Insider risks aren’t just a security problem (UNCOVERING HIDDEN RISKS – Episode 3)

Published 03-04-2021 09:00 AM 1,713 Views
Microsoft

Host:  Raman Kalyan – Director, Microsoft

Host:  Talhah Mir -   Principal Program Manager, Microsoft

Guest:  Dan Costa – Technical Manager, Carnegie Mellon University

 

The following conversation is adapted from transcripts of Episode 3 of the Uncovering Hidden Risks podcast.  There may be slight edits in order to make this conversation easier for readers to follow along.  You can view the full transcripts of this episode at:  https://aka.ms/uncoveringhiddenrisks

 

In this podcast we explore how partnering with Human Resources can create a strong insider risk management program, a better workplace and more secure organization.  We uncover the types of HR data that can be added to an insider risk management system, using artificial intelligence to contextualize the data, all while respecting privacy and keeping in line with applicable policies.

 

RAMAN:  Hi, I'm Raman Kalyan, I'm with Microsoft 365 Product Marketing Team.

 

TALHAH:  And I'm Talhah Mir, Principal Program Manager on the Security Compliance Team.

 

RAMAN:  And this is episode three with Dan Costa, and we are talking about how do you bring in HR, legal, privacy, and compliance into building an effective insider risk management program.

 

TALHAH:  Yeah, super important. This is not like security where you can just take care of this in your SOC alone, you need collaboration, and he's gonna tell us more on why that's critical.

 

RAMAN:  Yeah, it was awesome talking to Dan last week. So, let's do it.

 

TALHAH:  You gave a great example of an organizational stressor, like somebody being demoted or somebody being put on a performance improvement plan. You can also have personal stressors outside of work that you have talked about openly in a lot of your guidance and whatnot. When you look at organizational stressors, a lot of times they reside with your human resources department, right? So, this is a place where you have to negotiate with them to be able to bring this data in. Talk to me about that. How do you guide the teams that are looking to establish these connections with their human resources department, the HR department, and negotiate this kind of data so that it's for insider risk management purposes, and also talk about opportunities that you see where you could potentially infer sentiment by looking at communication patterns or physical movement patterns or digital log-in patterns and things like that? So how can you help to identify these early indicators if you will?

 

DAN:  So let's start with how we bridge the gap between the insider threat program and stakeholders like human resources, because Talhah, you're spot on. They're one of the key stakeholders for an insider threat program, really in two respects. One is they own a lot of the data that will allow us to gather the context that we can use to augment or supplement what we're seeing from our technical detection capabilities, to figure out was that activity appropriate for the job role, the responsibility of the individual associated with the activity. How can we pull left relative to an incident progression and find folks that might be experiencing these organizational stressors, right? That's data that our human resources stakeholders have and hold. We've seen insider threat programs over the years struggle with building the relationships between stakeholders like human resource management. A lot of the challenges there, from what we've seen, come down to a lack of understanding of what it is that the insider threat program is actually trying to do.

 

In many cases, the insider threat program isn't necessarily without fault in making that impression stick in the minds of human resources. So this goes back to the insider threat program's not trying to be duplicative or boil the ocean, or carve off too big of a part of this broader enterprise-wide activity that needs to happen to manage insider risk. In that early relationship building and establishment, there's an education piece that has to happen. Human resources folks aren't spending all day every day thinking about how insiders can misuse their access like we are, right? So much of it is these are the threats that our critical assets are subject to, by the nature of our employees having authorized access to them. We understand that this isn't always the most comfortable subject to talk about, but here's a myriad of incident data that shows where vulnerabilities existed within a human resource process, or a lack of information sharing between HR and IT enabled an insider to carry out their attack or to evade detection for some significant amount of time.

 

So much of it just starts with education. Once we've got them just aware of the fact that this is something that the organization has to consider as a part of its overarching security strategy, we need to help them understand the critical role that they play. Understanding how we use contextual information. Understanding how we don't use contextual information and helping them understand what, really, what an insider threat program is designed to do is help them make better data-driven decisions faster by giving them access to analysis that can only be conducted by folks that can take the data that they have and stitch it together with IT data, with SOC data, with information assurance data, with the risk register that's owned by our chief risk officer. They probably don't want to be spending all of their times writing analytics and making the relationships with IT and legal to facilitate some of that stuff.

 

That's what the insider threat program is here for. So, helping them understand that this is a mutually beneficial relationship, that the data that they provide will help the organization more proactively manage insider risk and that they are a stakeholder in terms of they are potentially recipients of the results of the analysis that the insider threat program itself will conduct. Helping them better understand how to do things like make refinements, enhancements, or improvements to the onboarding and offboarding processes. Helping them understand when it might be time to make a change to employee compensation strategies within the organization, how the employee performance management system is leveraged within the organization. The insider threat program, once it's up and running and bringing in all the different data and engaging with all the different stakeholders, can help highlight and emphasize where those processes are working, where they can be refined.

 

It's hard for the stakeholders to do that work on their own. So there's a fine line to walk there too, right? Which is, you can't go in and say, "We think we can be doing your job better than you can because we have data scientists and all this other cool data." So a lot of effective insider threat program building from a relationship building perspective really comes down to having an insider threat program manager who has that organizational savvy, that can find the right ways to build and establish these relationships within their organizations. So it's not easy by any stretch of the imagination, but we're seeing lots of organizations be successful at helping their stakeholders understand the threat, helping their stakeholders understand the two way street of, "This is the information we need. Here's why we need it from you. Here's why you're the only part of the organization that can help us with this, and here's how we think it can be beneficial to you and the organization more broadly."

 

RAMAN:  I think this is the kind of conversation that Talhah and I had when we first got into this space together. He'd already been in it, but I had come at it from a product perspective, as we think about helping our customers tackle these issues. One of the things we talked about early on was hey, look, this is, like you mentioned, Dan, this is a human problem. This is the employees that you're dealing with. These are people that are part of your organizational family, right? You just can't set something up that starts investigating people, snooping on them, and doing that sort of thing. You got to take a little more holistic viewpoint here. The things that Talhah and I talked about were around insider...

 

This is why insider risks makes more sense than insider threat because as you think about HR, they're stewards of the corporate culture, right? They're the ones that are responsible for help building a corporate culture of inclusion and of people feeling like they are wanted, and they are rewarded and they're building towards a positive outcome for the organization. For them, the program itself can highlight, to your point, the risks that are there that might impact that organizational health and in a way actually helps support a better, stronger organization by pointing out areas that are vulnerable [inaudible] that they can go after and build training around, that they can go out and say, "Hey, this is something that we should be doing," or, "People aren't feeling supported and so they're doing things that they shouldn't be doing." Now rather than treating the symptom, treat the underlying issue.

 

DAN:  That's a great point, Raman. I would add to that and take that a step further, which is, I think stakeholder parts of the organization like human resources don't intuitively or necessarily think about the things that they do as being influencers of increased security or resilience within the organization. So much of that education is helping them understand, "Look, organizations that have better management practices have higher degrees of employee engagement, have higher degrees of perceived organizational support amongst all the other great benefits that they experience." They also experience less security incidents.

 

So, what you're doing and these practices are security controls, and we really have to start to help our organizations broaden their understanding of what constitutes a security control. And, "Oh, by the way, HR, if you know that these are things that you'd like to be doing just to increase morale, we can amplify that ask and message up the chain when it comes time for budget requests, by saying, 'Hey, not only is this a good thing for us to do from a talent management perspective, but it's a key security strategy for our organization.'" Another way for those two disparate parts of the organization to work together in some mutually beneficial way.

 

A couple of years ago, we did a study called the Critical Role of Positive Incentives in Mitigating Insider Threats. It was really looking at just this, Raman, which is, could we establish a relationship between levels of connectedness at work, employee engagement, perceived organizational support, and a reduction in the number of insider incidents that organizations experience? We actually leveraged our opensource insider threat information sharing group for a lot of that work to conduct surveys. What we saw was positive correlation between... Increases across those dimensions of connectedness at work, perceived organizational support, and a decrease in the number of insider incidents that organizations were experiencing. So the key takeaway from that study was better places to work ended up also being more secure organizations, particularly as it pertains to insider risk.

 

Now, we're trying to continue that work and drive that towards a causal model and really being able to show that these are the root causes. These management practices, these HR practices, by putting them in place, you cause a reduction in insider incidents. So it's an area of ongoing research, but intuitively it just makes sense, right? So much of what we're trying to do in 2020 with insider threat programs is help folks recharacterize what constitutes security controls and what constitute valid response options for the things that insider threat programs should be on the lookout for.

