HRM On Demand LANDSCAPE

Explore HRMCon

On-Demand

Dive into the insights and discussions from HRMCon. Watch the recorded sessions at your convenience.

 

Each year, HRMCon brings together cybersecurity thought leaders and practitioners to present a half-day virtual conference geared toward continuously evolving the power of behavior change in mitigating risks.

04 (1) 04 (1)

Explore HRMCon
On-Demand

Dive into the insights and discussions from HRMCon. 

 

Each year Human Risk Management Conference brings together cybersecurity risk management thought leaders and practitioners to present a virtual conference geared towards continuously evolving the power of behavior change in mitigating human risks. 

 

 

HMRCon Unify Banner- charcoal- UPDATED

 

Breakout Tracks


Human Risk

Quantification


Risk-Based

Policy & Training Interventions


Workforce Education

and Enablement


Positive

Security Culture


Quantifying Behaviors to Mitigate Human Risk in HRM

Chris Poirel, Living Security

 Targeting Awareness of Cyber Threats with Risk-Based Policies & Training Interventions

David Tunley, Rivian

Hook, Line, and Sinker

Aaron Strong, Syniverse

Building a Robust Security Culture

Terry Smith, Blackbaud

Play Button Chris
Play Button David T
Play Button Aaron
Play Button Terry

Human Risk Management 2.0

Jon Brickey, Mastercard

 Empowring Your Human Firewall: Orchestration for Cyber Resilience and Training

Sandy Evans, Living Security

How to Deepen Your Career in Security Awareness

Cassie Clark, Consultant

HRM's Role Cultivating a Positive Security Culture for your Organization

Shawnee Delaney, Vaillance Group

Play Button Jon
Play Button Sandy
Play Button Cassie
Play Button Shawnee

The State of Human Risk Quantification

Maria Long, Violet Sullivan & Julian Sylvestro

MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization Synergy

Allen Ohanian, LA County

Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous Improvement

Erik Book, Living Security

Borrowing Brilliance: What Security Awareness and Training Should Steal from Marketing

Mike Taylor, Nationwide

Play Button Panel
Play Button Allen
Play Button Erik
Play Button Mike

Connecting Emerging Threat Intel to Human Risk Quantification

Josh Bartolomie, Cofense

Evolving from Annual Security Compliance Training to Risk-Based Policy and Training

Michele Kim, Fitch Ratings

Using Human Risk Management to Drive Behavioral Change

Brandy Harris, CyberEd

Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future

Nick Marchiselli, Living Security

Play Button Josh

 

Play Button Michele

 

Play Button Brandy

 

Play Button Nick

 

 

HRM Readiness Landing Page-1
copy copy copy 

copy copy copy 

TITLE

TITLE

copy copy copy 

TITLE

copy copy copy 

TITLE

copy copy copy 

 

Breakout Tracks


Human Risk

Quantification


Risk-Based

Policy & Training Interventions


Workforce Education

and Enablement


Positive

Security Culture


Quantifying Behaviors to Mitigate Human Risk in HRM

Chris Poirel, Living Security

 Targeting Awareness of Cyber Threats with Risk-Based Policies & Training Interventions

David Tunley, Rivian

Hook, Line, and Sinker

Aaron Strong, Syniverse

Building a Robust Security Culture

Terry Smith, Blackbaud

 

Human Risk Management 2.0

Jon Brickey, Mastercard

 Empowring Your Human Firewall: Orchestration for Cyber Resilience and Training

Sandy Evancs, Living Security

How to Deepen Your Career in Security Awareness

Cassie Clark, Consultant

HRM's Role Cultivating a Positive Security Culture for your Organization

Shawnee Delaney, Vaillance Group

 

The State of Human Risk Quantification

Maria Long, Violet Sullivan & Julian Sylvestro

MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization Synergy

Allen Ohanian, LA County

Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous Improvement

Erik Book, Living Security

Borrowing Brilliance: What Security Awareness and Training Should Steal from Marketing

Mike Taylor, Nationwide

Connecting Emerging Threat Intel to Human Risk Quantification

Josh Bartolomie, Cofense

Evolving from Annual Security Compliance Training to Risk-Based Policy and Training

Michele Kim, Fitch Ratings

Using Human Risk Management to Drive Behavioral Change

Brandy Harris, CyberEd

Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future

Nick Marchiselli, Living Security

 

Conference Tracks

Choose from four exciting conference tracks. 

1. Human Risk Quantification

Detect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.

2. Risk-Based Policy & Training Interventions

Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes (such as updating passwords).

