# #

October 19, 2022

How to Measure and Manage Cybersecurity Human Risk

Knowing what's coming makes the difference between a blocked attack and a hasty cleanup. But with threats constantly evolving, how do you stay ahead? The answer isn't more alerts. It's a deeper understanding of your cybersecurity human risk. To truly get ahead, you need a modern approach to behavioral risk management. By analyzing specific cyber security behaviours and identifying potential weaknesses, you can start changing cyber behavior for the better. This strategy turns your people from a potential liability into your strongest line of defense, building a security culture from a place of strength, not fear.

What Is Cybersecurity Risk Management?

Cybersecurity risk management is an overall approach to identifying, analyzing, evaluating, and lastly managing your organization's cybersecurity threats. The goal of organizations implementing risk management in cybersecurity is to ensure the most critical threats are handled in a timely manner. However, what cybersecurity risk management frameworks often fail to understand is the human element in risk.

Why Are Cyber Security Behaviours Your Biggest Blind Spot?

When it comes to risk management in cyber security, only one thing is certain: There is no certainty. Threats change daily, even hourly, and determining which potential threats are the highest priority requires awareness, keen insight, and adaptability. Effectively safeguarding a company means being able to handle risks posed by external threats that are often unpredictable. 

But it’s not just the external threats that put a company at risk: Internal ones can be just as damaging, if not more. A 2022 Data Breaches Investigation Report by Verizon found that 82% of data breaches involve a human element. Managing human risk effectively can make the difference between a secure frontline defense and one that’s exposed, either through human error or inaction. 

The Financial Reality of Human-Related Breaches

The financial consequences of human-driven security incidents are staggering. An insider-related event costs an organization an average of $13.1 million, and with companies experiencing about six such incidents a month, the potential annual losses can approach nearly one billion dollars. This massive financial risk is directly tied to the human element. Research from the World Economic Forum shows that human error is a factor in 95% of all cybersecurity breaches, confirming that technology-only defenses are incomplete. To truly protect your organization, you must address the root cause. A proactive Human Risk Management strategy is essential for moving beyond a reactive posture and preventing these costly incidents before they can impact your bottom line.

The "Vital Few": How a Small Percentage of Users Drive Most Incidents

Not all risk is created equal, and it isn't spread evenly across your workforce. In fact, research indicates that a small fraction of users, just 8%, are responsible for 80% of security incidents. This concentration of risk presents a clear opportunity for focused intervention. Instead of applying broad, generic security training to everyone, you can achieve a much greater impact by identifying and guiding this "vital few." The key is knowing who they are. An AI-native HRM platform can predict which individuals pose the highest risk by analyzing hundreds of signals across behavior, identity systems, and real-time threat data. This allows you to apply targeted, personalized actions precisely where they are needed most, efficiently reducing your organization's overall risk profile.

The Riskiest Behaviours That Create Security Gaps

Because human behaviors have such an impact on security, it's clear that a great cybersecurity framework is going to take this into account. After all, what is risk management in cyber security if it doesn’t include the greatest source of risk?

Some of the most common human behaviors that lead to security fails include:

Falling for Phishing Attacks

Most people are familiar with phishing attacks — those emails we all get that look slightly off, too good to be true, or from someone who we don’t recognize, claiming to be part of our organization — but despite this general familiarity, it’s surprising how often people still fall for them. One click on a link that looks close enough can compromise a whole organization. It’s important to educate the riskiest individuals or groups within an organization so that they can identify a phishing email and take the correct action. And ideally it’s not a “one and done,” “check the box” training. Consider sending one-off “tests” to see who clicks, who forwards to the security team, and who ignores it completely. 

Lack of Password Security

Having a secure password is important, but sometimes, people take shortcuts. Choosing a weak or common password, or something that can easily be guessed, is like leaving your front door wide open and asking someone to steal your TV. Keeping on top of weak or common passwords and informing users that they need to change and strengthen them is a simple but effective way to add a layer of security and enhance an organization’s risk mitigation defenses. Also helpful? A company-wide password vault that reminds them automatically. The trick is ensuring everyone uses it. 

Falling for Fake Software Updates

This one is similar to a traditional phishing attack, but can be more sophisticated, and harder to identify. Most individuals want to comply with keeping their software up to date, thinking that they’re helping, but they’re really installing malware. So how do you train them to be more discerning? The next time a popup or email appears before them, will they know what to do?

