Product

The User Personas of Riscosity

User Personas are at the foundation of how we think about tackling the problems that Riscosity addresses for our customers. In order to truly understand the unmet needs a product can address and how to effectively design a solution to a problem that a user is having, it is critical to constantly refine our understanding of who our users are. In order to create effective User Personas, we have taken the time to understand our users’ roles at their organizations, their challenges, their motivations, and how Riscosity fits into all of that.

Christopher Widstrom
Lead Product Manager at Riscosity
Published on
2/18/2025
5
min.

In this blog post, we will share our current understanding of the User Personas involved with Ricosity today. Job titles and responsibilities may vary, but the following User Personas are a reflection of the average users we meet who hold these roles at their organizations.

Chief Information Officer - Role: Manages the overall IT strategy, infrastructure, and policy for an organization

Challenges

  • Aligning technology strategy with overall business goals
  • Adapting to rapidly evolving technological landscapes (i.e. AI)
  • Awareness of any cybersecurity and data privacy concerns

Motivations

  • Using technology to significantly impact the organization
  • Promoting technical innovation at the organization
  • Being a key stakeholder in driving the success of the organization

How They Use Riscosity

  • Views the summary information from Riscosity about what data the applications in their organizations are sharing with 3rd party vendors and AI tools to maintain overall awareness of any data concerns
Chief Information Security Officer - Role: Develops, implements, and enforces security policies to protect their organization’s critical data.

Challenges

  • Managing evolving cyber threats and responding to incidents
  • Staying on top of the rapidly changing threat landscape
  • Ensuring regulatory compliance

Motivations

  • Passionate about technology
  • Protecting their organization’s sensitive data from cyber threats
  • A sense of purpose from mitigating security risks to the organization

How They Use Riscosity

  • Views the summary information from Riscosity about what data the applications in their organizations are sharing with 3rd party vendors and AI tools to ensure that any sensitive data is not being shared
Chief Data Officer - Role: Manages their organization's data operations, security, and strategies to ensure that data is used to its fullest potential for the benefit of the organization. 

Challenges

  • Managing complex data governance and compliance issues
  • Staying on top of evolving data regulations
  • Demonstrating the business value of data initiatives

Motivations

  • Developing a strong data culture at their organization
  • Using data strategically to drive significant business value
  • Ensuring data quality and proper data governance

How They Use Riscosity

  • Views the summary information from Riscosity about what data the applications in their organizations are sharing with 3rd party vendors and AI tools to ensure that any sensitive data is not being shared
General Counsel - Role: Ensures that their organization is compliant with various laws/regulations and that its legal interests are safeguarded

Challenges

  • Staying on top of evolving laws/regulations
  • Maintaining awareness of any legal developments in the organization
  • Enforcing ethical standards within the organization

Motivations

  • Using their legal expertise to proactively manage risk for their organization 
  • Solving complex legal challenges to drive positive business outcomes
  • Being a key decision-maker and partner in their organization’s success

How They Use Riscosity

  • Views Riscosity’s regulatory reports on what data is being shared with 3rd party vendors, including Privacy Impact Assessment reports (PIA)
Security Engineer - Role: Builds secure products for their organization

Challenges

  • Staying on top of rapidly evolving cyber threats 
  • Balancing security with usability
  • Managing security incidents at their organization

Motivations

  • Making a meaningful impact to their organization by protecting sensitive data and systems 
  • Learning and adapting to new threats in an evolving landscape 
  • Challenging themselves intellectually by solving complex security problems

How They Use Riscosity

  • Uses Riscosity’s detailed findings on data types being shared with 3rd party vendors and AI tools to inform remediation steps for the applications that they are assigned to
Security Analyst - Role: Safeguards their organization's computer networks, systems, and data from cyberattacks by monitoring for security breaches, identifying potential threats, and implementing security measures to mitigate risks

Challenges

  • Automating manual tasks
  • Dealing with too many alerts from various tools
  • Explaining complex technical issues to non-technical audiences

Motivations

  • Making a positive impact on their organization by protecting sensitive data and systems 
  • Enjoying the intellectual challenge of staying ahead of constantly evolving cybercrime tactics
  • Being about to constantly learn and develop new skills

How They Use Riscosity

  • Monitors and acts upon Riscosity’s findings by verifying the 3rd party vendors that their applications are sending data to, implementing automated governance on sensitive data types being sent to 3rd party vendors, and more.
Privacy Analyst - Role: Ensures that their organization's data handling practices comply with privacy laws and regulations to maintain trust from customers

Challenges

  • Staying on top of rapidly evolving privacy regulations
  • Maintaining data visibility and control across their organization, 
  • Ensuring compliance with various privacy frameworks like GDPR and CCPA 

Motivations

  • Protecting individuals' personal data and mitigating privacy risks by ensuring compliance with privacy regulations 
  • Promoting ethical data handling practices at their organization 
  • Contributing to the development of robust data protection strategies at their organization

How They Use Riscosity

  • Collects privacy and GRC related information from Riscosity’s reports and findings on data being shared by their organization’s applications with 3rd party vendors and AI tools.

Conclusion

Hopefully you have learned a thing or two about the types of users who interact with Riscosity for their data flow posture management needs and you will be inspired to consider the User Personas involved with your products.

If you have any thoughts about our understanding of these User Personas or want to learn more about Riscosity, please reach out to us.

The user persona images in this post were generated with Leonardo AI.