employee workload must become a core component of Information Security Policy, as extensive emailing and
high volumes of work increase the risk of clicking on phishing links (Jalali et al., 2020).
Mandate for Scientific Measurement
The vulnerability demonstrated by relying on easily-obtainable quantitative data (vanity metrics) requires a
shift toward the scientific measurement of security culture (Roer & Petrič, 2018). By measuring the seven
dimensions (Attitudes, Norms, Behaviour, etc.) through validated, bias-resistant surveys, organisations can
obtain actionable metrics that identify the true sources of risk within departments, thereby avoiding the
McNamara Fallacy (Roer & Petrič, 2018).
Embracing Technical Enforcement over Human Trust
The inherent fallibility of human behaviour mandates rigorous technical controls to eliminate or minimise the
reliance on human vigilance (usecure, n.d.). The Zero Trust philosophy, built on continuous verification,
must supersede the traditional Full Trust model, which assumes internal entities are trustworthy (Humanize,
2023). Just-in-Time (JIT) Access serves as the practical application of the Least Privilege Principle, granting
temporary, on-demand access and automatically revoking standing privileges, thereby drastically reducing the
attack surface (Rose, 2024; Humanize, 2023).
Furthermore, addressing cloud misconfiguration, the biggest threat to cloud security caused by human error,
requires automated solutions (HubSpot, n.d.). Since the Mean Time to Remediation (MTTR) for
misconfigurations is often measured in days or weeks, immediate, automated techniques like Baseline
Enforcement are essential to restore resources to a known-good state, eliminating human slowness and error
in the remediation path (HubSpot, n.d.).
Contribution to Knowledge
This study contributes to cybersecurity knowledge by synthesising the prescriptive governmental policy on
programme structure (Wilson & Hash, 2003) with advanced, data-driven security models and critical
empirical findings. It establishes a framework that integrates:
1. Programme Maturity: Detailing the NIST life-cycle approach and various implementation models
(Centralised, Partially Decentralised, Fully Decentralised) (Wilson & Hash, 2003).
2. Cultural Verifiability: Demonstrating the necessity of scientifically validated cultural metrics to replace
misleading compliance data (Roer & Petrič, 2018).
3. Contextual Vulnerability: Highlighting that workload is a critical security vulnerability that demands
organisational intervention (Jalali et al., 2020).
4. Automated Resilience: Cementing the necessity of technical controls (Zero Trust, JIT, Baseline
Enforcement) as mechanisms specifically designed to compensate for and eliminate the consequences of
inevitable human error and slowness (Humanize, 2023; HubSpot, n.d.; Rose, 2024).
SUMMARY, CONCLUSION AND RECOMMENDATIONS
Summary of Key Findings
This synthesis confirms that the human element remains the principal vulnerability in enterprise security,
responsible for up to 95% of breaches (Sjouwerman, 2025; usecure, n.d.). Insider activity, ranging from
negligence (risk) to malice (threat), poses the greatest internal danger (Teramind, 2024).
The fundamental structure for managing this risk is the NIST SP 800-50 life-cycle programme, which
addresses the continuum of Awareness, Training, and Education (Wilson & Hash, 2003). However, this
framework must be augmented by modern, advanced strategies:
Page 790