Each year, HRMCon brings together cybersecurity thought leaders and practitioners to present a half-day virtual conference geared toward continuously evolving the power of behavior change in mitigating risks.
HRM HRM Con on Demand
Dive into the insights and discussions from HRMCon.
Each year Human Risk Management Conference brings together cybersecurity risk management thought leaders and practitioners to present a virtual conference geared towards continuously evolving the power of behavior change in mitigating human risks.
Breakout Tracks |
|||
Human RiskQuantification |
Risk-BasedPolicy & Training Interventions |
Workforce Educationand Enablement |
PositiveSecurity Culture |
Quantifying Behaviors to Mitigate Human Risk in HRMChris Poirel, Living Security |
Targeting Awareness of Cyber Threats with Risk-Based Policies & Training InterventionsDavid Tunley, Rivian |
Hook, Line, and SinkerAaron Strong, Syniverse |
Building a Robust Security CultureTerry Smith, Blackbaud |
|
|||
Human Risk Management 2.0Jon Brickey, Mastercard |
Empowring Your Human Firewall: Orchestration for Cyber Resilience and TrainingSandy Evancs, Living Security |
How to Deepen Your Career in Security AwarenessCassie Clark, Consultant |
HRM's Role Cultivating a Positive Security Culture for your OrganizationShawnee Delaney, Vaillance Group |
|
|||
The State of Human Risk QuantificationMaria Long, Violet Sullivan & Julian Sylvestro |
MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization SynergyAllen Ohanian, LA County |
Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous ImprovementErik Book, Living Security |
Borrowing Brilliance: What Security Awareness and Training Should Steal from MarketingMike Taylor, Nationwide |
Connecting Emerging Threat Intel to Human Risk QuantificationJosh Bartolomie, Cofense |
Evolving from Annual Security Compliance Training to Risk-Based Policy and TrainingMichele Kim, Fitch Ratings |
Using Human Risk Management to Drive Behavioral ChangeBrandy Harris, CyberEd |
Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure FutureNick Marchiselli, Living Security |
Marsh | Senior Vice President in US & Canada Cyber Practice
It’s undeniable that the vast majority of cyber events can be attributed to human error. From falling victim to a phishing attack to misconfiguration of security controls, humans have the power to be the weakest link or the strongest asset when it comes to avoiding a cyber-attack. So how does the cyber insurance market quantify human susceptibility when evaluating an insured? In this session, an expert panel of cyber insurance risk managers and advocates discuss the status quo of human risk quantification, and how we hope to evolve evaluation of this risk facet.
Julian Sylvestro is a Senior Vice President in Marsh’s US & Canada National Cyber Practice and resides in Cincinnati, OH. In addition to managing a team of Cyber Advisors, he is responsible for a full range of advisory and placement services to clients with complex cyber, technology and services risk, including exposure identification, financial impact analysis and insurance program development and execution for Fortune 500 & Global 1000 Companies. Julian’s expertise with complex global clients includes depth in the Defense Contracting, Life Sciences, Healthcare, Manufacturing, Agriculture, and Technology industry sectors. Julian joined our firm in 2022. Prior to joining Marsh, Julian was a Director at Secureworks, where he developed the Insurance and Legal Verticals connecting technical cybersecurity experts with cyber insurancestakeholders. In his time at Secureworks he also helped stand up a ransom negotiation offering to help organizations impacted by ransomware safely navigate interactions with threat actors. Julian has a passion for driving alignment across the Cyber Risk ecosystem to provide more effective and efficient incident response services to his clients. Prior to Secureworks, Julian also spent a decade serving clients’ cyber brokerage needs for both retail and wholesale insurance broking organizations.
Living Security Blog
Streamline cybersecurity incident response with automated workflows and integrations. Reduce response times, enhance resilience, and tackle human-driven security risks
Jinan Budge
Jess Burn, principal analyst at Forrester specializing in incident response, crisis management, and email security, presents The Future is Now: Introducing Human Risk Management. This session examines the major expected changes in SA&T as the cybersecurity risk management industry transitions to an approach that centers on behavior, prioritizing positively influencing behavior and instilling a security culture within organizations.
WATCH SESSIONDecorated independent investigative reporter, Brian Krebs, joins Living Security CEO, Ashley Rose, for a Fireside Chat: What Breaches Teach Us. From data spills, breaches and thefts, to breach fatigue, apathy and cynicism, this discussion will examine some of the more alarming trends in cybercrime, and offer perspectives on how businesses can up their cybersecurity risk management game in response.
WATCH SESSIONDetect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.
Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes.
Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.
Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.
Jinan Budge
A monthly series bringing together the industry's top experts focusing on a variety of cybersecurity and human risk management topics.
Living Security’s experts assess your organizations readiness to transition to comprehensive human risk management.
See how your organization can easily identify groups with similar risks and protect with nudges, training, and policy updates.