02.01.2024 Views

The Cyber Defense eMagazine January Edition for 2024

Cyber Defense eMagazine January Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 201 page January Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine January Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 201 page January Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2. Selective Attention: Concentrating on specific actions or behaviors instead of considering other<br />

risk indicators.<br />

3. Attribution Bias: Judging specific employees or departments as presenting a heightened or<br />

lowered risk <strong>for</strong> an organization without considering their behaviors is attribution bias. This leads<br />

to inaccuracies when developing risk profiles.<br />

4. Group Identity Bias: Stereotyping employees and assuming they present a higher risk based on<br />

their backgrounds can generate inaccurate assessments of their level of risk.<br />

5. Confirmation Bias: Monitoring bias can cause organizations to believe data that supports<br />

preconceived assumptions is far more trustworthy than it is, resulting in a lack of focus on<br />

contradictory in<strong>for</strong>mation.<br />

<strong>The</strong>se biases can inadvertently make security teams fail to see risky activities from other employees,<br />

partners, or threat actors. <strong>The</strong> Intelligence and National Security Alliance finds that unfounded monitoring<br />

of individuals due to biases can lead to issues like:<br />

• Increased risk from unfounded confidence due to threat hunters and SOC teams concentrating<br />

on the wrong issues and individuals.<br />

• Wasted resources from spending too much time observing the wrong users due to biases.<br />

• Legal liability if protected groups are wrongfully monitored due to biases or privacy laws are<br />

violated.<br />

• Reputational damage due to unfavorable news reports because of biased investigations.<br />

Legacy Approaches Don’t Address Bias<br />

Older, legacy Data Loss Prevention and Insider Risk Management solutions use dated blueprints to run<br />

locally within organizational firewalls. <strong>The</strong>se solutions often only utilize keystroke logging, screen<br />

recording, or web monitoring <strong>for</strong> users individually, there<strong>for</strong>e losing sight of the “bigger picture” and<br />

promoting bias.<br />

Eliminate Bias and Improve Data Protection<br />

It is best practice to reduce bias when monitoring employees by pinpointing activities involving sensitive<br />

data that can jeopardize sensitive in<strong>for</strong>mation. Using technology that anonymizes employees while<br />

monitoring activities to maintain organizational security is crucial <strong>for</strong> eliminating bias. This monitoring<br />

technology still allows teams to unveil users displaying suspicious activity by providing ‘scoped<br />

investigations,’ giving audited data access to investigators with limited access to maintain privacy<br />

regulations.<br />

Protecting and identifying employee in<strong>for</strong>mation helps security teams detect risks without the interference<br />

of bias. This <strong>for</strong>m of anonymity in monitoring provides teams with a holistic view of organizational activities<br />

that help detect threats and reduce monitoring bias, supporting an impartial management program that<br />

employees can trust.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2024</strong> <strong>Edition</strong> 57<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!