RSA Security Breach
Attackers used phishing emails to trick RSA employees into opening malicious attachments, leading to the compromise of SecurID authentication tokens used by millions.
It’s no secret that human error still plays a significant role in data breaches - despite ongoing security and awareness training. But how do we finally disrupt this trend? The answer lies in a new approach to human risk management.
Human Risk Management (HRM) is a proactive cybersecurity approach that identifies, quantifies, and mitigates security risks stemming from human behavior.
HRM supports Security Awareness & Training (SA&T) programs, expanding their impact to equip security teams and stakeholders with real-time awareness of each employee's individual cyber risk profile.
Despite the popularity of SA&T programs, human-related breaches continue to rise, with Forrester predicting that 90% of data breaches in 2024 will involve human error.
While Security Awareness & Training remains an essential component of a cybersecurity program, it alone can't address the full scope of human-related cyber threats. It's clear that SA&T must align with a larger, more proactive cyber risk management strategy.
Forrester recognizes the need for this critical change, as evidenced by its reclassification of SA&T under Human Risk Management in 2024.
Much like endpoint security evolved beyond traditional antivirus solutions, HRM builds on SA&T principles to deliver a more comprehensive and outcomes-driven cybersecurity necessity.
Human Risk Management is an important component of cybersecurity because human error is a major contributor of many breaches. In 2023, 74% of breaches involved a human element. Year after year, phishing, credential theft, and user error remain among the top attack vectors.
IBM's 2024 Cost of a Data Breach report confirms this, finding that stolen credentials were the initial attack vector in 16% of breaches- the most common IT environment entry point, followed closely by phishing at 15%.
The chart below illustrates the persistent prevalence of data breaches caused by human error over time, highlighting the importance of a modified approach to human risk management programs.

Behind every major breach, there's a human story. Here is a list of recent major cybersecurity events that exploited human vulnerabilities.
These incidents prove that even companies with well-funded technical defenses can be crippled by a data breach linked to human error.
"Most cyber attacks begin by targeting a human weakness. Technology alone cannot accommodate for all human exploits in risk management programs."
- Phil Ross (CISO, UpGuard)
While firewalls, antivirus, and encryption are essential, they can't fix poor judgment, bad habits, or lack of awareness. One study found that over 90% of employees knowingly engage in risky behaviors, such as reusing passwords or clicking suspicious links.
The rise of AI-driven cyber threats means traditional digital defenses are becoming easier to fool. Attackers now use Generative AI to create hyper-realistic phishing emails, deepfake audio to impersonate executives, and AI chatbots to personalize scam messages at scale.
Deepfake-related phishing surged over 3,000% in 2023, and the World Economic Forum warns that AI-powered scamsare becoming more convincing than ever.
An HRM platform fills this defense gap by strengthening the human factor in cybersecurity—encouraging training participation, reinforcing ideal behaviors, and tracking insider threat activities—so employees become an active part of an organization's boundary defense system, even against AI-enhanced threats.
A single phishing email can set off a chain reaction of costly repercussions, including the activation of resource-heavy incident response plans, legal fines, lost customers, and long-term brand damage.
The 2013 Target breach, caused by the phishing of a third-party contractor, led to lawsuits, stock declines, and the CEO's resignation. More recently, the 2023 MGM Resorts cyber attack, enabled by social engineering a helpdesk employee, brought casino and hotel operations to a standstill.
IBM reports that "lost business" (downtime, customer churn, and reputational harm) is the biggest driver of breach costs, averaging $1.59 million per incident. The Colonial Pipeline attack, caused by a single compromised password, led to nationwide fuel shortages and economic disruption.
Cybersecurity is no longer just an IT concern. Regulators now hold organizations accountable. GDPR fines can reach 4% of global revenue or €20 million, whichever is higher, with penalties frequently imposed for phishing-related breaches, as evidenced by the Interserve Gourp Limited breach in 2020 (see timeline above).
In the U.S., SEC rules require public companies to disclose cybersecurity risk management strategies, including how they mitigate human risk. Compliance frameworks like NIST SP 800-53 and ISO 27001 also mandate security awareness training.
Ignoring the human element doesn’t just weaken security, it increases legal and financial exposure.
Most organizations attempt to address human cyber risk through a standardized model comprising security training, phishing simulations, and policy enforcement, but these traditional efforts alone often fall short.
Some common strategies for combating human-related security events include:
Despite billions spent on these programs, phishing clicks, malware infections, and policy violations remain persistent problems, security leaders often wonder if these efforts are making an impact.
Security training is perpetually battling Ebbinghaus's Forgetting Curve, an information retention model that says people forget 90% of what they learn within a week without reinforcement.

