Fable announces our board-ready human risk reporting.

7 human risk metrics your board wants, and you can deliver (finally!)

The TL;DR

  • Boards want clarity on human risk; legacy metrics don’t cut it
  • Fable’s board-ready reporting turns employee data into insights
  • Understand human risk, what comprises it, and how it’s changed
  • Show measurable impact and where to act next
  • Watch our Fast Fable to see the reporting in action

For years, CISOs have dreaded presenting human risk to the board. Directors and executives want to understand how employee behavior affects company risk, but most CISOs have struggled to make that story clear, explainable, and actionable.

If they show human risk at all, it’s employees’ phishing simulation scores and awareness training completion rates—limited proxies for actual risk. They want to see actual risk, remediation plans, and program impact. Until now, most security leaders would pretty much just shrug and focus on the hard-data security metrics.

We’re changing that. Our new board-ready reporting turns human risk and behavior data into meaningful, explainable, and actionable statistics for executives and directors. 

Here are seven metrics you will be able to see (or calculate) in Fable Security that your board will actually care about. These metrics reveal your organization’s human risk based on both inherent factors like their role and access, as well as behavioral factors such as their authentication hygiene, device health, data-sharing habits, credential strength, use of generative AI, susceptibility to social engineering, and more. They show the performance of programs you’ve tried so far, as well as where you should prioritize your next action.

1. Explainable risk score

What’s needed is a single, comprehensive, explainable score that captures your organization’s human risk posture. The operative descriptor is “explainable”: it should clearly show what risk factors comprise it and to what degree, what you have taken to reduce it, and the prioritized actions that could drive it down even further.

You should be able to see this risk and its factors at the organizational, departmental, regional, or individual level, as well as compare across departments or regions.

2. Riskiest behaviors

Boards are curious about what’s putting the organization at risk. Show the highest-impact behaviors, such as reused passwords, outdated OS software, sensitive data sharing in generative AI, failed phishing simulations, and more. Enumerating these behaviors shines a light on which ones move the needle the most, and grounds in reality all subsequent discussion about what investments to make.

3. Behavior change

Measure how much employee behavior improves from the prior reporting period or the start of your risk reduction campaign, as well as vis-a-vis your goal. For example, if you launched a campaign to encourage all employees with elevated system access to adopt a password manager, and you went from 20-80% compliance, you’d show a 60 percentage-point improvement, a four-fold increase in compliance, and a status of 80% of total goal.

4. Time-to-behavior change

How fast do people respond to your interventions? Show how many hours or days it takes to get your goal number of users to compliance (whether 50%, 75%, or 100% of the total cohort). For instance, if you’re being alerted to PII in cleartext in your systems and you have a zero tolerance for that behavior, you’ll need to measure how long it takes to drive that number to zero. 

5. Emerging threats and most relevant targets

Beyond showing risky behavior, it’s good to show how much of a target your organization is, with a drill-down into what the most relevant threats are. For example, if you have a large trove of customer data, you might be a target of the cyber crime group ShinyHunters. Do one better, and show which cohorts of people are most at risk. In this scenario, it would be those with elevated access in CRM systems. 

6. Social engineering heat map

Show which roles, teams, or regions are most frequently targeted, and how they perform in controlled tests. A visual heat map makes it instantly clear where defenses are working, and where you’re exposed.

7. Risk lift of toxic combinations

One of the more sophisticated (and useful) metrics is identifying where two factors combine to elevate risk. We call these “toxic combinations.” The metric compares how often two risky behaviors co-occur versus how often you’d expect them to if they were independent. If the ratio of P(X∩Y)/[P(X)×P(Y)] exceeds 1, those behaviors occur together more frequently than chance, indicating a positive association and a “toxic” risk lift. For example, employees with privileged access who also fail phishing simulations represent a high-risk combination.

To sum it all up

Boards don’t want more slides; they want clarity: the organization’s human risk, its primary factors, risk-reduction measures taken, and where to invest next. With board-ready reporting from Fable, you’ll be able to deliver those answers with confidence.

Upend what your board expects of your security reports

The TL;DR

  • Boards are asking for clarity on human risk—beyond phishing and training
  • With our board-ready reporting, CISOs can show risk with metrics that matter
  • With Fable, you can tell a crisp narrative of progress, proof, and accountability
  • Watch our Fast Fable to see the dashboard in action

For years, CISOs have walked into boardrooms armed with the same slide deck: threat counts, patch compliance, incident trends, phishing clicks, and training completions. The numbers look precise and the charts are neat, but they don’t answer the question boards are asking: what’s our human risk?

