developing-more-secure-applications.html\">DevSecOp<\/a><a href=\"https:\/\/www.csoonline.com\/article\/3245748\/what-is-devsecops-developing-more-secure-applications.html\">s<\/a> is a term chock full of misconceptions and it lacks context to drive the needed changes but it is handy for raising awareness of the lack of security fluency.<\/p>\n<p>Successful adoption of a DevOps philosophy is all about removing barriers to customer success. Providing teams with the tools and autonomy they require is a critical factor in their success.<\/p>\n<p>Security is just one aspect of the development team\u2019s toolkit. It\u2019s up to the current security team to help educate them on the principles driving modern cybersecurity and how to ensure that the systems they build work as intended\u2026and only as intended.<!-- AddThis Advanced Settings above via filter on the_content --><!-- AddThis Advanced Settings below via filter on the_content --><!-- AddThis Button BEGIN --><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/promoting_security_fluency\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#160; Migrating to the cloud is hard. The PowerPoint deck and pretty architectures are drawn up quickly but the work required to make the move will take months and possibly years. &#160; The early stages require significant effort by teams to learn new technologies (the cloud services themselves) and new ways of the working (the&#8230;<br \/>\nThe post Are You Promoting Security Fluency in your Organization? appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36064,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1252,1253,536,672],"class_list":["post-36063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-cloud","tag-cloud-computing","tag-cloud-security","tag-misconfiguration"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are You Promoting Security Fluency in your Organization? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are You Promoting Security Fluency in your Organization? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-30T20:27:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/are-you-promoting-security-fluency-in-your-organization.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Are You Promoting Security Fluency in your Organization?\",\"datePublished\":\"2020-06-30T20:27:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/\"},\"wordCount\":680,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/are-you-promoting-security-fluency-in-your-organization.jpg\",\"keywords\":[\"cloud\",\"cloud computing\",\"Cloud Security\",\"misconfiguration\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/\",\"name\":\"Are You Promoting Security Fluency in your Organization? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/are-you-promoting-security-fluency-in-your-organization.jpg\",\"datePublished\":\"2020-06-30T20:27:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/are-you-promoting-security-fluency-in-your-organization.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/are-you-promoting-security-fluency-in-your-organization.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-you-promoting-security-fluency-in-your-organization\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Are You Promoting Security Fluency in your Organization?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are You Promoting Security Fluency in your Organization? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/","og_locale":"en_US","og_type":"article","og_title":"Are You Promoting Security Fluency in your Organization? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-30T20:27:12+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/are-you-promoting-security-fluency-in-your-organization.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Are You Promoting Security Fluency in your Organization?","datePublished":"2020-06-30T20:27:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/"},"wordCount":680,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/are-you-promoting-security-fluency-in-your-organization.jpg","keywords":["cloud","cloud computing","Cloud Security","misconfiguration"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/","url":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/","name":"Are You Promoting Security Fluency in your Organization? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/are-you-promoting-security-fluency-in-your-organization.jpg","datePublished":"2020-06-30T20:27:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/are-you-promoting-security-fluency-in-your-organization.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/are-you-promoting-security-fluency-in-your-organization.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/are-you-promoting-security-fluency-in-your-organization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud\/"},{"@type":"ListItem","position":3,"name":"Are You Promoting Security Fluency in your Organization?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36063"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36063\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36064"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}