Lack of Communication

The bottom line with all of these common human risks to cybersecurity is information. When individuals know what to do, they don’t have to guess. This means keeping the lines of communication open — not to risk, but to education. When a company’s risk management strategy includes and prioritizes human risk management, it’s stronger, safer, and its employees are more empowered because they know what to do. 

A Modern Approach to Behavioral Risk Management

The solutions that will lead to a more effective risk management strategy should always begin with gathering more information. You wouldn’t set out on a hiking trip or vacation to a country you’ve never visited without first informing yourself about what might be ahead of you. Whatever your organization may be  — from the specialized needs of the healthcare industry to the unique needs of the software industry — your first step is gathering information about what’s already happening within your organization. 

Monitoring

It’s likely that your organization is already monitoring an array of things, or has the capability to do so. How often are people failing at login or using incorrect passwords? How often are they clicking phishing links, or visiting unsecured websites? Are there specialized needs within your organization or industry, and are you looking at them? Of what you’re already doing, what could be automated to gather data about employee behaviors related to cybersecurity? 

Analytics

Once you have the repository of data, how do you parse it and turn it into some sort of actionable insight? This is the step that often is the most challenging for organizations and program owners, mostly because there are only so many hours in the workday, and when push comes to shove, your attention is often divided and the last thing you want to do is manually generate some sort of spreadsheet or report that is going to be out of date in a week anyway. Ideally, you figure out the most common or malicious activities and work to get early-warning alerts to help prevent them from happening in the first place.

Training

In the current era of technology and cybersecurity, old-school security awareness training isn’t effective. You must do more than “train everyone;” you must also reinforce training to the riskiest cohorts, make learning fun and relevant, and do it more than once a year. If boosting security awareness across your entire organization will increase the resilience of your cybersecurity framework, then imagine what effects training your riskiest members and groups could have. 

Emerging Threats: Shadow AI and Shadow Data

The rise of generative AI tools has introduced a new frontier of risk known as "Shadow AI." This occurs when employees use unapproved AI applications for work, potentially feeding them sensitive company data. With 80% of organizations worried about data leaks through these tools, it's a risk you can't afford to ignore. The challenge is that you cannot manage what you cannot see. A modern Human Risk Management program moves beyond simple policy enforcement. It requires predicting which individuals or teams are likely to use unsanctioned tools by analyzing a wide range of signals across employee behavior, identity systems, and real-time threat intelligence to get ahead of potential data loss before it happens.

Vulnerabilities in Collaboration Tools

Collaboration platforms are the central nervous system of modern enterprise work, but their widespread use also makes them a prime target for attackers. In fact, 71% of companies anticipate security problems stemming from attacks on these tools. A compromised account in a collaboration tool can give an attacker access to sensitive conversations, files, and a launchpad for internal phishing campaigns. Securing these platforms is not just about technology; it is about understanding the human risk associated with them. By correlating data on user behavior with identity and access permissions, you can identify individuals who are both highly targeted and have privileged access, allowing you to apply protective measures where they will have the greatest impact.

Preparing for AI-Powered Social Engineering

Social engineering is evolving. AI can now craft highly personalized and convincing phishing emails, voice messages, and texts at a massive scale, making them incredibly difficult for employees to detect. While 69% of security professionals believe these AI-powered attacks are imminent, only 40% feel prepared to handle them. This readiness gap is critical, especially when human actions are behind 90% of data breaches. Annual awareness training is no longer enough. To counter this threat, you need a system that can identify the most susceptible individuals and autonomously deliver targeted phishing simulations and micro-training to build resilience. This data-driven approach ensures your defenses adapt as quickly as the threats do.

The Psychology Behind the Risk: Why People Make Mistakes

To effectively manage human risk, we first have to understand why people make security mistakes. It’s rarely about a lack of intelligence or a desire to cause harm. More often, it’s about the complexities of human psychology. People are wired to take mental shortcuts, they get distracted, and they operate under pressure. A staggering 95% of data breaches involve human error, not because employees are careless, but because they are human. Understanding the cognitive biases, motivations, and gaps between knowledge and action is the first step toward building a more resilient security posture that accounts for these realities instead of ignoring them.