Where does risky behavior actually live in the organization? What drives it? How quickly are we fixing it? And are we getting safer…or just busier?

From systems to humans

For too long, security updates have focused on systems, not people. The board gets metrics like vulnerabilities closed or endpoints patched, but little visibility into the everyday human decisions that make or break security. The weak link is rarely the firewall; it’s more often the reused password, the unpatched laptop, or the sensitive data pasted into generative AI. We know this. We just haven’t had the right metrics to quantify it.

Drive clarity and alignment

Boards and executives aren’t asking for more detail. They’re asking for clarity. They want to know three things, in plain language and explainable terms:

  1. What’s our organizational human risk?
  2. What comprises that risk?
  3. What are we doing about it?

Traditional metrics like phishing click rates and awareness training completions are proxies for risk, but they aren’t actual risk. Boards don’t want to hear, “We delivered more trainings.” They want to understand, “Credential reuse dropped by 45% across people with access to sensitive data this quarter.” That shift—from activity reporting to outcome reporting—is what changes everything.

From compliance to comprehension

The new gold standard in security reporting isn’t about compliance; it’s about comprehension. That means metrics need to be both explainable and actionable. With Fable Security’s board-ready reporting, CISOs can now quantify human risk with precision and context. That includes:

  • A comprehensive risk score that shows what drives it and how it’s trending
  • A view of the riskiest behaviors across people and teams
  • Behavior change metrics that track program impact over time
  • Time-to-behavior change, showing how quickly employees respond to your guidance
  • Social engineering heat maps that visualize where people are most targeted and how they perform

These metrics tell a clear story: where human risk lives, how it’s evolving, and what’s working to reduce it.

The next board meeting will sound different

Picture your next security update. Instead of walking through threat counts, you open with: 

“Our organizational human risk score improved by 18% this quarter. Credential reuse is down 50%, and we’ve cut time-to-OS update from 25 to 4 days. This means we’ll be about half as susceptible to most of the attacks that take advantage of credential reuse, and we’ve closed our device update exposure window to avoid most exploits. Our next priority is to reduce risky data-sharing in AI tools.”

That’s not a compliance update—it’s a narrative of progress, proof, and accountability.

Raising board expectations

The human risk story boards are expecting is changing from clicks and completions to metrics that really show what’s going on. Security leaders who can tell that story clearly will reshape how the board thinks about cyber risk altogether. By turning human behavior data into board-ready insights, we’re helping our security leader partners redefine what “good security reporting” looks like. The next time you brief your board, don’t just meet their expectations. Upend them.

Your human risk playbook for BYOD

The TL;DR

  • BYOD saves money and boosts morale, but can fragment security
  • Laptops, tablets, and smartphones carry distinct risks
  • People can inadvertently expose your network, applications, and data
  • These hyper-targeted, precise interventions reduce exposure

Most organizations have a BYOD program. This saves money and makes employees happier, but it can also be risky. That’s because personal devices have fragmented security postures: outdated operating system software, unvetted apps, shared usage, and configurations that can open doors for attackers or human error.

When personal laptops and smartphones connect to your network, access corporate applications, and handle sensitive communications, they effectively become part of your security perimeter. You can protect these interactions through technical controls (like VPNs, MDM, and endpoint detection solutions). But ultimately, many settings and behaviors come down to the device owner. That’s where human risk management comes in: helping employees configure and use their devices in ways that reduce exposure.

Four common risk areas include device hygiene, access control, connectivity, and data handling. Here are some of the lapses we see in our human behavior data lake here at Fable Security, and some advice for addressing them in a targeted way.

Device hygiene

People aren’t always on top of their device hygiene—whether smartphones, tablets, or laptops. They delay OS updates, skip lock-screen protections, and forget to update anti-malware (or don’t have their anti-malware configured properly). That leaves exploitable vulnerabilities and weakens built-in security. Some jailbreak their smartphones, putting them at higher risk for malware. On laptops, people run unsupported operating systems and disable full-disk encryption, making them an easy target for attackers or exposing important data if the laptop is stolen.

Access control

Access controls on personal devices are often weaker than on company-issued ones. Employees reuse passwords across personal and work accounts, store corporate logins in unsecured browsers, and rely on weak PINs and easily bypassed biometrics. Saved credentials in mobile apps can also expose company systems if the device is lost or stolen. Without MFA enforced across accounts, attackers have an easy path in. The result is that an otherwise secure application can be compromised simply because the device is unsecured.

