• NEWS
  • INDUSTRY SPOTLIGHT
  • SECURITY BLOGGERS NETWORK
    • ANALYTICS
    • APPSEC
    • CISO
    • CLOUD
    • DEVOPS
    • GRC
    • IDENTITY
    • IDENTITY RESPONSE
    • IOT / ICS
    • THREAT / BREACHES
    • MORE
      • BLOCKCHAIN / DIGITAL CURRENCIES
      • CAREERS
      • CYBERLAW
      • HUMOR
      • MOBILE SECURITY
      • SOCIAL ENGINEERING
  • CHATS
  • LIBRARY
  • WEBINARS
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • Homepage
  • Security Bloggers Network

The Behavioral Intelligence Officer

With the advent of increased cyber security related threats, the majority of attacks point to one target, and that is the human element. Examine any survey relating to cyber security threats faced by organizations from ransomware to phishing, and these attacks all have one target in common: the human element is necessary to trigger the attack.

Organizations of all sizes are battling this human susceptibility on a daily basis to keep users educated through awareness programs, technology learning systems, etc. Yet attacks are still increasing, resulting in major data breaches involving the exposure of critical organization information by targeting its weakest link.

On the technology side, new approaches to prevent ransomware and phishing have been in the marketplace for years now, but still there seems to be no slowing down in the number of attacks penetrating systems. There is also the compliance standard testing that organizations employ to become certified, yet still attacks persist.

Organizations now need to reexamine the approach they use to prevent attacks on their systems with technology, compliance, and user awareness programs as a supporting role.

Applying human behavioral science to understanding why a user would be enticed to act on an email or social engineering bait is required. This will not materialize by an organization’s user population attending a training session or by introducing some costly technology. What’s needed is the addition of a behavioral intelligence officer (BIO).

The BIO will need to bring in behavioral skills to answer the question of why attacks to the end user are so successful even with state-of-the-art security solutions in place.

The role of the BIO position, therefore, is to continuously analyze human behavior through cyber security-related user education programs and simulated cyber attacks. Another critical function is information-gathering from various threat intelligence feeds to determine correlation (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/behavioral-intelligence-officer/

Tags: behaviorIT Security and Data ProtectionPhishingRansomware
3 years ago
Tripwire Guest Authors

Related Post

  • Pay2Key Ransomware Joins the Threat Landscape

    As we approach the end of a year that has been trying for so many…

  • Old Vulnerabilities Open the Door for WannaCry Ransomware

    More than three years since it was discovered, WannaCry is still a threat for some…

  • Ransomware Increase Highlights Need for Better IT, OT Security

    IT networks tend to get all the attention for cybersecurity, but operational technology (OT) and…

Recent Posts

  • Press Releases

NewDay Scores with TigerGraph Cloud to Fight Financial Fraud

Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…

20 mins ago
  • Press Releases
  • Press Releases

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

2 hours ago
  • Security Bloggers Network

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

2 hours ago
  • Data Security
  • Security Bloggers Network

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

3 hours ago
  • Network Security
  • Security Bloggers Network

Being a Defender

1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…

4 hours ago
  • Security Bloggers Network

Smart DNS: Delivering the Best Subscriber Experience

This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…

4 hours ago
  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • t