11 HRMCon LinkedIn Promo-3

HRMCon 2024 brought together over 1000 registrants with:

  • 3 Keynotes
  • 4 Tracks & 16 Breakout Sessions
  • 22 Speakers

Fill out one form to access all the recordings from this event. 

HRMCon Schedule Outline

 

26
25
24
27
23
HRMCon Registration Page Banner
testimonial bg testimonial mobile bg

The Future Is Now: Introducing Human Risk Management. This is not just a name change. It is a significant change of mindset, strategy, process, and technology about how we approach an old problem in a new world.

Jinan Budge

forrester-RGB-white_logo
# mobile

Brian Krebs

KrebsOnSecurity.com | Independent Investigative Reporter

Fireside Chat: What Breaches Teach Us

The daily drumbeat of data spills, breaches and thefts can foster breach fatigue, apathy and cynicism among even the most hardy security professionals. What sets in is a suspicion that all our efforts are for naught, and that we are perpetually a step behind the bad guys. In truth, most of these incidents are not only preventable, but they take months or years to bubble up. This fireside chat will examine some of the more alarming trends in cybercrime today, and offer some perspectives on how businesses, consumers and infosec pros can up their game in response.

Brian Krebs

About Brian

Brian Krebs is an independent investigative reporter who writes about cybercrime at the award-winning Web site KrebsOnSecurity.com.

 Formerly with The Washington Post (1995-2009), Krebs is best known for breaking stories on high-profile data breaches, including those that hit Target, Home Depot, Michaels, Ashley Madison, and Capital One.

 A frequent interviewee and public speaker, Krebs has been profiled by 60 Minutes, The New York Times, Poynter.org, and Business Week. Krebs’s book, Spam Nation: The Inside Story of Organized Cybercrime - From Global Epidemic to Your Front Door – is now a New York Times bestseller. More recently, he was invited to an “Ask Me Anything” discussion on Reddit about investigative reporting.

 In January 2015, the National Press Foundation announced it was awarding Krebs its Chairman's Citation, an award designed to "recognize individuals whose accomplishments fall outside the traditional categories of excellence." In October 2014, the Association of Certified Fraud Examiners gave Krebs the "Guardian Award" an honor given annually to a journalist "whose determination, perseverance, and commitment to the truth have contributed significantly to the fight against fraud."

 Krebs graduated in 1994 from George Mason University. Today, he lives with his wife Jennifer in Northern Virginia.

The Little Dot in the Top Right Corner

Living Security Blog

The Little Dot in the Top Right Corner
link
From Pop-Ups to Panic: The Impact of Scareware on User Security

Living Security Blog

From Pop-Ups to Panic: The Impact of Scareware on User Security
link
Insights from HRMCon 2024 On Demand

Living Security Blog

Insights from HRMCon 2024 On Demand
link

Conference Tracks

Choose from four exciting conference tracks. 

1. Human Risk Quantification

Detect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.

2. Risk-Based Policy & Training Interventions

Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes (such as updating passwords).

3. Workforce Education and Enablement

Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.

4. Positive Security Culture

Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.
# # # # # # # # # # # #