.st0{fill:#FFFFFF;}

Why I Refused to Say “People Are the Weakest Link in Cyber” 

 June 24, 2025

By  Jane Frankland

I froze when the question came in. If you work in cyber, you’ll know this question all too well. It’s the one that continues to resurface, both in boardrooms and at industry events:

“Why are people still the weakest link?”

Yes, it was familiar. Yes, it was provocative. But as I stood on stage, reading from my notes, I paused, looked at the question… and moved on to another.

I couldn’t ask it. Not because it was technically wrong — we all know the role human mistakes play in incidents — but because it reflected a mindset that’s no longer fit for modern leadership.

Putting it bluntly, framing people as the "weakest link" misses the mark. It’s a perspective rooted in blame rather than constructive leadership. And today, with an increasing volume of digital challenges – from malicious to mistakes and malfunction, it’s vital we move beyond this narrative and focus on governance and empowerment instead.

The good news? Change is happening.

The UK Government’s refreshed Cyber Governance Code of Practice sets a clear direction with guidance, and is holding boards accountable for human cyber risk.

In this blog, I’m going to be taking a deeper dive into this transformation and the actionable steps organizations can take to address this critical issue. I’m approaching this from my role with OutThink, the Cybersecurity Human Risk Management platform I proudly represent as an advisor and brand ambassador.

The Shift from “Blame” to “Governance”

With the UK Government’s recently refreshed Cyber Governance Code of Practice, we now have official recognition that cyber risk (particularly human cyber risk) is a board-level responsibility. Not a bolt-on. Not a technicality. But a governance issue that sits squarely with those who lead.

At the launch of the Code, Cyber Minister Feryal Clark said:

“Boards must take responsibility for cybersecurity. They are ultimately accountable for ensuring their organization is resilient.” (The Times, April 2024)

This is not just rhetoric. The Code outlines clear, actionable expectations for how boards and executives must govern human risk — an area long treated as a side note or delegated to compliance teams.

NCSC CEO, Richard Horne reinforced the point, saying:

"In today's digital world, where organisations increasingly rely on data and technology, cyber security is not just an IT concern — it is a business-critical risk, on a par with financial and legal challenges."

That statement alone should shift the tone in every boardroom in the country.

Principle C — The People’s Mandate

Among the five key principles of the Code, ‘Principle C: People’ is arguably the most transformative. It redefines human cyber risk not as an operational problem, but as a strategic leadership issue with four areas of governance responsibility outlined:

1. Create a Cyber-Resilient Culture

Boards are expected to promote and model behaviors that enable a secure culture from the top down. Top management is expected to lead by example, prioritise secure practices, and ensure that risk awareness is embedded in how decisions are made.

Too often, boardroom agendas treat cybersecurity as an item to be “noted.” This principle says: if culture eats strategy for breakfast, then cyber culture must sit at the head of the table!

2. Align Policies to Enable the Right Behaviors

Policies shouldn’t exist just to satisfy auditors. They must align with how people work and behave daily. Abstract or punitive policies disconnected from workplace realities set employees up to fail.

When staff bypass policies to do their jobs, it’s typically not due to recklessness. Rather, it’s operational (or control) friction, i,e., a failure of governance. Secure behaviour should be the easiest choice and the path of least resistance, not the hardest one.

Boards must therefore ensure policies are practical, actionable, and integrated into workflows. More importantly, they need governance systems to actively monitor if these policies truly work in practice. Policies should empower secure behavior, not hinder it.

3. Develop Cyber Knowledge, Skills, and Literacy at All Levels

Many organisations invest in security awareness training and phishing simulations for staff, but overlook their leadership teams. Boards must invest in their own security awareness not to become technical experts, but to be effective stewards. This means asking the right questions, understanding behavioural and technical risk, and overseeing strategic interventions. That entails making security awareness training adaptive and specific to the roles performed, too.

4. Use Metrics to Monitor Cultural and Behavioral Risk

If you can’t measure it, you can’t govern it. Yet most cybersecurity reports to boards focus on threat activity and system vulnerabilities, not on human risk indicators.

If they do include any reference to people, it’s typically in terms of security awareness and phishing training. However, boards need visibility into how people actually behave, what risks they take, and how these patterns shift over time. This means going beyond checkbox compliance to true performance-based assurance.

And this is where traditional tools fall short — and where OutThink is changing the game.

