Integrating Cyber Risk Management into Business Processes through Transformation using ADKAR
Todd Hammond
VP, Cybersecurity & Risk Executive | Digital Forensics + Risk & Compliance + MBA Strategy | Decisive Leadership | Securing Assets & Enabling Business | Balances Business Agility & Risk | Developing High-Impact Leaders
As business leaders, we recognize that the rapid digital transformation of organizations has brought numerous benefits. That digital transformation has also exposed businesses to more complex and evolving cyber threats, making cyber-related risks paramount for businesses of all sizes.
Just like safety features for a car are part of the design, as opposed to a feature tacked on after the car is manufactured, cyber security and risk management should be part of the design of every business process, product, or service from inception.
Integrating security and risk management seamlessly in this way is often easier said than done. The Awareness, Desire, Knowledge, Agility, and Reinforcement (ADKAR) framework is one practical framework for achieving this integration.
ADKAR is a change management model that focuses on individual and organizational change. This article will explore how businesses can bolster their cybersecurity posture by incorporating ADKAR into security transformation.
Understanding ADKAR
ADKAR is an acronym that represents the five key elements of successful change management:
Integrating ADKAR into Cybersecurity Risk Management
Now, let's examine how ADKAR can be leveraged to further the transformation effort to integrate cybersecurity and risk into the business:
As with any framework or model, ADKAR goes much more profound and is highly adaptable, so it can be finely tailored to an organization's unique culture and requirements, facilitating a more profound and practical integration of cybersecurity into its core processes.
The ADKAR model is a great tool to help businesses empower their employees to become active defenders against cyber threats, ultimately strengthening business.
领英推荐
Other change management models offer different perspectives and approaches to manage change within organizations effectively. The choice of model depends on the specific context, the nature of the change, and the organization's culture.
In some cases, a combination of models may comprehensively address various aspects of change. Ultimately, an organization's risk management context aims to manage risk as we run, operate, and build the business.
Leaders could also explore other change management models; here are some areas in which they are particularly effective.
Each model offers similar and distinct features and advantages for organizations planning and managing change. The choice of model depends on specific organizational needs and the nature of the change being undertaken.
Regardless of the model(s) chosen or adapted, the transition from reactive information security and risk management to proactive business-aligned integrated is no small feat but worthy of undertaking.
References
Hammond, T. (2020, January 27). Todd Hammond: Proactive Cybersecurity & Business Risk Solutions -. Www.toddhammond.com. https://www.toddhammond.com/
Prosci. (2019a). The Prosci ADKAR Model | Prosci Tim Talks. In YouTube. https://www.youtube.com/watch?v=L_7I03LOyyk
Prosci. (2019b). The Prosci ADKAR Model: Why it Works. Prosci.com. https://www.prosci.com/resources/articles/why-the-adkar-model-works
CEO & Co-founder at Kovrr | Cyber Risk Quantification
1 年Embedding cybersecurity into company culture is indeed going to require a systematic change, and this is a great, approachable framework, Todd. Your awareness stage is so crucial and yet so often overlooked when corporations make shifts. But suppose we communicate the impact these new cybersecurity measures will have in terms that are understandable in a broader business context. In that case, everyone is much more likely to play an active role. For instance, if an employee knows that a potential phishing scam can cost the organization upwards of $6 million, they'll definitely think twice about that suspicious-looking email they received. Our employees deserve to know the underlying reasonings and benefits of the corporate changes. Thanks for sharing!