 

TALHAH:  I assume there's an inverse correlation then between an organization being potentially disconnected because of things like work from home and what's happening in today's environment and an increase in potentially insider risk activity. Is that a fair extrapolation to make?

 

DAN:  Well, I think it's a fair hypothesis to consider testing, right? It's the opposite side of the coin. I think now would be a fantastic time to be making sure that we can collect evidence and data that would show those data points trending in maybe a different direction, right? As our organizations are experiencing unprecedented volumes of personal and professional stressors across our workforces, what's that doing to the rates of occurrence or the rates of frequency with which we're experiencing insider misuse cases? It's the kind of thing where it takes organizations a while to collect that data, right? So, I don't know that we're going to know for sure until we're maybe a little bit further out because these incidents tend to not evolve over the course of days and weeks or even months, but usually on the order of magnitude of several months, if not years in most cases. So it's one of those things, right? I think there are going to be far reaching implications, particularly from an insider threat perspective, that we'll be able to attribute to just how drastically everyone's normal changed over the past several months.

 

TALHAH:  Dan, we talked about stressors and a lot of times we hear customers talk about insider risk management. It really boils down to a game of indicators. When you have the right set of indicators and the ability to orchestrate over that, correlate over that, that's when you start to at least do the first part of the whole problem, which is to identify them. One of those indicators you talked about are these stressors, and you talked about the importance of partnering with your human resources organization, but how do you think about the potential to infer those stressors through communication channels or other means of looking at certain indicators in an environment to see if somebody is potentially disgruntled? We'd love to get your thoughts on that based on what you've researched.

 

DAN:  Yeah, certainly. Leveraging text analytics and natural understanding has been a hallmark of some of the research that we've done in this space. We've got a multi-part blog series that talks about how to apply text analytics to various stages of insider threat detection. What you'll find in there is a real strong emphasis and focus on the detection of the concerning behaviors and activities and the stressors that can precede attacks. So, the state of the practice a few years ago was keyword-based searches, right? These big buckets of words that we associate with topics like money or topics like code name sensitive projects within organizations, and every time we see one of those words being used, let's generate an alert and have an analyst dig in there.

 

Over the past several years, we've seen the state of the practice move past those simple keyword-based searches and start to leverage AI and ML to help with natural language understanding that can better contextualize that, deal with the nuances of electronic communication, and then again, form the foundation for features that comprise a broader model that's really a model of models, that helps us understand the data that we're seeing in aggregate across our organizations, relative to what we constitute as our highest priority risks to our critical assets.

 

This goes back to our HR friends and also our friends in legal and privacy, when this can be a tough pill to swallow from a legal privacy and civil liberties protection perspective for lots of organizations, right? This is the next step. We're going to start reading our employees electronic communications to figure out if they're talking about having money problems. This goes back to the need to educate those stakeholders in terms of what it is that we're actually trying to do, what we're not trying to do, who gets access to that analysis and what the allowable response options are with regards to the end products or end results of that analysis.

 

And helping them understand that, "No, no, we want to feed this back to you all so that we can help you all and support you all in your decision-making processes about what it is that we're seeing on our organizations networks and systems." It's something that we're seeing lots of organizations start to incorporate after close consultation and collaboration with their legal, privacy and civil liberties folks. Certainly, as you're considering this for large organizations that are operating maybe outside of the United States, you're going to have to make sure that you're working within all of those different legal jurisdictions that your program might be operating to understand what is and is not allowable in those different jurisdictions, because the privacy protection rules obviously change depending on operating location.

 

RAMAN:  Yeah, that's a great point. I mean, I had a conversation with a customer back in springtime, and the CSO was all in on, "Hey, I want to go and identify these risks, use an automated tool," et cetera. About a week later, I get another phone call, which is, "Hey, now my chief privacy officer wants to have a conversation with you, and she needs to better understand how information is being protected, how the PII of individuals is being protected." Because to your point, I could generate an alert, but that doesn't mean that person is necessarily doing something wrong. It's just an alert that's popping up. Now at that point, I'd want to protect their information. I want to make it private, anonymized so that there isn't this bias, this discrimination that might happen at the analyst level.

 

Once we went through all of the different ways to protect information and privacy, anonymization pieces, that convinced them and they said, "All right, great. We're going to roll this out worldwide across multiple divisions in multiple countries." So, you bring that up. That's a great point there. The other point you made, Dan, was around there's multiple sources here. I think Talhah touched upon this earlier, which is customers struggle to figure out how do I get started, right? You talked about, "Hey, you need sentiment analysis. You need contextual information. You need data sources beyond just..." For example, a lot of organizations say that they have an insider risk program, but yet they've just implemented DLP and that's it. It's like, "Well, that's only one piece of the puzzle and that's going to create alert fatigue for you."

 

When we talk to him and we say, "Hey, you need not only the endpoint indicators, but you need signals from sentiment. You need signals from maybe HR data and other sources." They're like, "Wow, that's a lot for me to try to figure out and [crosstalk 00:19:43], you know what I mean?" I think getting started quickly and, to your point, around scoping it to what are the risks that are most important and then quickly getting started on tackling those, scoping the right people and involving the cross-organizational parties, is probably is the foundational step that most organizations...

 

DAN:  Yeah. That, "We have a DLP program or we're trying to expand it," that's a very common pattern that we've seen in industry. One of the places that we've helped organizations get started in that space, what's that next data source to incorporate, was simply a list of known departing employees provided to us by human resources. So just knowing who is departing from the organization at any given time gives us the opportunity to supplement or augment what we have in the data loss prevention tools. So that if we see alerts or hits associated with folks that have announced their resignation, we've found that most theft of intellectual property cases that we've studied tend to occur within a 30-to-90-day window of an individual announcing their departure from the organization.

 

One of the earliest ways to address alert fatigue from something like a DLP is to just grab that tiny piece of context owned by human resources, right? It's focused. It's specific. We can point to data that just provides a rationale or justification as to why we think we need access to this information, how we'll use it, how we'll protect it. It gives us an opportunity to start small, but still make a big impact and show, "Look, HR, because we were able to incorporate this information, we've reduced our false positives rate by X or Y percentage, and we were able to increase our ability to recover intellectual property as it was being targeted for exfiltration by our departing employees." So, it's finding those use cases that are important to our organizations that you can back up with empirical data and starting small and taking those quick wins, high-impact solutions and finding ways to build on those successes to establish broader relationships.

 

TALHAH:  Another thing that I remember, that a customer of mine said that "DLP is just one piece. Another way to think about that is because DLP's really want data loss and if you just focusing on that, as far as your insider risk program is concerned, you're automatically focusing just on the confidentiality type risks." What about fraud? What about sabotage? What about physical issues that you might come up with, right? So, you have to take that holistic approach, and then from there start to prioritize and figure out what you want to try to target.

 

RAMAN:  I was going to say, also the other parts of it, which around, like you mentioned this, the workplace harassment, right? You have other risks that are more human-oriented that DLP can't necessarily identify. The one thing that you just talked about just now, which is what happened 60, 90, 180 days prior? That's not going to get picked up by a transactional tool that just looks at today's data. You need that historical data to go back and reason over, right?

 

DAN:  Yeah. I mean, so much about what we're doing with insider threat detection is about anomaly detection, right? An understanding of a deviation from a defined process or the ways that things normally happen as it pertains to authorized use of our organization's critical assets. So Raman, you're spot on.

 

If we're trying to determine deviations from normal, we need to have the capability to understand what normal has looked like historically, right? So, it's finding how long back is long enough to look to establish a pattern of normal. But as we've seen over the past couple of months, it's also having an understanding of knowing when normal is going to change and knowing how quickly it's going to take for us to establish what a ‘new normal’ looks like.

 

That's something that we saw a countless number of insider threat programs struggle with over the past few months, which is every baseline that they were relying on as the foundation for an anomaly detection strategy was completely turned upside down and onto its head and rendered almost ineffective or useless when everybody fundamentally changed their normal in the way that they normally conduct authorized access to their organization's critical assets. The last several months have really shone a light on the fact that we've got to get better at being able to find ways to articulate and describe what normal or expected is that might not necessarily have to rely on six months or years’ worth of data.

 

Where do we start there with policies and procedures? How do we make it easier for our technical detection strategies to mirror our policies and procedures when everybody changed their policies and procedures as it pertained to remote work and authorized the use of information technology systems, which insider threat programs really struggle to catch up to those changes and to make sure that the detection strategies and the prevention strategies caught up?  There's lots of lessons learned over the past few months about how we do that and where our opportunities for improvement are as a community.

