What is a Human-Centric Response?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
36 minutes
Difficulty
Intermediate
CEU/CPE
1
Video Transcription
00:01
Mhm.
00:02
Yeah,
00:04
yeah,
00:06
yeah!
00:10
Incident response. Playbooks, orchestration and automation are all excellent tools to address specific problems.
00:19
But for insider threat, it's important to understand how the investigation and remediation work flows may be different than other types of response.
00:29
Since insider threat is a human problem perpetuated purposefully or accidentally by one of your own employees, you should be prepared for a human centric response.
00:43
Many investigations will involve coordination with a combination of HR, Legal and others.
00:49
Eventually, someone may have to speak with the employee as well.
00:55
For this video, instead of automation and orchestration, think training and practice when dealing with the human factor.
01:03
Let's explore the difference with clear Austin door.
01:08
Cybersecurity is often described as part art and part science. Nowhere in the security field is that truer than in the insider threat space. Human behavior is the most unpredictable variable to account for in the security program and consequently, where a lot of the art and experience comes into play.
01:27
Let's think about insider threat investigations as an art science, then diagram
01:33
as you think about the different aspects of an investigation, which items fall into each category, things like search criteria alert parameters, escalation and triage, work flows and alert severity or priorities may fall into the science side.
01:49
Items like defining motive, calculating risk, assessing data sensitivity, liaising with stakeholders or interviewing employees would likely fall into the art side.
02:00
Some of these may fall into the overlap area.
02:02
A prime example of a mixed category item would be your escalation and triage process flow. Some of them may be automated and prescribed, but there is also room for human interpretation and qualitative judgment by an analyst to deviate from the standard process based on their experience. An assessment of the available fax.
02:22
Aside from deviating what falls into each bucket and what remains a gray area, let's talk about a few ways to prepare for the uncertainty of our own erratic nature.
02:31
Stakeholder training
02:34
Your stakeholders will include anyone who may be part of the investigation process. Different stakeholders may get involved with an insider threat incident for different reasons at different stages of the response and remediation.
02:46
It's important to help these stakeholders understand insider threat risk, the data and the use cases you are looking at and what their role in the process will be.
02:57
This will also mean taking into consideration their needs and requirements to fulfill their piece of the puzzle.
03:02
For example, if HR is going to help with investigations or employees interaction, what data do they need? What information, What format, What case management system, What files
03:15
investigation, practice.
03:17
Doing dry runs of investigations is a great way to consider the unexpected from human behavior.
03:23
Mock interviews of employees that were identified performing insider threat activities will help you learn how to engage these individuals and what issues might arise. What happens if they don't admit their actions?
03:36
How can you tell if they're being truthful?
03:38
What are the standard excuses?
03:40
How can you use the data and evidence to help guide the discussion? Also? And this might be the most important.
03:47
How do you treat employees with dignity and respect while discussing an insider incident?
03:54
If this is your first time building an insider threat program, you'll quickly see how difficult of a job investigators have.
04:03
It truly is a professional skill set, and seasoned investigators spend years to hone their craft.
04:12
As your program matures, it's very likely you'll start uncovering mawr inside a risk
04:17
and human behavior. The most unpredictable variable to account for.
04:23
That's where a lot of the art and experience comes into play.
04:27
If you take a human centric approach to response and remediation, you can prepare for success by understanding how these cases will be different than other cyber risks your organization faces.
04:43
Thanks for watching.
Up Next
5 Power-Ups for Your Insider Threat Program

With all the advice on how to build an Insider Threat Program or ITP, it is easy to miss some crucial details. Industry leader Code42 presents five power-ups that will ensure your ITP is successful and meaningful for your organization.

Instructed By