Saturday, March 25, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
Ransomware Report
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Explicit Online Content of Children

    Removing Explicit Online Content of Children is a Global War

    Rio Tinto Cyber Attack

    Rio Tinto Cyber Attack Puts Employee Information at Risk

    Team Insane PK Targets Indian Businesses

    Team Insane PK Targets Indian Businesses, Leaks Sensitive Data

    Goa Cyber attack 2

    Cl0p Ransomware Lists Goa State Government as Victim

    opt out of ChatGPT data collection

    OpenAI Has Privacy Issues: How Do We Opt Out of ChatGPT Data Collection?

    The City of Toronto Cyberattack

    The City of Toronto Cyberattack Confirmed, Linked to GoAnywhere Data Breach

    Counter Strike 2 leaked

    Oh No! Counter Strike 2 leaked Before Official Launch

    Medusa ransomware group

    Minneapolis Public Schools Data Breach: Medusa Allegedly Leaks 100GB Data

    US District Court's Network Access

    Everest Ransomware Group Adds US District Court’s Network Access for Sale

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Explicit Online Content of Children

    Removing Explicit Online Content of Children is a Global War

    Rio Tinto Cyber Attack

    Rio Tinto Cyber Attack Puts Employee Information at Risk

    Team Insane PK Targets Indian Businesses

    Team Insane PK Targets Indian Businesses, Leaks Sensitive Data

    Goa Cyber attack 2

    Cl0p Ransomware Lists Goa State Government as Victim

    opt out of ChatGPT data collection

    OpenAI Has Privacy Issues: How Do We Opt Out of ChatGPT Data Collection?

    The City of Toronto Cyberattack

    The City of Toronto Cyberattack Confirmed, Linked to GoAnywhere Data Breach

    Counter Strike 2 leaked

    Oh No! Counter Strike 2 leaked Before Official Launch

    Medusa ransomware group

    Minneapolis Public Schools Data Breach: Medusa Allegedly Leaks 100GB Data

    US District Court's Network Access

    Everest Ransomware Group Adds US District Court’s Network Access for Sale

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cyber Essentials

Behavioral Psychology, a Boon for Insider Risk Mitigation

The most significant difference between adopting behavioral psychology in the clinical field and cyberspace is just the final business outcome; in the clinical meant to change human behavior, but in cyberspace, intended to predict human (and object) behavior.

Editorial by Editorial
February 26, 2023
in Cyber Essentials, Cybersecurity News, Firewall Daily
0
Insider threat mitigation
608
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter
Listen to this story

In this highly connected business environment, connectivity creates frictionless opportunities and vulnerability to cyber-attacks. Thriving under cyber attack is not a radical proposal but a function of digital resilience.

Unlike conventional security controls, which assume the nature of future cyber attacks is the same as past attacks, the application of behavioral psychology breaks that myth. I.e., Behavioral based threat prevention is a critical part of an effective cyber resilience strategy.

You might also like

Removing Explicit Online Content of Children is a Global War

Rio Tinto Cyber Attack Puts Employee Information at Risk

Team Insane PK Targets Indian Businesses, Leaks Sensitive Data

Learning from the success of clinical psychology

As it is proven in clinical psychology to treat patients, behavior does not change in a vacuum but occurs in response to proceeding events and situations we call antecedents and is encouraged to happen or not concur by the consequences of the behavior that immediately follow.

The most significant difference between adopting behavioral psychology in the clinical field and cyberspace is just the final business outcome; in the clinical meant to change human behavior, but in cyberspace, intended to predict human (and object) behavior.

Example: Mitigating insider threat risk exposures

Unlike external adversaries, It is not easy to profile insider threat adversaries. They may or may not have financial motivation. They may act maliciously out of anger, frustration, or whim. When a user exhibit behavior in the presence of precursor events, his behavior has consequences.

Preceding events (i.e., Antecedents) prompt behavior to occur and results maintain/increase/decrease it in the future based on the desirability of the consequences. (ie, in the case of insider threat, it is either damaging the system/assets or stealing critical information).

BEHAVIORAL PSYCHOLOGY. RISK MITIGATION

Not a silver bullet for all the problems

Like any other technology solution, behavioral-based detection capabilities’ effectiveness depends on these critical factors.

  • Availability of multiple observations of the same user behavior under various conditions.
  • Observations must include adequate descriptions to identify the who, what, when, where, and how of past behaviors.
  • Necessary of SME: A security analyst can leverage subject matter experts (SME) guidance when there is a lack of observations.
  • The findings’ quality depends on the antecedents and consequences associated with past behavior. The mere selection of a specific type of statistical method or calculation can’t determine the quality of the findings.

Risk Mitigation

Key behavioral indicators of insider

Unlike the advanced persistent threat (APT) adversaries, insiders neither exhibit psychological nor demographic profiles. Instead, they exhibit a unique behavioral pattern as they move along the idea-to-action continuum.

Here are some of the potential behavioral patterns we often hypothesize to detect an insider’s earlier indication.

Summary

Although the business environment evolved from bricks and mortar to bits and bytes, the underlying behaviors associated with insider behavior have remained the same.

So, behavioral-based capabilities are vital in reducing insider threat risk exposures. At the same time, the quality of reliable insider threat prediction over time is based on our ability to identify the precursor antecedents that set the stage for the behavior to occur and the consequences of it.

– By Pons Mudivai Arun, Head of security products, NetScaler

Watch this space and stay updated with Cybersecurity Features.

 

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: insiderinsider threatsrisk mitigation
Previous Post

City of Lakewood Cyberattack: ALPHV Ransomware Gang Steals 300GB Worth of Data

Next Post

How to Protect Your Company as Digital Transformation Accelerates

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

Explicit Online Content of Children
Firewall Daily

Removing Explicit Online Content of Children is a Global War

by Vishwa Pandagle
March 25, 2023
Rio Tinto Cyber Attack
Data Breach News

Rio Tinto Cyber Attack Puts Employee Information at Risk

by Ashish Khaitan
March 25, 2023
Team Insane PK Targets Indian Businesses
Dark Web News

Team Insane PK Targets Indian Businesses, Leaks Sensitive Data

by Vishwa Pandagle
March 25, 2023
Goa Cyber attack 2
Dark Web News

Cl0p Ransomware Lists Goa State Government as Victim

by Chandu Gopalakrishnan
March 24, 2023
opt out of ChatGPT data collection
Firewall Daily

OpenAI Has Privacy Issues: How Do We Opt Out of ChatGPT Data Collection?

by Chandu Gopalakrishnan
March 24, 2023
Next Post
Digital Transformation

How to Protect Your Company as Digital Transformation Accelerates

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Issue is Out. Subscribe Now

Women in Cybersecurity

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Top 10 Cybersecurity Jobs

Categories

About The Cyber Express

The Cyber Express

Cyber Security News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Events: +1 (678) 578-4140

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Tel: (678) 578-8838

Events: +1 (678) 578-4140

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cyber Security Magazine
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.