Cognitive Biases and Unintentional Errors

Our brains are designed for efficiency, which often leads to unintentional errors. Cognitive biases, like optimism bias (the belief that a negative event is less likely to happen to us), can cause an employee to think, "I won't be the one to click a phishing link." Similarly, habituation leads to "warning fatigue," where users click through security prompts without reading them. These aren't malicious acts; they are automatic responses developed to cope with information overload. Traditional security training often fails because it doesn't address these underlying psychological drivers. It simply provides information without changing the ingrained habits and mental shortcuts that lead to risky behaviors in the first place.

Understanding Malicious Insider Intent

While most human risk is unintentional, we can't ignore the potential for malicious intent. A disgruntled employee, a person facing financial hardship, or someone recruited by an external threat actor can pose a significant threat. These individuals often have legitimate access to sensitive systems, making their actions difficult to detect. This is where a narrow focus on behavioral data falls short. To spot a malicious insider, you need to correlate behavioral signals with other critical data points. For example, is a user who is downloading sensitive files also exhibiting unusual login patterns or accessing systems outside their typical role? This is why Human Risk Management must analyze behavior, identity, and threat data together to predict and prevent these high-impact incidents.

The Awareness-Action Gap: Knowing vs. Doing

One of the biggest challenges in security is the gap between what people know and what they do. An employee can ace a phishing quiz but still click on a malicious link in a moment of distraction. Research from Proofpoint highlights this disconnect, noting that while 96% of companies know they aren't fully protected, only 28% conduct both regular training and continuous monitoring. This "awareness-action gap" proves that knowledge alone doesn't translate to secure behavior. To close this gap, organizations need to move beyond annual check-the-box training and implement a system of continuous reinforcement, timely nudges, and personalized interventions that guide users toward safer habits in their daily workflow.

What is Human Risk Management (HRM)?

Human Risk Management (HRM) is a strategic approach that moves beyond traditional security awareness to proactively measure, mitigate, and manage the security risks associated with human behavior. Instead of relying on a reactive, one-size-fits-all training model, HRM uses a data-driven framework to understand the full context of human risk. It identifies not just *what* risky behaviors are occurring, but *who* is exhibiting them, *why* they are happening, and what the potential impact is to the organization. An effective HRM program makes human risk visible and measurable, enabling security teams to deploy targeted actions that drive real, lasting behavior change and demonstrably reduce incidents.

Core Pillars of a Modern HRM Strategy

A modern HRM strategy is built on a continuous, adaptive cycle rather than a static, annual plan. It starts with a deep understanding of risk, informed by comprehensive data analysis. From there, it moves to deploying personalized interventions designed to influence behavior at the point of risk. This entire process is supported by continuous monitoring, which feeds new data back into the system, allowing policies and interventions to adapt as the threat landscape and user behaviors evolve. This creates a resilient security culture where risk is managed proactively, not just reacted to after an incident occurs. It’s a shift from detection and response to prediction and prevention.

Risk Assessment and Behavioral Analysis

Effective risk assessment in HRM goes far beyond tracking phishing click rates. It requires correlating data across multiple sources to build a complete picture of risk. At Living Security, our AI-native platform analyzes signals across three core pillars: human behavior (like failing phishing tests or mishandling data), identity and access (such as privilege levels and login activity), and real-time threat intelligence (like which users are being actively targeted by threat actors). By integrating these data streams, you can identify the individuals who not only exhibit risky behaviors but also have the access and are under attack, allowing you to prioritize interventions where they will have the greatest impact.

Targeted Training and Interventions

Once you have a clear, data-driven view of your highest-risk areas, you can move away from generic training. Modern HRM focuses on delivering targeted interventions that are relevant and timely. Instead of a long annual course, this could be a two-minute micro-training delivered to a user moments after they click a simulated phishing link or a policy nudge sent to a developer attempting to use an unauthorized application. As Proofpoint suggests, training should be "engaging, short, and regularly updated" to be effective. This personalized approach respects employees' time, reinforces secure habits in context, and is far more effective at changing long-term behavior.