 

RAMAN:  We did a survey here at Microsoft with well over 200 CSOs focused on insider risk. One of the things that we found was 73% of them said to us that they're planning on spending more on insider risk technology now with COVID than they were before. I think this highlights the point that you just made, which is the systems and processes, if you even had them, that you were using nine months ago aren't necessarily relevant today, right? You need things that can... Because people are accessing data from end points that don't have agents on them, right? You have people that are working in new ways, sharing things with others and new mechanisms, right? I mean, just look at this particular podcast, videocast. We're doing it from our houses, right? I've got a courier coming to pick up SanDisk card here. It's one of those things where it's challenging for organizations in this new world, right?

 

DAN:  Yeah, certainly. So now that we've got the spotlight on the insider threat problem, particularly with everything that's going on in the world, that highlights the need for organizations to be intentional about where they put that expenditure, right? This goes back to where we started this discussion. You've got to think through... Now that you've got evidence that suggests that maybe you've got some gap areas from an insider threat detection or prevention mechanism, how are you going to prioritize where your next security dollar goes for insider threats? To get that answer right, you've got to take a risk-management-based approach to this. You've got to understand what's currently in place, and you've got to also be a little bit future forward-thinking here, in terms of when will things go back to the way that they were or something somewhat resembling the way that they were? What lessons learned are we going to incorporate from the last several months into that new normal?

 

So I'm happy to hear that 73% of CSOs intend to spend more for inside threats, but also kind of terrified for them because I want to make sure that they understand what they're actually trying to do with that security investment and making sure that it's aligned with the actual risks to their organizations and being done in a way that is cognizant of their actual risk and what their current capabilities are and how that risk landscape might change and shift even within the next calendar year. It's a hard problem to juggle and it's a continuously evolving process and a continuously evolving problem for organizations.

 

RAMAN:  Dan, thank you so much. This was an awesome conversation today. You brought a lot of insights. How can people get more information about some of the research that you all are doing over there?

 

DAN:  Yeah, certainly. For more information, check out our website, Cert.org/insider-threat. You can also contact us at insider-threat-feedback@cert.org. In anticipation of National Insider Threat Awareness Month in September, we're going to be out and about a lot, trying to transition our research into as many broad communities of practices as we can. We'll be blogging to our Insider Threat blog about once a week in September and stay tuned for the seventh edition to ‘The Common Sense Guide to Mitigating Insider Threats,’ which we're targeting for a late 2020 release.

 

                                            

To learn more about this episode of the Uncovering Hidden Risks podcast, visit https://aka.ms/uncoveringhiddenrisks.

For more on Microsoft Compliance and Risk Management solutions, click here.

To follow Microsoft’s Insider Risk blog, click here.

To subscribe to the Microsoft Security YouTube channel, click here.

Follow Microsoft Security on Twitter and LinkedIn.

 

Keep in touch with Raman on LinkedIn.

Keep in touch with Talhah on LinkedIn.

Keep in touch with Dan at:  insider-threat-feedback@cert.org or https://cert.org/insider-threat

