The Overlooked Importance of Identifying Riskiest Users

The Overlooked Importance of Identifying Riskiest Users

October 31, 2024 at 10:21AM

The “see one, teach one, do one” model in cybersecurity emphasizes training high-risk users through observation, education, and practical application. By focusing on this group, organizations can mitigate significant vulnerabilities, enhance tool efficiency, and foster a culture of shared cybersecurity responsibility, ultimately improving overall defense strategies against threats.

### Meeting Takeaways

**1. Concept Overview:**
– The “see one, teach one, do one” model from healthcare can be adapted to cybersecurity to improve employee understanding and engagement.
– High-risk users significantly contribute to cybersecurity threats; focused training for these individuals can enhance organizational defense.

**2. User Risk Statistics:**
– 80-90% of cyber threats are linked to only 3-5% of users, highlighting the critical nature of managing high-risk individuals.
– Approximately 20% of users in high-risk categories change monthly, making continuous monitoring essential.

**3. High-Risk User Identification:**
– Utilize identity management tools (e.g., Active Directory, Google Workspace) to identify Most Attacked People (MAP) within the organization.
– Key targets include high-profile executives and IT personnel with significant access privileges.

**4. Phases of the Training Model:**
– **See One:**
– Identify high-risk users and raise awareness through personalized demonstrations of potential threats (e.g., phishing simulations).
– **Teach One:**
– Empower high-risk users to share their knowledge with peers, fostering collective cybersecurity awareness within the organization.
– **Do One:**
– Encourage practical application of security measures, continuously monitor user behavior, and adapt strategies to evolving threats.

**5. Holistic Security Strategy:**
– Implement continuous risk monitoring to keep high-risk users under surveillance.
– Develop a user- and device-aware security approach to tailor protective measures effectively.

**6. Benefits of a Focused Strategy:**
– Directing efforts towards high-risk users allows for more efficient use of resources, reducing overall vulnerabilities.
– Educating and empowering these users can transform them into advocates for cybersecurity, enhancing the organization’s overall security posture.

### Action Items:
– Identify MAP using existing data and tools.
– Develop a training program based on the “see one, teach one, do one” model.
– Establish continuous monitoring and evaluation of user-related risks.
– Foster a culture of shared responsibility for cybersecurity throughout the organization.

Full Article