Skip to main content

NIST CSF 2.0 – Protect Function Deep Dive: Awareness and Training (PR.AT)


Most organizations don’t fail at cybersecurity because they lack tools.

They fail because people do the reasonable thing in an unreasonable situation:

  • Clicking a convincing link

  • Reusing a password to get work done

  • Sharing files the fastest way, not the safest

  • Bypassing controls that slow them down

PR.AT exists because humans are not the weakest link—they are the most influential one.

NIST CSF 2.0 explicitly recognizes that cybersecurity awareness and training are not “nice-to-have” activities. They are protective controls that reduce risk every single day.


Where PR.AT Fits in the Protect Function

So far, Protect has focused on structural controls:

  • PR.AA ensures only the right identities have access

  • Controls, permissions, and authentication enforce boundaries

PR.AT addresses something different:

How people think, decide, and behave when controls are present—or when they fail.

No control operates in isolation.
People configure it.
People use it.
People override it.

PR.AT is the layer that helps people make safer decisions when security matters most.


What Is PR.AT (In Plain Language)?

PR.AT ensures that people understand their cybersecurity responsibilities and are trained to act appropriately for their role.

This is not just:

  • Annual compliance training

  • Watching a video once a year

  • Clicking through slides to “check the box”

PR.AT is about building confidence, not fear.

It answers questions like:

  • What should I do if something feels wrong?

  • How do attackers really trick people?

  • What does security expect of me—specifically?

  • How do I do my job securely without slowing down?


Why Awareness and Training Matter More Than Ever

Technology has gotten better.
Attackers have gotten smarter.
And work has gotten faster.

Today:

  • Phishing emails are personalized and realistic

  • Deepfakes target executives

  • Credential theft bypasses many perimeter controls

  • Employees juggle dozens of systems and alerts

In this environment, decision-making matters more than memorization.

PR.AT helps organizations shift from:

“Don’t click bad links”

To:

“Recognize suspicious behavior and respond correctly under pressure”


Common PR.AT Pitfalls

1. Treating Training as a Compliance Exercise

If awareness exists only to satisfy audits:

  • Employees disengage

  • Lessons aren’t retained

  • Risk doesn’t meaningfully change

Completion ≠ understanding.


2. One-Size-Fits-All Content

Executives, developers, HR, finance, and IT face very different risks.

When everyone gets the same training:

  • It’s irrelevant to most

  • Critical roles remain underprepared

  • Advanced users feel talked down to


3. Fear-Based Messaging

Constant warnings that “everything is dangerous” lead to:

  • Alert fatigue

  • Risk normalization

  • Employees hiding mistakes instead of reporting them

Effective awareness builds trust, not anxiety.


How to Implement PR.AT in a Practical Way

1. Define Security Expectations by Role

Start by answering:

  • What decisions does this role make?

  • What access do they have?

  • What mistakes would have the biggest impact?

Training should map directly to real job responsibilities, not generic threats.


2. Teach Recognition, Not Just Rules

Rules tell people what to do.
Training should explain why it matters.

For example:

  • What social engineering actually looks like

  • How attackers create urgency

  • Why certain shortcuts are risky

People who understand attacker intent respond better under pressure.


3. Reinforce Through Small, Frequent Touchpoints

Security awareness works best when it is:

  • Short

  • Relevant

  • Repeated over time

Micro-learning, reminders, and real-world examples outperform annual training marathons.


4. Normalize Reporting and Recovery

Mistakes happen—even in mature programs.

Good PR.AT cultures emphasize:

  • Reporting quickly

  • Learning without blame

  • Improving responses over time

The goal is not zero mistakes.
It is fast detection and recovery.


Metrics That Actually Measure Effectiveness

Training success is not measured by completion rates alone.

Foundational Metrics

  • % of employees completing required training

  • Time to complete onboarding training

  • % of workforce trained by role

These show coverage, not capability.


Better Risk-Based Metrics

  • Phishing report rate

  • Time to report suspicious activity

  • Reduction in repeat phishing failures

  • % of incidents detected by employees

These indicate whether training is changing behavior.


What “Good” Looks Like

When PR.AT is working well:

  • Employees ask better security questions

  • Suspicious activity is reported quickly

  • Mistakes surface early, not late

  • Security teams are seen as partners, not police

  • Leaders model the behavior they expect

For newcomers, this builds confidence.
For new CISOs, it builds organizational trust.
For mature teams, it becomes a risk multiplier.


Final Thoughts

You cannot train people to be security experts.
But you can train them to recognize risk and respond appropriately.

PR.AT acknowledges a simple truth:

Cybersecurity is not just about systems protecting people—it is about people protecting systems.

Strong identity controls reduce exposure.
Strong awareness reduces impact.

Together, they turn cybersecurity from a technical discipline into an organizational capability.

Popular posts from this blog

Generative AI Governance: Using the NIST Framework to Build Trust, Reduce Risk, and Lead Secure AI Adoption

Generative AI has moved faster than nearly any technology security leaders have dealt with. Tools that can generate text, code, images, and data insights are now embedded into productivity platforms, security tooling, development workflows, and business operations—often before security teams are formally involved. For CISOs, this creates a familiar but amplified challenge: innovation is happening faster than governance, and unmanaged generative AI introduces material risk across confidentiality, integrity, availability, compliance, and trust. For aspiring information security professionals, AI governance represents a growing and valuable discipline where strategic thinking matters just as much as technical depth. The good news? We don’t need to invent governance from scratch. NIST’s AI Risk Management Framework (AI RMF) provides a practical, flexible structure that security leaders can use today to govern generative AI responsibly and defensibly. Why Generative AI Governance Matt...

Winning the Room: How to Gain and Keep Executive Support

Blog Series: Your First 90 Days as a CISO Post 4 of 4 A Plain-English Guide for New, Aspiring, and Future Security Leaders Here's a truth that many talented security professionals discover too late: you can be technically brilliant, deeply experienced, and genuinely committed to protecting the organization — and still fail as a CISO if you don't have executive support. Security programs require funding. They require organizational authority. They require the ability to make decisions that sometimes create friction for other business units. They require the backing to hold lines when the pressure to cut corners for speed or convenience is intense. None of that happens without the support of the people at the top of the organization. And yet, earning and keeping executive support is exactly the area where security leaders most often struggle. The technical skills that make someone a great security professional don't automatically translate into the c...