Subscribe
About
  • Home
  • /
  • Security
  • /
  • Why unified human risk management is key to cyber security strategy

Why unified human risk management is key to cyber security strategy

Christopher Tredger
By Christopher Tredger, Portals editor
Johannesburg, 17 Feb 2025
Brian Pinnock, Vice President, Sales Engineering, EMEA, Mimecast.
Brian Pinnock, Vice President, Sales Engineering, EMEA, Mimecast.

Cyber attackers continue to target humans as the weakest link in the security chain, so companies should integrate e-mail, collaboration security and insider risk management in a scalable manner to strengthen defence.

This is according to Brian Pinnock, VP of sales engineering, EMEA at Mimecast, who is scheduled to deliver a presentation at the ITWeb Governance, Risk and Compliance 2025 event on 20 February at The Forum, in Bryanston. Pinnock will explain how to advance a company's security strategy with a unified human risk management (HRM) strategy.

Aligning GRC with business innovation and agility

Driven by new laws and a heightened focus on data protection, privacy and corporate governance, the regulatory environment is rapidly evolving. The ITWeb Governance, Risk and Compliance 2025 Conference will explore how AI, big data and other tech trends are impacting compliance strategies and the responsible governance of enterprise technology in South Africa.
Click here for more information and to register.

He will also demonstrate how this strategy helps to bridge the gap between external threats and internal vulnerabilities, while maintaining existing teams and security technology investments.

This is an important consideration, particularly for CISOs and other stakeholders within the cyber security ecosystem, says Pinnock.

According to Mimecast, it is important to unify e-mail, collaboration security and insider risk to protect users and sensitive company data, simplify operations and enable security teams to stay focused and end-users to keep working.

“This unified, integrated approach reduces alert fatigue from IP theft, shadow IT and data loss from departing employees with AI, automation and proactive remediation strategies, while allowing users to work unimpeded,” adds Pinnock.

He underlines how purpose-built AI and NLP models detect sensitive data in files, e-mails and screenshots, streamlining content inspection and investigations.

The Mimecast executive says it’s important to make users aware of behaviour with real-time, automated, customisable micro-lessons that can be used to reduce alerts and automate remediation.

Share