{"id":1636,"date":"2020-05-01T14:52:00","date_gmt":"2020-05-01T14:52:00","guid":{"rendered":"https:\/\/cisobyte.com\/?p=1636"},"modified":"2020-05-01T19:07:34","modified_gmt":"2020-05-01T19:07:34","slug":"using-employee-risk-scores-to-guide-security-initiatives","status":"publish","type":"post","link":"https:\/\/cisobyte.com\/index.php\/2020\/05\/01\/using-employee-risk-scores-to-guide-security-initiatives\/","title":{"rendered":"Using Employee Risk Scores to Guide Security Initiatives"},"content":{"rendered":"<h4 style=\"text-align: left;\"><strong>CISObyte\u00a0 \u00a0 05-01-2020<\/strong><\/h4>\n<p>\u00a0<\/p>\n<h4>CISOs are developing and using employee risk scores to determine where more user training and better automated defense is needed.<\/h4>\n<h2>&#8220;Humans still remain the most consistently vulnerable element of any business. And malicious actors will stop at nothing to prey on their fallibility.&#8221;<\/h2>\n<p>\u201cTheoretically, if an employee clicks a malicious link in a phishing email, there was a failure of the automated defense tool somewhere in the chain.\u201d But your automated system cant stop everything. Your greatest risk remains your people, and getting them the training and tools they need to be successful\u00a0 and secure becomes more necessary daily. How to determine where best to allocate a limited spend? &#8220;While not a new concept, employee risk scorecarding is growing ever more advanced, thanks to better analytics, policies and workflows that make assessments more actionable.&#8221;<\/p>\n<p>&#8220;Despite its virtues, the employee risk and scorecarding process must continue to be refined. To understand why, one need only look at the scourge of COVID-19 phishing campaigns that have oozed out of the shadows since the start of the coronavirus pandemic, preying on the fears of an anxious public looking for answers in an uncertain time.&#8221;<\/p>\n<ul>\n<li>Risk Management<\/li>\n<li>Risk Scoring<\/li>\n<li>Governance<\/li>\n<li>Security Analysis<\/li>\n<\/ul>\n<div class=\"vlp-link-container vlp-template-default \">\n\t<a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/features\/cisos-score-big-on-employee-risk\/\" class=\"vlp-link\" title=\"CISOs score big on employee risk | SC Media\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/04\/F3.jpg\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tCISOs score big on employee risk | SC Media\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\tThe analytic capabilities are there to pinpoint problem employees. But what to do with them?\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>05-01-2020 | CISOs are developing and using employee risk scores to determine where more user training and better automated defense is needed.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[33,39],"tags":[42,34,41,43],"class_list":["post-1636","post","type-post","status-publish","format-standard","hentry","category-risk-management","category-security-governance","tag-governance","tag-riskmanagement","tag-riskscoring","tag-securityanalysis"],"_links":{"self":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/comments?post=1636"}],"version-history":[{"count":2,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1636\/revisions"}],"predecessor-version":[{"id":1638,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1636\/revisions\/1638"}],"wp:attachment":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/media?parent=1636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/categories?post=1636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/tags?post=1636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}