Continuous Monitoring and Adaptive Policies

Human risk is not a static problem, so your approach to managing it shouldn't be either. Continuous monitoring is the engine that powers an adaptive HRM program. By constantly analyzing security signals and behavioral trends, you can measure the effectiveness of your interventions and adjust your strategy in near real-time. This data can also inform adaptive policies. For example, if a user with privileged access suddenly begins exhibiting high-risk behaviors, the system could automatically trigger a policy enforcement action, like requiring multi-factor authentication for their next login, all while keeping a human-in-the-loop for oversight. This creates a dynamic defense that evolves with your organization.

Putting HRM into Practice: Actionable Steps for Your Program

Implementing a successful Human Risk Management program is about taking a methodical, data-first approach. It begins with understanding your current risk posture and then systematically applying targeted actions to reduce it. This isn't about deploying another tool; it's about shifting your organizational mindset from reactive compliance to proactive risk reduction. By establishing a strong baseline, deploying precise interventions, and fostering a culture of shared responsibility, you can transform your human element from your biggest liability into your strongest line of defense. The goal is to create an empowered workforce that actively contributes to the organization's security resilience.

Establish a Data-Driven Baseline

You can't manage what you can't measure. The first step in any HRM program is to establish a data-driven baseline of your organization's human risk. As Proofpoint notes, it’s likely your organization is already monitoring an array of things. The key is to unify these disparate data sources. This means integrating information from your identity and access management systems, security tools, and threat intelligence feeds. An AI-native platform like Living Security can ingest and correlate over 200 signals to provide a comprehensive, quantifiable view of your risk landscape, showing you exactly where your biggest vulnerabilities lie before you even take action.

Deploy Targeted Interventions and Nudges

With a clear baseline, you can move from broad-stroke awareness campaigns to precise, targeted interventions. Instead of training everyone on everything, you can focus your resources on the individuals and groups that pose the most significant risk. This could mean deploying an advanced phishing simulation for a team that is heavily targeted by threat actors or sending a quick, automated nudge to an employee who repeatedly fails to lock their workstation. The goal is to deliver the right intervention to the right person at the right time, making security guidance a helpful and integrated part of their daily work, not a disruptive annual event.

Foster a Strong Security Culture from the Top Down

Technology and data are critical, but a truly effective HRM program is built on a strong security culture. This starts with leadership. When executives champion security and frame it as a shared responsibility, employees are more likely to be engaged. As we've noted before, an HRM-driven strategy makes a company "stronger, safer, and its employees are more empowered because they know what to do." This shifts the narrative from fear and compliance to one of empowerment and collective defense. A positive security culture encourages employees to report potential incidents without fear of blame, turning every user into an active part of your security team.

Enforce the Principle of Least Privilege

A foundational element of any security strategy, the principle of least privilege is especially critical in Human Risk Management. This principle dictates that you should only give people access to the data and systems they absolutely need for their job. Over-provisioned access dramatically increases the potential blast radius of a compromised account, whether it's through an unintentional error or a malicious act. By integrating your identity and access management data into your HRM platform, you can identify users whose permissions exceed their role requirements and present a high level of risk, allowing you to right-size their access and proactively shrink your attack surface.

The Human-Sized Gap in Your Security Framework

Why is risk management important in cyber security? Human risk management is key to empowering the kind of behavior changes that greatly increase security. 

The fact that managing human risk is the key to an effective frontline of security isn’t exactly a secret. And yet, so many existing frameworks don’t take human behavior into account — or, if they mention it, it’s second to other cybersecurity programs that potentially only can guard against that remaining twenty or so percent of threats. 

While they have been working towards an updated response to this changing threat landscape, the National Institute of Standards and Technology hasn’t formally updated their Framework for Improving Critical Infrastructure Cybersecurity since 2018. Think of everything that has changed since then! More people use technology than ever before, and the work-from-home revolution has taken over.

Other existing risk management tests — ones with a mandatory, once-a-year training and a quiz at the end — can’t prove that the training has worked just from that one quiz. If you can’t see whether behaviors have changed as a result of the training, then how can you prove that anything is different? Not to mention that those mandatory training sessions are often outdated (and few employees actually want to attend!)

The way things have always been done just isn’t good enough. There is a better way. 

