Forcepoint Leaders Highlight the Cyber Continuum of Intent at Gartner Security &...

Forcepoint Leaders Highlight the Cyber Continuum of Intent at Gartner Security & Risk Management Summit

2916
133
SHARE

This week at the Gartner Security & Risk Management Summit, Chief Information Officer Meerah Rajavel and Chief Scientist Dr. Richard Ford from global cybersecurity leader Forcepoint shared methods for combating insider threats by focusing on understanding human intent. In their joint speech, Rajavel and Ford discussed how approaching security through a human-centric lens will help organizations better understand indicators of normal behavior and help spot anomalous or compromised behavior. This allows enterprises and government agencies to address what Forcepoint calls ‘The Cyber Continuum of Intent,’ a model that categorizes users on a spectrum from accidental to compromised and malicious insiders. A user can move along this spectrum fluidly based on external factors, motivations and intent such as job satisfaction, training or fatigue.

“Insider threats can arise from any number of scenarios, ranging from simple mistakes to malicious actions,” said Ford. “Regardless, the actions of people – or malware that’s taken the identity of an employee – are at the center of many security incidents. Forcepoint is helping companies understand behaviors and motivations of people, so they are fully enabled to do their jobs, but avoid mistakes that lead to loss of critical business data and IP.”

With this in mind, Rajavel recommended building insider threat programs beginning with people first, then process, and lastly technology. She stressed that one must understand data movement within an organization in addition to user activity to build risk adaptive protection.

“There is no silver bullet in security,” said Rajavel. “We must build programs that have many layers of protection, understanding and taking into consideration international implications for data privacy like GDPR. We must always keep in mind the right balance of safety and privacy as we build data and insider threat protection programs, to ultimately stop the bad and free the good.

133 COMMENTS

  1. I must thank you for the efforts you’ve put in writing this website. I really hope to view the same high-grade content by you later on as well. In fact, your creative writing abilities has motivated me to get my own website now 😉

  2. A motivating discussion is worth comment. I think that you should publish more about this subject, it might not be a taboo subject but typically people don’t discuss these issues. To the next! All the best!!

  3. Hi there! This blog post couldnít be written much better! Looking through this post reminds me of my previous roommate! He constantly kept preaching about this. I am going to send this article to him. Fairly certain he’s going to have a good read. Thank you for sharing!

  4. Right here is the right blog for everyone who hopes to find out about this topic. You understand a whole lot its almost hard to argue with you (not that I personally would want toÖHaHa). You certainly put a new spin on a topic that’s been written about for many years. Wonderful stuff, just excellent!

  5. Having read this I believed it was rather enlightening. I appreciate you taking the time and energy to put this content together. I once again find myself personally spending way too much time both reading and leaving comments. But so what, it was still worth it!

  6. Today, while I was at work, my cousin stole my iphone and tested to see if it can survive a 30 foot drop, just so she can be a youtube sensation. My apple ipad is now broken and she has 83 views. I know this is totally off topic but I had to share it with someone!|

  7. Howdy! I know this is somewhat off topic but I was wondering if you knew where I could get a captcha plugin for my comment form? I’m using the same blog platform as yours and I’m having trouble finding one? Thanks a lot!|

  8. I do trust all the concepts you have introduced to your post. They’re really convincing and can certainly work. Still, the posts are too brief for starters. May just you please lengthen them a bit from next time? Thank you for the post.|

  9. Hi, i believe that i saw you visited my weblog thus i came to go back the favor?.I am attempting to find things to enhance my website!I suppose its adequate to make use of a few of your ideas!!|

  10. Thank you a bunch for sharing this with all of us you really know what you are talking approximately! Bookmarked. Kindly also consult with my website =). We will have a link exchange arrangement between us|

  11. We stumbled over here by a different web address and thought I should check things out. I like what I see so i am just following you. Look forward to finding out about your web page repeatedly.|

  12. Hi there, just became alert to your blog through Google, and found that it is really informative. I’m going to watch out for brussels. I’ll appreciate if you continue this in future. Many people will be benefited from your writing. Cheers!|

LEAVE A REPLY