Governance & Risk Management , Insider Threat , Remote Workforce

Remote Work Creates Insider Threat Concerns

Margaret Cunningham of Forcepoint X-Labs Describes Risky Remote Worker Behaviors
Margaret Cunningham, principal research scientist, Forcepoint X-Labs

Recent research highlights the growth in risky remote work behaviors. Margaret Cunningham of Forcepoint X-Labs discusses the implications of this increase in insider threats and provides risk mitigation insights.

See Also: The Hidden Threat: Understanding Insider Risks

“One of our insider threats isn't this bad actor evil person retaliating or breaking something; it's someone who's doing something potentially innovative and creative to get their job done," Cunningham says. "But in doing that, they can cause some issues for our security team."

In a video interview with Information Security Media Group, Cunningham discusses:

  • Factors influencing remote worker behavior;
  • How security professionals can help mitigate insider threat risks;
  • Priorities for insider threat risk management this year.

Cunningham, who has a doctorate in applied experimental psychology, is the principal research scientist for human behavior at Forcepoint X-Labs, where she serves as the behavioral science subject matter expert on an interdisciplinary security team driving the development of human-centric security solutions. Previously, she supported the human systems integration branch of the U.S. Department of Homeland Security.


About the Author

Nick Holland

Nick Holland

Former Director, Editorial

Holland focused on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.