This article contains information on using an empathetic approach to insider risk investigations, emphasizing trust, transparency, and positive intent to foster a security-first culture and improve inquiry outcomes.
Overview
Instead of investigating employees the same way we investigate threats from external actors, it’s time to take a more empathetic approach to investigations.
Prerequisites
- You are an Incydr Administrator or Security Practitioner, with beginner to intermediate experience level.
- You are familiar with Incydr.
Introduction
Welcome!
In this course, we’ll investigate how you can employ an empathetic approach to your event inquiries and investigations.
We’ll look at how empathy and trust are vital components of any modern Insider Risk Management Program. We’ll outline the steps you can take during an inquiry, including the how and when to use an empathetic investigation approach, and how to set the correct tone when doing so. We’ll also look at real-world cases and allow you to practice what you learned. And don’t forget to test your knowledge at the end!
Why Use an Empathetic Approach
Why Empathy?
One of the critical foundations of a modern Insider Risk Management program is a positive security culture. Building trust with your employees will get more honest, timely information when you inquire about an event. Conversely, if they feel attacked when you reach out, their natural instinct is to go on the defensive and deny knowing anything. And that's where an empathetic approach to investigations can help.
The Steps
You got this!
We’ve identified the steps you can take to add Empathetic Investigations to your skillset. This may not be easy, especially if you’re accustomed to reacting suspiciously to alerts, and for some of us, we may need to unlearn some previous ways of “digging into” investigations. But, give yourself some grace, and try this high-level approach to start building your response finesse.
When to Use the Empathetic Approach
Most exfiltration events are typically unintentional and non-malicious. While we should always start an inquiry free of pre-judgment, there will be times where you suspect something more malicious was at hand. So, when should you use the Empathetic Investigation Approach? Well, that all depends on intent.
Empathetic Communication
When investigating an insider risk that is likely the result of human error, when interacting with our employees, the words we use and how we use them can significantly impact their trust in us. One of the hallmarks of using an Empathetic Investigation approach is presuming positive intent, giving the employee the benefit of the doubt. And it’s important for our words and actions to mirror that presumption.
Knowledge Check
Check your understanding of Incydr's Empathetic Investigations Approach.
You got this!
Question One: True or False? If employees feel attacked when you reach out, their natural instinct may be to go on the defensive and deny knowing anything.
- True.
- False.
The answer is True.
Question Two: Empathetic investigations _____________. (choose all correct answers)
- approach the situation without preconceived conclusion
- begin by assuming something malicious is going on
- may require a shift from traditional investigative approaches
- should begin with an inquiry free of pre-judgment
The answer is 1, 3, & 4.
Question Three: Initiating an insider risk investigation using an adversarial approach:
- Is foolish because an adversary is still an adversary.
- Works better than assuming Jane in accounting is “just trying to get her work done” and made a mistake.
- Runs counter to establishing a security-first mindset within your organization.
- Is the best way to catch data thieves.
The answer is 3.
Question Four: Using an empathetic approach to insider investigations:
- Will make your security team appear “soft” when it comes to enforcing security policies.
- Can replace your security policy.
- Is best left to the People or HR teams, not the security or risk teams.
- Can provide useful insights about where security policies are failing.
The answer is 4.
Question Five: Three pillars of a successful insider risk program are:
- Policies, Procedures and Practices.
- Trust, Transparency and Training.
- Simplicity, Sincerity, Service.
- Training, Teaching and Toggling.
The answer is 2.
Question Six: As part of a positive security culture, transparency ____________________.
- never works - users should fear us to keep them on their toes.
- is expected from our users but security must remain mysterious.
- helps build trust with our users.
- Is a marketing term and therefore, not pertinent.
The answer is 3.
Question Seven: Using an empathetic approach to your investigation ________________.
Choose the WRONG answer:
- always comes naturally to seasoned investigators.
- can inform how to conduct the interview more thoughtfully and effectively.
- may take some practice if you’re accustomed to reacting suspiciously to alerts.
- allows you understand what the employee was thinking.
The answer is 1.
Question Eight: Which of the following are the key steps to a successful empathetic investigation?
- Connect, Reassure, Recover, Educate.
- Connect, Correct, Report.
- Block, Contain, Remediate.
- Correct, Reprimand, Recover, Educate.
The answer is 1.
Question Nine: Changing user behaviors to better protect data works best when: (choose all correct answers)
- Users receive punitive training after making mistakes.
- The same training is delivered to all employees, regardless of their demonstrated ability to follow policy.
- Lessons are short, easy to consume, and engaging.
- Lessons are delivered to a specific user at the time they put data at risk (just-in-time training).
The answer is 3 & 4.
Question Ten: What is the best indicator that you should pivot from an empathetic investigation to a more traditional investigation??
- The intention of the actor.
- What was lost/stolen.
- Who caused the event.
- When the event happened.
The answer is 1.
Question Eleven: You should move to a full/traditional investigation when it becomes clear that the actor’s intention was
- Accidental
- Unintentional
- Intentional but non-malicious
- Malicious
The answer is 4.
Additional Resources
Getting Started with Incydr
General Resources
Questions or Comments?
Reach out to your Customer Success Manager (CSM).
Comments
Please sign in to leave a comment.