HRM On Demand LANDSCAPE

Explore HRMCon

On-Demand

Dive into the insights and discussions from HRMCon. Watch the recorded sessions at your convenience.

 

Each year, HRMCon brings together cybersecurity thought leaders and practitioners to present a half-day virtual conference geared toward continuously evolving the power of behavior change in mitigating risks.

04 (1) 04 (1)

Explore HRMCon
On-Demand

Dive into the insights and discussions from HRMCon. 

 

Each year Human Risk Management Conference brings together cybersecurity risk management thought leaders and practitioners to present a virtual conference geared towards continuously evolving the power of behavior change in mitigating human risks. 

 

 

HMRCon Unify Banner- charcoal- UPDATED

 

Breakout Tracks


Human Risk

Quantification


Risk-Based

Policy & Training Interventions


Workforce Education

and Enablement


Positive

Security Culture


Quantifying Behaviors to Mitigate Human Risk in HRM

Chris Poirel, Living Security

 Targeting Awareness of Cyber Threats with Risk-Based Policies & Training Interventions

David Tunley, Rivian

Hook, Line, and Sinker

Aaron Strong, Syniverse

Building a Robust Security Culture

Terry Smith, Blackbaud

Play Button Chris
Play Button David T
Play Button Aaron
Play Button Terry

Human Risk Management 2.0

Jon Brickey, Mastercard

 Empowring Your Human Firewall: Orchestration for Cyber Resilience and Training

Sandy Evans, Living Security

How to Deepen Your Career in Security Awareness

Cassie Clark, Consultant

HRM's Role Cultivating a Positive Security Culture for your Organization

Shawnee Delaney, Vaillance Group

Play Button Jon
Play Button Sandy
Play Button Cassie
Play Button Shawnee

The State of Human Risk Quantification

Maria Long, Violet Sullivan & Julian Sylvestro

MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization Synergy

Allen Ohanian, LA County

Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous Improvement

Erik Book, Living Security

Borrowing Brilliance: What Security Awareness and Training Should Steal from Marketing

Mike Taylor, Nationwide

Play Button Panel
Play Button Allen
Play Button Erik
Play Button Mike

Connecting Emerging Threat Intel to Human Risk Quantification

Josh Bartolomie, Cofense

Evolving from Annual Security Compliance Training to Risk-Based Policy and Training

Michele Kim, Fitch Ratings

Using Human Risk Management to Drive Behavioral Change

Brandy Harris, CyberEd

Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future

Nick Marchiselli, Living Security

Play Button Josh

 

Play Button Michele

 

Play Button Brandy

 

Play Button Nick

 

 

HRM Readiness Landing Page-1
copy copy copy 

copy copy copy 

TITLE

TITLE

copy copy copy 

TITLE

copy copy copy 

TITLE

copy copy copy 

 

Breakout Tracks


Human Risk

Quantification


Risk-Based

Policy & Training Interventions


Workforce Education

and Enablement


Positive

Security Culture


Quantifying Behaviors to Mitigate Human Risk in HRM

Chris Poirel, Living Security

 Targeting Awareness of Cyber Threats with Risk-Based Policies & Training Interventions

David Tunley, Rivian

Hook, Line, and Sinker

Aaron Strong, Syniverse

Building a Robust Security Culture

Terry Smith, Blackbaud

 

Human Risk Management 2.0

Jon Brickey, Mastercard

 Empowring Your Human Firewall: Orchestration for Cyber Resilience and Training

Sandy Evancs, Living Security

How to Deepen Your Career in Security Awareness

Cassie Clark, Consultant

HRM's Role Cultivating a Positive Security Culture for your Organization

Shawnee Delaney, Vaillance Group

 

The State of Human Risk Quantification

Maria Long, Violet Sullivan & Julian Sylvestro

MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization Synergy

Allen Ohanian, LA County

Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous Improvement

Erik Book, Living Security

Borrowing Brilliance: What Security Awareness and Training Should Steal from Marketing

Mike Taylor, Nationwide

Connecting Emerging Threat Intel to Human Risk Quantification

Josh Bartolomie, Cofense

Evolving from Annual Security Compliance Training to Risk-Based Policy and Training

Michele Kim, Fitch Ratings

Using Human Risk Management to Drive Behavioral Change

Brandy Harris, CyberEd

Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future

Nick Marchiselli, Living Security

 

Conference Tracks

Choose from four exciting conference tracks. 

