Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Risk Scoring Is a Key Benefit to Zero Trust
Cybersecurity

Why Risk Scoring Is a Key Benefit to Zero Trust

Robert WoodBy Robert WoodSeptember 23, 2022Updated:September 28, 20224 Mins Read
Facebook Twitter LinkedIn Email
Risk Scoring
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The surge of conversation around zero trust has included one really interesting topic for me: risk scoring and adaptive authorization. Depending on a number of factors, your score changes. Depending on your score, you get access to different things or are monitored differently. From a pure technology perspective, this is exciting. It means there won’t be so many heavy-handed security measures in place.

The more interesting thing to me about this is the potential to truly change behavior and mindset around an individual’s interaction with technology and the risk that comes with that. To me, it’s an opportunity to achieve a level of ownership that years of sometimes horrible and sometimes okay security awareness training engagement have failed to accomplish.

Principles Behind Risk Scoring

Risk scoring will likely look different depending on the organization or the industry. However, the consistent themes I’ve observed, thus far, should help in facilitating the exploration in this article. There are also vendor tooling-specific implementations of zero trust risk scoring, including:

  • Crowdstrike scoring a given device’s risk based on user activity, association with vulnerability or exploit activity, role of the user, whether or not it’s managed, and more.
  • TrendMicro scoring attempts to look across a number of input sources including interaction with SaaS applications, endpoint activity, email activity, and more.
  • Okta scoring scores a given user or authentication event based on data around geolocation, behavioral information from the user making the request, previous failed authentication activity, and more.

The vendor community will likely continue scoring in various ways that build upon or extend its respective solutions, intending to support broader zero trust initiatives within an organization. Depending on how an organization intended to implement and use risk scoring, it may be building decision logic on top of vendor scores or collecting, aggregating, and normalizing them, and then making their own scores to connect more of their environment together.

How Risk Scoring and User Behavior Change Are Connected

There are many examples backed by solid research that can be a powerful aid to reinforcing behavior change to support goals, particularly when people have access to data relating to behavior. To make an analogy outside of cybersecurity, think about devices like Fitbit or Apple Watch and how people may walk or exercise more when presented with their daily steps or their daily rings.

In an organizational context, dashboards are built and displayed so that people and teams can adapt to meet their goals. Goal-setting systems such as objectives and key results support this approach with frequent measurement and adaptation.

Circling back to zero trust scores and security awareness efforts — security teams strive to educate their user communities around behaviors in topics such as:

  • What types of devices do they use for work: personal devices versus managed devices?
  • Where do they work? Do they log on from a coffee shop, the office, a WeWork, or work from home?
  • What data do they access? How do they use it? Where do they store it?

I have a hypothesis that making zero trust scores transparent and visible to users will drive ownership and accountability over their behavior and how it relates to security outcomes. This is similar to what happens when someone starts counting their calories and tracking their steps.

Final Thoughts

Users are not robots; they won’t all behave exactly the same way or do exactly the same thing. If a user knows what measures are going into a risk score, they can make decisions that support the score that works for them. When that risk score is connected to them getting their job done, when it’s connected to the amount of friction they may receive with respect to step-up authentication or deprecated permissions or access, then they can own decisions that best meet their needs and circumstances.

This is the empowerment of end users. This is ownership over the day-to-day things that influence security. This is enablement. This is also a part of the bigger zero trust journey.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity featured Featured Post risk zero trust
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Microsoft, AWS, Oracle Lead $1-Trillion RPO Total for Cloud Wars Top 10

June 17, 2025

How ServiceNow and EY Use AI to Merge Brand and Demand in B2B Marketing

June 17, 2025

$1 Trillion RPO!

June 17, 2025

Transforming Compliance: EY and ServiceNow Simplify Complex Regulations

June 16, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft, AWS, Oracle Lead $1-Trillion RPO Total for Cloud Wars Top 10
  • How ServiceNow and EY Use AI to Merge Brand and Demand in B2B Marketing
  • $1 Trillion RPO!
  • Transforming Compliance: EY and ServiceNow Simplify Complex Regulations
  • Larry Ellison and Safra Catz Humiliate Oracle Skeptics with Stunning Guidance

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.