Why We Need a New Category: Cybersecurity Human Risk Management

For years, organisations have focused on raising security awareness through both training and simulation, and that’s not a bad thing. But cyberattacks haven’t slowed and behavioural risks remain high. That’s because awareness is not the same as behavior. And measurement that yields true, actionable, behavioral insight has been missing.

At OutThink, I’m seeing how organisations are shifting from compliance-driven awareness to data-driven risk governance. Unlike legacy security awareness and phishing training tools, it enables leadership teams to:

  • Quantify human cyber risk at the individual, team, and business unit level.
  • Monitor behavioural indicators like phishing susceptibility, policy bypassing, or risk sentiment.
  • Track cultural maturity over time, with real metrics aligned to governance frameworks.
  • Provide boards with dynamic dashboards that reflect real risk, not just activity.

This is how you bring Principle C to life. This is how you move from oversight to foresight.

What “Good” Looks Like Today

Leading organisations are no longer asking if their people are trained in security awareness and phishing attacks. Instead, they’re asking:

  • Are secure behaviours embedded?
  • Can we predict and reduce human error before it becomes a cyber incident?
  • Do we have the data to govern human cyber risk effectively?

The best boards now receive monthly reporting on human cyber risk trends. They’re using risk scores to prioritise investment. They’re partnering with platforms like OutThink to visualise and reduce cyber risk at scale, not just raise security awareness.

This isn’t aspirational, it’s operational. And increasingly expected by regulators, insurers, and investors.

From Blame to Leadership: A Final Word

Back to that panel.

The reason I skipped the “weakest link” question wasn’t to avoid a tough conversation but to reframe it. The question we should be asking is:

“What have we done as leaders to make secure behaviour the path of least resistance?”

Too often, human mistakes are the result of poor leadership design: unclear policies, contradictory incentives, inadequate training, or toxic cultures. If a frontline employee falls for a phishing email, the issue isn’t their intelligence; it’s the fact that the system wasn’t built to support success. When people are supported, trained, and valued — when they see leadership walking the talk — they become your most powerful layer of defence.

So no, people are not the weakest link.

They are our most underutilised security control.

When equipped, supported, and led well, they are the most adaptive and resilient cyber defence we have.

For C-suites and Boards: What to Do Next

  • Download the UK Cyber Governance Code Toolkit to assess your current state.
  • Start asking better questions. Not “are we compliant?” but “are we reducing cyber risk?”
  • See how cybersecurity human risk management platforms like OutThink can help you operationalise Principle C with the appropriate data, dashboards, and insights aligned to the boardroom.

Did you enjoy this blog? Search for more blogs that you want to read!

Jane frankland

 

Jane Frankland MBE is an author, board advisor, and cybersecurity thought leader, working with top brands and governments. A trailblazer in the field, she founded a global hacking firm in the 90s and served as Managing Director at Accenture. Jane's contributions over two decades have been pivotal in launching key security initiatives such as CREST, Cyber Essentials and Women4Cyber. Renowned for her commitment to gender diversity, she authored the bestselling book "IN Security" and has provided $800,000 in scholarships to hundreds of women. Through her company KnewStart, and other initiatives she leads, she is committed to making the world safer, happier, and more prosperous.

Follow me

related posts:

The Real Cost of Decentralising Cybersecurity in a Fragmented Regulatory World

It started in a rugby box. There I was, watching the match from a VIP suite—surrounded by a handful of other cybersecurity leaders. The beers were cold, the banter flowing, but one comment cut through the noise: “Cybersecurity’s no longer about technology. It’s about sovereignty.” That stuck with me. That rugby-box insight wasn’t just banter—it

Read More

Why Discomfort Might Be the Ultimate Power Move for Cybersecurity Leaders

Most of us have heard the saying, “No pain, no gain.” For cybersecurity leaders navigating the high-stakes world of defending critical systems, this phrase takes on a whole new meaning. Pain, in this context, doesn’t have to mean the physical discomfort. Instead, it’s the uncomfortable reality of facing constant threats, adapting to a rapidly shifting

Read More

The Battle for Attention: How Cybersecurity Fights for Truth in a World of Noise

“Amusement will outcompete information, and spectacle will outcompete arguments.” This observation, from Chris Hayes’ book The Sirens’ Call: How Attention Became the World’s Most Endangered Resource cuts to the heart of a growing challenge in every domain of modern society. Whether it’s politics, media, or cybersecurity, the ability to seize attention now often outweighs the

Read More

Get in touch