Connectivity

Connectivity habits are another weak link. Employees join public Wi-Fi networks in airports or cafés without a VPN, making them vulnerable to man-in-the-middle attacks. Smartphones paired with untrusted Bluetooth devices or personal hotspots can expose sensitive traffic. Unsecured laptop tethering creates similar risks. These are small conveniences for employees, but each one broadens the attack surface and can make corporate data easier to intercept.

Data handling

The line between personal and work data blurs quickly on BYOD devices. Auto-backups can push corporate files into personal iCloud or Google Drive accounts. Screenshots of sensitive information can land in smartphone photo galleries. Employees can save work documents to personal Dropbox accounts for convenience. These habits may feel harmless, but they erode the boundary between corporate and personal environments and can expose data.

The human risk playbook
No doubt you have policies for most or all of these eventualities, backed up with technical controls or paper processes. Whether you have a control in place or rely on a process, your human risk process can do four important things:

  1. Monitor how well your policies are being followed, and gain visibility into the cohorts of people who aren’t following them;
  2. Nudge or brief those who need a reminder of what your policies are, and how to adhere to them;
  3. Prompt people to adopt the proper tools (e.g., MDM, MFA, etc.) to ensure policies are followed through technical controls;
  4. When technical controls aren’t available, prompt people to adhere to policies through high-quality, targeted interventions.   

Use data to your advantage

Your human risk playbook should involve gathering and synthesizing telemetry from your identity and access, workspace, HR, and security stack to understand behaviors and automatically create cohorts of employees whose devices are out of policy or who exhibit risky BYOD behavior. 

Deploy hyper-targeted, precise interventions

From there, create targeted, policy-aligned, AI-generated interventions, such as a 30-word nudge in Slack or a 60-second personalized briefing video. The intervention should target only the people who need to take action, explain why, and offer a precise call-to-action. That could mean instructing people with out-of-date OS versions to update immediately, prompting those accessing sensitive corporate applications over unsecured Wi-Fi to use an approved VPN, or directing employees who are saving sensitive data to personal cloud storage to use the approved corporate-sanctioned cloud storage. By narrowing the scope and tailoring your calls-to-action, you not only reduce noise and fatigue but also maximize the likelihood that people will follow your BYOD policy.

Your path forward on safe BYOD use includes modern human risk management. Your human risk platform should understand your areas of risk and policy non-compliance and deploy super-relevant, just-in-time interventions to help employees course-correct without blocking them from using their devices.

Your human risk playbook for secure generative AI use

The TL;DR

  • Generative AI tools boost productivity, but can leak data
  • The risk can come from employees pasting code, uploading IP, sharing non-public financials, etc.
  • A human behavior data lakehouse can reveal hidden patterns pointing to these risks
  • You can use just-in-time interventions like super-short nudges and briefings to shape behavior
  • Here’s a sample of what you might find in the Fable platform

Enterprises are adopting generative AI in a big way. People are using tools like ChatGPT, Gemini, and Claude to speed up coding, polish marketing copy, summarize contracts, and brainstorm ideas. The productivity upside is real, but so are the risks—exposed customer data, source code, intellectual property, non-public financials, protected health information, and more can end up in places you never intended. Unlike traditional cyber threats, these exposures don’t come from an external attacker; they come from everyday employees moving too fast, and maybe not realizing the consequences.

The only way to deal with this risk is to see it clearly. A human behavior data lakehouse like ours ingests signals from your workspace and security stack, normalizes them, and identifies patterns. While your security team may be able to surface some issues from individual tools, they won’t have an easy way to see the behavior across the board, and more importantly, won’t be empowered to intervene—making employees aware and suggesting alternative ways to get their jobs done—while also protecting your sensitive data.

Here are a few examples of what we see in the Fable platform:

IAM (Okta, Azure AD) → who’s adopting and provisioning access to AI

EDR (CrowdStrike, SentinelOne) → endpoint activity such as copy-paste

DLP (Microsoft Purview, Netskope) → sensitive data categorizations

SASE (Netskope, Zscaler) → sensitive data uploads to AI

To name a few.

Beyond simply telling you who’s doing what, a human behavior data lakehouse can connect more dots to give you context, such as people’s role, access, and behavior history, so you know where your risk is most acute and where to concentrate your interventions. 

Once you’ve identified the most problematic data-sharing behaviors in your enterprise, you’ll want to take action in the moment using an automated, AI-generated intervention. That may be a quick-and-dirty nudge in Slack or Teams, or a personalized 60-ish-second video briefing referencing the person, their precise behavior, your company’s policy, whatever sanctioned applications you want to guide them to, and any specific calls-to-action you want to make.

