User Personas are at the foundation of how we think about tackling the problems that Riscosity addresses for our customers. In order to truly understand the unmet needs a product can address and how to effectively design a solution to a problem that a user is having, it is critical to constantly refine our understanding of who our users are. In order to create effective User Personas, we have taken the time to understand our users’ roles at their organizations, their challenges, their motivations, and how Riscosity fits into all of that.
Christopher Widstrom
Lead Product Manager at Riscosity
Published on
2/18/2025
5
min.
In this blog post, we will share our current understanding of the User Personas involved with Ricosity today. Job titles and responsibilities may vary, but the following User Personas are a reflection of the average users we meet who hold these roles at their organizations.
Challenges
Aligning technology strategy with overall business goals
Adapting to rapidly evolving technological landscapes (i.e. AI)
Awareness of any cybersecurity and data privacy concerns
Motivations
Using technology to significantly impact the organization
Promoting technical innovation at the organization
Being a key stakeholder in driving the success of the organization
How They Use Riscosity
Views the summary information from Riscosity about what data the applications in their organizations are sharing with 3rd party vendors and AI tools to maintain overall awareness of any data concerns
Challenges
Managing evolving cyber threats and responding to incidents
Staying on top of the rapidly changing threat landscape
Ensuring regulatory compliance
Motivations
Passionate about technology
Protecting their organization’s sensitive data from cyber threats
A sense of purpose from mitigating security risks to the organization
How They Use Riscosity
Views the summary information from Riscosity about what data the applications in their organizations are sharing with 3rd party vendors and AI tools to ensure that any sensitive data is not being shared
Challenges
Managing complex data governance and compliance issues
Staying on top of evolving data regulations
Demonstrating the business value of data initiatives
Motivations
Developing a strong data culture at their organization
Using data strategically to drive significant business value
Ensuring data quality and proper data governance
How They Use Riscosity
Views the summary information from Riscosity about what data the applications in their organizations are sharing with 3rd party vendors and AI tools to ensure that any sensitive data is not being shared
Challenges
Staying on top of evolving laws/regulations
Maintaining awareness of any legal developments in the organization
Enforcing ethical standards within the organization
Motivations
Using their legal expertise to proactively manage risk for their organization
Solving complex legal challenges to drive positive business outcomes
Being a key decision-maker and partner in their organization’s success
How They Use Riscosity
Views Riscosity’s regulatory reports on what data is being shared with 3rd party vendors, including Privacy Impact Assessment reports (PIA)
Challenges
Staying on top of rapidly evolving cyber threats
Balancing security with usability
Managing security incidents at their organization
Motivations
Making a meaningful impact to their organization by protecting sensitive data and systems
Learning and adapting to new threats in an evolving landscape
Challenging themselves intellectually by solving complex security problems
How They Use Riscosity
Uses Riscosity’s detailed findings on data types being shared with 3rd party vendors and AI tools to inform remediation steps for the applications that they are assigned to
Challenges
Automating manual tasks
Dealing with too many alerts from various tools
Explaining complex technical issues to non-technical audiences
Motivations
Making a positive impact on their organization by protecting sensitive data and systems
Enjoying the intellectual challenge of staying ahead of constantly evolving cybercrime tactics
Being about to constantly learn and develop new skills
How They Use Riscosity
Monitors and acts upon Riscosity’s findings by verifying the 3rd party vendors that their applications are sending data to, implementing automated governance on sensitive data types being sent to 3rd party vendors, and more.
Challenges
Staying on top of rapidly evolving privacy regulations
Maintaining data visibility and control across their organization,
Ensuring compliance with various privacy frameworks like GDPR and CCPA
Motivations
Protecting individuals' personal data and mitigating privacy risks by ensuring compliance with privacy regulations
Promoting ethical data handling practices at their organization
Contributing to the development of robust data protection strategies at their organization
How They Use Riscosity
Collects privacy and GRC related information from Riscosity’s reports and findings on data being shared by their organization’s applications with 3rd party vendors and AI tools.
Conclusion
Hopefully you have learned a thing or two about the types of users who interact with Riscosity for their data flow posture management needs and you will be inspired to consider the User Personas involved with your products.
If you have any thoughts about our understanding of these User Personas or want to learn more about Riscosity, please reach out to us.
The user persona images in this post were generated with Leonardo AI.