SANS Security Awareness Report 2024 v2
SANS Security Awareness Report 2024 v2
a Strong
Security Culture
SANS 2024 Security Awareness Report ®
SANS 2024 SECURITY AWARENESS REPORT®
Table of Contents
Executive Summary 3
Key Findings 3
How to Grow Your Compensation and Career: Action Items for Non-Technical Individuals 20
How to Grow Your Compensation and Career: Action Items for Technical Individuals 21
Acknowledgements25
About SANS Security Awareness 26
2
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
Executive Summary
3
SANS 2024 SECURITY AWARENESS REPORT®
4
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
5
SANS 2024 SECURITY AWARENESS REPORT®
Section 1
Benchmarking Your Program
This section provides a framework and resources to identify the maturity of your organization’s security awareness
program, data you can use to benchmark your program, as well as risks and challenges that a security awareness program will
face and must overcome to successfully cultivate a security-minded workforce.
Figure 1
6
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
As outlined in the Security Awareness Maturity Model ®, the different levels of programs are as follows:
7
SANS 2024 SECURITY AWARENESS REPORT®
Select Your Program’s Maturity Level Using the Security Awareness Maturity Model
Nonexistent 37
Awareness/
Behavior Change 425
Sustainment/
Culture Change 267
Metrics
Framework 118
numbers of respondents
Figure 2
Top Human Risks: What are the top three concerns or human risks you are focusing on for 2024?
Passwords/
Strong Authentication 45%
Detecting/
Reporting Incidents 43%
Social Networks/
Social Media 19%
Cloud 19%
Training Compliance
Failure 14%
Other 7%
0 10 20 30 40 50 60 70 80 90 100
percentage of respondents
Figure 3
8
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
1 Social Engineering
This category refers to the three most common
social engineering attacks: email-based phishing,
3 Detection/Reporting
Detection and reporting tied with passwords/
authentication in the risk ranking. Detection/reporting
text based smishing, and voice-based vishing. While as a top concern is a positive development, as it implies
phishing remains the primary social engineering organizations are going beyond just the human firewall
attack method, we see a rise in both numbers (prevention) to developing the human sensor (detection/
and sophistication in smishing and vishing. This response) which helps organizations reduce attacker
is in part as organizations are getting better at dwell time. The key to developing a human sensor
detecting and stopping phishing attacks, but also network is not only training your workforce on what to
because fewer organizations have control over and look for, but also making it as simple as possible to report
visibility into employees’ mobile devices. Social a suspected incident. In addition, your security culture
engineering attacks were by far the top human is key. How likely are people to report an incident if they
risk identified by respondents as technology know they caused it? If you have a highly trusted security
alone can only go so far in stopping them. In culture, people are far more likely to report. If you have
addition, with the growth of Artificial intelligence a toxic or punitive security culture, people are far more
(AI), it is becoming easier for cyber threat likely to hide and not report an incident they caused.
actors to create customized social engineering
attacks in any language or voice they want.
2 Passwords/Authentication
How people authenticate and manage their
passwords was a top risk, but we were expecting
4 Artificial Intelligence
This is the first year AI popped up as a risk, and
unsurprisingly so. The issue we see with AI is not that it is
this risk to be ranked closer to social engineering. inherently vulnerable or unsafe, it’s that AI is so new that
One reason we believe passwords are perceived organizations are struggling to figure out how to use it
as a lower risk is the active deployment of and the risks, policies, and controls that must be in place
numerous authentication controls such as to manage those risks. For many organizations, addressing
identity access management (IAM), single sign- the risks of AI will be similar to cloud-based software
on (SSO), and multi-factor authentication (MFA). as a service (SaaS) models. Until organizations address
Authentication is a primary attack vector, and these issues, cybersecurity teams will struggle to figure
as a result, organizations are investing heavily out what to tell the workforce and how to train them.
in controls to enable strong authentication.
9
SANS 2024 SECURITY AWARENESS REPORT®
Program Challenges: What do you feel are the two biggest challenges limiting your ability to succeed?
