{"id":51931,"date":"2023-05-16T00:00:00","date_gmt":"2023-05-16T00:00:00","guid":{"rendered":"urn:uuid:105d996e-90aa-7276-5c98-c5618456c19e"},"modified":"2023-05-16T00:00:00","modified_gmt":"2023-05-16T00:00:00","slug":"cyber-risk-management-in-2023-the-people-element","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/","title":{"rendered":"Cyber Risk Management in 2023: The People Element"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-risk-management-2023:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/23\/cyber-risk-management-2023.png\" class=\"ff-og-image-inserted\"><\/div>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/security-intelligence\/breaking-news\/cyber-risk-index.html\">Read the Cyber Risk Index (2H\u20192022) methodology here<\/a>.<\/p>\n<p>2022 was full of challenges, from cyber war between Russia and Ukraine, continuing ransomware attacks, and a number of high-profile vulnerabilities and zero-day attacks. With <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/d\/attack-surface-management.html\">the attack surface constantly expanding<\/a>, CISOs and security leaders are acutely aware of the need to minimize risk across people, processes, and technology.<\/p>\n<p><span class=\"body-subhead-title\">Top infrastructure risk: people<\/span><\/p>\n<p>It\u2019s common knowledge that it\u2019s not if but when your organization will be the target of a cyberattack. CISOs and security leaders seem to share the same opinion\u2014according to Trend Micro\u2019s latest <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/e\/global-cyber-risk-level-2h-2022.html\">Cyber Risk Index (CRI) (2H\u20192022)<\/a>, 80% of 3,700 respondents across four global regions believed they will be successfully attacked in the next 12 months.<\/p>\n<p>The CRI (2H\u20192022) also found that CISOs, IT practitioners, and managers identified that most organizations IT security objectives are not aligned with the business objectives, which could cause challenges when trying to implement a sound cybersecurity strategy.<\/p>\n<p>It\u2019s important to note that while ideal, avoiding a cyberattack isn\u2019t the main goal\u2014companies need to address critical challenges across their growing digital attack surface to enable faster detection and response, therefore minimizing cyber risk.<\/p>\n<p>While it&#8217;s commonly assumed that cyber risk management efforts should be largely focused on protecting critical servers and infrastructure, the <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/k\/cyber-attack-vectors-how-to-protect-them.html\">human attack vector<\/a> shouldn\u2019t be so quickly forgotten.<\/p>\n<p>In a TrendTalksBizSec discussion, Trend Micro\u2019s Jon Clay, VP of threat intelligence, and Ed Cabrera, chief cybersecurity officer, dig into how the global recession could impact hiring and maintaining cybersecurity professionals within organizations.<\/p>\n<p>Watch now: <a href=\"https:\/\/www.youtube.com\/watch?v=VP8z_6y6YGo\" target=\"_blank\" rel=\"noopener\">TrendTalksBizSec | Part 1: Business Risks Associated with a Recession<\/a><\/p>\n<p><span class=\"body-subhead-title\">Managing people to manage cyber risk<\/span><\/p>\n<p>Security leaders have good reason to be concerned about the risk as in the 2H\u20192022 CRI results, negligent insiders and mobile\/remote employees were a top concern for organizations globally to their infrastructure.<\/p>\n<p>\u201cThe people part of the equation is overlooked so much,\u201d Ed Cabrera, chief cybersecurity officer at Trend Micro said recently, \u201cYou can look at any breach out there\u2026and you see people and the breakdown possibly of someone either being exposed to a social engineering attack, be it phishing or smishing.\u201d<\/p>\n<p>With <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/a\/remote-work-security-tips.html\">remote\/hybrid employees<\/a> accessing applications, networks, and servers via the cloud, oftentimes from multiple devices sharing an unsecure home network, enterprises are rightfully concerned with risk exposure. Factor in the <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report\">35% increase in business email compromise (BEC) detections and 29% increase in phishing attacks in 2022<\/a> , it\u2019s paramount to secure the human attack vector to prevent malicious actors from accessing critical infrastructure.<\/p>\n<p>Cyber risk management isn\u2019t always a top priority within an organization as a top risk from the survey was my organization\u2019s senior leadership doesn\u2019t view security as a competitive advantage. This mindset may hinder efforts to improve the ability to detect and respond to a cyberattack.<\/p>\n<p>Evidently, managing people should go beyond user awareness training regarding <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/h\/business-email-compromise-bec-attack-tactics.html\">business email compromise (BEC)<\/a> scams, <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/k\/email-security-best-practices.html\">phishing<\/a>, smishing, etc. CISOs and security leaders must also ensure they have the right teams within their cybersecurity program with the right skill sets and that those skills are properly maintained as threats evolve.<\/p>\n<p>However, hiring the right staff can be challenging due a <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener\">growing cybersecurity workforce gap<\/a> and the fact that some enterprises may not have the resources to recruit a large team. Choosing a vendor that offers <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/i\/cyber-security-managed-services-101.html\">managed services<\/a> is an effective way to augment teams while managing cyber risk.<\/p>\n<p>Beyond general <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/j\/cyber-hygiene-best-practices-assessment.html\">cyber hygiene<\/a>, skills training, or leveraging managed services, drilling down into processes since it\u2019s people that actually create and manage these processes.<\/p>\n<p><span class=\"body-subhead-title\">Enhancing cybersecurity processes<\/span><\/p>\n<p>After establishing a strong security team, the focus should shift to cementing processes that keep people in check. This is especially crucial with remote\/hybrid workforces; with users more widespread and left to their own devices (pun intended), it can be challenging to know who you need to secure. As the adage goes: \u201cyou can\u2019t stop what you can\u2019t see.\u201d<\/p>\n<p>To identify the users within your network, you\u2019re essentially <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/d\/attack-surface-management.html\">identifying the attack surface<\/a> which according to the survey is challenging. \u201cMy organization\u2019s IT security function has the ability to know the physical location of business-critical data assets and applications\u201d was a top concern for respondents.