%3CLINGO-SUB%20id%3D%22lingo-sub-2160069%22%20slang%3D%22en-US%22%3EInsider%20risks%20aren%E2%80%99t%20just%20a%20security%20problem%20(UNCOVERING%20HIDDEN%20RISKS%20%E2%80%93%20Episode%203)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2160069%22%20slang%3D%22en-US%22%3E%3CP%3E%3CU%3EHost%3C%2FU%3E%3A%26nbsp%3B%20Raman%20Kalyan%20%E2%80%93%20Director%2C%20Microsoft%3C%2FP%3E%0A%3CP%3E%3CU%3EHost%3C%2FU%3E%3A%26nbsp%3B%20Talhah%20Mir%20-%20%26nbsp%3B%26nbsp%3BPrincipal%20Program%20Manager%2C%20Microsoft%3C%2FP%3E%0A%3CP%3E%3CU%3EGuest%3C%2FU%3E%3A%26nbsp%3B%20Dan%20Costa%20%E2%80%93%20Technical%20Manager%2C%20Carnegie%20Mellon%20University%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EThe%20following%20conversation%20is%20adapted%20from%20transcripts%20of%20Episode%203%20of%20the%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Funcoveringhiddenrisks%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CEM%3EUncovering%20Hidden%20Risks%3C%2FEM%3E%3C%2FA%3E%20%3CEM%3Epodcast.%26nbsp%3B%20There%20may%20be%20slight%20edits%20in%20order%20to%20make%20this%20conversation%20easier%20for%20readers%20to%20follow%20along.%26nbsp%3B%20You%20can%20view%20the%20full%20transcripts%20of%20this%20episode%20at%3A%26nbsp%3B%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Funcoveringhiddenrisks%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CEM%3Ehttps%3A%2F%2Faka.ms%2Funcoveringhiddenrisks%3C%2FEM%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EIn%20this%20podcast%20we%20explore%20how%20partnering%20with%20Human%20Resources%20can%20create%20a%20strong%20insider%20risk%20management%20program%2C%20a%20better%20workplace%20and%20more%20secure%20organization.%26nbsp%3B%20We%20uncover%20the%20types%20of%20HR%20data%20that%20can%20be%20added%20to%20an%20insider%20risk%20management%20system%2C%20using%20artificial%20intelligence%20to%20contextualize%20the%20data%2C%20all%20while%20respecting%20privacy%20and%20keeping%20in%20line%20with%20applicable%20policies.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERAMAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EHi%2C%20I'm%20Raman%20Kalyan%2C%20I'm%20with%20Microsoft%20365%20Product%20Marketing%20Team.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETALHAH%3A%26nbsp%3B%20%3C%2FSTRONG%3EAnd%20I'm%20Talhah%20Mir%2C%20Principal%20Program%20Manager%20on%20the%20Security%20Compliance%20Team.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERAMAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EAnd%20this%20is%20episode%20three%20with%20Dan%20Costa%2C%20and%20we%20are%20talking%20about%20how%20do%20you%20bring%20in%20HR%2C%20legal%2C%20privacy%2C%20and%20compliance%20into%20building%20an%20effective%20insider%20risk%20management%20program.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETALHAH%3A%26nbsp%3B%20%3C%2FSTRONG%3EYeah%2C%20super%20important.%20This%20is%20not%20like%20security%20where%20you%20can%20just%20take%20care%20of%20this%20in%20your%20SOC%20alone%2C%20you%20need%20collaboration%2C%20and%20he's%20gonna%20tell%20us%20more%20on%20why%20that's%20critical.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERAMAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EYeah%2C%20it%20was%20awesome%20talking%20to%20Dan%20last%20week.%20So%2C%20let's%20do%20it.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETALHAH%3A%26nbsp%3B%20%3C%2FSTRONG%3EYou%20gave%20a%20great%20example%20of%20an%20organizational%20stressor%2C%20like%20somebody%20being%20demoted%20or%20somebody%20being%20put%20on%20a%20performance%20improvement%20plan.%20You%20can%20also%20have%20personal%20stressors%20outside%20of%20work%20that%20you%20have%20talked%20about%20openly%20in%20a%20lot%20of%20your%20guidance%20and%20whatnot.%20When%20you%20look%20at%20organizational%20stressors%2C%20a%20lot%20of%20times%20they%20reside%20with%20your%20human%20resources%20department%2C%20right%3F%20So%2C%20this%20is%20a%20place%20where%20you%20have%20to%20negotiate%20with%20them%20to%20be%20able%20to%20bring%20this%20data%20in.%20Talk%20to%20me%20about%20that.%20How%20do%20you%20guide%20the%20teams%20that%20are%20looking%20to%20establish%20these%20connections%20with%20their%20human%20resources%20department%2C%20the%20HR%20department%2C%20and%20negotiate%20this%20kind%20of%20data%20so%20that%20it's%20for%20insider%20risk%20management%20purposes%2C%20and%20also%20talk%20about%20opportunities%20that%20you%20see%20where%20you%20could%20potentially%20infer%20sentiment%20by%20looking%20at%20communication%20patterns%20or%20physical%20movement%20patterns%20or%20digital%20log-in%20patterns%20and%20things%20like%20that%3F%20So%20how%20can%20you%20help%20to%20identify%20these%20early%20indicators%20if%20you%20will%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDAN%3A%26nbsp%3B%20%3C%2FSTRONG%3ESo%20let's%20start%20with%20how%20we%20bridge%20the%20gap%20between%20the%20insider%20threat%20program%20and%20stakeholders%20like%20human%20resources%2C%20because%20Talhah%2C%20you're%20spot%20on.%20They're%20one%20of%20the%20key%20stakeholders%20for%20an%20insider%20threat%20program%2C%20really%20in%20two%20respects.%20One%20is%20they%20own%20a%20lot%20of%20the%20data%20that%20will%20allow%20us%20to%20gather%20the%20context%20that%20we%20can%20use%20to%20augment%20or%20supplement%20what%20we're%20seeing%20from%20our%20technical%20detection%20capabilities%2C%20to%20figure%20out%20was%20that%20activity%20appropriate%20for%20the%20job%20role%2C%20the%20responsibility%20of%20the%20individual%20associated%20with%20the%20activity.%20How%20can%20we%20pull%20left%20relative%20to%20an%20incident%20progression%20and%20find%20folks%20that%20might%20be%20experiencing%20these%20organizational%20stressors%2C%20right%3F%20That's%20data%20that%20our%20human%20resources%20stakeholders%20have%20and%20hold.%20We've%20seen%20insider%20threat%20programs%20over%20the%20years%20struggle%20with%20building%20the%20relationships%20between%20stakeholders%20like%20human%20resource%20management.%20A%20lot%20of%20the%20challenges%20there%2C%20from%20what%20we've%20seen%2C%20come%20down%20to%20a%20lack%20of%20understanding%20of%20what%20it%20is%20that%20the%20insider%20threat%20program%20is%20actually%20trying%20to%20do.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIn%20many%20cases%2C%20the%20insider%20threat%20program%20isn't%20necessarily%20without%20fault%20in%20making%20that%20impression%20stick%20in%20the%20minds%20of%20human%20resources.%20So%20this%20goes%20back%20to%20the%20insider%20threat%20program's%20not%20trying%20to%20be%20duplicative%20or%20boil%20the%20ocean%2C%20or%20carve%20off%20too%20big%20of%20a%20part%20of%20this%20broader%20enterprise-wide%20activity%20that%20needs%20to%20happen%20to%20manage%20insider%20risk.%20In%20that%20early%20relationship%20building%20and%20establishment%2C%20there's%20an%20education%20piece%20that%20has%20to%20happen.%20Human%20resources%20folks%20aren't%20spending%20all%20day%20every%20day%20thinking%20about%20how%20insiders%20can%20misuse%20their%20access%20like%20we%20are%2C%20right%3F%20So%20much%20of%20it%20is%20these%20are%20the%20threats%20that%20our%20critical%20assets%20are%20subject%20to%2C%20by%20the%20nature%20of%20our%20employees%20having%20authorized%20access%20to%20them.%20We%20understand%20that%20this%20isn't%20always%20the%20most%20comfortable%20subject%20to%20talk%20about%2C%20but%20here's%20a%20myriad%20of%20incident%20data%20that%20shows%20where%20vulnerabilities%20existed%20within%20a%20human%20resource%20process%2C%20or%20a%20lack%20of%20information%20sharing%20between%20HR%20and%20IT%20enabled%20an%20insider%20to%20carry%20out%20their%20attack%20or%20to%20evade%20detection%20for%20some%20significant%20amount%20of%20time.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20much%20of%20it%20just%20starts%20with%20education.%20Once%20we've%20got%20them%20just%20aware%20of%20the%20fact%20that%20this%20is%20something%20that%20the%20organization%20has%20to%20consider%20as%20a%20part%20of%20its%20overarching%20security%20strategy%2C%20we%20need%20to%20help%20them%20understand%20the%20critical%20role%20that%20they%20play.%20Understanding%20how%20we%20use%20contextual%20information.%20Understanding%20how%20we%20don't%20use%20contextual%20information%20and%20helping%20them%20understand%20what%2C%20really%2C%20what%20an%20insider%20threat%20program%20is%20designed%20to%20do%20is%20help%20them%20make%20better%20data-driven%20decisions%20faster%20by%20giving%20them%20access%20to%20analysis%20that%20can%20only%20be%20conducted%20by%20folks%20that%20can%20take%20the%20data%20that%20they%20have%20and%20stitch%20it%20together%20with%20IT%20data%2C%20with%20SOC%20data%2C%20with%20information%20assurance%20data%2C%20with%20the%20risk%20register%20that's%20owned%20by%20our%20chief%20risk%20officer.%20They%20probably%20don't%20want%20to%20be%20spending%20all%20of%20their%20times%20writing%20analytics%20and%20making%20the%20relationships%20with%20IT%20and%20legal%20to%20facilitate%20some%20of%20that%20stuff.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThat's%20what%20the%20insider%20threat%20program%20is%20here%20for.%20So%2C%20helping%20them%20understand%20that%20this%20is%20a%20mutually%20beneficial%20relationship%2C%20that%20the%20data%20that%20they%20provide%20will%20help%20the%20organization%20more%20proactively%20manage%20insider%20risk%20and%20that%20they%20are%20a%20stakeholder%20in%20terms%20of%20they%20are%20potentially%20recipients%20of%20the%20results%20of%20the%20analysis%20that%20the%20insider%20threat%20program%20itself%20will%20conduct.%20Helping%20them%20better%20understand%20how%20to%20do%20things%20like%20make%20refinements%2C%20enhancements%2C%20or%20improvements%20to%20the%20onboarding%20and%20offboarding%20processes.%20Helping%20them%20understand%20when%20it%20might%20be%20time%20to%20make%20a%20change%20to%20employee%20compensation%20strategies%20within%20the%20organization%2C%20how%20the%20employee%20performance%20management%20system%20is%20leveraged%20within%20the%20organization.%20The%20insider%20threat%20program%2C%20once%20it's%20up%20and%20running%20and%20bringing%20in%20all%20the%20different%20data%20and%20engaging%20with%20all%20the%20different%20stakeholders%2C%20can%20help%20highlight%20and%20emphasize%20where%20those%20processes%20are%20working%2C%20where%20they%20can%20be%20refined.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIt's%20hard%20for%20the%20stakeholders%20to%20do%20that%20work%20on%20their%20own.%20So%20there's%20a%20fine%20line%20to%20walk%20there%20too%2C%20right%3F%20Which%20is%2C%20you%20can't%20go%20in%20and%20say%2C%20%22We%20think%20we%20can%20be%20doing%20your%20job%20better%20than%20you%20can%20because%20we%20have%20data%20scientists%20and%20all%20this%20other%20cool%20data.%22%20So%20a%20lot%20of%20effective%20insider%20threat%20program%20building%20from%20a%20relationship%20building%20perspective%20really%20comes%20down%20to%20having%20an%20insider%20threat%20program%20manager%20who%20has%20that%20organizational%20savvy%2C%20that%20can%20find%20the%20right%20ways%20to%20build%20and%20establish%20these%20relationships%20within%20their%20organizations.%20So%20it's%20not%20easy%20by%20any%20stretch%20of%20the%20imagination%2C%20but%20we're%20seeing%20lots%20of%20organizations%20be%20successful%20at%20helping%20their%20stakeholders%20understand%20the%20threat%2C%20helping%20their%20stakeholders%20understand%20the%20two%20way%20street%20of%2C%20%22This%20is%20the%20information%20we%20need.%20Here's%20why%20we%20need%20it%20from%20you.%20Here's%20why%20you're%20the%20only%20part%20of%20the%20organization%20that%20can%20help%20us%20with%20this%2C%20and%20here's%20how%20we%20think%20it%20can%20be%20beneficial%20to%20you%20and%20the%20organization%20more%20broadly.%22%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERAMAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EI%20think%20this%20is%20the%20kind%20of%20conversation%20that%20Talhah%20and%20I%20had%20when%20we%20first%20got%20into%20this%20space%20together.%20He'd%20already%20been%20in%20it%2C%20but%20I%20had%20come%20at%20it%20from%20a%20product%20perspective%2C%20as%20we%20think%20about%20helping%20our%20customers%20tackle%20these%20issues.%20One%20of%20the%20things%20we%20talked%20about%20early%20on%20was%20hey%2C%20look%2C%20this%20is%2C%20like%20you%20mentioned%2C%20Dan%2C%20this%20is%20a%20human%20problem.%20This%20is%20the%20employees%20that%20you're%20dealing%20with.%20These%20are%20people%20that%20are%20part%20of%20your%20organizational%20family%2C%20right%3F%20You%20just%20can't%20set%20something%20up%20that%20starts%20investigating%20people%2C%20snooping%20on%20them%2C%20and%20doing%20that%20sort%20of%20thing.%20You%20got%20to%20take%20a%20little%20more%20holistic%20viewpoint%20here.%20The%20things%20that%20Talhah%20and%20I%20talked%20about%20were%20around%20insider...%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThis%20is%20why%20insider%20risks%20makes%20more%20sense%20than%20insider%20threat%20because%20as%20you%20think%20about%20HR%2C%20they're%20stewards%20of%20the%20corporate%20culture%2C%20right%3F%20They're%20the%20ones%20that%20are%20responsible%20for%20help%20building%20a%20corporate%20culture%20of%20inclusion%20and%20of%20people%20feeling%20like%20they%20are%20wanted%2C%20and%20they%20are%20rewarded%20and%20they're%20building%20towards%20a%20positive%20outcome%20for%20the%20organization.%20For%20them%2C%20the%20program%20itself%20can%20highlight%2C%20to%20your%20point%2C%20the%20risks%20that%20are%20there%20that%20might%20impact%20that%20organizational%20health%20and%20in%20a%20way%20actually%20helps%20support%20a%20better%2C%20stronger%20organization%20by%20pointing%20out%20areas%20that%20are%20vulnerable%20%5Binaudible%5D%20that%20they%20can%20go%20after%20and%20build%20training%20around%2C%20that%20they%20can%20go%20out%20and%20say%2C%20%22Hey%2C%20this%20is%20something%20that%20we%20should%20be%20doing%2C%22%20or%2C%20%22People%20aren't%20feeling%20supported%20and%20so%20they're%20doing%20things%20that%20they%20shouldn't%20be%20doing.%22%20Now%20rather%20than%20treating%20the%20symptom%2C%20treat%20the%20underlying%20issue.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EThat's%20a%20great%20point%2C%20Raman.%20I%20would%20add%20to%20that%20and%20take%20that%20a%20step%20further%2C%20which%20is%2C%20I%20think%20stakeholder%20parts%20of%20the%20organization%20like%20human%20resources%20don't%20intuitively%20or%20necessarily%20think%20about%20the%20things%20that%20they%20do%20as%20being%20influencers%20of%20increased%20security%20or%20resilience%20within%20the%20organization.%20So%20much%20of%20that%20education%20is%20helping%20them%20understand%2C%20%22Look%2C%20organizations%20that%20have%20better%20management%20practices%20have%20higher%20degrees%20of%20employee%20engagement%2C%20have%20higher%20degrees%20of%20perceived%20organizational%20support%20amongst%20all%20the%20other%20great%20benefits%20that%20they%20experience.%22%20They%20also%20experience%20less%20security%20incidents.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESo%2C%20what%20you're%20doing%20and%20these%20practices%20are%20security%20controls%2C%20and%20we%20really%20have%20to%20start%20to%20help%20our%20organizations%20broaden%20their%20understanding%20of%20what%20constitutes%20a%20security%20control.%20And%2C%20%22Oh%2C%20by%20the%20way%2C%20HR%2C%20if%20you%20know%20that%20these%20are%20things%20that%20you'd%20like%20to%20be%20doing%20just%20to%20increase%20morale%2C%20we%20can%20amplify%20that%20ask%20and%20message%20up%20the%20chain%20when%20it%20comes%20time%20for%20budget%20requests%2C%20by%20saying%2C%20'Hey%2C%20not%20only%20is%20this%20a%20good%20thing%20for%20us%20to%20do%20from%20a%20talent%20management%20perspective%2C%20but%20it's%20a%20key%20security%20strategy%20for%20our%20organization.'%22%20Another%20way%20for%20those%20two%20disparate%20parts%20of%20the%20organization%20to%20work%20together%20in%20some%20mutually%20beneficial%20way.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EA%20couple%20of%20years%20ago%2C%20we%20did%20a%20study%20called%20the%20Critical%20Role%20of%20Positive%20Incentives%20in%20Mitigating%20Insider%20Threats.%20It%20was%20really%20looking%20at%20just%20this%2C%20Raman%2C%20which%20is%2C%20could%20we%20establish%20a%20relationship%20between%20levels%20of%20connectedness%20at%20work%2C%20employee%20engagement%2C%20perceived%20organizational%20support%2C%20and%20a%20reduction%20in%20the%20number%20of%20insider%20incidents%20that%20organizations%20experience%3F%20We%20actually%20leveraged%20our%20opensource%20insider%20threat%20information%20sharing%20group%20for%20a%20lot%20of%20that%20work%20to%20conduct%20surveys.%20What%20we%20saw%20was%20positive%20correlation%20between...%20Increases%20across%20those%20dimensions%20of%20connectedness%20at%20work%2C%20perceived%20organizational%20support%2C%20and%20a%20decrease%20in%20the%20number%20of%20insider%20incidents%20that%20organizations%20were%20experiencing.%20So%20the%20key%20takeaway%20from%20that%20study%20was%20better%20places%20to%20work%20ended%20up%20also%20being%20more%20secure%20organizations%2C%20particularly%20as%20it%20pertains%20to%20insider%20risk.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENow%2C%20we're%20trying%20to%20continue%20that%20work%20and%20drive%20that%20towards%20a%20causal%20model%20and%20really%20being%20able%20to%20show%20that%20these%20are%20the%20root%20causes.%20These%20management%20practices%2C%20these%20HR%20practices%2C%20by%20putting%20them%20in%20place%2C%20you%20cause%20a%20reduction%20in%20insider%20incidents.%20So%20it's%20an%20area%20of%20ongoing%20research%2C%20but%20intuitively%20it%20just%20makes%20sense%2C%20right%3F%20So%20much%20of%20what%20we're%20trying%20to%20do%20in%202020%20with%20insider%20threat%20programs%20is%20help%20folks%20recharacterize%20what%20constitutes%20security%20controls%20and%20what%20constitute%20valid%20response%20options%20for%20the%20things%20that%20insider%20threat%20programs%20should%20be%20on%20the%20lookout%20for.