Without continuous engagement, security training doesn’t translate into long-term behavior change.
Generic, one-size-fits-all security training does not resonate equally with all employees. The same security guidelines do not apply to developers and salespeople—developers require more technical training covering security coding practices, which is completely irrelevant to the sales staff.
Broadening cybersecurity training to maximize workplace relevance often requires omitting advanced security knowledge that is beneficial for technical roles. As a result, some employees may remain security liabilities even after completing the training.
The SA&T market is projected to reach $10 billion by 2027, yet breaches keep rising. A SANS Institute study found that even with widespread security awareness programs, 74% of organizations still fell victim to phishing attacks.
Measuring quiz completion rates doesn’t reduce risk—actual behavior change does.
- Masha Sedova (Human Risk expert)
It is important to note that security training does work. It remains one of the most effective tools for preventing human-related cyber incidents. However, this branch of internal risk mitigation must evolve with the fast-paced nature of the modern threat landscape, where AI advancements allow even the most novel hacker to create and deploy advanced social engineering attacks at scale.
Most organizations lack a unified view of human risk. Phishing test results, IT logs, and HR data sit in disconnected systems, preventing security teams from seeing which employees pose the greatest risk.
If an employee clicks multiple phishing emails, triggers antivirus alerts, or has access to sensitive financial data yet passes a cybersecurity quiz, fragmented security data would prevent a holistic view revealing the employee's need to be flagged as "high risk.".

For example, if an employee clicks multiple phishing emails, triggers antivirus alerts, and has access to sensitive financial data, they should be flagged as "high risk," but fragmented security data would prevent the holistic view required to see this..
If an employee fails a phishing test in January, they might get a remedial video—but what happens when an actual attack occurs in July? Delayed, one-off interventions don't provide real-time reinforcement, leaving employees vulnerable.
Ultimately, traditional "train and test" approaches focus more on compliance than actual risk reduction. Organizations will see high-risk behaviors persist without reinforcement, role-specific engagement, and continuous monitoring. To truly mitigate human risk, security must move beyond awareness to active risk management.
Security-driven organizations are moving beyond checkbox training to data-driven, behavior-focused human risk management (HRM). The future of HRM is defined by continuous monitoring, risk-based prioritization, real-time behavioral reinforcement, and deep security integration.
Traditional risk assessments provide only snapshots of risk exposure at a single point in time, which can result in a misleading report on your organization's actual human cyber risk exposure.
This data discrepancy is further expanded by failing to consider the complete spectrum of metrics influencing human cyber risk profiles—a characteristic of most traditional risk assessments, which include:
By integrating with IAM, email security, endpoint protection, and SIEM logs, Human Risk Management solutions offer continuous visibility across all human cyber risk attack vectors, giving you real-time awareness of your organization's evolving human cyber risk exposure.
An HRM platform helps security teams make informed decisions about specific human security practices impacting an organization's security posture. Consider the scenario of an employee interacting with multiple phishing emails in a given month—outside of a scheduled point-in-time risk assessment period.
With an HRM platform properly integrated across all relevant human cyber risk insights, the event is immediately flagged, triggering instant interventions, such as sending an alert to the direct manager or flagging the employee as requiring additional SA&T. The result is real-time awareness of emerging human cyber risks.
A point-in-time risk assessment approach alone would not have detected this malicious activity or any other arising cyber threats until the next scheduled risk assessment.

Not all employees pose the same risk—a small subset often contributes disproportionately. In one study, 8% of users were responsible for 80% of security incidents. HRM identifies these high-risk individuals and tailors interventions accordingly.
Instead of blanket training, HRM assigns risk scores based on user behavior, such as frequent phishing clicks, failed MFA attempts, or security violations. Higher-risk users receive targeted coaching or stronger controls, while low-risk employees may require less frequent training.

To combat the forgetting curve, consider implementing an HRM solution employing real-time nudges—timely, contextual prompts that reinforce secure actions at the moment of decision.
For example:
Unlike traditional training, which tells employees what to do once a year, HRM coaches them in real-time. Security becomes a daily habit, not a one-off compliance task.

HRM doesn't replace existing security measures and tools—it enhances them. By integrating a Human Risk Management platform with IAM, SIEMs, email security, and endpoint detection tools, an HRM tool broadens human attack vector contextualization—creating a risk management strategy based on each employee's true cyber risk profile.
With HRM insights feeding into SIEM systems, correlating user risk data with broader security threats, it becomes possible to establish automated response triggers based on human risk signals, such as:
The automation potential introduced by HRM tools eliminates manual processes, allowing security teams to act faster and focus their energy on cyber threat prevention rather than remediation.
As cybersecurity threats evolve, managing human risk must become a core security priority—not just a compliance requirement.
By continuously analyzing risk trends and behavioral patterns, HRM allows security teams to refine their approach over time, ensuring resources are focused where they have the most significant impact.
Here's how security leaders can embed Human Risk Management (HRM) into their strategy for long-term impact.
Just as organizations track technical vulnerabilities, incident rates, and threat intelligence, they must quantify human risk. This means defining key metrics like phishing click rates, policy violations, and user risk scores—and reporting them alongside technical risk data to leadership and the board.
What gets measured gets improved and human risk is no exception.
Compliance training is necessary but not sufficient. A strong cybersecurity culture means employees feel responsible for cybersecurity and are not just obligated to complete training.
Organizations should shift to ongoing, bite-sized learning tailored to specific roles and risks.
HRM should connect with existing security tools and not function in isolation. Security teams understand user risk by integrating phishing data, access logs, and security alerts.
HRM requires executive support to succeed.
The next wave of attacks will use AI to bypass traditional security. Organizations must train employees to recognize AI-enhanced scams, like deepfake phishing and synthetic voice fraud.
UpGuard simplifies Human Risk Management by tracking emerging threats across three major human cyber risk categories in real-time:
For a quick overview of how UpGuard can help you effectively manage human cyber risks, watch this video: