RANT Roundtable in partnership with Mimecast
'You've Got 17 Sources of Human Risk Data. Can You Name Your 10 Riskiest Users Right Now?'
Your email security knows who clicks suspicious links. Your DLP knows who moves sensitive data. Your training platform knows who fails simulations. Your identity system knows who logs in from unusual locations. Your collaboration security knows who is being targeted through Microsoft Teams, SharePoint, and OneDrive. You’ve probably got 17 different sources telling you something about human behaviour but none of them are talking to each other.
So, answer this: can you name your 10 riskiest users right now, confidently, with a score that reflects not just what they’ve done, but how heavily they’re being targeted? Most CISOs can’t. Not because the data doesn’t exist, but because it’s trapped in silos. Each tool has its own definition of “risky user,” none of which aggregate into a single answer when the board asks who they should be most worried about. This is why 96% of organisations admit they have incomplete human risk protection despite massive security investments and why the 8% of employees driving 80% of incidents remain invisible until it’s too late.
Effective human risk management demands the right technology stack. Start with email and collaboration threat protection that accurately maps user targeting across all threat types; this is where most human risk originates. From there, signals from identity, EDR, security behaviour management, DLP, and cloud security feed into a smart calculation engine that synthesises telemetry into precise, multi-dimensional risk scores for every individual grounded in their actual behaviour and real-world targeting exposure.
Technology alone isn’t enough. Operationalising human risk demands process — automated reporting that adapts to shifting behaviours across your organisation, adaptive policy controls calibrated to each user’s targeting exposure and behaviour, board-ready monthly summaries, dynamic watchlist management, and real-time nudges that reinforce good behaviour and flag risky actions before an incident occurs. Human risk management is not a single team’s responsibility. IT owns the accuracy of the directory data that underpins every risk signal. Security owns the translation of behaviour into risk scores and the controls that follow. HR and Legal own the governance layer, ensuring every intervention is proportionate, compliant, and legally defensible. When these functions operate in silos, risk goes unmanaged regardless of the technology in place.
The question isn’t whether you have enough data, you almost certainly do. The question is whether your organisation has the technology, processes, and coordination to turn it into a single, defensible answer when the board asks: “Who are our riskiest users, and what are we doing about them?” Join senior cybersecurity leaders and experts from Mimecast for a candid peer discussion on what unified human risk management looks like in practice and how to move from reacting to incidents to measuring and reducing risk proactively.
Agenda
Our Speaker

Our Proud Partner
Mimecast is transforming the way businesses manage and secure human risk. Its AI-powered, API-enabled connected human risk platform is purpose-built to protect organisations from the spectrum of cyber threats. Integrating cutting-edge technology with human-cen...tric pathways, our platform enhances visibility and provides strategic insight. Our technology safeguards critical data and actively engages employees in reducing risk and enhancing productivity. More than 42,000 businesses worldwide trust Mimecast to help them keep ahead of the ever-evolving threat landscape. From insider risk to external threats, customers get more with Mimecast. More visibility. More agility. More control. More security.
Read MoreInterested? Request to Attend
Fill in our form below to express your interest in attending this event and we will get back to you as soon as possible to confirm your seat.
* Please note that attendance to our events is subject to availability and a membership approval.