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETALHAH%3A%26nbsp%3B%20%3C%2FSTRONG%3EI%20assume%20there's%20an%20inverse%20correlation%20then%20between%20an%20organization%20being%20potentially%20disconnected%20because%20of%20things%20like%20work%20from%20home%20and%20what's%20happening%20in%20today's%20environment%20and%20an%20increase%20in%20potentially%20insider%20risk%20activity.%20Is%20that%20a%20fair%20extrapolation%20to%20make%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EWell%2C%20I%20think%20it's%20a%20fair%20hypothesis%20to%20consider%20testing%2C%20right%3F%20It's%20the%20opposite%20side%20of%20the%20coin.%20I%20think%20now%20would%20be%20a%20fantastic%20time%20to%20be%20making%20sure%20that%20we%20can%20collect%20evidence%20and%20data%20that%20would%20show%20those%20data%20points%20trending%20in%20maybe%20a%20different%20direction%2C%20right%3F%20As%20our%20organizations%20are%20experiencing%20unprecedented%20volumes%20of%20personal%20and%20professional%20stressors%20across%20our%20workforces%2C%20what's%20that%20doing%20to%20the%20rates%20of%20occurrence%20or%20the%20rates%20of%20frequency%20with%20which%20we're%20experiencing%20insider%20misuse%20cases%3F%20It's%20the%20kind%20of%20thing%20where%20it%20takes%20organizations%20a%20while%20to%20collect%20that%20data%2C%20right%3F%20So%2C%20I%20don't%20know%20that%20we're%20going%20to%20know%20for%20sure%20until%20we're%20maybe%20a%20little%20bit%20further%20out%20because%20these%20incidents%20tend%20to%20not%20evolve%20over%20the%20course%20of%20days%20and%20weeks%20or%20even%20months%2C%20but%20usually%20on%20the%20order%20of%20magnitude%20of%20several%20months%2C%20if%20not%20years%20in%20most%20cases.%20So%20it's%20one%20of%20those%20things%2C%20right%3F%20I%20think%20there%20are%20going%20to%20be%20far%20reaching%20implications%2C%20particularly%20from%20an%20insider%20threat%20perspective%2C%20that%20we'll%20be%20able%20to%20attribute%20to%20just%20how%20drastically%20everyone's%20normal%20changed%20over%20the%20past%20several%20months.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETALHAH%3A%26nbsp%3B%20%3C%2FSTRONG%3EDan%2C%20we%20talked%20about%20stressors%20and%20a%20lot%20of%20times%20we%20hear%20customers%20talk%20about%20insider%20risk%20management.%20It%20really%20boils%20down%20to%20a%20game%20of%20indicators.%20When%20you%20have%20the%20right%20set%20of%20indicators%20and%20the%20ability%20to%20orchestrate%20over%20that%2C%20correlate%20over%20that%2C%20that's%20when%20you%20start%20to%20at%20least%20do%20the%20first%20part%20of%20the%20whole%20problem%2C%20which%20is%20to%20identify%20them.%20One%20of%20those%20indicators%20you%20talked%20about%20are%20these%20stressors%2C%20and%20you%20talked%20about%20the%20importance%20of%20partnering%20with%20your%20human%20resources%20organization%2C%20but%20how%20do%20you%20think%20about%20the%20potential%20to%20infer%20those%20stressors%20through%20communication%20channels%20or%20other%20means%20of%20looking%20at%20certain%20indicators%20in%20an%20environment%20to%20see%20if%20somebody%20is%20potentially%20disgruntled%3F%20We'd%20love%20to%20get%20your%20thoughts%20on%20that%20based%20on%20what%20you've%20researched.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EYeah%2C%20certainly.%20Leveraging%20text%20analytics%20and%20natural%20understanding%20has%20been%20a%20hallmark%20of%20some%20of%20the%20research%20that%20we've%20done%20in%20this%20space.%20We've%20got%20a%20multi-part%20blog%20series%20that%20talks%20about%20how%20to%20apply%20text%20analytics%20to%20various%20stages%20of%20insider%20threat%20detection.%20What%20you'll%20find%20in%20there%20is%20a%20real%20strong%20emphasis%20and%20focus%20on%20the%20detection%20of%20the%20concerning%20behaviors%20and%20activities%20and%20the%20stressors%20that%20can%20precede%20attacks.%20So%2C%20the%20state%20of%20the%20practice%20a%20few%20years%20ago%20was%20keyword-based%20searches%2C%20right%3F%20These%20big%20buckets%20of%20words%20that%20we%20associate%20with%20topics%20like%20money%20or%20topics%20like%20code%20name%20sensitive%20projects%20within%20organizations%2C%20and%20every%20time%20we%20see%20one%20of%20those%20words%20being%20used%2C%20let's%20generate%20an%20alert%20and%20have%20an%20analyst%20dig%20in%20there.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EOver%20the%20past%20several%20years%2C%20we've%20seen%20the%20state%20of%20the%20practice%20move%20past%20those%20simple%20keyword-based%20searches%20and%20start%20to%20leverage%20AI%20and%20ML%20to%20help%20with%20natural%20language%20understanding%20that%20can%20better%20contextualize%20that%2C%20deal%20with%20the%20nuances%20of%20electronic%20communication%2C%20and%20then%20again%2C%20form%20the%20foundation%20for%20features%20that%20comprise%20a%20broader%20model%20that's%20really%20a%20model%20of%20models%2C%20that%20helps%20us%20understand%20the%20data%20that%20we're%20seeing%20in%20aggregate%20across%20our%20organizations%2C%20relative%20to%20what%20we%20constitute%20as%20our%20highest%20priority%20risks%20to%20our%20critical%20assets.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20goes%20back%20to%20our%20HR%20friends%20and%20also%20our%20friends%20in%20legal%20and%20privacy%2C%20when%20this%20can%20be%20a%20tough%20pill%20to%20swallow%20from%20a%20legal%20privacy%20and%20civil%20liberties%20protection%20perspective%20for%20lots%20of%20organizations%2C%20right%3F%20This%20is%20the%20next%20step.%20We're%20going%20to%20start%20reading%20our%20employees%20electronic%20communications%20to%20figure%20out%20if%20they're%20talking%20about%20having%20money%20problems.%20This%20goes%20back%20to%20the%20need%20to%20educate%20those%20stakeholders%20in%20terms%20of%20what%20it%20is%20that%20we're%20actually%20trying%20to%20do%2C%20what%20we're%20not%20trying%20to%20do%2C%20who%20gets%20access%20to%20that%20analysis%20and%20what%20the%20allowable%20response%20options%20are%20with%20regards%20to%20the%20end%20products%20or%20end%20results%20of%20that%20analysis.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAnd%20helping%20them%20understand%20that%2C%20%22No%2C%20no%2C%20we%20want%20to%20feed%20this%20back%20to%20you%20all%20so%20that%20we%20can%20help%20you%20all%20and%20support%20you%20all%20in%20your%20decision-making%20processes%20about%20what%20it%20is%20that%20we're%20seeing%20on%20our%20organizations%20networks%20and%20systems.%22%20It's%20something%20that%20we're%20seeing%20lots%20of%20organizations%20start%20to%20incorporate%20after%20close%20consultation%20and%20collaboration%20with%20their%20legal%2C%20privacy%20and%20civil%20liberties%20folks.%20Certainly%2C%20as%20you're%20considering%20this%20for%20large%20organizations%20that%20are%20operating%20maybe%20outside%20of%20the%20United%20States%2C%20you're%20going%20to%20have%20to%20make%20sure%20that%20you're%20working%20within%20all%20of%20those%20different%20legal%20jurisdictions%20that%20your%20program%20might%20be%20operating%20to%20understand%20what%20is%20and%20is%20not%20allowable%20in%20those%20different%20jurisdictions%2C%20because%20the%20privacy%20protection%20rules%20obviously%20change%20depending%20on%20operating%20location.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERAMAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EYeah%2C%20that's%20a%20great%20point.%20I%20mean%2C%20I%20had%20a%20conversation%20with%20a%20customer%20back%20in%20springtime%2C%20and%20the%20CSO%20was%20all%20in%20on%2C%20%22Hey%2C%20I%20want%20to%20go%20and%20identify%20these%20risks%2C%20use%20an%20automated%20tool%2C%22%20et%20cetera.%20About%20a%20week%20later%2C%20I%20get%20another%20phone%20call%2C%20which%20is%2C%20%22Hey%2C%20now%20my%20chief%20privacy%20officer%20wants%20to%20have%20a%20conversation%20with%20you%2C%20and%20she%20needs%20to%20better%20understand%20how%20information%20is%20being%20protected%2C%20how%20the%20PII%20of%20individuals%20is%20being%20protected.%22%20Because%20to%20your%20point%2C%20I%20could%20generate%20an%20alert%2C%20but%20that%20doesn't%20mean%20that%20person%20is%20necessarily%20doing%20something%20wrong.%20It's%20just%20an%20alert%20that's%20popping%20up.%20Now%20at%20that%20point%2C%20I'd%20want%20to%20protect%20their%20information.%20I%20want%20to%20make%20it%20private%2C%20anonymized%20so%20that%20there%20isn't%20this%20bias%2C%20this%20discrimination%20that%20might%20happen%20at%20the%20analyst%20level.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EOnce%20we%20went%20through%20all%20of%20the%20different%20ways%20to%20protect%20information%20and%20privacy%2C%20anonymization%20pieces%2C%20that%20convinced%20them%20and%20they%20said%2C%20%22All%20right%2C%20great.%20We're%20going%20to%20roll%20this%20out%20worldwide%20across%20multiple%20divisions%20in%20multiple%20countries.%22%20So%2C%20you%20bring%20that%20up.%20That's%20a%20great%20point%20there.%20The%20other%20point%20you%20made%2C%20Dan%2C%20was%20around%20there's%20multiple%20sources%20here.