50
40
41%
37%
30
29%
20
9% 9%
7%
0
Lack of Time Lack of Staff Lack of Budget Weak Leadership Lack of Weak Requires Skills Other
Partnerships Support Workforce Prioritization Development
Engagement
Figure 4
10
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
EDUCATIONCULTURE
MANAGEMENT
SAFETY
CYBER
AWARENESS RISK
CYBER TRAINING
INFORMATION
AWARENESS
CYBERSECURITY
TRAINING RISK
MANAGEMENT
CYBERSECURITY INFORMATION
SAFETY
EDUCATION
CULTURE
CYBER
RISK
11
SANS 2024 SECURITY AWARENESS REPORT®
420
300
numbers of respondents
200
215 210
100
67 25
52 12 10 7
40
0
Cybersecurity Information Other Operations Legal/Audit/ Risk Project Training/ Human Communications
Team Technology Compliance/ Management Management Education Resources
Team GRC
Figure 5
12
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
Finance 205
Other 193
Operations 170
Communications/
Branding 134
Legal/Audit/Compliance 60
Information Technology 54
Learning/Training/
Education Team 52
Project Management
Office 48
Information Security/
Risk Management 9
numbers of respondents
Figure 6
Security Team: How strong is your relationship with the information security team?
Do you actively partner with them on understanding threats, identifying human risks,
helping with outbound communications, or interacting with the workforce?
numbers of respondents
Figure 7
13
SANS 2024 SECURITY AWARENESS REPORT®
Section 2
Maturing Your Program
Now that you have a better understanding of your security awareness program’s maturity and the
data you can use to benchmark your program, we need to identify the key drivers of program maturity and
what you can do based on that information. Once again, this year’s survey found a strong correlation between
the size of a security awareness team and program maturity: the larger your team, the greater your program’s
maturity level. To determine size, we asked respondents to report how many FTEs supported their awareness
program. By FTE, we mean individuals who spend 75% or more of their time on security awareness.
This finding makes sense: managing human risk is a “people problem,” so it requires people to drive the solution.
Organizations with the largest security awareness teams are able to most effectively partner with multiple
departments, understand and address their top human risks with relevant resources and engaging content,
and frequently communicate with, train, and secure their workforce. To have an impact, most programs need at
least a combined effort of 1.8 FTEs to effectively change behavior, this means at least 1.8 people who focus 75%
or more of their time on the program. The most mature security awareness programs on average have at least
4 combined FTEs dedicated to or helping manage the program. You will notice these numbers have gone down
from last year, which is attributed to the new wording of the question. We are no longer asking how many people
contribute to your program. Instead, we narrowed the scope of the question by asking how many people dedicate
75% or more of their time to the program. We felt this was a more accurate way of measuring the impact of an
awareness program’s FTE count. Either way the question is framed, for the past five years the results have remained
consistent. The more people dedicated to or working on a security program, the more mature the program.
Nonexistent 1.14
Awareness/
Behavior Change 1.81
Sustainment/
Culture Change 2.62
Metrics
Framework 4.18
We are often asked, “How many FTEs do I need?” Unfortunately, there is no simple answer. We examined
various approaches to quantify an answer, however, we found that because every organization has different
goals, mission, and risk tolerance, any correlations were tenuous at best. We found no connection between
number of FTEs and number of employees. Further, we found that it did not matter whether a company had
5,000 or 250,000 employees. In many ways it takes the same effort to run monthly phishing simulations, launch
and track computer-based training, create and push email, develop infographics, work with the cybersecurity
team to identify top risks, and partner with the Communications or Human Resources departments.
14
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
One challenge large organizations often face is scaling their security awareness program. Reaching large numbers
of people in different regions, roles, cultures, or languages is especially difficult. So, the larger your organization,
the larger your security awareness team must be. Conversely, even relatively small companies (approximately
1,000 employees) still need a baseline of at least 1.5 FTEs dedicated to the security awareness team. If you are
looking for a more linear approach to sizing your security awareness team, consider a 10:1 ratio, i.e., for every
ten people on your cybersecurity team, delegate one person to focus on the human side of cybersecurity.
Compare, if you will, the two different ways a security awareness officer role could be described. Example 1 is
how most awareness officers describe their job, in terms of what they do, while example 2 is more risk focused.
