How to Build and Sustain a Successful Security Champions Program

How to Build and Sustain a Successful Security Champions Program

Jul 11

Andy Wood
Andy WoodAndy Wood is the Group Director of Security Strategy & Culture at Capita and is a leading expert on empowering individuals and organizations to build resilient cybersecurity habits. As founder of CyBehave, Andy develops resources and research that blend behavioral science and cultural anthropology, emphasizing that cybersecurity is fundamentally a human discipline. He is also the author of several influential books, including "Building a Cybersecurity Culture" and "Deceived – We Click, We Trust, We Get Hacked," which explore how human psychology and historical patterns shape digital risk.
View Profile

Establishing a Security Champions Program (SCP) can be a transformative step towards embedding a resilient cybersecurity culture across an organization. However, many businesses underestimate the ongoing challenges that extend far beyond the initial setup phase. Building an effective program is not just about appointing enthusiastic individuals; it requires a through-life approach that considers sustainability, scalability, and adaptability in an ever-changing business and threat environment.

The Challenge of Initial Set-Up

Getting started is often the most visible challenge. Identifying the right individuals, securing initial buy-in from managers, and establishing the scope and objectives of the program can feel like a mountain to climb. Early momentum can be lost if the program is not aligned with the organization’s goals, lacks clear governance, or fails to provide immediate value to participants and the business.

To address this, the SCP must be clearly positioned as a strategic enabler of business resilience, with its goals tied directly to operational and security objectives. Champions should be selected based not only on their interest but on their influence, trust, and connectivity within their teams. Early training and support must focus on equipping them with practical knowledge and the confidence to engage peers, not on making them mini-security experts.

Sustaining Momentum and Energy

Once the program is in place, the more complex challenge begins: maintaining energy, engagement, and relevance over time. Without regular input, support, and recognition, champions may drift from their role, especially when faced with competing work priorities. Boredom, repetition, and lack of perceived impact can all contribute to fatigue.

Sustaining momentum requires a deliberate strategy of engagement and recognition. This includes varied communication, regular knowledge-sharing forums, visible wins, and leadership endorsement. Celebrating success, such as sharing champion-led improvements or incident prevention stories, can help keep the purpose fresh and reinforce value. Importantly, Security Champions must not operate in isolation. Creating community through structured peer networks, buddy systems, or regional groups can foster a sense of shared purpose and keep ideas flowing.

Evolving with the Business and the Threat Landscape

As the organization changes, so must the SCP. Business models shift, new geographies and units emerge, digital transformation introduces new risks, and hybrid working patterns reshape team dynamics. What worked in year one may no longer be effective in year three.

To adapt effectively, the SCP must be designed with flexibility. Champions should be encouraged to surface emerging risks and business changes from their areas, serving as a feedback loop into the central security team. Regular reviews of the SCP should ensure that its training, materials, and focus areas remain aligned with the evolving business landscape. This might include expanding champion responsibilities into new risk areas such as data privacy, fraud awareness, or secure use of generative AI tools.

The external threat landscape is also accelerating, driven by increased digitalization, third-party dependencies, and sophisticated social engineering attacks. Champions can act as the eyes and ears of the security function, enabling rapid identification of localized vulnerabilities or behavioral concerns. To do this effectively, they must be given up-to-date insights, tailored briefings, and simple materials they can share with their peers.

Addressing Time, Resource Constraints, and the Need for Strong Leadership

One of the most common barriers to SCP effectiveness is time. Champions typically hold roles with core business responsibilities, and their capacity to engage in security activities is limited. Without clear support from line managers or executive sponsors, security can quickly fall off their radar.

Gaining board-level support is crucial to protect champion time and signal that security is a priority across the business. This support must be more than lip service; it should translate into performance metrics, recognition schemes, and formalized commitments within job plans. Business leaders should understand that time invested in the SCP is time invested in protecting the organization.

At the same time, the SCP must be delivered as leanly as possible. However, it is critical not to underestimate the importance of strong, experienced leadership at the helm of the program. A dedicated SCP lead is essential for ensuring the network receives the time, support, and strategic alignment it needs to succeed. The lead must be able to engage proactively with the network, develop impactful materials, run workshops, provide reinforcing feedback, measure progress, report outcomes, and adapt the strategy to meet evolving needs. These tasks require significant time and expertise, far beyond what can be achieved in spare hours alongside another full-time role.

As the SCP matures, the need for additional support becomes more apparent. Some of this can be drawn from within the SCN itself, particularly champions with capacity and appetite to contribute to design or delivery. However, other support functions – such as communications, graphic design, and content creation – may lie outside the security team. It may also become necessary to appoint dedicated team members responsible for content development, training delivery, meeting facilitation, and administrative functions like onboarding, scheduling, and data reporting.

The goal should be to maximize the SCP lead’s time on value-adding work, not administration. Investing in support roles and services helps sustain program momentum and ensures that the SCP continues to evolve and deliver against business needs. This means creating resources that are easy to use, scalable, and low-maintenance. Examples include monthly pre-prepared slide decks, plug-and-play campaign kits, and quick 5-minute conversation guides. Central coordination should focus on enabling and curating rather than controlling. Champions should have the autonomy to deliver messages in a way that fits their team’s culture and workflows, supported by tools rather than mandates.

Creating Long-Term Impact

For a SCP to endure, it must become part of the organizational fabric. This means embedding champion activities into existing rhythms of the business– team meetings, onboarding processes, and staff training days so they become normalized rather than additional.

It also means nurturing a pipeline of future champions and having mechanisms to onboard, off-board, and rotate members efficiently. Exit interviews with former champions can provide insights into what worked and what didn’t, feeding into continuous improvement.

Finally, impact must be measured. Not purely by counting champions, but by understanding how the program is influencing behavior, supporting incident response, and improving overall resilience. Qualitative feedback, behavioral indicators, and metrics tied to broader human risk goals can provide a compelling case to keep investing.

Conclusion

An effective Security Champions Program is not a one-time initiative; it is a living, adaptive part of a mature security culture. Success lies in designing for the long haul – keeping it lean, flexible, and grounded in business value. With the right support, structure, and strategic vision, an SCP can transform an organization’s security culture from the inside out, helping every employee play their part in keeping the organization secure.

Share

Unlock Unprecedented Engagement with Cybersecurity

Related Articles
How to Build and Sustain a Successful Security Champions Program
Andy Wood
11/07/2025

How to Build and Sustain a Successful Security Champions Program

Read More about AI-Native Cybersecurity Human Risk Management
It’s Time to Make Peace With Imperfection in Cybersecurity Human Risk Management
Thea Mannix
27/06/2025

It’s Time to Make Peace With Imperfection in Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Why I Refused to Say “People Are the Weakest Link in Cyber”
Jane Frankland
26/06/2025

Why I Refused to Say “People Are the Weakest Link in Cyber”

Read More about AI-Native Cybersecurity Human Risk Management
Can Your People Outthink a Deepfake?
Olivia Debroy
19/06/2025

Can Your People Outthink a Deepfake?

Read More about AI-Native Cybersecurity Human Risk Management
Trusting HTTPS Could Be Your Biggest Mistake - Here’s Why
Olivia Debroy
16/06/2025

Trusting HTTPS Could Be Your Biggest Mistake - Here’s Why

Read More about AI-Native Cybersecurity Human Risk Management
The Human Risk Behind Scareware Attacks
Olivia Debroy
13/06/2025

The Human Risk Behind Scareware Attacks

Read More about AI-Native Cybersecurity Human Risk Management
Why Whaling Attacks Are the Caviar of Cybercrime
Olivia Debroy
10/06/2025

Why Whaling Attacks Are the Caviar of Cybercrime

Read More about AI-Native Cybersecurity Human Risk Management
Biometrics Are Here: Are We Ready for the Human Risks?
Olivia Debroy
06/06/2025

Biometrics Are Here: Are We Ready for the Human Risks?

Read More about AI-Native Cybersecurity Human Risk Management
I’m a Human Risk Manager (I Think?)
John Scott
03/06/2025

I’m a Human Risk Manager (I Think?)

Read More about AI-Native Cybersecurity Human Risk Management
How Microsoft’s ‘Passwordless by Default’ Might Save Security
Olivia Debroy
28/05/2025

How Microsoft’s ‘Passwordless by Default’ Might Save Security

Read More about AI-Native Cybersecurity Human Risk Management
The Cyber Risk Within: Insider Threats
Olivia Debroy
26/05/2025

The Cyber Risk Within: Insider Threats

Read More about AI-Native Cybersecurity Human Risk Management
What Is ‘Human Risk’ in Cyber?
Olivia Debroy
22/05/2025

What Is ‘Human Risk’ in Cyber?

Read More about AI-Native Cybersecurity Human Risk Management
What if Agentic AI Could Stop Human Risks Before They Happen?
Olivia Debroy
19/05/2025

What if Agentic AI Could Stop Human Risks Before They Happen?