3. Workforce Education and Enablement

Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.

4. Positive Security Culture

Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.
# #

Speakers

REMOVE THESE???

Brian Krebs Brian Krebs

Brian Krebs

KrebsOnSecurity.com | Independent Investigative Reporter

link
Jessica Burn Jessica Burn

Jessica Burn

Forrester | Principal Analyst

link
David Kennedy David Kennedy

David Kennedy

TrustedSec | Founder and CEO TrustedSec

link
Ashley Rose Ashley Rose

Ashley Rose

Living Security | CEO & Co-Founder

link
Jon Brickey Jon Brickey

Jon Brickey

Mastercard | Senior Vice President, Cybersecurity Evangelist

link
Dr. Brandy Harris Dr. Brandy Harris

Dr. Brandy Harris

CyberEd.io | Director of Education an Organizational Development

link
David Tunley David Tunley

David Tunley

Rivian | Cybersecurity Engagement Lead

link
Michele Kim Michele Kim

Michele Kim

Fitch Ratings | Director, Technology Risk

link
Mike Taylor Mike Taylor

Mike Taylor

Nationwide | Learning Capabilities Consultant

link
Maria Long Maria Long

Maria Long

Munich Re Specialty Insurance | Vice President, Cyber Underwriter & Risk Management Portfolio Leader

link
Julian Sylvestro Julian Sylvestro

Julian Sylvestro

Marsh | Senior Vice President in US & Canada Cyber Practice

link
Violet Sullivan Violet Sullivan

Violet Sullivan

Crum & Forster | AVP, Cyber Solutions Team Leader

link
Shawnee Delaney Shawnee Delaney

Shawnee Delaney

Vaillance Group | Founder and CEO

link
Terry Smith Terry Smith

Terry Smith

Blackbaud | Security Awareness Program Manager

link
Cassie Clark Cassie Clark

Cassie Clark

Consulting | Sociotechnical and Behavior Leader

link
Allen Ohanian Allen Ohanian

Allen Ohanian

LA County Department of Children and Family Services (DCFS) | Chief Information Security Officer

link
Chris Poirel Chris Poirel

Chris Poirel

Living Security | Head of Data Science

link
Josh Bartolomie Josh Bartolomie

Josh Bartolomie

Cofense | VP, Global Threat Services

link
Sandy Evans Sandy Evans

Sandy Evans

Living Security | Senior Product Manager

link
Erik Book Erik Book

Erik Book

Living Security | Product Manager

link
Nick Marchiselli Nick Marchiselli

Nick Marchiselli

Living Security | Customer Success Manager Lead

link
Aaron Strong Aaron Strong

Aaron Strong

Syniverse | Information Security Risk Analyst

link
testimonial bg testimonial mobile bg

The Future Is Now: Introducing Human Risk Management. This is not just a name change. It is a significant change of mindset, strategy, process, and technology about how we approach an old problem in a new world.

Jinan Budge

forrester-RGB-white_logo

Keynote Speakers

Review extended insights into human risk management from renowned thought leaders in the cybersecurity risk management industry.
David Kennedy Color

David Kennedy | TrustedSec

David Kennedy, founder and CEO of TrustedSec, and subject matter expert in cybersecurity presents Unveiling the Adversary: War Stories & Discoveries from the Human Element. During this keynote hear war stories and discoveries of advanced attacks including voice cloning and ransomware attacks. Dive into how businesses can prepare for these advanced scams and attacks through human risk management. WATCH SESSION
Jess Burn Color

Jess Burn | Forrester

Jess Burn, principal analyst at Forrester specializing in incident response, crisis management, and email security, presents The Future is Now: Introducing Human Risk Management. This session examines the major expected changes in SA&T as the cybersecurity risk management industry transitions to an approach that centers on behavior, prioritizing positively influencing behavior and instilling a security culture within organizations.

WATCH SESSION
Brian Krebs Color

Brian Krebs | KrebsOnSecurity.com

Decorated independent investigative reporter, Brian Krebs, joins Living Security CEO, Ashley Rose, for a Fireside Chat: What Breaches Teach Us. From data spills, breaches and thefts, to breach fatigue, apathy and cynicism, this discussion will examine some of the more alarming trends in cybercrime, and offer perspectives on how businesses can up their cybersecurity risk management game in response. 

WATCH SESSION

 

Watch Breakout Tracks

Detect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.