How Living Security Predicts and Prevents Human Risk

Living Security believes that cybersecurity human risk management is a better approach to security awareness.  This includes:

  • Aggregating data from your existing security technology platforms – sources you already have and trust.
  • Clear analytics that tell you the risky (and vigilant) behaviors so that you can prioritize actions or make decisions.
  • Effective, targeted actions specific to the type of behaviors and individuals who are most likely to be a risk, and where it will have the most positive impact on your organization's risk.

Living Security’s Unify insights Human Risk Management platform brings these three elements together for a real-time, scalable program for CISOs and Program Owners can effectively step in front of cyber risks and attacks before they become incidents. 

 

Learn more about how Living Security’s Unify insights Human Risk Management platform can help boost your risk management strategy, and make your cybersecurity framework strong, agile, and resilient. 

Frequently Asked Questions

How is Human Risk Management (HRM) different from traditional security awareness training? Think of it as the difference between an annual check-up and a continuous health monitoring plan. Traditional security awareness is often a once-a-year, one-size-fits-all event designed to check a compliance box. HRM, on the other hand, is a proactive and data-driven strategy. It continuously analyzes risk signals from your existing security tools to understand who is most at risk and why, then delivers personalized, timely interventions to change behavior before an incident occurs. It’s about preventing breaches, not just teaching about them.

My organization has thousands of employees. How does your platform pinpoint the specific individuals who pose the most risk? It’s not about finding "bad" employees; it's about identifying the highest concentration of risk. Our platform does this by looking beyond simple behavioral metrics like phishing clicks. We correlate data from three critical areas: user behavior, identity and access systems, and real-time threat intelligence. This allows us to identify the small group of individuals who not only exhibit risky habits but also have privileged access and are being actively targeted by attackers. This multi-dimensional view lets you focus your resources precisely where they will have the greatest impact.

We already have a lot of security tools. How does an HRM platform integrate with them without adding more manual work for my team? An HRM platform is designed to reduce your team's workload, not add to it. It acts as an intelligence layer that aggregates and makes sense of the data you already have from your existing security stack. Instead of creating more alerts, our AI guide, Livvy, analyzes the signals, identifies the most critical risk trajectories, and can autonomously execute 60 to 80 percent of routine response actions, like sending micro-trainings or policy nudges. This frees up your team to focus on strategic initiatives while maintaining full oversight.

You mention analyzing data from multiple sources. What specific types of data does the platform use to get a full picture of human risk? To build a comprehensive risk profile, we analyze over 200 signals across three core pillars. For behavior, we look at things like performance on phishing simulations, data handling practices, and use of unapproved applications. For identity and access, we analyze privilege levels, login patterns, and access to sensitive systems. Finally, we integrate real-time threat intelligence to see which employees or roles are being actively targeted by external threats. Combining these sources provides the context needed to move from guessing to knowing where your true risks lie.

With the rise of AI-powered social engineering, how does HRM prepare our employees for threats that are harder to detect? Annual training can't keep up with threats that evolve daily. HRM addresses this by building continuous resilience. By identifying which employees are most susceptible to social engineering, the platform can deliver targeted, adaptive phishing simulations that mimic these advanced attacks. This isn't about passing a test; it's about building muscle memory. When an employee receives a hyper-realistic simulation moments after a risky action, it reinforces learning in a way that a generic annual course never could, preparing them for the sophistication of real-world threats.

Key Takeaways

  • Concentrate efforts on the "vital few" users: Since a small percentage of your workforce is responsible for the vast majority of security incidents, a targeted approach is far more effective than broad, generic training. Identifying and guiding these high-risk individuals provides the greatest return on your security investment.
  • Adopt a predictive HRM strategy to get ahead of threats: Move beyond outdated, reactive security training. A modern Human Risk Management program predicts risk by analyzing signals across behavior, identity, and threat data, enabling you to prevent security incidents instead of just responding to them.
  • Make human risk measurable and actionable: You cannot manage what you do not measure. Start by unifying data from your existing security stack to create a clear baseline of human risk, then use this insight to deploy precise interventions like targeted micro-training that change behavior and build a stronger security culture.

Related Articles

You may also like

Blog March 19, 2026

The CISO's Guide to Human Risk Management

link

Blog February 02, 2026

Managing Human Risk in Cybersecurity: A CISO's Guide

link
# # # # # # # # # # # #