Read More about AI-Native Cybersecurity Human Risk Management
How to Run a Cybersecurity Awareness Training Program in Academia
Ravi Miranda
15/05/2025

How to Run a Cybersecurity Awareness Training Program in Academia

Read More about AI-Native Cybersecurity Human Risk Management
Phishing in 2025: Cybercriminals Are Smarter Than You Know
Olivia Debroy
14/05/2025

Phishing in 2025: Cybercriminals Are Smarter Than You Know

Read More about AI-Native Cybersecurity Human Risk Management
Why Cybersecurity Human Risk Management Benefits CISOs
Gry Evita Sivertsen
29/04/2025

Why Cybersecurity Human Risk Management Benefits CISOs

Read More about AI-Native Cybersecurity Human Risk Management
The Strategic Role of Adaptive Security Awareness Training Content
Roberto Ishmael Pennino
21/04/2025

The Strategic Role of Adaptive Security Awareness Training Content

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity's Comfort Zone Problem
Jane Frankland
15/04/2025

Cybersecurity's Comfort Zone Problem

Read More about AI-Native Cybersecurity Human Risk Management
Turning Employees into Payment Security Champions: Your Guide to Free PCI Awareness Training
Roberto Ishmael Pennino
11/04/2025

Turning Employees into Payment Security Champions: Your Guide to Free PCI Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
AI Phishing: The Rising Threat of Intelligent Cyber Deception
Roberto Ishmael Pennino
02/04/2025

AI Phishing: The Rising Threat of Intelligent Cyber Deception

Read More about AI-Native Cybersecurity Human Risk Management
What Maslow’s Hierarchy of Needs Reveals About Cybersecurity Flaws
Jane Frankland
01/04/2025

What Maslow’s Hierarchy of Needs Reveals About Cybersecurity Flaws

Read More about AI-Native Cybersecurity Human Risk Management
Smishing: The Phishing Attack That Lives in Your Pocket
Roberto Ishmael Pennino
24/03/2025

Smishing: The Phishing Attack That Lives in Your Pocket

Read More about AI-Native Cybersecurity Human Risk Management
How Adaptive Security Awareness Training Drives Better Cybersecurity Outcomes: The Science
Rory Attwood
11/03/2025

How Adaptive Security Awareness Training Drives Better Cybersecurity Outcomes: The Science

Read More about AI-Native Cybersecurity Human Risk Management
Quishing: When QR Codes Become Cyber Traps - Your Essential Guide to Protection
Roberto Ishmael Pennino
10/03/2025

Quishing: When QR Codes Become Cyber Traps - Your Essential Guide to Protection

Read More about AI-Native Cybersecurity Human Risk Management
Domain Spoofing: The Cyber Trick You Can’t Afford to Ignore
Roberto Ishmael Pennino
10/03/2025

Domain Spoofing: The Cyber Trick You Can’t Afford to Ignore

Read More about AI-Native Cybersecurity Human Risk Management
PIPEDA Compliance: Why PIPEDA Training is Important
Roberto Ishmael Pennino
21/02/2025

PIPEDA Compliance: Why PIPEDA Training is Important

Read More about AI-Native Cybersecurity Human Risk Management
CCPA Training: Building a Culture of Privacy and Compliance
Roberto Ishmael Pennino
10/02/2025

CCPA Training: Building a Culture of Privacy and Compliance

Read More about AI-Native Cybersecurity Human Risk Management
Data Privacy Week: How Convention 108 Paved the Way for Modern Privacy Laws
Roberto Ishmael Pennino
31/01/2025

Data Privacy Week: How Convention 108 Paved the Way for Modern Privacy Laws

Read More about AI-Native Cybersecurity Human Risk Management
TISAX Training: Strengthening Automotive Information Security and Compliance
Roberto Ishmael Pennino
27/01/2025

TISAX Training: Strengthening Automotive Information Security and Compliance

Read More about AI-Native Cybersecurity Human Risk Management
GDPR Training: Building a Culture of Compliance
Roberto Ishmael Pennino
20/01/2025

GDPR Training: Building a Culture of Compliance

Read More about AI-Native Cybersecurity Human Risk Management
What Is DORA? DORA Training for Compliance
Dr. Charlotte Jupp
20/01/2025

What Is DORA? DORA Training for Compliance

Read More about AI-Native Cybersecurity Human Risk Management
Risk Quantification for Cybersecurity Human Risk Management
Lev Lesokhin
13/12/2024

Risk Quantification for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive SAT: The Future Is Now
Roberto Ishmael Pennino
12/11/2024

Adaptive SAT: The Future Is Now

Read More about AI-Native Cybersecurity Human Risk Management
NIST Recommends New Guidelines for Password Security
Roberto Ishmael Pennino
11/11/2024

NIST Recommends New Guidelines for Password Security

Read More about AI-Native Cybersecurity Human Risk Management
Empowering Organizations with Adaptive Security Awareness Training
Roberto Ishmael Pennino
07/11/2024

Empowering Organizations with Adaptive Security Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
Why Humans Should Be the New Frontline in Cyber Defense
Roberto Ishmael Pennino
06/11/2024

Why Humans Should Be the New Frontline in Cyber Defense

Read More about AI-Native Cybersecurity Human Risk Management
Behavioral Analytics Are Changing Cybersecurity
Roberto Ishmael Pennino
04/11/2024

Behavioral Analytics Are Changing Cybersecurity

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Awareness Month 2024: Your Security Journey Doesn't End Here
Roberto Ishmael Pennino
01/11/2024

Cybersecurity Awareness Month 2024: Your Security Journey Doesn't End Here

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Awareness Training for Remote Workforces
Roberto Ishmael Pennino
25/10/2024

Cybersecurity Awareness Training for Remote Workforces

Read More about AI-Native Cybersecurity Human Risk Management
Would You Skip an Update if You Knew What It Could Cost You?
Roberto Ishmael Pennino
24/10/2024

Would You Skip an Update if You Knew What It Could Cost You?