Here’s an example of what such an intervention might look like—a free video you can download and use in your company. It’ll give you a taste of our short-and-sweet, highly-effective, AI-generated content. As part of the Fable platform, it would be personalized, targeted, and sent just in time.

Want a briefing tailored to your organization’s tools? Schedule a short demo with us. 

These 7 human risk use cases require a data lakehouse

The TL;DR

  • Legacy tools are based on static rules and rules-based detections
  • Fable’s human behavior data lakehouse unlocks powerful, real-time capabilities
  • A data lakehouse enables critical, first-time use cases for enterprises, including:
    • Dynamic risk scoring
    • Early threat detection
    • Automated policy enforcement
  • Register for our 15-minute webinar on 9/4 at 10 am PT to learn more

When we set out to build the Fable human behavior data lakehouse, we weren’t just thinking about storing information. We were thinking about unlocking entirely new capabilities—ones that legacy systems simply can’t handle.

Here are seven human risk use cases that are only possible with a flexible lakehouse architecture, so data can be available in a variety of formats, including enriched, contextual, and intelligent.

1. Calculate employee risk dynamically

Most platforms score risk based on static rules: “Did John Smith pass or fail our phishing simulation?” But real-world risk is more complex. With a data lakehouse, ingest raw signals from across the enterprise—identity systems, endpoints, workspaces, HR systems, and more—and calculate a contextual risk score that updates dynamically as new data flows in.

2. See emerging threats early

Point solutions often miss nuanced employee behaviors that don’t fit a pre-defined rule and may occur across multiple enterprise touchpoints. For example, if someone with elevated Salesforce access also installs an unsanctioned remote support application, has browsed to malicious URLs, and hasn’t seen the briefing on vishing (all key indicators of a ShinyHunters attack), that combination may indicate trouble. A data lakehouse lets you correlate these signals and flag new risk patterns you haven’t seen before.

3. Identify risky, but business-critical employees

Not all risky users are created equal. With a flexible data model, you can layer in business metadata to distinguish between, say, a contractor with weak MFA accessing Snowflake and a senior engineer in the same system. A data lakehouse makes it possible to prioritize based on actual business exposure, not just technical signals.

4. Personalize interventions at scale

Generic nudges and training don’t cut it. A data lakehouse lets you assemble a full picture of each user—their role, access, team, geography, company tenure, authentication hygiene, data-handling history, credential exposure, phishing simulation performance, and more—and use that context to deliver highly personalized, AI-generated interventions that actually land. That might mean a nudge, a video briefing, or even a live workflow—precisely when and where it matters.

5. Query human risk in plain language

Instead of digging through dashboards, security teams can now ask questions like “Has anyone shared credentials to access our financial data?,” or “Which developers consistently commit secrets or credentials in code?” With generative AI layered on top of a data lakehouse, raw data becomes explainable, queryable, and—most of all—accurate. Having data in both raw and normalized, flattened formats facilitates efficient querying and ensures accuracy, since every result can be traced back to its original source.

6. Turn policy documents into enforcement engines

Most organizations have PDF security policies that nobody reads. With a data lakehouse and generative AI, you can ingest and translate those documents into structured logic—then run that logic against real behavior data to detect violations and deliver interventions. Think of it as policy enforcement without the manual work.

7. Power automated, cross-system remediation

The best part of having a data lakehouse? You don’t just identify risk—you reduce it. We’re evolving toward agentic workflows that act on data lakehouse insights, pushing changes across your stack: triggering a Slack message, disabling access, assigning a task, or updating configuration. It’s no longer just, “Tell me what’s wrong,” but, “Let’s fix it.”


Our human behavior data lakehouse isn’t just an architecture choice. It’s a foundation for a more powerful, precise, and proactive approach to managing human risk. And these seven use cases are just the beginning.

Register for our webinar

Want to learn more about our human behavior data lakehouse? Sign up for our 15-minute webinar on September 4 at 10:00 am PT.

We architected our data lakehouse for insights—and action

The TL;DR

  • Human risk data is messy, siloed, and context-dependent—most platforms constrain it, losing the ability to enable insights and action.
  • Our bronze–silver–gold data lakehouse keeps data complete, connected, and actionable.
  • This architecture enables rich insights: behavioral timelines, trend detection, cross-platform correlation, and contextual risk-scoring.
  • The result: fast, precise interventions that shape behavior and reduce risk.
  • Read insights from our 15-minute webinar to learn more.