1. Human Risk Quantification

Detect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.

2. Risk-Based Policy & Training Interventions

Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes (such as updating passwords).

3. Workforce Education and Enablement

Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.

4. Positive Security Culture

Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.
# mobile

Jessica Burn

Forrester | Principal Analyst

The Future Is Now: Introducing Human Risk Management.  

Our efforts in understanding and managing the significant matter of human element breaches remain perfunctory, with one touted silver bullet: security awareness and training (SA&T). This is a market that has grown exponentially and yet, with all this training and quizzing, human-related breaches continue to increase year over year. Join us for this session to examine the major expected changes in SA&T as the industry transitions to an approach that centers on behavior: human risk management.  This new approach prioritizes positively influencing behavior and instilling a security culture within organizations. The session will provide attendees with Forrester’s definition of human risk management and answer questions like:

  • What are the drivers and challenges of security awareness and training?
  • How is the human risk management market maturing?
  • What are the challenges, opportunities, and practicalities of moving from SA&T to human risk management?
Jess-Burn-1

About Jess

Jess is a principal analyst at Forrester serving security and risk (S&R) professionals. She contributes to Forrester’s research on the role of the CISO with a focus on security talent management. Additionally, Jess covers incident response and crisis management, and email security.

Previous Work Experience

Prior to her analyst role, Jess spent eight years as a principal advisor on Forrester’s Security & Risk Council. In this role, she was a trusted partner to a network of CISOs and S&R leaders, making and communicating critical decisions about and investments in their programs. Before she was an advisor, Jess led a Forrester Consulting practice focused on helping tech and service providers with their business and go-to-market strategies.

Education

Jess holds a Bachelor of Arts in communications, with concentrations in English and marketing, from the University of Connecticut.
Insights from HRMCon 2024 On Demand

Living Security Blog

Insights from HRMCon 2024 On Demand
link
Insider Threat Awareness Tools & Resources

Living Security Blog

Insider Threat Awareness Tools & Resources
link
What is a Phishing Campaign? How Do You Create One?

Living Security Blog

What is a Phishing Campaign? How Do You Create One?
link
testimonial bg testimonial mobile bg

The Future Is Now: Introducing Human Risk Management. This is not just a name change. It is a significant change of mindset, strategy, process, and technology about how we approach an old problem in a new world.

Jinan Budge

forrester-RGB-white_logo

Keynote Speakers

Review extended insights into human risk management from renowned thought leaders in the cybersecurity risk management industry.
David Kennedy Color

David Kennedy | TrustedSec

David Kennedy, founder and CEO of TrustedSec, and subject matter expert in cybersecurity presents Unveiling the Adversary: War Stories & Discoveries from the Human Element. During this keynote hear war stories and discoveries of advanced attacks including voice cloning and ransomware attacks. Dive into how businesses can prepare for these advanced scams and attacks through human risk management. WATCH SESSION
Jess Burn Color

Jess Burn | Forrester

Jess Burn, principal analyst at Forrester specializing in incident response, crisis management, and email security, presents The Future is Now: Introducing Human Risk Management. This session examines the major expected changes in SA&T as the cybersecurity risk management industry transitions to an approach that centers on behavior, prioritizing positively influencing behavior and instilling a security culture within organizations.

WATCH SESSION
Brian Krebs Color

Brian Krebs | KrebsOnSecurity.com

Decorated independent investigative reporter, Brian Krebs, joins Living Security CEO, Ashley Rose, for a Fireside Chat: What Breaches Teach Us. From data spills, breaches and thefts, to breach fatigue, apathy and cynicism, this discussion will examine some of the more alarming trends in cybercrime, and offer perspectives on how businesses can up their cybersecurity risk management game in response. 

WATCH SESSION

 

Watch Breakout Tracks

Detect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.

 

Chris Poirel, Living security

Jon Brickey, Mastercard

Maria Long, Violet Sullivan, Julian Sylvestro

Josh Bartolomie, Cofense

Play Button Chris Play Button Jon Play Button Panel Play Button Josh
Data-Driven Decisions: Quantifying Behaviors to Mitigate Human Risk in HRM Human Risk Management 2.0 The State of Human Risk Quantification  Global Threat Intel

 

Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes.