The actions of each example effectively engage the workforce. The problem is one of perception. Leadership may
perceive the role described in the first example as a job in digital entertainment. Then notice the second example.
Its description is risk focused and therefore more likely to connect with and gain the support of leadership.
Example 1
Hi, my name is Renan, and I’m the Security Awareness Officer.
I’m the person managing all of our security training activities.
For example, I co-led the newly released security awareness
micro-videos and posters as well as last month’s guest speaker
symposium. We are even more excited about next month as we
start a new series of security memes and interactive webcasts.
Our goal is to increase workforce participation by 26%.
Example 2
Hi, my name is Renan, and I’m the Security Awareness
Officer. I manage our human risk and ultimately drive a
strong security culture. Did you know that our employees
were the key drivers in over 75% of all security incidents
in the past year? I work with the cybersecurity team to
engage, train, and change our workforce’s behaviors
so they act in a far more secure manner. Our goal is to
dramatically reduce our workforce’s risk, increasing our
ability to securely make the most of technology, including
adopting AI as part of our new innovation initiative.
15
SANS 2024 SECURITY AWARENESS REPORT®
4
culture. Partner your SOC, incident response, and
cyber threat intelligence teams to better understand Leverage AI
not only what they do, but also how you can help If you don’t have the budget to hire additional
them solve their human-risk-related challenges. resources, leverage generative AI (GenAI). In many
ways, GenAI can act as an intern or subject matter
2
expert to help with all of your needs, from creating
Demonstrate the Investment Gap Between emails and content to data or risk analysis. You
Technical and Human-Focused Security and your team are still responsible for the final
Explain that while your organization has become results, but GenAI is becoming extremely powerful
very effective at securing technology, it has in giving you back your most precious resource
under-invested in the human side, leaving its – time. Learn more how to leverage GenAI in
workforce (and culture) vulnerable. A simple but managing human risk in this series of blog posts.
effective way to demonstrate this is to count how
5
many people are on your cybersecurity team
then count how many of them are dedicated to Develop Partnerships
the technology side versus the human side. We You can’t do everything yourself. The more you
often see 50-person cybersecurity teams with can partner with other departments in your
only one person focused on the human side. organization, the more effective your team will
And then we wonder why people are the primary be. Partner with Communications to help engage
attack vector. As a starting point, consider having and communicate with your workforce, Human
a 10:1 ratio of technical security professionals Resources to help with new hires or to measure and
to human-focused security professionals. build a strong culture, and Business Operations to
help analyze metrics and data points. Developing
partnerships is something you do not accomplish
overnight, it takes time to build trust. Try to take
key people out for a coffee once a month, or ask
if you can sit in on one of their monthly team
meetings. Listen and learn what their challenges
are and how to best support and work with them.
16
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
Section 3
Compensation and Career
The goal of this section is to enable security awareness professionals to grow their skills, careers, and compensation.
Compensation
Similar to past years, we wanted to know the average salaries for security awareness practitioners. The average annual salary
for a security awareness role in 2024 was $108,483. This is a $10,000 increase from 2023. Keep in mind this draws on responses
from all industries and regions. In terms of geography, North America has the highest average annual salary at $129,905.
Asia-Pacific $87,464
salary average
Figure 9
We looked at a variety of other variables to determine which had the greatest impact on pay. The two biggest
variables seen in 2024 were industry and background. The highest-paying industries were healthcare, pharma,
real estate, and consumer goods, averaging $125,000/yr. The utilities and finance sectors were close seconds. The
industries paying the least were metals, mining, accommodation, and automotive, averaging $70,000/yr.
We saw even more dramatic numbers based on background. The highest paid people were those with backgrounds
that included technical skills like software developer, IT administrator, and information security, at roughly $115,000/yr.
Surprisingly, those with legal and compliance backgrounds were the top earners in terms of compensation at $130,000/yr.
The lowest compensated backgrounds were marketing, graphic design, and human resources at $65,000.
Once again, these numbers are based on a global data set and not adjusted for region.
Finally, and unsurprisingly, the maturity of your program can be a big indicator of your pay. Individuals who
reported the maturity level of their program at the highest stage (Stage 5, Strategic Metrics Framework) were
on average paid twice as much as people reporting that they did not have an awareness program or were
just starting one. This makes sense as organizations that have the highest maturity levels are most likely the
organizations willing to invest in the people to run, monitor, and maintain a security awareness program.
