{"id":5849,"date":"2018-07-10T17:00:00","date_gmt":"2018-07-10T17:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/businesses-struggle-to-build-security-first-culture\/d\/d-id\/1332259"},"modified":"2018-07-10T17:00:00","modified_gmt":"2018-07-10T17:00:00","slug":"businesses-struggle-to-build-security-first-culture","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/","title":{"rendered":"Businesses Struggle to Build &#8216;Security-First&#8217; Culture"},"content":{"rendered":"<header>\n<\/header>\n<p><span class=\"strong black\">New Accenture study finds half of businesses provide cybersecurity training for new hires and only 40% of CISOs prioritize building or expanding insider threat programs.<\/span> <\/p>\n<p class=\"\">More than half of businesses base their cybersecurity investments solely on today&#8217;s known risks and security needs. That&#8217;s a good move for defending against modern cyberattacks but won&#8217;t help much with attacks on the horizon, experts say.<\/p>\n<p>Businesses who want to fully defend against these future threats need to let security influence the entire organization and stop letting the CISO and their team operate in silos.<\/p>\n<p>&#8220;Companies today are waging war with outdated, backward-looking battle plans,&#8221; researchers report in a new Accenture study entitled &#8220;Securing the Future Enterprise Today \u2013 2018.&#8221; The study polled 1,400 C-suite executives, including CISOs, to learn about current and future cyber risks and what companies are doing to prepare for cyberattacks they know will happen.<\/p>\n<p>Consider the insider threat. Accidental and malicious insiders <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/insider-threats-red-flags-and-best-practices\/d\/d-id\/1330432\" target=\"_blank\">pose a growing risk<\/a> to enterprise security, yet only 40% of experts polled say building or expanding an insider threat program is a high priority. It&#8217;s imperative for <a href=\"https:\/\/www.darkreading.com\/partner-perspectives\/f5\/cio-or-c-suite-to-whom-should-the-ciso-report\/a\/d-id\/1329807\" target=\"_blank\">CISOs and the C-suite<\/a> to get on the same page when it comes to infosec, says Kelly Bissell, Accenture managing director and security global lead.<\/p>\n<p>&#8220;[They] can see bad things occurring in their organization faster than before \u2026 the time from detection to eradication is getting better,&#8221; he explains, adding that for many, this timeframe has gone from months to days.<\/p>\n<p>In most organizations, security is a separate function dedicated to protecting core IT systems and data. Security strategies are more focused on detecting threats and decreasing damage rather than building products and processes to be more secure by design, researchers say.<\/p>\n<p>CISOs of the future need to have business savvy, Bissell continues. They should know how the business makes money, where the enterprise &#8220;crown jewels&#8221; are located, including those used by third parties, and they should understand who their largest clients are.<\/p>\n<p><strong>The Danger of Siloed CISOs<\/strong><\/p>\n<p>Most companies are not governed, organized, and managed to handle risks of the future, Accenture reports. Security is left to the CISO and security team; business leaders are rarely asked to build security into product design or take responsibility for cybersecurity.<\/p>\n<p>Only 22% of <a href=\"https:\/\/newsroom.accenture.com\/news\/closer-collaboration-between-c-suite-and-cisos-needed-to-bridge-gap-in-cyber-readiness-finds-accenture-report.htm\" target=\"_blank\">experts surveyed<\/a> report business-unit leaders are held accountable for security. About 40% of security teams don&#8217;t confer with business leaders to understand their goals before implementing a new security approach. Sometimes this is because the security team thinks they know the answer, says Bissell. Sometimes it&#8217;s because security employees are under IT and politically separate from the business unit, which he says is still fairly common.<\/p>\n<p>&#8220;If they don&#8217;t collaborate well with the business unit they may not always have a shared vision for how to solve the problem, and that&#8217;s what they&#8217;ve got to get to,&#8221; he emphasizes.<\/p>\n<p>A poor relationship between security and business teams leads to worse behavior, Bissell says. Mistakes are swept under the rug and go unreported, and the two blame one another when problems occur. Positive relationships make things easier but both teams have to contribute.<\/p>\n<p>&#8220;The best CISOs are the ones who work with a business unit leader, and go to the audit committee together as one team to solve the problem,&#8221; he explains. &#8220;Better alignment is critical \u2026 it&#8217;s a two-way street.&#8221; Security teams should proactively reach out to understand the business goals, and vice versa, for the relationship to work.<\/p>\n<p><strong>Breaking Down Silos, Building Bridges<br \/><\/strong><\/p>\n<p>An important step toward breaking security out of its silo is to embed security employees within business units, says Bissell. While this is more feasible for larger companies than smaller ones, it can help the two teams better understand one another.<\/p>\n<p>Security pros of the future will require business risk skills and consultant skills, on top of technical expertise, and this strategy can help them learn how they can better protect the business. Some leading CISOs are hiring security employees who used to be mortgage processors or insurance claims adjusters because they have business backgrounds.