But then you look at what's actually happening three levels down. The marketing team is sharing credentials to social media accounts. Sales is pushing back on MFA because it adds seconds to their login process. Developers are storing API keys in public repositories because it's faster than the approved method. Remote employees are working from unsecured networks and don't think twice about it.
The executive commitment is there. The company-wide behavior isn't. And that gap is where breaches happen.
This is the challenge that keeps security leaders up at night. You have the mandate from above, but translating that into thousands of daily decisions made by people who have completely different priorities is a different game entirely.
Because unless you do, people will adopt behaviour that makes them productive, and instead of increasing security, your policies will drive it down.
This is not a result of "bad employees": this is a result of bad security policies.
After that, "security" starts to mean "ticking all the boxes to keep the scan happy and stay off the report" (even if the scans are wrong, out of date, littered with false positives, and lacking the ability to find basic problems) and stops having anything to do with actually being secure.
> Marketing team sharing credentials
Fireable offense, immediate firing first time this happens, won’t happen again after that, both of person who shared the credentials and person who used the shared credentials
> Sales MFA
Prevent login without it, let them bitch about it for a week
> API keys in repos
Fireable offense not just for commiter but entire team
Enough truth in that.
Need hours back and forth w/the end user, moderately sophisticated UX designers (eg. empathy, anybody?) user education (not mandates) and training, an actually useful help desk, efficient equipment... And real time graduated enforcement that impacts all levels, not just the bottom level perp-scapegoat.