blog post

Moving To Human Risk Management

In organizational security, the concept of human risk management has gained prominence, particularly when juxtaposed with the critical task of insider threat detection.

Forrester Research, a leading global market research company, defines human risk management as the process of identifying, assessing, and mitigating risks associated with human behavior within an organization.

This approach underscores the importance of understanding the human element in safeguarding against internal and external threats. By comparing insider threat detection directly with Forrester Research’s definition and description of human risk management, we can discover a new pathway where managing human-centric risks is integral to the broader security posture of organizations.

Insider Threats

Insider threat detection focuses on identifying and mitigating risks posed by individuals within an organization who may or may not have the intent and opportunity to cause harm.

This harm can manifest in various forms, including data breaches, intellectual property theft, and sabotage.

Insider threats are notoriously difficult to detect and mitigate because they originate from within the organization, often involving individuals who have legitimate access to sensitive information and critical infrastructure. The challenge lies in discerning malicious intent amidst normal activities, making the human aspect of risk management paramount.

A New Approach

Forrester’s approach to human risk management broadens the scope, emphasizing not just the detection of threats but understanding and influencing the human behaviors that precede them.

This methodology recognizes that human actions, whether malicious, negligent, or unintentional, can significantly impact an organization’s security posture. Human risk management, therefore, encompasses a proactive stance, focusing on the why and how individuals might pose a risk, and implementing strategies to influence behavior and mitigate potential threats before they materialize.

Integration of Insider Threat Detection within Human Risk Management

Integrating insider threat detection within the framework of human risk management involves several key components:

  1. Behavioral Analysis and Anomaly Detection: By analyzing patterns of human behavior, organizations can identify anomalies that may signify a potential insider threat. This approach aligns with Forrester’s emphasis on understanding human actions and motivations. Advanced analytics and machine learning can aid in distinguishing between benign and potentially harmful behavior, allowing for preemptive action.
  2. Comprehensive Training and Awareness Programs: Education plays a crucial role in human risk management. Training employees to recognize and report suspicious activities is a critical line of defense against insider threats. This proactive measure aligns with Forrester’s advocacy for influencing behavior to mitigate risk, fostering a culture of security awareness throughout the organization. But with this approach, we no longer need to relay on company or department wide security training classes, which have historically not worked.
  1. Psychological and Motivational Assessment: Understanding the psychological factors and motivations that drive individuals to become insider threats is a core principle of human risk management. By addressing these root causes, organizations can implement targeted interventions designed to deter potential insiders. This could include training targeted to the particular vulnerability at risk, addressing workplace grievances, and creating an inclusive culture that reduces the desire to cause harm.
  1. Robust Access Control and Monitoring Policies: Limiting access to sensitive information based on the principle of least privilege is a fundamental security practice that intersects both insider threat detection and human risk management. Monitoring access and activities related to critical assets can help detect and prevent unauthorized actions without overly intrusive surveillance that might erode employee trust.
  1. Ethical Considerations and Privacy: Respecting employee privacy while ensuring organizational security is a delicate balance that both insider threat detection and human risk management must navigate. Forrester’s approach advocates for transparent policies and ethical practices that respect individual privacy while protecting organizational interests.

The Path Forward

In embracing Forrester Research’s definition of human risk management, organizations can forge a path that effectively integrates insider threat detection into a broader strategy focused on understanding and influencing human behavior.

This holistic approach not only enhances the detection and mitigation of insider threats but also addresses the underlying human factors that contribute to risk. By fostering a culture of security awareness, providing avenues for addressing grievances, and implementing fair and transparent monitoring practices, organizations can minimize the human risks that pose a significant threat to their security posture.

And in so doing lower their probability of breach due to human error while increasing their employees’ understanding and preparation for increased cybersecurity attacks driven by AI that are surely on their way.

Author

Steve King

Managing Director, CyberEd

King, an experienced cybersecurity professional, has served in senior leadership roles in technology development for the past 20 years. He began his career as a software engineer at IBM, served Memorex and Health Application Systems as CIO and became the West Coast managing partner of MarchFIRST, Inc. overseeing significant client projects. He subsequently founded Endymion Systems, a digital agency and network infrastructure company and took them to $50m in revenue before being acquired by Soluziona SA. Throughout his career, Steve has held leadership positions in startups, such as VIT, SeeCommerce and Netswitch Technology Management, contributing to their growth and success in roles ranging from CMO and CRO to CTO and CEO.

Get In Touch!

Leave your details and we will get back to you.