- VMware Product Release Tracker (vTracker)
- If your AI-generated code becomes faulty, who faces the most liability exposure?
- These discoutned earbuds deliver audio so high quality, you'll forget they're mid-range
- This Galaxy Watch is one of my top smartwatches for 2024 and it's received a huge discount
- One of my favorite Android smartwatches isn't from Google or OnePlus (and it's on sale)
Applied Human Threat Management in Cyber Industry
By Milica D. Djekic
The high-tech industry is an extremely emerging environment dealing with the sophisticated and skilled workforce that is recruited to develop an ultimate cutting-edge technology, so far. The majority of things done in that area of the business are highly confidential or if being a contractor with defense or space industries, might be from a national or even global significance especially when there is a word about an international collaboration among law enforcement, military and intelligence communities that do not need an insider risk within their cooperators which could sell some of the projects or professional secrets on the black market or to some of competitors and enemy countries. In other words, it’s very important to be confident about the own human resources certainly in a field of cyber industry as those staffing should be managed in a trustworthy, not only skilled manner in order to remain reliable and friendly about their roles within such an employer. On the other hand, the human threat management is a branch of security which copes with pre-, in- and post-employment screenings requiring not just a professionalism, but also some of the background checking, as well as the entire trust management which could be truly correlated with the in-employment screenings, so far. The human threat management is a pretty new concept in security being in use only a couple of years and it is not yet fully developed, but more likely seeks some pioneering effort to get better understanded and implemented into the practice. In addition, there have always been some competitive intelligence and background checks agencies mainly in a private sector which can sell such sorts of the services to those being interested in and apparently, many advanced economies’ governments deal with some standards and legal regulation potentials which are applied to that kind of the well-made marketplace which might be a good source of incomes affecting significantly GDP of the country coping with such security programs.
Depending on how importantly any kind of the employment screenings, background checking and some standards with the laws can impact an overall economy taking into account all independent and objective consequences it is possible to suggest those factors with the total marketplace could be from a vital interest not only for a quality and security in business, but mostly for a wellbeing of the entire social landscape. Indeed, from a strategic point of view, it’s very welcome to put into consideration the reasons why someone could invest into such a work as the human threat management should not necessarily rely on a strategy of the fear making everyone believes the safety and security are such drastically needed, but more likely using some soft skills indicating to the governments that if they support such a program they can count on a better economy and greatly developed marketplace which could contribute with the higher GDP and increasing standard to the people. In other words, if the economy is well-developed and the unemployment rate is low, the entire country or, say, the global communities might serve for progress and prosperity across the world, so far. The human threat management as a novel security paradigm has appeared from a need to deal with an accurate and timing finding about the possible risk within some community which means some sort of a theory of the fear has been invoked as those indicators have come from an experience of managing some security challenge and as such empirical results have been very appealing the defense professionals have needed to think hard how to uncover the threat before it becomes too forcing and embarrassing to the rest of the society always getting in mind a counter-intelligence cannot pick up all information from a community, but very likely only those being on the surface and not deeply within someone’s personality or, more obviously, some risky routine that person has. From a current perspective, the applied human threat management could mean coping with the risk in the workplace via skill testing, trust management, incident assessment and the other screening programs which should show if there is any reason for worrying truly demanding from the security specialists to in a quite straightforward and practical way, use their experience and expertise in order to create such sorts of the assignments being updated any time a tendency looks for that making a set of the lawful approaches and methodologies which could serve in obtaining a feedback from such a community, so far.
Apparently, if there are some words about the cyber industry, it’s very obvious a great majority of those tasks will be done on computers using the highly sophisticated tools and very often the web connectivity which gives some hope those serving in such a field can make a lot of logins leaving a trace in cyberspace and truly uncovering some of their habits and affinities to their employers which in a case of the human threat management, could mean once collecting and analyzing such intelligence it could get feasible to deeply understand all pluses and minuses of those professionals. Also, it’s very suitable to think a bit how to do such analytics as user behavior might be a good starting point in getting aware of the potential threat to such an organization suggesting that some sorts of the criteria and wanted goals should be applied in that kind of the human threat management approaches, so far. Moreover, the high-tech industry is also some kind of the critical infrastructure and many using cyber technologies are well-aware that hacker’s attacks can occur anytime and anywhere in the world as cyberspace is a very asymmetric surrounding which can make many lessons to everyone as it is not a matter of probability if the cyber incident could happen, but more likely a causality which must be accepted as inevitable in the everyday life and business not to someone, but mainly to everyone. In total, the role of cyber industry is to assure a cyberspace making such a cutting-edge experience convenient and safe to everyone, but the concern might appear in a sense of the human factor operating in that business which suggests it’s undoubtedly good to rely on the experience, as well as some innovative ideas in order to protect all the generations of the humankind have made for a betterment of their own communities and widely the entire global population, so far.
References:
[1] Djekic, M. D., 2017. The Internet of Things: Concept, Application and Security. LAP LAMBERT Academic Publishing.
[2] Djekic, M. D., 2021. The Digital Technology Insight. Cyber Security Magazine
[3] Djekic, M. D., 2021. Smart Technological Landscape. Cyber Security Magazine
[4] Djekic, M. D., 2021. Biometrics Cyber Security. Cyber Security Magazine
[5] Djekic, M. D., 2020. Detecting an Insider Threat. Cyber Security Magazine
[6] Djekic, M. D., 2021. Communication Streaming Challenges. Cyber Defense Magazine
[7] Djekic, M. D., 2021. Channelling as a Challenge. Cyber Defense Magazine
[8] Djekic, M. D., 2021. Offense Sharing Activities in Criminal Justice Case. Cyber Defense Magazine
[9] Djekic, M. 2019. The Informant Task. Asia-Pacific Security Magazine
[10] Djekic, M. D., 2020. The Importance of Communication in Investigations. International Security Journal
[11] Djekic, M. D. 2019. The Purpose of Neural Networks in Cryptography, Cyber Defense Magazine
[12] Djekic, M. D. 2020. Artificial Intelligence-driven Situational Awareness, Cyber Defense Magazine
[13] Djekic, M. D. 2019. The Perspectives of the 5th Industrial Revolution, Cyber Defense Magazine
[14] Djekic, M. D. 2019. The Email Security Challenges, Cyber Defense Magazine
[15] Djekic, M. D. 2016. The ESIS Encryption Law, Cyber Defense Magazine
[16] Đekić, M. D., 2021. The Insider’s Threats: Operational, Tactical and Strategic Perspective. LAP LAMBERT Academic Publishing.
[17] Đekić, M. D., 2022. Static Absorber Modelling. Military Technical Courier
About the Author
Milica D. Djekic is an Independent Researcher from Subotica, the Republic of Serbia. She received her engineering background from the Faculty of Mechanical Engineering, University of Belgrade. She writes for some domestic and overseas presses and she is also the author of the books “The Internet of Things: Concept, Applications and Security” and “The Insider’s Threats: Operational, Tactical and Strategic Perspective” being published in 2017 and 2021 respectively with the Lambert Academic Publishing. Milica is also a speaker with the BrightTALK expert’s channel. She is the member of an ASIS International since 2017 and contributor to the Australian Cyber Security Magazine since 2018. Milica’s research efforts are recognized with Computer Emergency Response Team for the European Union (CERT-EU), Censys Press, BU-CERT UK and EASA European Centre for Cybersecurity in Aviation (ECCSA). Her fields of interests are cyber defense, technology and business. Milica is a person with disability.