 

Chris Poirel, Living security

Jon Brickey, Mastercard

Maria Long, Violet Sullivan, Julian Sylvestro

Josh Bartolomie, Cofense

Play Button Chris Play Button Jon Play Button Panel Play Button Josh
Data-Driven Decisions: Quantifying Behaviors to Mitigate Human Risk in HRM Human Risk Management 2.0 The State of Human Risk Quantification  Global Threat Intel

 

Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes.

 

David Tunley, Rivian

Sandy Evans, Living Security

Allen Ohanian, LA County DCFS

Michele Kim, Fitch Ratings

Play Button David T Play Button Sandy Play Button Allen Play Button Michele
Targeting Awareness of Emerging Cyber Threats with Risk-Based Policy and Training Interventions Empowering Your Human Firewall: Orchestration for Cyber Resilience & Training MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organizational Synergy Evolving from Annual Security Compliance Training to Risk-Based Policy and Training
 

Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.

 

Aaron Strong, Syniverse

Cassie Clark, Security Awareness Consultant

Erik Book, Living Security

Brandy Harris, CyberEd

Play Button Aaron Play Button Cassie Play Button Erik Play Button Brandy
Hook, Line, and Sinker How to Deepen Your Career in Security Awareness Own Your Security Journey: Empowering All Levels to Track Human Risk and Drive Continuous Improvement Using HRM to Drive Behavioral Change
 

Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.

 

Terry Smith, Blackbaud

Shawnee Delaney, Vaillance Group

Mike Taylor, Nationwide

Nick Marchiselli, Living Security

Play Button Terry Play Button Shawnee Play Button Mike Play Button Nick
Building a Robust Security Culture HRM’s Role Cultivating a Positive Security Culture in Your Organization Borrowing Brilliance: What Security Awareness and Training Should Steal from Marketing Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future
 

 
Chris Poirel Sandy Evans Erik Book Nick Marchiselli
Play Button Chris Play Button Sandy Play Button Erik Play Button Nick
Data-Driven Decisions: Quantifying Behaviors to Mitigate Human Risk in HRM Empowering Your Human Firewall: Orchestration for Cyber Resilience & Training Own Your Security Journey: Empowering All Levels to Track Human Risk & Drive Continuous Improvement Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future

 

testimonial bg testimonial mobile bg

The Future Is Now: Introducing Human Risk Management. This is not just a name change. It is a significant change of mindset, strategy, process, and technology about how we approach an old problem in a new world

Jinan Budge

forrester-RGB-white_logo
senior-hispanic-woman-working-in-home-office-color drench

senior-hispanic-woman-working-in-home-office-color drench

 

prevent-img-1

 

Browse Curated Collections

 
Chris Poirel Sandy Evans Erik Book Nick Marchiselli
Play Button Chris Play Button Sandy Play Button Erik Play Button Nick
Data-Driven Decisions: Quantifying Behaviors to Mitigate Human Risk in HRM Empowering Your Human Firewall: Orchestration for Cyber Resilience & Training Own Your Security Journey: Empowering All Levels to Track Human Risk & Drive Continuous Improvement Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future

 

Dr. Brandy Harris, CyberEd

Shawnee Delaney, Vaillance Group

Michele Kim, Fitch Ratings

Cassie Clark, Security Awareness Consultant

Play Button Brandy Play Button Shawnee Play Button Michele Play Button Cassie
Using HRM to Drive Behavioral Change HRM’s Role Cultivating a Positive Security Culture in Your Organization Evolving from Annual Security Compliance Training to Risk-Based Policy and Training How to Deepen Your Career in Security Awareness
 

Josh Bartolomie, Cofense

Dr. Brandy Harris, CyberEd

Maria Long, Violet Sullivan, Julian Sylvestro

Shawnee Delaney, Vaillance Group

Play Button Josh Play Button Brandy Play Button Panel Play Button Shawnee
Global Threat Intel Using HRM to Drive Behavioral Change The State of Human Risk Quantification  HRM’s Role Cultivating a Positive Security Culture in Your Organization
 
Flat-Red_04 Flat-Red_04

Book a Demo

 

 

Platform Overview - Report

 

 

More from Living Security

 

www.livingsecurity.comhubfsAMA Icon

HRM Ask Me Anything

A monthly series bringing together the industry's top experts focusing on a variety of cybersecurity and human risk management topics. 

link
HRM Readiness Assessment meta image

Readiness Assessment

Living Security’s experts assess your organizations readiness to transition to comprehensive human risk management. 

link
4x5 Icon- Unify

Schedule a Demo

See how your organization can easily identify groups with similar risks and protect with nudges, training, and policy updates.

link
# # # # # # # # # # # #