
Automating Insider Risk Response
Automating Insider Risk response has many benefits, including work load reduction for analysts (praise the sun) and decreased response time, but chief among them is increased consistency in our interactions with end users. This consistency reduces implicit bias that every human being possesses by applying the same responses to associates ... Read More

Automating Insider Risk Response
Automating Insider Risk response has many benefits, including work load reduction for analysts (praise the sun) and decreased response time, but chief among them is increased consistency in our interactions with end users. This consistency reduces implicit bias that every human being possesses by applying the same responses to associates ... Read More

3 Steps to Conduct a Modern Insider Risk Investigation
As Insider Risk Analysts, our goal is always to seek understanding. We need to use past experience to filter out important information from a set of facts. While technical sources provide invaluable data about an event, very often the human aspects of an event require conversations to fully understand. When ... Read More

3 Steps to Conduct a Modern Insider Risk Investigation
As Insider Risk Analysts, our goal is always to seek understanding. We need to use past experience to filter out important information from a set of facts. While technical sources provide invaluable data about an event, very often the human aspects of an event require conversations to fully understand. When ... Read More

Developing an Empathetic Mindset for Insider Risk Analysts
First things first, dealing with risks presented by internal users requires a different approach than those from external threats. While this likely isn’t news to some of you, it does need to continue to be said, as this reality unfortunately has yet to be widely accepted by the security industry ... Read More

Developing an Empathetic Mindset for Insider Risk Analysts
First things first, dealing with risks presented by internal users requires a different approach than those from external threats. While this likely isn’t news to some of you, it does need to continue to be said, as this reality unfortunately has yet to be widely accepted by the security industry ... Read More