Building a cybersecurity platform for people, not machines

On Demand Video Webcast

Register now

Cybersecurity has changed. In the early days, it resolved around network security before the rise of cloud and mobile meant protecting the endpoint became paramount. In spite of this, data breaches rocketed to an all-time high.

The reason? Humans. With one study finding that 86% of all data security breaches reported to the ICO in 2017-2018 were down to human error (source: 2017 ICO Reports), and criminals increasingly targeting workers with sensitive material in subtle, cost-effective social engineering campaigns, protecting your organisation from such attacks is becoming increasingly difficult. Whether it’s inbound spear phishing emails targeted your senior executives, or misdirected outbound emails going to the wrong person, protecting your staff is tricky.

However, blaming your employees is not the desired approach and it isn’t warranted either, because security solutions to date have not been designed with the human in mind.

In the past, we focused on what the machines could understand - rules, blacklists and signatures. But we know these methods do not work, rules are circumvented and data breaches continue to occur.

Rule-based cybersecurity is also only effective at preventing threats when the threat characteristics are known, static and can be efficiently predefined using logic. Very few of today’s email security threats fit this criteria, and these systems are often annoying to end-users and create significant admin overhead for security teams.

Now machines can understand the human layer, meaning we can protect it.

Tessian's Human Layer Security platform uses machine learning to understand human relationships and communication behaviour in order to protect businesses from threats executed by people on email.

We can understand the full context of human email behaviours with stateful machine learning. Stateful machine learning looks at historical training data as a series of moments in time and stores an understanding of each moment to inform its next prediction.

By knowing what's normal, we can automatically detect what’s anomalous and which may be a security threat, thereby protecting our staff. This provides protection from spear phishing, misdirected emails, unauthorised emails and other threats executable by humans.

Register now
CIO Webcast
In partnership with:
Speakers
Harry Wetherald
Product Manager
Tessian
Doug Drinkwater
EMEA Content Director
IDG