Why human risk data needs a data lakehouse

In modern human risk management, delivering the right insights and recommendations requires assembling the right data and making it available to the right decision-makers, right away. Many platforms limit what data can be captured or constrain it as it’s being captured, making it hard for security practitioners to do high-value work like build personalized risk profiles, view behavioral timelines, detect changes over time, and correlate cross-platform signals down to the individual employee.

As we were building Fable, we knew we needed to integrate thousands of data points from hundreds of sources, and then transform that data into something accurate and meaningful for our customers, while also preserving the captured data in its original format. We modeled our data lakehouse architecture after the Medallion Data Foundation, an industry standard in modern data engineering.

Fable Security’s data lakehouse architecture showing raw data flowing through Bronze, Silver, and Gold layers toward human risk analysis.

Put simply, we needed to move from the static, rigid world of, “This employee fits X behavior,” to dynamic, flexible insights that take business context, timelines, newly-discovered data, and populations into account. We need to create insights like the following:

  Insight

  What’s required

  “This employee exhibits risky behavior”

  Personalized baselines vs. population rules

  “This employee’s behavior has shifted”

  Temporal change detection vs. static snapshots

  “This employee’s risk is escalating”

  Trend analysis vs. point-in-time assessment

  “This employee’s behavior correlates across platforms”

  Cross-system patterns vs. siloed alerts

  “This employee’s risk context matters”

  Seasonal/role-aware vs. one-size-fits-all

  “This employee recovered from previous risk”

  Dynamic scoring vs permanent flagging

These insights—and the recommendations they enable—are possible because we’ve organized our data lakehouse into a three-layer pipeline: bronze, silver, and gold. Each layer plays a distinct role in turning messy inputs into precise findings on which you can take action.

Our approach: A bronze, silver, and gold data lakehouse pipeline

The bronze layer: capture everything; lose nothing

The bronze layer is our raw landing zone for exact API responses. Here, we ingest data as nested JSON blobs from across the human attack surface: security event logs, phishing simulations, email gateways, endpoint detections, policy compliance records, HR data, workspace events, and more. 

The key at this stage is fidelity: we preserve the original data exactly as we receive it, schema quirks and all. This “store first, shape later” approach means we never lose potentially valuable context, even if we don’t yet know how we’ll use it.

The silver layer: make it consistent and connected

The silver layer is where raw chaos becomes usable. We flatten data (with no data loss), normalize formats, and correct quality issues. We also join data points from disparate systems, e.g., an endpoint alert to the employee who uses the device or a phishing click with an employee’s role, tenure, and past phishing simulation performance. We also remove obvious noise so downstream models and analytics don’t get tripped up by irrelevant events. The result is a unified, queryable view of human risk events across the enterprise. This layer is the difference between “we have the data” and “we can ask meaningful questions.”

The gold layer: deliver insights that drive action

The gold layer is where we have human risk data. Here, we apply advanced processing, analytics, and machine learning to identify patterns, score risk, and trigger interventions. A phishing click becomes a risk score adjustment; a policy violation becomes a two-way chat; anomalous behavior across multiple systems or from a foreign country flags a just-in-time security briefing. The gold layer is tightly coupled to our platform’s agentic intervention capability, ensuring that insights don’t just sit in dashboards; they actively shape behavior. 

By combining these three layers, we get a complete picture of human risk, like how repeated phishing missteps plus excessive access can reveal an employee’s rising risk.

Why this architecture matters

This bronze-silver-gold-layered approach matters because human risk data is messy, siloed, and often context-dependent. Without the bronze layer, you lose historical detail that could be vital in an investigation. Without silver, you can’t reliably connect behaviors across systems and people. And without gold, you can’t put insights into action in a way that changes outcomes. Together, these layers ensure that every security-relevant human action, whether a click, a login, or a policy acknowledgment, is part of a coherent, actionable risk picture.

What human risk use cases are possible

Because our Medallion-based pipeline keeps the data clean, connected, and context-rich, it enables capabilities that would otherwise be impossible. Some examples of human risk use cases are:

  • Behavioral trend analysis: Identify departments where phishing susceptibility is increasing month over month.
  • Precision interventions: Trigger a targeted briefing for an employee who failed a simulated phishing test and recently had a risky browser download.
  • Risk-informed policy changes: Highlight patterns where security policies are routinely bypassed, so leaders can address root causes rather than just symptoms.

In human risk management, speed, accuracy, and context aren’t nice-to-haves; they’re the difference between stopping a breach and cleaning up after one. Our data lakehouse architecture ensures we always have the intelligence we need, when we need it, to keep our customers secure.

Register for our webinar

Want to learn more about our human behavior data lakehouse? Sign up for our 15-minute webinar on September 4 at 10:00 am PT.