APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Enterprise Security
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 )
    left
    What Keeps Your Security Chief Up at Night: Keeping the Enterprise Secure is a Round-the-Clock Job

    Gary Eppinger, Global CISO, Carnival Corporation

    Security is Only As Good As Your Weakest Link

    Sam Schoelen, CIO, Continental Resources

    Mobility x Security

    Daniel Sobral, CSO, JBS USA

    Managing Security At The Speed Of Business

    Nimmy Reichenberg, VP-Marketing and Business Development, AlgoSec

    Viewing Security With A Service Perspective

    Gary Eppinger, Global CISO, Carnival Corporation

    Inaccurate Data Creating a False Sense of Security

    Larry Hurtado, President & CEO, Digital Defense, Inc.

    Enterprise Security Strategies in Todays Threat Environment

    Mike Convertino, VP and Chief Information Security Officer (CISO), F5 Networks

    right

    The Employee-An Organization's Security Downfall or a Hidden Security Gem

    Gordon MacKay, EVP and CTO, Digital Defense

    Tweet
    content-image

    Gordon MacKay, EVP and CTO, Digital Defense

    Several years ago, while on a walk, my lively Pomeranian took notice of a few birds. They also took notice of her and nearly immediately took flight, reacting to what they perceived as impending danger. This was nature’s warning system in motion. The few birds' reaction to the threat caused the entire flock to become aware of the danger. This "safety in numbers" behavior intrigued me. Often in nature, an organ¬ism is more secure in a community than alone. I wondered whether this ecosystem principle could apply to employees, with the goal of enhancing the organization’s overall security posture. Evidence has shown employees can of¬ten be liabilities when it comes to security. Yet this begs the question: If assessed, trained and armed with the right tools, could employees represent a hidden security protection force to be har¬nessed?

    The Rise of Human Hacking

    Due to the advances in technology and the greater need for convenience, the IT landscape has evolved, mak¬ing information security increasingly more com¬plex. Security walls are crumbling and organizations, now more than ever, are faced with the chal¬lenge of supporting an efficient workforce while protecting against the possibility of a devastating in¬formation security breach. Attackers have seen this changing landscape and have expanded their attack surface to include human hacking, also known as social engineering. As evi¬denced within the Verizon 2015 Data Breach Investigations Report, over the past several years, successful data breaches that included a component of social engineering attacks have steadily increased. This is an increasingly concerning trend.

    The Root of Human Vulnerability

    As humans, we play a big role within the organizations we work for and contribute towards. In many senses, a human may actually be viewed as a kind of a computer; an Organic Computer. We hold valuable information such as usernames and passwords. We operate, use and access the company’s computers to do our work and in doing so, we may be fooled by others (e.g. in the form of an email) into accessing infor¬mation that hides dangerous malware. A recent Intel Secu¬rity quiz showed that of the more than 16,000 test takers, 80 percent fell for at least one in seven phishing emails. These numbers are alarming, especially when we realize hackers only need one employee to fall victim in order to gain ac¬cess to an organization’s valuable data. But what is the root of our vulnerabilities? Throughout our evolution, we learned to overcome harsh natural environments by relying on each other. We learned to inherently trust others in our community because this has enabled us to survive longer. Yet, due to our social nature and our dependence on others, rooted in our nat¬ural desire to survive, we are vulnerable to lies.

    “Instead of considering humans as a security liability, contemplate the harnessing and utilization of human vulnerabilities for our benefit”

    This is a grim reality.However, as opposed to considering the employee as a security liability, I have a more optimistic perspective.These numbers are alarming, especially when we realize hackers only need one employee to fall victim in order to gain ac¬cess to an organization’s valuable data. But what is the root of our vulnerabilities? Throughout our evolution, we learned to overcome harsh natural environments by relying on each other. We learned to inherently trust others in our community because this has enabled us to survive longer. Yet, due to our social nature and our dependence on others, rooted in our nat¬ural desire to survive, we are vulnerable to lies. This is a grim reality. However, as opposed to considering the employee as a security liability, I have a more optimistic perspective.

    Training, Assessing and Harnessing the Intelligence

    As security professionals, we understand the importance of regular vulnerability assessments of our IT infrastructure, as well as remediation of findings to drive out risk. However, by and large, we mini¬mize

    the assessment of our employee population as part of this program. Cer¬tainly, assessing and training won’t render us immune and we may still fall victim to social engineering attacks. However, evi¬dence has shown that security awareness training and behavior training systems have significantly reduced the incidence of human compromise to security related events. Taking this to the next level, we can utilize the intelligence gleaned from our organic computer assessments, to bolster an organization’s security pos¬ture. I see this as crucial element of the next wave of cybersecurity and envision a system which, among other capabilities, achieves this concept by integrating hu¬man security awareness assessments with IAM systems. For instance, even though an IAM system may authenticate a user’s identity during a user’s login request, this user may be refused access on the basis that the user has poor security awareness assessment results. With this integration, an organization’s security program is bol¬stered in that it catches more real social engineering threat attacks.

    Safety in Numbers

    Just as the saying goes “One Man’s Poi¬son is another Man’s Medicine”, instead of considering humans as a security li¬ability, contemplate the harnessing and utilization of human vulnerabilities for our benefit. Our natural tendency to trust and rely on others may be used to our ad¬vantage. For example, there are several existing security solutions which offer human behavior based training which enables an organization to continuously raise awareness within their employee base of the dangers of phishing. Some solutions include a feature that allows employees to notify the entire community whenever an employee becomes aware of a real phishing event. Does this seem analogous to the security in numbers of the few birds alerting the entire flock? I be¬lieve this concept need not be limited to phish¬ing, but can be used for all suspected security attacks. Imagine a web based social media ena¬bled system, inclusive of gamification, which allows all em¬ployees of an organization to share their experiences related to imminent attacks. I sense it is similar to using an employee base as a grid of organic Intrusion Detec¬tion Systems acting as a security overlay that compliments an organization’s exist¬ing security infrastructure.

    Conclusion

    Information security defense has become exponentially more complex and chal¬lenging. The attackers have several advan¬tages: they need not stay in one place, they may hide, time is on their side and they may leverage the susceptibility of em¬ployees in order to achieve their desired prize. As defenders, we have a disadvan¬tage in that it is difficult to continuously move our fortress to evade the attacker. A strength we must take advantage of is our ability to harness our individual hu¬man awareness to achieve a “protection in numbers”effect. This has proven success¬ful for many natural ecosystems. We de¬fenders are not fighting a losing war. We are not even part of a war; we are simply surviving within a natural, ever changing physical and virtual world.

    Check out: Top Enterprise Security Startups in APAC
    tag

    Startups

    Information Security

    Infor

    Weekly Brief

    loading
    25 Most Promising Enterprise Security Service Providers
    ON THE DECK

    Enterprise Security 2016

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    Andreas Kurz, Global Head of Digital Transformation, ALFAGOMMA Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://enterprise-security.apacciooutlook.com/cxoinsights/the-employeean-organizations-security-downfall-or-a-hidden-security-gem-nwid-4224.html