Cybersecurity training still doesn’t stick, and why that’s a leadership problem

Phil Rowell, COO, Wizard IT Group on turning people risk into operational resilience with effective blame-free leadership

Most cyber incidents don’t start with a zero-day exploit. They start with a perfectly reasonable person making a perfectly human decision under pressure.

At the board level, we tend to talk about cybersecurity in terms of tools, spend, and risk registers. But the uncomfortable truth is this: your security posture is only as strong as the behaviour your organisation reinforces every day. And for many businesses, cybersecurity training simply isn’t changing behaviour.

From an operational standpoint, that’s not an employee failure — it’s a leadership one.

Training fails when it’s treated as compliance

If cyber training exists primarily to satisfy auditors rather than influence decisions, people will treat it accordingly. Annual, generic training creates the illusion of control without delivering it.

What actually works is treating cyber awareness as part of how the business operates, not as a once-a-year interruption. Short, relevant interventions. Regular reinforcement. Content that mirrors the real commercial risks your organisation faces.

This isn’t about doing more training. It’s about doing less, better, and more often.

Executives are not exempt. They’re exposed

Senior leaders are prime targets. Their access, authority, and time pressure make them attractive to attackers. Yet in many organisations, executives are the least engaged audience for cyber training.

That sends a signal, and culture follows signals.

When leadership participates visibly, cybersecurity stops being seen as an IT issue and starts being understood as a business discipline, on par with finance, legal, or health and safety. Not because policy says so, but because behaviour demonstrates it.

Behaviour beats awareness

Slide decks don’t change behaviour. Scenarios do.

Tabletop exercises, realistic phishing simulations, and decision-based discussions force people to think the way they would in real conditions. They expose gaps in authority, process, and escalation; the things that actually matter when something goes wrong.

For decision makers, these moments are often more revealing than any risk dashboard. They surface how decisions are made under pressure, not how risks are described on paper.

Blame is expensive

If people are afraid to admit mistakes, you lose time, and time is the one thing you don’t have in an incident.

The organisations that handle cyber events best are not the ones that never make mistakes. They’re the ones who surface issues early, respond quickly, and learn fast. That only happens in cultures where reporting is encouraged rather than punished.

Replacing blame with speed isn’t a soft approach. It’s a commercially rational one.

Leadership is the control plane

Cybersecurity training becomes effective when leaders stop asking whether training has been completed and start asking whether their people would make the right call under pressure.

If the answer is uncertain, the solution isn’t another module or platform. It’s leadership involvement, practical rehearsal, and a culture that treats cyber risk as a shared operational responsibility.

The organisations that handle incidents best aren’t the ones with the most tools; they’re the ones where people know how to think when something doesn’t look right. That doesn’t happen by accident. It happens when leadership treats cybersecurity training as a strategic capability rather than an HR obligation.

If you want fewer surprises, faster decisions, and lower business impact when incidents occur, the investment isn’t just technical. It’s visible, consistent leadership. Because when leaders take cybersecurity seriously, the rest of the organisation follows, and that’s when training finally starts to stick.

Dell Innovation - vettdd.com

Where technology experts come to think out loud