Each year, HRMCon brings together cybersecurity thought leaders and practitioners to present a half-day virtual conference geared toward continuously evolving the power of behavior change in mitigating risks.
HRM HRM Con on Demand
Dive into the insights and discussions from HRMCon.
Each year Human Risk Management Conference brings together cybersecurity risk management thought leaders and practitioners to present a virtual conference geared towards continuously evolving the power of behavior change in mitigating human risks.
Breakout Tracks |
|||
Human RiskQuantification |
Risk-BasedPolicy & Training Interventions |
Workforce Educationand Enablement |
PositiveSecurity Culture |
Quantifying Behaviors to Mitigate Human Risk in HRMChris Poirel, Living Security |
Targeting Awareness of Cyber Threats with Risk-Based Policies & Training InterventionsDavid Tunley, Rivian |
Hook, Line, and SinkerAaron Strong, Syniverse |
Building a Robust Security CultureTerry Smith, Blackbaud |
|
|||
Human Risk Management 2.0Jon Brickey, Mastercard |
Empowring Your Human Firewall: Orchestration for Cyber Resilience and TrainingSandy Evancs, Living Security |
How to Deepen Your Career in Security AwarenessCassie Clark, Consultant |
HRM's Role Cultivating a Positive Security Culture for your OrganizationShawnee Delaney, Vaillance Group |
|
|||
The State of Human Risk QuantificationMaria Long, Violet Sullivan & Julian Sylvestro |
MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization SynergyAllen Ohanian, LA County |
Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous ImprovementErik Book, Living Security |
Borrowing Brilliance: What Security Awareness and Training Should Steal from MarketingMike Taylor, Nationwide |
Connecting Emerging Threat Intel to Human Risk QuantificationJosh Bartolomie, Cofense |
Evolving from Annual Security Compliance Training to Risk-Based Policy and TrainingMichele Kim, Fitch Ratings |
Using Human Risk Management to Drive Behavioral ChangeBrandy Harris, CyberEd |
Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure FutureNick Marchiselli, Living Security |
KrebsOnSecurity.com | Independent Investigative Reporter
The daily drumbeat of data spills, breaches and thefts can foster breach fatigue, apathy and cynicism among even the most hardy security professionals. What sets in is a suspicion that all our efforts are for naught, and that we are perpetually a step behind the bad guys. In truth, most of these incidents are not only preventable, but they take months or years to bubble up. This fireside chat will examine some of the more alarming trends in cybercrime today, and offer some perspectives on how businesses, consumers and infosec pros can up their game in response.
Brian Krebs is an independent investigative reporter who writes about cybercrime at the award-winning Web site KrebsOnSecurity.com.
Formerly with The Washington Post (1995-2009), Krebs is best known for breaking stories on high-profile data breaches, including those that hit Target, Home Depot, Michaels, Ashley Madison, and Capital One.
A frequent interviewee and public speaker, Krebs has been profiled by 60 Minutes, The New York Times, Poynter.org, and Business Week. Krebs’s book, Spam Nation: The Inside Story of Organized Cybercrime - From Global Epidemic to Your Front Door – is now a New York Times bestseller. More recently, he was invited to an “Ask Me Anything” discussion on Reddit about investigative reporting.
In January 2015, the National Press Foundation announced it was awarding Krebs its Chairman's Citation, an award designed to "recognize individuals whose accomplishments fall outside the traditional categories of excellence." In October 2014, the Association of Certified Fraud Examiners gave Krebs the "Guardian Award" an honor given annually to a journalist "whose determination, perseverance, and commitment to the truth have contributed significantly to the fight against fraud."
Krebs graduated in 1994 from George Mason University. Today, he lives with his wife Jennifer in Northern Virginia.
Living Security Blog
Streamline cybersecurity incident response with automated workflows and integrations. Reduce response times, enhance resilience, and tackle human-driven security risks
Jinan Budge
Jess Burn, principal analyst at Forrester specializing in incident response, crisis management, and email security, presents The Future is Now: Introducing Human Risk Management. This session examines the major expected changes in SA&T as the cybersecurity risk management industry transitions to an approach that centers on behavior, prioritizing positively influencing behavior and instilling a security culture within organizations.
WATCH SESSIONDecorated independent investigative reporter, Brian Krebs, joins Living Security CEO, Ashley Rose, for a Fireside Chat: What Breaches Teach Us. From data spills, breaches and thefts, to breach fatigue, apathy and cynicism, this discussion will examine some of the more alarming trends in cybercrime, and offer perspectives on how businesses can up their cybersecurity risk management game in response.
WATCH SESSIONDetect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.
Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes.
Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.
Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.
Jinan Budge
A monthly series bringing together the industry's top experts focusing on a variety of cybersecurity and human risk management topics.
Living Security’s experts assess your organizations readiness to transition to comprehensive human risk management.
See how your organization can easily identify groups with similar risks and protect with nudges, training, and policy updates.