 

David Tunley, Rivian

Sandy Evans, Living Security

Allen Ohanian, LA County DCFS

Michele Kim, Fitch Ratings

Play Button David T Play Button Sandy Play Button Allen Play Button Michele
Targeting Awareness of Emerging Cyber Threats with Risk-Based Policy and Training Interventions Empowering Your Human Firewall: Orchestration for Cyber Resilience & Training MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organizational Synergy Evolving from Annual Security Compliance Training to Risk-Based Policy and Training
 

Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.

 

Aaron Strong, Syniverse

Cassie Clark, Security Awareness Consultant

Erik Book, Living Security

Brandy Harris, CyberEd

Play Button Aaron Play Button Cassie Play Button Erik Play Button Brandy
Hook, Line, and Sinker How to Deepen Your Career in Security Awareness Own Your Security Journey: Empowering All Levels to Track Human Risk and Drive Continuous Improvement Using HRM to Drive Behavioral Change
 

Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.

 

Terry Smith, Blackbaud

Shawnee Delaney, Vaillance Group

Mike Taylor, Nationwide

Nick Marchiselli, Living Security

Play Button Terry Play Button Shawnee Play Button Mike Play Button Nick
Building a Robust Security Culture HRM’s Role Cultivating a Positive Security Culture in Your Organization Borrowing Brilliance: What Security Awareness and Training Should Steal from Marketing Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future
 

 
Chris Poirel Sandy Evans Erik Book Nick Marchiselli
Play Button Chris Play Button Sandy Play Button Erik Play Button Nick
Data-Driven Decisions: Quantifying Behaviors to Mitigate Human Risk in HRM Empowering Your Human Firewall: Orchestration for Cyber Resilience & Training Own Your Security Journey: Empowering All Levels to Track Human Risk & Drive Continuous Improvement Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future

 

testimonial bg testimonial mobile bg

The Future Is Now: Introducing Human Risk Management. This is not just a name change. It is a significant change of mindset, strategy, process, and technology about how we approach an old problem in a new world

Jinan Budge

forrester-RGB-white_logo
senior-hispanic-woman-working-in-home-office-color drench

senior-hispanic-woman-working-in-home-office-color drench

 

prevent-img-1

 

Browse Curated Collections

 
Chris Poirel Sandy Evans Erik Book Nick Marchiselli
Play Button Chris Play Button Sandy Play Button Erik Play Button Nick
Data-Driven Decisions: Quantifying Behaviors to Mitigate Human Risk in HRM Empowering Your Human Firewall: Orchestration for Cyber Resilience & Training Own Your Security Journey: Empowering All Levels to Track Human Risk & Drive Continuous Improvement Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure Future

 

Dr. Brandy Harris, CyberEd

Shawnee Delaney, Vaillance Group

Michele Kim, Fitch Ratings

Cassie Clark, Security Awareness Consultant

Play Button Brandy Play Button Shawnee Play Button Michele Play Button Cassie
Using HRM to Drive Behavioral Change HRM’s Role Cultivating a Positive Security Culture in Your Organization Evolving from Annual Security Compliance Training to Risk-Based Policy and Training How to Deepen Your Career in Security Awareness
 

Josh Bartolomie, Cofense

Dr. Brandy Harris, CyberEd

Maria Long, Violet Sullivan, Julian Sylvestro

Shawnee Delaney, Vaillance Group

Play Button Josh Play Button Brandy Play Button Panel Play Button Shawnee
Global Threat Intel Using HRM to Drive Behavioral Change The State of Human Risk Quantification  HRM’s Role Cultivating a Positive Security Culture in Your Organization
 
Flat-Red_04 Flat-Red_04

Book a Demo

 

 

Platform Overview - Report

 

 

More from Living Security

 

HRM AMA-1

HRM Ask Me Anything

A monthly series bringing together the industry's top experts focusing on a variety of cybersecurity and human risk management topics. 

link
Readiness-1

Readiness Assessment

Living Security’s experts assess your organizations readiness to transition to comprehensive human risk management. 

link
Left of Boom

Schedule a Demo

See how your organization can easily identify groups with similar risks and protect with nudges, training, and policy updates.

link
# # # # # # # # # # # #