%20I%20think%20Talhah%20touched%20upon%20this%20earlier%2C%20which%20is%20customers%20struggle%20to%20figure%20out%20how%20do%20I%20get%20started%2C%20right%3F%20You%20talked%20about%2C%20%22Hey%2C%20you%20need%20sentiment%20analysis.%20You%20need%20contextual%20information.%20You%20need%20data%20sources%20beyond%20just...%22%20For%20example%2C%20a%20lot%20of%20organizations%20say%20that%20they%20have%20an%20insider%20risk%20program%2C%20but%20yet%20they've%20just%20implemented%20DLP%20and%20that's%20it.%20It's%20like%2C%20%22Well%2C%20that's%20only%20one%20piece%20of%20the%20puzzle%20and%20that's%20going%20to%20create%20alert%20fatigue%20for%20you.%22%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20we%20talk%20to%20him%20and%20we%20say%2C%20%22Hey%2C%20you%20need%20not%20only%20the%20endpoint%20indicators%2C%20but%20you%20need%20signals%20from%20sentiment.%20You%20need%20signals%20from%20maybe%20HR%20data%20and%20other%20sources.%22%20They're%20like%2C%20%22Wow%2C%20that's%20a%20lot%20for%20me%20to%20try%20to%20figure%20out%20and%20%5Bcrosstalk%2000%3A19%3A43%5D%2C%20you%20know%20what%20I%20mean%3F%22%20I%20think%20getting%20started%20quickly%20and%2C%20to%20your%20point%2C%20around%20scoping%20it%20to%20what%20are%20the%20risks%20that%20are%20most%20important%20and%20then%20quickly%20getting%20started%20on%20tackling%20those%2C%20scoping%20the%20right%20people%20and%20involving%20the%20cross-organizational%20parties%2C%20is%20probably%20is%20the%20foundational%20step%20that%20most%20organizations...%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EYeah.%20That%2C%20%22We%20have%20a%20DLP%20program%20or%20we're%20trying%20to%20expand%20it%2C%22%20that's%20a%20very%20common%20pattern%20that%20we've%20seen%20in%20industry.%20One%20of%20the%20places%20that%20we've%20helped%20organizations%20get%20started%20in%20that%20space%2C%20what's%20that%20next%20data%20source%20to%20incorporate%2C%20was%20simply%20a%20list%20of%20known%20departing%20employees%20provided%20to%20us%20by%20human%20resources.%20So%20just%20knowing%20who%20is%20departing%20from%20the%20organization%20at%20any%20given%20time%20gives%20us%20the%20opportunity%20to%20supplement%20or%20augment%20what%20we%20have%20in%20the%20data%20loss%20prevention%20tools.%20So%20that%20if%20we%20see%20alerts%20or%20hits%20associated%20with%20folks%20that%20have%20announced%20their%20resignation%2C%20we've%20found%20that%20most%20theft%20of%20intellectual%20property%20cases%20that%20we've%20studied%20tend%20to%20occur%20within%20a%2030-to-90-day%20window%20of%20an%20individual%20announcing%20their%20departure%20from%20the%20organization.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EOne%20of%20the%20earliest%20ways%20to%20address%20alert%20fatigue%20from%20something%20like%20a%20DLP%20is%20to%20just%20grab%20that%20tiny%20piece%20of%20context%20owned%20by%20human%20resources%2C%20right%3F%20It's%20focused.%20It's%20specific.%20We%20can%20point%20to%20data%20that%20just%20provides%20a%20rationale%20or%20justification%20as%20to%20why%20we%20think%20we%20need%20access%20to%20this%20information%2C%20how%20we'll%20use%20it%2C%20how%20we'll%20protect%20it.%20It%20gives%20us%20an%20opportunity%20to%20start%20small%2C%20but%20still%20make%20a%20big%20impact%20and%20show%2C%20%22Look%2C%20HR%2C%20because%20we%20were%20able%20to%20incorporate%20this%20information%2C%20we've%20reduced%20our%20false%20positives%20rate%20by%20X%20or%20Y%20percentage%2C%20and%20we%20were%20able%20to%20increase%20our%20ability%20to%20recover%20intellectual%20property%20as%20it%20was%20being%20targeted%20for%20exfiltration%20by%20our%20departing%20employees.%22%20So%2C%20it's%20finding%20those%20use%20cases%20that%20are%20important%20to%20our%20organizations%20that%20you%20can%20back%20up%20with%20empirical%20data%20and%20starting%20small%20and%20taking%20those%20quick%20wins%2C%20high-impact%20solutions%20and%20finding%20ways%20to%20build%20on%20those%20successes%20to%20establish%20broader%20relationships.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETALHAH%3A%26nbsp%3B%20%3C%2FSTRONG%3EAnother%20thing%20that%20I%20remember%2C%20that%20a%20customer%20of%20mine%20said%20that%20%22DLP%20is%20just%20one%20piece.%20Another%20way%20to%20think%20about%20that%20is%20because%20DLP's%20really%20want%20data%20loss%20and%20if%20you%20just%20focusing%20on%20that%2C%20as%20far%20as%20your%20insider%20risk%20program%20is%20concerned%2C%20you're%20automatically%20focusing%20just%20on%20the%20confidentiality%20type%20risks.%22%20What%20about%20fraud%3F%20What%20about%20sabotage%3F%20What%20about%20physical%20issues%20that%20you%20might%20come%20up%20with%2C%20right%3F%20So%2C%20you%20have%20to%20take%20that%20holistic%20approach%2C%20and%20then%20from%20there%20start%20to%20prioritize%20and%20figure%20out%20what%20you%20want%20to%20try%20to%20target.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERAMAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EI%20was%20going%20to%20say%2C%20also%20the%20other%20parts%20of%20it%2C%20which%20around%2C%20like%20you%20mentioned%20this%2C%20the%20workplace%20harassment%2C%20right%3F%20You%20have%20other%20risks%20that%20are%20more%20human-oriented%20that%20DLP%20can't%20necessarily%20identify.%20The%20one%20thing%20that%20you%20just%20talked%20about%20just%20now%2C%20which%20is%20what%20happened%2060%2C%2090%2C%20180%20days%20prior%3F%20That's%20not%20going%20to%20get%20picked%20up%20by%20a%20transactional%20tool%20that%20just%20looks%20at%20today's%20data.%20You%20need%20that%20historical%20data%20to%20go%20back%20and%20reason%20over%2C%20right%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EYeah.%20I%20mean%2C%20so%20much%20about%20what%20we're%20doing%20with%20insider%20threat%20detection%20is%20about%20anomaly%20detection%2C%20right%3F%20An%20understanding%20of%20a%20deviation%20from%20a%20defined%20process%20or%20the%20ways%20that%20things%20normally%20happen%20as%20it%20pertains%20to%20authorized%20use%20of%20our%20organization's%20critical%20assets.%20So%20Raman%2C%20you're%20spot%20on.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20we're%20trying%20to%20determine%20deviations%20from%20normal%2C%20we%20need%20to%20have%20the%20capability%20to%20understand%20what%20normal%20has%20looked%20like%20historically%2C%20right%3F%20So%2C%20it's%20finding%20how%20long%20back%20is%20long%20enough%20to%20look%20to%20establish%20a%20pattern%20of%20normal.%20But%20as%20we've%20seen%20over%20the%20past%20couple%20of%20months%2C%20it's%20also%20having%20an%20understanding%20of%20knowing%20when%20normal%20is%20going%20to%20change%20and%20knowing%20how%20quickly%20it's%20going%20to%20take%20for%20us%20to%20establish%20what%20a%20%E2%80%98new%20normal%E2%80%99%20looks%20like.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThat's%20something%20that%20we%20saw%20a%20countless%20number%20of%20insider%20threat%20programs%20struggle%20with%20over%20the%20past%20few%20months%2C%20which%20is%20every%20baseline%20that%20they%20were%20relying%20on%20as%20the%20foundation%20for%20an%20anomaly%20detection%20strategy%20was%20completely%20turned%20upside%20down%20and%20onto%20its%20head%20and%20rendered%20almost%20ineffective%20or%20useless%20when%20everybody%20fundamentally%20changed%20their%20normal%20in%20the%20way%20that%20they%20normally%20conduct%20authorized%20access%20to%20their%20organization's%20critical%20assets.%20The%20last%20several%20months%20have%20really%20shone%20a%20light%20on%20the%20fact%20that%20we've%20got%20to%20get%20better%20at%20being%20able%20to%20find%20ways%20to%20articulate%20and%20describe%20what%20normal%20or%20expected%20is%20that%20might%20not%20necessarily%20have%20to%20rely%20on%20six%20months%20or%20years%E2%80%99%20worth%20of%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhere%20do%20we%20start%20there%20with%20policies%20and%20procedures%3F%20How%20do%20we%20make%20it%20easier%20for%20our%20technical%20detection%20strategies%20to%20mirror%20our%20policies%20and%20procedures%20when%20everybody%20changed%20their%20policies%20and%20procedures%20as%20it%20pertained%20to%20remote%20work%20and%20authorized%20the%20use%20of%20information%20technology%20systems%2C%20which%20insider%20threat%20programs%20really%20struggle%20to%20catch%20up%20to%20those%20changes%20and%20to%20make%20sure%20that%20the%20detection%20strategies%20and%20the%20prevention%20strategies%20caught%20up%3F%26nbsp%3B%20There's%20lots%20of%20lessons%20learned%20over%20the%20past%20few%20months%20about%20how%20we%20do%20that%20and%20where%20our%20opportunities%20for%20improvement%20are%20as%20a%20community.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERAMAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EWe%20did%20a%20survey%20here%20at%20Microsoft%20with%20well%20over%20200%20CSOs%20focused%20on%20insider%20risk.%20One%20of%20the%20things%20that%20we%20found%20was%2073%25%20of%20them%20said%20to%20us%20that%20they're%20planning%20on%20spending%20more%20on%20insider%20risk%20technology%20now%20with%20COVID%20than%20they%20were%20before.