<\/p>\n<p>After security teams have achieved comprehensive visibility across the attack surface, they can establish processes to <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/k\/cyber-attack-vectors-how-to-protect-them.html\">protect initial attack vectors<\/a>. They should also manage and monitor users\u2019 identities by deploying a <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/b\/zero-trust-security.html\">zero trust model<\/a>.<\/p>\n<p>Leveraging a zero trust approach ensures that access is validated and continuously monitored for suspicious activity to prevent cybercriminals from using legitimate credentials to move undetected across the network.<\/p>\n<p>Taking a risk-based approach to security is proving more effective than a compliance-based approach.<\/p>\n<p>\u201cCompliance is the starting line,\u201d Cabrera said, \u201cIn other words, you\u2019re not just thinking about \u2018hey, what are we doing about compliance?\u2019 We need to identify that risk\u2026what are the basic elements of that risk. So, we can mitigate it before it gets out of control or to make it more manageable.\u201d<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>Now that we\u2019ve covered how to effectively manage people and processes, CISOs and security leaders need to consider that even the best and well-intended teams can come up short if the right security technology isn\u2019t in place. And from the survey, many organizations know this is true: \u201cmy organization\u2019s enabling security technologies aren\u2019t sufficient to protect data assets and IT infrastructure\u201d was a top risk globally.<\/p>\n<p>Look for a cybersecurity platform like <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform.html\">Trend Micro One<\/a> that is designed to help security teams better understand, communicate, and mitigate cyber risk across the enterprise. Its capabilities and features, like automation, third-party integrations, customizable APIs, detailed reports and <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/detection-response\/risk-insights.html\">risk insights<\/a>, were purposefully created to simplify security for users while maximizing protection.<\/p>\n<p>To learn more about managing and minimizing cyber risk as well as the benefits of leveraging a unified cybersecurity platform, check out these resources:<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/d\/attack-surface-management.html\">Attack Surface Management Strategies<\/a><br \/><a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/k\/threat-detection-response-guide.html\">Guide to Better Threat Detection and Response (XDR)<\/a><br \/><a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/g\/cyber-risk-management-platform.html\">Manage Cyber Risk with a Platform Approach<\/a><\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/23\/e\/cyber-risk-management-2023.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore the latest findings from Trend Micro\u2019s Cyber Risk Index (2H\u20192022) and discover how to enhance cybersecurity risk management across the digital attack surface. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51932,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9528,9549,9559,9550,9548,9527,9529,9660],"class_list":["post-51931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-article","tag-trend-micro-ciso-cloud","tag-trend-micro-ciso-compliance","tag-trend-micro-ciso-detection-and-response","tag-trend-micro-ciso-digital-transformation","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-risk-management","tag-trend-micro-ciso-skills-gap"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Risk Management in 2023: The People Element 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Risk Management in 2023: The People Element 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-risk-management-2023:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber Risk Management in 2023: The People Element\",\"datePublished\":\"2023-05-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/\"},\"wordCount\":1007,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/cyber-risk-management-in-2023-the-people-element.png\",\"keywords\":[\"Trend Micro CISO : Article\",\"Trend Micro CISO : Cloud\",\"Trend Micro CISO : Compliance\",\"Trend Micro CISO : Detection and Response\",\"Trend Micro CISO : Digital Transformation\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Risk Management\",\"Trend Micro CISO : Skills Gap\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/\",\"name\":\"Cyber Risk Management in 2023: The People Element 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/cyber-risk-management-in-2023-the-people-element.png\",\"datePublished\":\"2023-05-16T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/cyber-risk-management-in-2023-the-people-element.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/cyber-risk-management-in-2023-the-people-element.png\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Article\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Risk Management in 2023: The People Element\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Risk Management in 2023: The People Element 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Risk Management in 2023: The People Element 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-16T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-risk-management-2023:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber Risk Management in 2023: The People Element","datePublished":"2023-05-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/"},"wordCount":1007,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/cyber-risk-management-in-2023-the-people-element.png","keywords":["Trend Micro CISO : Article","Trend Micro CISO : Cloud","Trend Micro CISO : Compliance","Trend Micro CISO : Detection and Response","Trend Micro CISO : Digital Transformation","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Risk Management","Trend Micro CISO : Skills Gap"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/","name":"Cyber Risk Management in 2023: The People Element 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/cyber-risk-management-in-2023-the-people-element.png","datePublished":"2023-05-16T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/cyber-risk-management-in-2023-the-people-element.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/cyber-risk-management-in-2023-the-people-element.png","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-in-2023-the-people-element\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/"},{"@type":"ListItem","position":3,"name":"Cyber Risk Management in 2023: The People Element"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51931"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51931\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51932"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}