Select Page

How to increase the perceived value for what you do to manage human cyber risk

CYBSAFE-SebDB Webinar-preblog-221011MS-36

12 March 2025

Security professionals often struggle to quantify and communicate the business impact of human cyber risk management.

While it’s well known that the people aspect is an important part of any security and risk strategy, proving the ROI of managing human risk is more challenging.

Below is a comprehensive list of real-world examples demonstrating how human cyber risk initiatives align with core business priorities:

  1. Make us money (Revenue generation)
  2. Save us money (Cost reduction)
  3. Reduce our risk (Risk mitigation)
  4. Make us more productive (Efficiency gains)

Each example provides measurable metrics that security professionals can use to secure executive buy-in, justify budget, and align cybersecurity with business goals.

 

1. Make us money (Revenue generation)

1.1 Security as a competitive advantage in winning deals

 

  • X% of deals in our pipeline included security-related objections or requirements.
  • We successfully addressed Y%, progressing to contract negotiations.
  • Without strong human cyber risk controls, we would have lost $Z million in potential revenue.

Example
  • 35% of deals in our pipeline included security-related objections or requirements.
  • We successfully addressed 80%, progressing to contract negotiations.
  • Without strong human cyber risk controls, we would have lost $12.5M in potential revenue annually.

1.2 Increased eligibility for regulated industries and security-conscious customers

 

  • X% of contracts in regulated industries (finance, healthcare, government) required proof of human cyber risk controls.
  • By meeting these requirements, we secured $Y million in deals that would have been at risk.

 

1.3 Reduced sales cycle time by eliminating security objections

 

  • Previously, security concerns extended deal cycles by X weeks.
  • By proactively addressing human risk concerns, we cut security review time by Y%, accelerating contract signings by Z days.
  • This unlocked $A in additional revenue per quarter.

Example
  • Previously, security concerns extended deal cycles by 4 weeks on average.
  • By proactively addressing human risk concerns, we cut security review time by 30%, accelerating contract signings by 8 days.
  • This unlocked $3.2M in additional revenue per quarter.

1.4 Retaining existing customers by meeting evolving security requirements

  • X% of customers required us to meet updated security standards to renew contracts.
  • By demonstrating compliance, we retained Y% of customers at risk of churn, preserving $Z in annual recurring revenue (ARR).

 

1.5 Security as a revenue enabler for enterprise deals

  • X enterprise contracts worth $Y million would have been disqualified without strong human cyber risk controls.
  • Our improved security posture increased our eligibility for Z% more enterprise deals, driving revenue growth.

Example
  • 18 enterprise contracts worth $14.2M would have been disqualified without strong human cyber risk controls (as this represents 20% of the requirement).
  • Our improved security posture increased our eligibility for 25% more enterprise deals, driving revenue growth.

1.6 Preventing revenue loss by reducing security-related downtime

 

  • Each hour of downtime costs the business $X in lost productivity and sales.
  • 30% of the incidents resulting in downtime are related to user behavior.
  • By improving ABC user behavior we reduced security-related downtime by Y%, preventing $Z in lost revenue over the past year.

Example
  • Each hour of downtime costs the business $250,000 in lost productivity and sales.
  • By improving specific user behaviors we reduced security-related downtime by 40%, preventing $6.5M in lost revenue over the past year.

1.7 Security as a competitive advantage in winning deals

 

  • X% of contracts now require vendors to demonstrate compliance with MFA enforcement and strong password policies.
  • By ensuring 100% adoption of password managers and MFA among employees, we passed Y% of vendor risk assessments, winning $Z in contracts.

Example
  • 72% of contracts now require vendors to demonstrate compliance with MFA enforcement and strong password policies.
  • By ensuring 100% adoption of password managers and MFA among employees, we passed 90% of vendor risk assessments, winning $5.4M in contracts.

2. Save us money (Cost reduction)

2.1 Lowering compliance-related fines and penalties

 

  • Regulatory fines for security failures can reach $X per violation (GDPR, HIPAA, PCI-DSS).
  • Our improved security behaviors reduced non-compliance incidents by Y%, avoiding $Z in potential penalties.

Example
  • Regulatory fines for security failures can reach $20M per GDPR violation and $43,792 per HIPAA violation.
  • Our improved security behaviors reduced non-compliance incidents by 35%, avoiding $5.6M in potential penalties.

2.2 Reducing security-related IT support costs

 

  • Each IT support ticket related to security (e.g., account lockouts, phishing reports) costs $X in labor time.
  • By reducing these tickets by Y%, we saved $Z in IT support costs annually.

Example
  • Each IT support ticket related to security (e.g., account lockouts, phishing reports) costs $45 in labor time.
  • By reducing these tickets by 28%, we saved $1.1M in IT support costs annually.

2.3 Lowering costs by reducing security-related downtime

 

  • Security-related disruptions previously caused X hours of downtime per month.
  • By reducing incidents by Y%, we saved an estimated $Z in lost productivity annually.

Example
  • Security-related disruptions previously caused 240 hours of downtime per month.
  • By improving employee security behaviors we reduced incidents by 50%, and we saved an estimated $3.7M in lost productivity annually.

2.4 Optimizing security training to improve effectiveness while reducing spend

 

  • Traditional training programs cost $X per employee annually with a Y% engagement rate.
  • By switching to personalized, risk-based interventions, costs dropped by Z% per employee while improving engagement by A%.

Example
  • Traditional training programs cost $250 per employee annually with a 30% engagement rate.
  • By switching to personalized, risk-based interventions, costs dropped by 40% per employee while improving engagement by 65%.

2.5 Reducing costs of breach recovery and incident response

  • The average breach takes X days to recover from and costs $Y in investigation, containment, and mitigation efforts.
  • By reducing human-related incidents by Z%, and improving the post-incident engagement and behavior interventions, we’ve saved $A in breach response costs over the past year.

Example
  • The average breach takes 21 days to recover from and costs $4.45M in investigation, containment, and mitigation efforts.
  • By reducing human-related incidents by 45%, and improving the post-incident engagement and behavior interventions, we’ve saved $2.1M in breach response costs over the past year.

2.6 Reducing financial impact of security incidents

 

  • The average insider-related breach costs $15.38M per incident (Ponemon).
  • We implemented automated behavioral risk reporting, reducing unintentional insider-related security events by X%.
  • Data loss incidents due to improper document sharing were reduced by X% through automated security nudges.
  • Identified and mitigated Y high-risk employee behaviors, preventing $Z in potential financial losses.
  • Prevented Y accidental sensitive data leaks, avoiding $Z in compliance fines.

Example
  • Insider-related breaches cost $15.38M per incident.
  • We implemented automated behavioral risk monitoring, reducing unintentional insider-related security events by 32%.
  • Data loss incidents due to improper document sharing were reduced by 40% through automated security nudges.
  • Identified and mitigated 85 high-risk employee behaviors, preventing $4.7M in potential financial losses.

 

3. Reduce our risk (Risk mitigation)

3.1 Measuring the effectiveness of human risk management

 

  • Weak/reused passwords decreased by C%.
  • Unapproved data sharing incidents reduced by D%.
  • Overall user-related incidents dropped by E% over the past year.
  • 🟢 Employees reporting security concerns increased by Z%. 
  • 🟢 Shadow IT use (unauthorized software) reduced by A%.

Example
  • Weak/reused passwords decreased by 50%.
  • Unapproved data sharing incidents reduced by 35%.
  • Overall user-related incidents dropped by 42% over the past year.
  • Employees reporting security concerns increased by 28%.
  • Shadow IT use (unauthorized software) reduced by 47%.

3.2 Reducing risks associated with password security and authentication

  • X% of breaches are caused by compromised credentials (Verizon DBIR).
  • 🟢 Improvements in security behaviors associated with using password managers and MFA adoption led to a Y% decrease in credential theft incidents.
  • 🟢 Reduced Z unauthorized access attempts, preventing potential account takeovers.

Example
  • 81% of breaches are caused by compromised credentials (Verizon DBIR).
  • Improvements in security behaviors associated with using password managers and MFA adoption led to a 48% decrease in credential theft incidents.
  • Reduced 2,500 unauthorized access attempts, preventing potential account takeovers.

3.3 Reducing security policy violations and regulatory compliance risks

 

  • Non-compliance fines can reach $X per violation.
  • By improving employee adherence to data protection policies from Y% to Z%, we reduced the likelihood of breaches and avoided $A in potential penalties.

Example
  • Non-compliance fines can reach $20M per GDPR violation.
  • By improving employee adherence to data protection policies from 60% to 95%, we reduced the likelihood of breaches and avoided $3.5M in potential penalties.