%20I%20think%20this%20highlights%20the%20point%20that%20you%20just%20made%2C%20which%20is%20the%20systems%20and%20processes%2C%20if%20you%20even%20had%20them%2C%20that%20you%20were%20using%20nine%20months%20ago%20aren't%20necessarily%20relevant%20today%2C%20right%3F%20You%20need%20things%20that%20can...%20Because%20people%20are%20accessing%20data%20from%20end%20points%20that%20don't%20have%20agents%20on%20them%2C%20right%3F%20You%20have%20people%20that%20are%20working%20in%20new%20ways%2C%20sharing%20things%20with%20others%20and%20new%20mechanisms%2C%20right%3F%20I%20mean%2C%20just%20look%20at%20this%20particular%20podcast%2C%20videocast.%20We're%20doing%20it%20from%20our%20houses%2C%20right%3F%20I've%20got%20a%20courier%20coming%20to%20pick%20up%20SanDisk%20card%20here.%20It's%20one%20of%20those%20things%20where%20it's%20challenging%20for%20organizations%20in%20this%20new%20world%2C%20right%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EYeah%2C%20certainly.%20So%20now%20that%20we've%20got%20the%20spotlight%20on%20the%20insider%20threat%20problem%2C%20particularly%20with%20everything%20that's%20going%20on%20in%20the%20world%2C%20that%20highlights%20the%20need%20for%20organizations%20to%20be%20intentional%20about%20where%20they%20put%20that%20expenditure%2C%20right%3F%20This%20goes%20back%20to%20where%20we%20started%20this%20discussion.%20You've%20got%20to%20think%20through...%20Now%20that%20you've%20got%20evidence%20that%20suggests%20that%20maybe%20you've%20got%20some%20gap%20areas%20from%20an%20insider%20threat%20detection%20or%20prevention%20mechanism%2C%20how%20are%20you%20going%20to%20prioritize%20where%20your%20next%20security%20dollar%20goes%20for%20insider%20threats%3F%20To%20get%20that%20answer%20right%2C%20you've%20got%20to%20take%20a%20risk-management-based%20approach%20to%20this.%20You've%20got%20to%20understand%20what's%20currently%20in%20place%2C%20and%20you've%20got%20to%20also%20be%20a%20little%20bit%20future%20forward-thinking%20here%2C%20in%20terms%20of%20when%20will%20things%20go%20back%20to%20the%20way%20that%20they%20were%20or%20something%20somewhat%20resembling%20the%20way%20that%20they%20were%3F%20What%20lessons%20learned%20are%20we%20going%20to%20incorporate%20from%20the%20last%20several%20months%20into%20that%20new%20normal%3F%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESo%20I'm%20happy%20to%20hear%20that%2073%25%20of%20CSOs%20intend%20to%20spend%20more%20for%20inside%20threats%2C%20but%20also%20kind%20of%20terrified%20for%20them%20because%20I%20want%20to%20make%20sure%20that%20they%20understand%20what%20they're%20actually%20trying%20to%20do%20with%20that%20security%20investment%20and%20making%20sure%20that%20it's%20aligned%20with%20the%20actual%20risks%20to%20their%20organizations%20and%20being%20done%20in%20a%20way%20that%20is%20cognizant%20of%20their%20actual%20risk%20and%20what%20their%20current%20capabilities%20are%20and%20how%20that%20risk%20landscape%20might%20change%20and%20shift%20even%20within%20the%20next%20calendar%20year.%20It's%20a%20hard%20problem%20to%20juggle%20and%20it's%20a%20continuously%20evolving%20process%20and%20a%20continuously%20evolving%20problem%20for%20organizations.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERAMAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EDan%2C%20thank%20you%20so%20much.%20This%20was%20an%20awesome%20conversation%20today.%20You%20brought%20a%20lot%20of%20insights.%20How%20can%20people%20get%20more%20information%20about%20some%20of%20the%20research%20that%20you%20all%20are%20doing%20over%20there%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDAN%3A%26nbsp%3B%20%3C%2FSTRONG%3EYeah%2C%20certainly.%20For%20more%20information%2C%20check%20out%20our%20website%2C%20%3CA%20href%3D%22https%3A%2F%2Fcert.org%2Finsider-threat%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ECert.org%2Finsider-threat%3C%2FA%3E.%20You%20can%20also%20contact%20us%20at%20%3CA%20href%3D%22mailto%3Ainsider-threat-feedback%40cert.org%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Einsider-threat-feedback%40cert.org%3C%2FA%3E.%20In%20anticipation%20of%20National%20Insider%20Threat%20Awareness%20Month%20in%20September%2C%20we're%20going%20to%20be%20out%20and%20about%20a%20lot%2C%20trying%20to%20transition%20our%20research%20into%20as%20many%20broad%20communities%20of%20practices%20as%20we%20can.%20We'll%20be%20blogging%20to%20our%20Insider%20Threat%20blog%20about%20once%20a%20week%20in%20September%20and%20stay%20tuned%20for%20the%20seventh%20edition%20to%20%E2%80%98The%20Common%20Sense%20Guide%20to%20Mitigating%20Insider%20Threats%2C%E2%80%99%20which%20we're%20targeting%20for%20a%20late%202020%20release.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3ETo%20learn%20more%20about%20this%20episode%20of%20the%20Uncovering%20Hidden%20Risks%20podcast%2C%20visit%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Funcoveringhiddenrisks%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CEM%3Ehttps%3A%2F%2Faka.ms%2Funcoveringhiddenrisks%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EFor%20more%20on%20Microsoft%20Compliance%20and%20Risk%20Management%20solutions%2C%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fbusiness%2Fcompliance-solutions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CEM%3Eclick%20here%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3ETo%20follow%20Microsoft%E2%80%99s%20Insider%20Risk%20blog%2C%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Feffectively-managing-insider-risks-with-integrated-collaboration%2Fba-p%2F1675867%22%20target%3D%22_blank%22%3E%3CEM%3Eclick%20here%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3ETo%20subscribe%20to%20the%20Microsoft%20Security%20YouTube%20channel%2C%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fmicrosoftsecurity%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3E%3CEM%3Eclick%20here%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EFollow%20Microsoft%20Security%20on%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2Fmsftsecurity%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3E%3CEM%3ETwitter%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%20and%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3E%3CEM%3ELinkedIn%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EKeep%20in%20touch%20with%20Raman%20on%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Framankalyan%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3E%3CEM%3ELinkedIn%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EKeep%20in%20touch%20with%20Talhah%20on%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Ftalhahm%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3E%3CEM%3ELinkedIn%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EKeep%20in%20touch%20with%20Dan%20at%3A%26nbsp%3B%20%3C%2FEM%3E%3CA%20href%3D%22mailto%3Ainsider-threat-feedback%40cert.org%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3E%3CEM%3Einsider-threat-feedback%40cert.org%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%20or%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fcert.org%2Finsider-threat%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3E%3CEM%3Ehttps%3A%2F%2Fcert.org%2Finsider-threat%3C%2FEM%3E%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2160069%22%20slang%3D%22en-US%22%3E%3CP%3E%3CU%3EHost%3C%2FU%3E%3A%26nbsp%3B%20Raman%20Kalyan%20%E2%80%93%20Director%2C%20Microsoft%3C%2FP%3E%0A%3CP%3E%3CU%3EHost%3C%2FU%3E%3A%26nbsp%3B%20Talhah%20Mir%20-%20%26nbsp%3B%26nbsp%3BPrincipal%20Program%20Manager%2C%20Microsoft%3C%2FP%3E%0A%3CP%3E%3CU%3EGuest%3C%2FU%3E%3A%26nbsp%3B%20Dan%20Costa%20%E2%80%93%20Technical%20Manager%2C%20Carnegie%20Mellon%20University%3C%2FP%3E%0A%3CP%3E%3CEM%3EThe%20following%20conversation%20is%20adapted%20from%20transcripts%20of%20Episode%203%20of%20the%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Funcoveringhiddenrisks%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3E%3CEM%3EUncovering%20Hidden%20Risks%3C%2FEM%3E%3C%2FA%3E%20%3CEM%3Epodcast.%26nbsp%3B%20There%20may%20be%20slight%20edits%20in%20order%20to%20make%20this%20conversation%20easier%20for%20readers%20to%20follow%20along.%26nbsp%3B%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EIn%20this%20podcast%20we%20explore%20how%20partnering%20with%20Human%20Resources%20can%20create%20a%20strong%20insider%20risk%20management%20program%2C%20a%20better%20workplace%20and%20more%20secure%20organization.%26nbsp%3B%20We%20uncover%20the%20types%20of%20HR%20data%20that%20can%20be%20added%20to%20an%20insider%20risk%20management%20system%2C%20using%20artificial%20intelligence%20to%20contextualize%20the%20data%2C%20all%20while%20respecting%20privacy%20and%20keeping%20in%20line%20with%20applicable%20policies.%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2160069%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECompliance%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EInsider%20Risk%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎May 11 2021 02:02 PM
Updated by: