Page 199 - Cyber Defense eMagazine June 2024
P. 199

there have always been some competitive intelligence and background checks agencies mainly in a
            private sector which can sell such sorts of the services to those being interested in and apparently, many
            advanced economies’ governments deal with some standards and legal regulation potentials which are
            applied to that kind of the well-made marketplace which might be a good source of incomes affecting
            significantly GDP of the country coping with such security programs.

            Depending on how importantly any kind of the employment screenings, background checking and some
            standards with the laws can impact an overall economy taking into account all independent and objective
            consequences it is possible to suggest those factors with the total marketplace could be from a vital
            interest not only for a quality and security in business, but mostly for a wellbeing of the entire social
            landscape. Indeed, from a strategic point of view, it’s very welcome to put into consideration the reasons
            why someone could invest into such a work as the human threat management should not necessarily
            rely  on  a  strategy  of the  fear  making  everyone  believes the safety  and  security  are  such  drastically
            needed, but more likely using some soft skills indicating to the governments that if they support such a
            program they can count on a better economy and greatly developed marketplace which could contribute
            with  the  higher  GDP  and  increasing standard to  the  people.  In  other  words,  if  the  economy  is well-
            developed and the unemployment rate is low, the entire country or, say, the global communities might
            serve for progress and prosperity across the world, so far. The human threat management as a novel
            security  paradigm  has  appeared  from  a  need  to  deal  with  an  accurate and  timing  finding  about  the
            possible risk within some community which means some sort of a theory of the fear has been invoked as
            those  indicators  have  come  from  an  experience  of  managing  some  security  challenge  and  as  such
            empirical results have been very appealing the defense professionals have needed to think hard how to
            uncover the threat before it becomes too forcing and embarrassing to the rest of the society always
            getting in mind a counter-intelligence cannot pick up all information from a community, but very likely only
            those being on the surface and not deeply within someone’s personality or, more obviously, some risky
            routine that person has. From a current perspective, the applied human threat management could mean
            coping with the risk in the workplace via skill testing, trust management, incident assessment and the
            other screening programs which should show if there is any reason for worrying truly demanding from
            the security specialists to in a quite straightforward and practical way, use their experience and expertise
            in order to create such sorts of the assignments being updated any time a tendency looks for that making
            a set of the lawful approaches and methodologies which could serve in obtaining a feedback from such
            a community, so far.

            Apparently, if there are some words about the cyber industry, it’s very obvious a great majority of those
            tasks will be done on computers using the highly sophisticated tools and very often the web connectivity
            which gives some hope those serving in such a field can make a lot of logins leaving a trace in cyberspace
            and truly uncovering some of their habits and affinities to their employers which in a case of the human
            threat management, could mean once collecting and analyzing such intelligence it could get feasible to
            deeply understand all pluses and minuses of those professionals. Also, it’s very suitable to think a bit
            how to do such analytics as user behavior might be a good starting point in getting aware of the potential
            threat to such an organization suggesting that some sorts of the criteria and wanted goals should be
            applied  in  that  kind  of  the  human  threat  management  approaches,  so  far.  Moreover,  the  high-tech
            industry is also some kind of the critical infrastructure and many using cyber technologies are well-aware
            that hacker’s attacks can occur anytime and anywhere in the world as cyberspace is a very asymmetric
            surrounding which can make many lessons to everyone as it is not a matter of probability if the cyber




            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          199
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   194   195   196   197   198   199   200   201   202   203   204