<\/p>\n<p>&#8220;That can really help shorten the learning curve of how the business works and where the risks are,&#8221; he explains.<\/p>\n<p>It&#8217;s also important for security experts to <a href=\"https:\/\/www.darkreading.com\/partner-perspectives\/f5\/be-a-more-effective-ciso-by-aligning-security-to-the-business-\/a\/d-id\/1330618\" target=\"_blank\">be business-savvy<\/a> so they can provide awareness training tailored to each business unit. For example, Bissell says, financial experts are educated on wire transfer fraud and other cyber risks specific to finance. The same goes for operations.<\/p>\n<p>&#8220;Regular awareness around security risk to that particular business unit is key,&#8221; he adds. &#8220;This is why it&#8217;s so critical for the security group to understand the business in a very deep way.&#8221;<\/p>\n<p><strong>Related Content:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Horizontal-334031_BH_US18_banners_468x60_non_1.png\" alt=\"\" width=\"400\" height=\"50\"\/><\/p>\n<p><em><strong>\u00a0<\/strong><\/em><\/p>\n<p><em><strong>Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the <a href=\"http:\/\/blackhat.com\/us-18\/\" target=\"_blank\">conference<\/a>\u00a0and <a href=\"https:\/\/blackhat.tech.ubm.com\/usa\/2018\/?_mc=nlad_x_insecr_le_tsnr_insec_x_x-bht&amp;\" target=\"_blank\">to register.<\/a><\/strong><\/em><\/p>\n<p><span class=\"italic\">Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance &amp; Technology, where she covered financial &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=837\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/businesses-struggle-to-build-security-first-culture\/d\/d-id\/1332259?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New Accenture study finds half of businesses provide cybersecurity training for new hires and only 40% of CISOs prioritize building or expanding insider threat programs. Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/businesses-struggle-to-build-security-first-culture\/d\/d-id\/1332259?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-5849","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Businesses Struggle to Build &#039;Security-First&#039; Culture 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Businesses Struggle to Build &#039;Security-First&#039; Culture 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-10T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Horizontal-334031_BH_US18_banners_468x60_non_1.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Businesses Struggle to Build &#8216;Security-First&#8217; Culture\",\"datePublished\":\"2018-07-10T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/\"},\"wordCount\":864,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/Horizontal-334031_BH_US18_banners_468x60_non_1.png\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/\",\"name\":\"Businesses Struggle to Build 'Security-First' Culture 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/Horizontal-334031_BH_US18_banners_468x60_non_1.png\",\"datePublished\":\"2018-07-10T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/Horizontal-334031_BH_US18_banners_468x60_non_1.png\",\"contentUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/Horizontal-334031_BH_US18_banners_468x60_non_1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/businesses-struggle-to-build-security-first-culture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Businesses Struggle to Build &#8216;Security-First&#8217; Culture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Businesses Struggle to Build 'Security-First' Culture 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/","og_locale":"en_US","og_type":"article","og_title":"Businesses Struggle to Build 'Security-First' Culture 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-10T17:00:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Horizontal-334031_BH_US18_banners_468x60_non_1.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Businesses Struggle to Build &#8216;Security-First&#8217; Culture","datePublished":"2018-07-10T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/"},"wordCount":864,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Horizontal-334031_BH_US18_banners_468x60_non_1.png","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/","url":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/","name":"Businesses Struggle to Build 'Security-First' Culture 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Horizontal-334031_BH_US18_banners_468x60_non_1.png","datePublished":"2018-07-10T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Horizontal-334031_BH_US18_banners_468x60_non_1.png","contentUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Horizontal-334031_BH_US18_banners_468x60_non_1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/businesses-struggle-to-build-security-first-culture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Businesses Struggle to Build &#8216;Security-First&#8217; Culture"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=5849"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5849\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=5849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=5849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=5849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}