AI in Human Risk Management
Lots of things make people more or less susceptible to cyberattacks.Cybersecurity practitioners work hard to influence those things to bring down the risk. If you’re reading this, you’re probably doing this.Traditionally, the focus has been on technical controls, and training. But these are just two bricks in the wall, not the wall itself.To handle the threats of today’s landscape, addressing the human risk elements of security is a must. In most organizations it’s either happening too slowly—or not happening at all.It’s all down to a misunderstanding. A belief that beyond tech, there’s only knowledge.
There is so much more to it!
Recent CybSafe analysis suggests there are in fact 8 primary human cyber risk factors. This webinar digs into what they are, what they look like, and how security teams can use them to better understand and reduce people-related security risk.
Oz Alashe MBE
Chief Executive Officer, CybSafe
Oz leads CybSafe. He has been the driving force behind CybSafe – the concept, vision and platform.A former UK Special Forces Lieutenant Colonel, Oz is focused on making society more secure by helping organisations address the human aspect of cyber security.Oz has a deep background in the areas of intelligence insight, complex human networks, and human cyber risk & resilience. He’s also passionate about reducing societal threats to stability and security by making the most of opportunities presented through advancements in technology.Oz was made an MBE in 2010 for his personal leadership in the most complex of conflict environments.Oz chairs the UK Government’s (DCMS) Cyber Resilience Expert Advisory Group. He also sits on the Advisory Board for the Research Institute in Sociotechnical Cyber Security (RISCS). And he’s an Expert Fellow at The Security, Privacy, Identity and Trust Engagement NetworkPlus (SPRITE+), as well as the Royal United Services Institute (RUSI).
Ira Winkler
CISO and Vice President, CYE and author of Security Awareness for Dummies
The research suggests cybersecurity teams are becoming enablers rather than obstacles of daily business processes. Given that 38% of respondents felt that the security team hampered their work suggests that users still perceive cybersecurity as a nuisance.
This does make it a pleasant surprise that users who reported were overwhelmingly satisfied with the response from the cybersecurity team. The implication is that cybersecurity teams are becoming more customer service focused and understanding of the needs of users.
While cybersecurity friction does have a bad connotation, the reality is that it can be useful and necessary. While you don't necessarily want to make business processes difficult, you do want to make sure that it is not easy to do the wrong things. At the same time, users and the company as a whole should understand that cybersecurity embedded in business practices enables organizations to do things they otherwise would not be able to do. For example, cloud based applications would not be possible unless data could be secured across the internet and users could authenticate themselves properly.
Tom Field
Senior Vice President, Editorial, ISMG
Tom Field is an award-winning journalist with over 30 years’ experience in print and electronic publishing, events and editorial staff development.Currently the SVP-Editorial for Information Security Media Group, Field oversees content development – including news, research, and events – for 30-plus international media sites and an international suite of conferences and roundtable discussions dedicated to cybersecurity.An accomplished public speaker, Field has developed and moderated scores of podcasts, webcasts, videos, roundtables, and conferences, and he has appeared on C-SPAN, The History Channel and Travel Channel television programs.