Read More about AI-Native Cybersecurity Human Risk Management
Why Every Cyber Strategy Fails Without This Element
Roberto Ishmael Pennino
22/10/2024

Why Every Cyber Strategy Fails Without This Element

Read More about AI-Native Cybersecurity Human Risk Management
Your Password Isn't Enough: Why Your Digital Life Needs Multifactor Authentication Today
Roberto Ishmael Pennino
21/10/2024

Your Password Isn't Enough: Why Your Digital Life Needs Multifactor Authentication Today

Read More about AI-Native Cybersecurity Human Risk Management
Is Your Cybersecurity Working From Home Too?
Roberto Ishmael Pennino
18/10/2024

Is Your Cybersecurity Working From Home Too?

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management Gets Adaptive
Lev Lesokhin
08/10/2024

Human Risk Management Gets Adaptive

Read More about AI-Native Cybersecurity Human Risk Management
Your Cybersecurity Is Only as Strong as Your People
Roberto Ishmael Pennino
08/10/2024

Your Cybersecurity Is Only as Strong as Your People

Read More about AI-Native Cybersecurity Human Risk Management
The Email That Could Cost You Everything: Your Essential Guide to Recognizing Phishing in 2024
Roberto Ishmael Pennino
07/10/2024

The Email That Could Cost You Everything: Your Essential Guide to Recognizing Phishing in 2024

Read More about AI-Native Cybersecurity Human Risk Management
How Ready Is Your Workforce for a Real Phishing Attack?
Roberto Ishmael Pennino
01/10/2024

How Ready Is Your Workforce for a Real Phishing Attack?

Read More about AI-Native Cybersecurity Human Risk Management
What is Cybersecurity Human Risk Management? What You Need to Know
Lev Lesokhin
23/09/2024

What is Cybersecurity Human Risk Management? What You Need to Know

Read More about AI-Native Cybersecurity Human Risk Management
Engagement Strategies for Cybersecurity Human Risk Management
Lev Lesokhin
16/08/2024

Engagement Strategies for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Enhance Your Phishing Training With Outthink
Lavinia Manocha
02/08/2024

Enhance Your Phishing Training With Outthink

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training for Frontline Workers
Lavinia Manocha
26/07/2024

Adaptive Security Awareness Training for Frontline Workers

Read More about AI-Native Cybersecurity Human Risk Management
The Role of Security Awareness Training After IT Outages
Lev Lesokhin
26/07/2024

The Role of Security Awareness Training After IT Outages

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management's Eight Dimensions of Secure Behavior Segmentation
Lev Lesokhin
25/07/2024

Human Risk Management's Eight Dimensions of Secure Behavior Segmentation

Read More about AI-Native Cybersecurity Human Risk Management
State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business
Lev Lesokhin
18/07/2024

State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training: Unlearning and Relearning Routines
Lev Lesokhin
10/07/2024

Adaptive Security Awareness Training: Unlearning and Relearning Routines

Read More about AI-Native Cybersecurity Human Risk Management
Did You Think Your Password Was Secure? Let’s Talk Password Security
Lev Lesokhin
24/05/2024

Did You Think Your Password Was Secure? Let’s Talk Password Security

Read More about AI-Native Cybersecurity Human Risk Management
Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework
Lev Lesokhin
23/05/2024

Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework

Read More about AI-Native Cybersecurity Human Risk Management
Password Security: Why the UK is Banning Generic Passwords
Lev Lesokhin
17/05/2024

Password Security: Why the UK is Banning Generic Passwords

Read More about AI-Native Cybersecurity Human Risk Management
Instagram Security Awareness Training: A Step-by-Step Guide
Lev Lesokhin
10/05/2024

Instagram Security Awareness Training: A Step-by-Step Guide

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Human Risk Management Forum Kicks Off in London
Lev Lesokhin
18/04/2024

Cybersecurity Human Risk Management Forum Kicks Off in London

Read More about AI-Native Cybersecurity Human Risk Management
Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step
Rory Attwood
31/01/2024

Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step

Read More about AI-Native Cybersecurity Human Risk Management