The DEEP Matrix: Your Map to a Unified Defense

Javvad Malik | Oct 6, 2025

blog.knowbe4.comhubfsSocial Image RepositoryEvangelist Blog Social GraphicsEvangelists-Javvad MalikWelcome back. We have our DEEP framework which was explored in the previous blog post, and discussed in depth in our most recent human risk management (HRM) whitepaper, but a framework is only useful if we can apply it.

The problem is, we don't have "users." We have a complex collection of individuals, each with different motivations, pressures, and levels of security savvy. A one-size-fits-all approach is doomed to fail.

To build a truly effective strategy, you need to stop thinking about a monoculture and start thinking about personas. In our experience, most human risk falls into four key categories:    

The Socially Engineered Victim: The well-meaning person who gets duped by a clever con because it played on their trust or sense of urgency. They didn't mean to cause harm; they were tricked.

The Accidental Insider (Oops, My Bad!): The person who makes an honest mistake, like sending an email with sensitive data to the wrong "John," misconfiguring a cloud setting, or using a weak password out of habit. There's no malice, just a momentary lapse.

The Convenience-Driven Rule-Bender (Just Trying to Get My Job Done!): The person who knows the rules but finds them cumbersome. They might use an unsanctioned file-sharing service or a personal device because it's faster, prioritizing efficiency over policy.

The Malicious Insider (The Wolf in Sheep’s Clothing): The rare but high-impact individual deliberately trying to cause harm, steal data, or disrupt operations.

A phishing simulation is great for the first persona, but it does nothing for the other three. This is where we need a map. Introducing the DEEP Matrix.

The Matrix is a simple grid that allows you to map your security controls—both technical and human—across the DEEP framework for each of these distinct personas. It’s a powerful diagnostic tool that forces you to think about your defenses in a more nuanced way.    

User Risk
Persona

Defend (Stop it getting in)

Educate (Teach 'em right)

Empower (Help 'em choose well)

Protect (Limit the damage)

 

Social Engineering Victims

🟢 Email filtering/gateway

🟢 Link protection services

🟢 Attachment sandboxing

🟢 AI-based anomaly detection

🟢 Domain monitoring

🟡 Phishing simulations

🟡 Security awareness training

🟢 Contextual security tips

🟡 Social engineering tactics training

🟡 Red flag workshops

🟢 One-click phishing reporting

🟢 Security champions programme

🟢 Peer recognition

🟢 Security decision support

🟢 Clear escalation

🟢 Automated incident response

🟡 Just-in-time warnings

🟢 Account compromise containment

🟢 Post-click protection

🟢 Credential monitoring

 

Accidental Insiders

🟢 Data classification automation

🟡 Guardrails for common errors

🟢 Smart defaults

🟢 Automated compliance checking

🟡 Preventive controls

🟡 Data handling training

🟡 Security implications of actions

🟡 Role-based education

🟡Mistake-focused case studies

🟢 "Think before you click"

🟢 Simplified security interfaces

🟢 Plain language policies

🟢 Self-service security tools

🟢 Supportive (not punitive) culture

🟢 Security champions

🟡 Data Loss Prevention (DLP)

🟢 Automated data redaction

🟢 Mistake recovery procedures

🟡 Confirmation prompts

🟢 Automated backups

 

Convenience Bypasses

🟢 Secure paths made easy

🟢 Frictionless authentication

🟢Secure-by-default configs

🟢 Remove workaround incentives

🟢 Streamlined security

🟡 Risk awareness of shortcuts

🟢 Explaining "the why" of policies

🟡 Consequences of bypassing

🟡 Secure alternatives training

🟡 Compliance education

🟢 Self-service secure file sharing

🟡 Password managers

🟢 Single Sign-On (SSO)

🟢 Secure collaboration tools

🟢 Security friction feedback

🟢 Shadow IT discovery

🟡 Automated policy exceptions

🟢 Secure alternatives to bypasses

🟢 Policy violation monitoring

🟢 Graceful degradation

 

Malicious Insiders

🟡 Least privilege access

🟡 Separation of duties

🟡 Just-in-time access

🟡 Privileged access management

🟢 Enhanced background screening

🟡 Advanced DLP

🟡 Insider threat awareness

🟡 Ethics training

🟡 Legal consequences education

🟡 Recognising concerning behaviours

🟢Whistleblower protection

🟢 Anonymous reporting channels

🟢 Positive security culture

🟢 Clear acceptable use policies

🟢 Employee assistance programmes

🟡 Management training

🟢 User behaviour analytics

🟢 Data access monitoring

🟢 Unusual activity alerts

🟢 Offboarding security controls

🟢 Forensic readiness

By plotting your existing controls, you can instantly see where your gaps are. You might realise you have dozens of technical controls to Defend against social engineering but almost nothing to Empower the "Convenience-Driven Rule-Bender" with secure, easy-to-use alternatives. Or perhaps you have plenty of policies to Educate the "Accidental Insider," but no automated Protect controls like Data Loss Prevention (DLP) to catch their mistakes in real-time.

But there's one more crucial layer: The Friction Conundrum. Every security control adds friction. If a control is too annoying—like that ridiculously over-packaged toy on Christmas morning—people will find a way around it. The Navigator uses a simple traffic light system (🟢🟡🔴) to rate the friction of each control, helping you balance robust security with user productivity. The goal isn't to eliminate friction, but to be intentional about where you apply it.    

You now have a framework and a map. You can see your gaps and understand your people.  The question is now, how do you power this whole strategy at scale?

In our next, and final, blog post in this series, we’ll look at the engine room—the intelligent technology required to bring your human risk management strategy to life.


Stop Advanced Phishing Attacks with KnowBe4 Defend

KnowBe4 Defend takes a new approach to email security by addressing the gaps in M365 and Secure Email Gateways (SEGs). Defend helps you respond to threats quicker, dynamically improve security and stop advanced phishing threats. It reduces admin overhead, enhances detection and engages users to build a stronger security culture.

Image UpdatedWith KnowBe4 Defend you can:

  • Reduce risk of data breaches by detecting threats missed by M365 and SEGs
  • Free up admin resources by automating email security tasks
  • Educate users with color-coded banners to turn risks into teachable moments
  • Continuously assess and dynamically adapt security detection reducing admin overhead
  • Leverage live threat intelligence to automate training and simulations

Request a Demo

PS: Don't like to click on redirected buttons? Cut and paste this link in your browser:

https://www.knowbe4.com/products/defend-demo



Subscribe to Our Blog


Gartner Magic Quadrant




Get the latest insights, trends and security news. Subscribe to CyberheistNews.