17
SANS 2024 SECURITY AWARENESS REPORT®
Marketing/
Graphic Design $63,015
Physical Security/
Law Enforcement/ $97,620
Military
Training/Education $99,263
Project
Management $99,736
Communications/
Public Relations/ $102,647
Journalism
Information
Technology/ $104,744
Networking
Information
Security $114,778
Other $115,227
Software
Development $124,976
Legal/Audit/
Compliance $130,202
salary average
Figure 10
Nonexistent $64,529
Compliance
Focused $106,185
Awareness/
Behavior Change $104,445
Sustainment/
Culture Change $111,594
Metrics
Framework $132,878
salary average
Figure 11
18
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
Awareness 75 Security Awareness and Training, Global Cybersecurity Awareness Leader, Head of Information Security Awareness
Training 27 Security Awareness and Training, Security Training Specialist, Training and Development Lead in Security
Culture 19 Security Awareness and Culture Lead, Security Manager, Security Culture Coordinator
Human Risk 5 Human Risk Analyst, Cyber and Human Risk Manager, Human Risk and Security Advisor
Senior Manager Security Awareness and Communication, Communication and Information Security Officer,
Communication 4
IT Security Communication Strategist
Influence 2 Associate Security Analyst (with an influence on security policies), Influencer of IT Security
Table 1
0 10 20 30 40 50 60 70 80 90 100
percentage of respondents
Figure 12
19
SANS 2024 SECURITY AWARENESS REPORT®
20
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
While highly technical individuals often understand cybersecurity concepts, technology, and controls, we often see
them struggle to effectively engage and secure their workforce. Quite often, outreach, communications, and training
initiatives by these experts are confusing and difficult to follow or even overwhelming or intimidating for those with less
expertise in the field. This is due to a cognitive bias called the “curse of knowledge,” which states that the more expertise
someone has on a specific subject, the more likely they are to expect others to know as much as they do on the subject.
This cognitive bias can make it difficult for an expert to effectively teach or communicate a subject in which they excel.
This can be especially true in the highly technical world of cybersecurity. Security awareness professionals with strong
technical security backgrounds should be aware of their “curse of knowledge” and take measures to compensate for it.
21
SANS 2024 SECURITY AWARENESS REPORT®
Appendix A
Security Awareness Maturity Model®
Indicators Matrix
NOTE: You can download a digital copy of the Maturity Model Indicator Matrix here. Use the matrix to identify the current state
of your program’s maturity, its desired future state, and the steps that must be taken to get there.
DOWNLOAD
22
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
Appendix B
Career Development
Organizations and security leaders know for a fact that cybersecurity is no longer a technical challenge alone,
but a human challenge as well. Cybersecurity teams around the world are looking for trained professionals
specializing in the human side of cybersecurity. Whether you are interested in a career in security awareness
or currently in the field and want to develop your skills, career, and compensation, SANS Institute offers
several key introductory, intermediate, and advanced level courses to accelerate your career growth.
Still not sure which course is right for you? Contact a SANS Student
Success Representative today.
23
SANS 2024 SECURITY AWARENESS REPORT®
OUCH! Newsletter
Advanced Level SANS’s monthly OUCH! security awareness
Once you have 5-7 years of experience and want to truly develop your newsletter focuses on a new topic each month
cybersecurity leadership skills, consider LDR514. This course walks you through and is led by a guest editor subject matter
the strategic planning process and challenges today’s CISOs face. Many people expert. Translated into twenty languages, share
consider this the “CISO Course,” as it helps develop new and experienced CISOs OUCH! with your family, friends, and/or as
into better security leaders and more effective business communicators. By better part of your security awareness program.
understanding CISO challenges, priorities, and concerns, you can more effectively
collaborate with senior leadership and communicate in their terms and language.
24
E M B E D D I N G A S T R O N G S E C U R I T Y C U LT U R E
Acknowledgements
The 2024 Security Awareness Report was developed by and for the community, in partnership
with SANS Institute. The following key contributors produced this report.
25
About SANS Security Awareness