3.4 Reducing shadow IT risks

  • 🟢 X% of employees previously installed unauthorized software, creating security vulnerabilities.
  • 🟢 Automated detection, behavioral interventions, and policy reinforcement led to a Y% decrease in shadow IT use.
  • 🟢 Reduced Z instances of unapproved cloud storage usage, minimizing risk exposure.

Example
  • 20% of employees previously installed unauthorized software.
  • Automated detection, behavioral interventions, and policy reinforcement led to a 55% decrease in shadow IT use.
  • Reduced 1,200 instances of unapproved cloud storage usage, minimizing risk exposure.

3.5 Reducing security policy violations and compliance risks

 

  • 🟢 Failure to follow security policies (e.g., USB use, document handling) led to X incidents last year.
  • 🟢 Through increasingly effective behavioral interventions policy adherence improved by Y%, decreasing Z incidents requiring security intervention.

 

3.6 Strengthening password security to reduce credential theft

 

  • X% of security incidents in the past year involved weak or reused passwords.
  • Y% of employees have now adopted password managers, reducing credential compromise incidents by Z%.
  • Enforced multi-factor authentication (MFA) adoption led to a A% decrease in unauthorized account access.

3.7 Reducing compliance violations and audit risks

 

  • Failure to meet compliance requirements (GDPR, HIPAA, PCI-DSS) can result in fines of up to 4% of annual revenue.
  • Improved data handling and access control behaviors have ****reduced compliance violations by X%.
  • Reducing audit findings and non-compliance risks by Y%, saving Z hours of remediation work per year.

3.8 Decreasing security policy violations across the workforce

 

  • X% of employees previously engaged in risky behaviors, such as unauthorized cloud storage usage or sharing sensitive data.
  • Improved security behaviors and fewer policy breaches led to a Z% decrease in corrective actions and disciplinary measures.

3.9 Reducing data exfiltration risks

 

  • X% of security incidents involved unauthorized data transfers or accidental sharing.
  • Implementation of data loss prevention (DLP) controls, combined with improvements in DLP-related security behaviors reduced incidents by Y%.
  • Decreased Z instances of sensitive data exposure, mitigating potential reputational and financial damage.

Example
  • Unauthorized data transfers or accidental sharing led to 320 security incidents last year.
  • Implementation of data loss prevention (DLP) controls, combined with improvements in DLP-related security behaviors reduced incidents by 53%.
  • Decreased 190 instances of sensitive data exposure, mitigating potential reputational and financial damage.

3.10 Increasing threat detection response speed

 

  • The average time to detect and respond to human-driven security incidents was X hours.
  • Through automation, effective behavioral interventions, and real-time risk monitoring, we reduced response time by Y%, containing threats before escalation.

 

4. Make us more productive (Efficiency gains)

 

4.1 Automating human risk management to free up security team resources

 

  • Manual risk assessments and interventions previously took X hours per week.
  • By implementing automated behavioral interventions, we cut that by Y%, saving Z hours per week, allowing security teams to focus on high-priority threats.

Example
  • Manual risk assessments and interventions previously took 50 hours per week.
  • By implementing automated behavioral interventions, we cut that by 60%, saving 1,500 hours per year.
  • At an average IT/security analyst rate of $48 per hour, this equals $72,000 in direct cost savings annually.

4.2 Reducing security-related disruptions for employees

 

  • Security-related IT support requests previously accounted for X% of help desk tickets.
  • By reducing these incidents through automated and/or effective behavioral interventions by Y%, we saved employees an estimated Z hours of lost productivity per year.
  • Account lockouts and password resets were reduced by X%, saving Y IT support hours per month.
  • 🟢 Security automation for access requests reduced delays, saving Z employee hours per year.

Example
  • Account lockouts and password resets were reduced by 35%, saving 1,200 IT support hours per year.
  • At $48 per hour, this equals $57,600 in direct IT cost savings annually.
  • Security automation for access requests reduced delays, saving 5,400 employee hours per year.
  • At $36 per hour, this equals $194,400 in regained productivity.

4.3 Reducing unnecessary security friction while maintaining strong protections

 

  • Adaptive security controls reduced:
    • Account lockouts by X%.
    • Unnecessary MFA prompts by Y%, saving Z minutes per employee per week.
    • False positive security alerts by A%, reducing analyst workload by B hours per month.
    • Shadow IT alerts by X%.
    • Unnecessary access approval requests by Y%, reducing employee frustration.

4.4 Reducing time spent on security awareness training without compromising security

 

  • Employees previously spent X minutes per week on redundant security training.
  • By optimizing training, we reduced time spent by Y%, saving Z minutes per employee per week, which scales to A hours regained across the company annually.
  • 🟢 Personalized risk-based training reduced training time by Y%, saving Z hours across the organization annually.
  • Just-in-time security interventions replaced generic training, improving behavioral compliance by X% while reducing overall training time by Y%.

Example
  • Employees previously spent 40 minutes per week on security training.
  • Just-in-time interventions replaced generic training, improving compliance by 55% while reducing training time by 30%.
  • Personalized risk-based training reduced training time by 40%, saving 5,200 hours across the organization annually.
  • At an average employee cost of $36 per hour, this equates to $187,200 in regained productivity.
  • Just-in-time security interventions replaced generic training, improving behavioral compliance by 55% while reducing overall training time by 35%.
  • This saved an additional 3,900 employee hours annually, equating to $140,400 in regained productivity.
  • (9,100 employee hours saved per year. $327,600 in productivity regained annually).

4.5 Minimizing time wasted on phishing attack recovery

 

  • Each phishing attack requires X hours of investigation, containment, and mitigation.
  • By improving early detection and response, we reduced phishing recovery time by Y%, saving Z hours per month.

4.6 Streamlining security policies to improve workflow efficiency

 

  • Complex security policies previously slowed down employee workflows by X minutes per task.
  • By refining policies and introducing automated approvals, we improved efficiency by Y%, reducing employee frustration and increasing output.

 

4.7 Reducing time spent on repetitive security processes

 

  • Employees spent X minutes per week resetting passwords, managing access approvals, and reporting security issues.
  • Implementing self-service security tools reduced time spent by Y%, saving Z hours across the organization annually.

 

4.8 Creating capacity within security teams by reducing manual intervention

 

  • Before automation, security teams spent X hours per month manually handling user-related security risks.
  • By deploying risk-based security automation to target risky employee behavior, we reduced manual intervention by Y%, freeing Z hours per security analyst, and X hours per employee per year.

Example
  • Before automation, security teams spent 200 hours per month manually handling user-related security risks.
  • By deploying behavior risk-based security automation, we reduced manual intervention by 50%, freeing 200 hours per security analyst, and 3 hours per employee per year.
  • At $48 per hour, this equals $153,600 in direct cost savings annually.

4.9 Preventing productivity loss from ransomware and other disruptions

 

  • The average downtime from a ransomware attack is X days, costing $Y per day in lost productivity.
  • By implementing stronger human risk controls, incident reporting, and proactive interventions, we reduced ransomware infection rates by Z%, minimizing downtime risk.

Example
  • The average downtime from a ransomware attack is 15 days, costing $250,000 per day in lost productivity.
  • By implementing stronger human risk controls, incident reporting, and proactive interventions, we reduced ransomware infection rates by 35%, minimizing downtime risk by 5.3 days.
  • This prevented $1.3M in lost productivity.
Behave Hub newsletter CybSafe

Do one more thing right today. Subscribe to the Behave newsletter:

You may also like

Security metrics reboot: Less input, better output, real outcomes

Security metrics reboot: Less input, better output, real outcomes

Unfortunately, most security awareness professionals don’t really understand the difference between: ✅ Inputs✅ Outputs✅ Outcomes But they don’t want to admit it. And honestly? We get it. It’s like pretending to know the plot of Inception when deep down, you’re just as confused as everyone else. No...

The dogma of security awareness: Exposing cybersecurity’s biggest blind spot

The dogma of security awareness: Exposing cybersecurity’s biggest blind spot

“Humans are the weakest link.”“Security Awareness training = better behaviour”"If we can nail engagement, we’ll nail risk reduction.""Security Awareness is *actually* about so much more than awareness.”“Security culture is the golden ticket to risk reduction.”“Good communication, messaging,...

Can BS make SA&T stick? Hot takes from the experts…

Can BS make SA&T stick? Hot takes from the experts…

Using insights from “Oh, Behave!” to strengthen security training and drive lasting behavioral change Security training. It’s as commonplace in an organization as writing “see attached” and forgetting to attach anything. It can help to tackle cybersecurity risks—but only when done well. Simply...

Maximizing security awareness engagement: How the pros do it

Maximizing security awareness engagement: How the pros do it

Ditch mandatory training, starting riiiight…now!Want to boost security awareness? Talk about something else entirelyGet serious about funThe top mic-drop insights from our Cybersecurity Awareness Month engagement webinar We know people whose organizations make a big deal of CAM are much more...