Page 199 - Cyber Defense eMagazine June 2024
P. 199
there have always been some competitive intelligence and background checks agencies mainly in a
private sector which can sell such sorts of the services to those being interested in and apparently, many
advanced economies’ governments deal with some standards and legal regulation potentials which are
applied to that kind of the well-made marketplace which might be a good source of incomes affecting
significantly GDP of the country coping with such security programs.
Depending on how importantly any kind of the employment screenings, background checking and some
standards with the laws can impact an overall economy taking into account all independent and objective
consequences it is possible to suggest those factors with the total marketplace could be from a vital
interest not only for a quality and security in business, but mostly for a wellbeing of the entire social
landscape. Indeed, from a strategic point of view, it’s very welcome to put into consideration the reasons
why someone could invest into such a work as the human threat management should not necessarily
rely on a strategy of the fear making everyone believes the safety and security are such drastically
needed, but more likely using some soft skills indicating to the governments that if they support such a
program they can count on a better economy and greatly developed marketplace which could contribute
with the higher GDP and increasing standard to the people. In other words, if the economy is well-
developed and the unemployment rate is low, the entire country or, say, the global communities might
serve for progress and prosperity across the world, so far. The human threat management as a novel
security paradigm has appeared from a need to deal with an accurate and timing finding about the
possible risk within some community which means some sort of a theory of the fear has been invoked as
those indicators have come from an experience of managing some security challenge and as such
empirical results have been very appealing the defense professionals have needed to think hard how to
uncover the threat before it becomes too forcing and embarrassing to the rest of the society always
getting in mind a counter-intelligence cannot pick up all information from a community, but very likely only
those being on the surface and not deeply within someone’s personality or, more obviously, some risky
routine that person has. From a current perspective, the applied human threat management could mean
coping with the risk in the workplace via skill testing, trust management, incident assessment and the
other screening programs which should show if there is any reason for worrying truly demanding from
the security specialists to in a quite straightforward and practical way, use their experience and expertise
in order to create such sorts of the assignments being updated any time a tendency looks for that making
a set of the lawful approaches and methodologies which could serve in obtaining a feedback from such
a community, so far.
Apparently, if there are some words about the cyber industry, it’s very obvious a great majority of those
tasks will be done on computers using the highly sophisticated tools and very often the web connectivity
which gives some hope those serving in such a field can make a lot of logins leaving a trace in cyberspace
and truly uncovering some of their habits and affinities to their employers which in a case of the human
threat management, could mean once collecting and analyzing such intelligence it could get feasible to
deeply understand all pluses and minuses of those professionals. Also, it’s very suitable to think a bit
how to do such analytics as user behavior might be a good starting point in getting aware of the potential
threat to such an organization suggesting that some sorts of the criteria and wanted goals should be
applied in that kind of the human threat management approaches, so far. Moreover, the high-tech
industry is also some kind of the critical infrastructure and many using cyber technologies are well-aware
that hacker’s attacks can occur anytime and anywhere in the world as cyberspace is a very asymmetric
surrounding which can make many lessons to everyone as it is not a matter of probability if the cyber
Cyber Defense eMagazine – June 2024 Edition 199
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.