11 HRMCon LinkedIn Promo-3

HRMCon 2024 brought together over 1000 registrants with:

  • 3 Keynotes
  • 4 Tracks & 16 Breakout Sessions
  • 22 Speakers

Fill out one form to access all the recordings from this event. 

HRMCon Schedule Outline

 

26
25
24
27
23
HRMCon Registration Page Banner
testimonial bg testimonial mobile bg

The Future Is Now: Introducing Human Risk Management. This is not just a name change. It is a significant change of mindset, strategy, process, and technology about how we approach an old problem in a new world.

Jinan Budge

forrester-RGB-white_logo
# mobile

Jessica Burn

Forrester | Principal Analyst

The Future Is Now: Introducing Human Risk Management.  

Our efforts in understanding and managing the significant matter of human element breaches remain perfunctory, with one touted silver bullet: security awareness and training (SA&T). This is a market that has grown exponentially and yet, with all this training and quizzing, human-related breaches continue to increase year over year. Join us for this session to examine the major expected changes in SA&T as the industry transitions to an approach that centers on behavior: human risk management.  This new approach prioritizes positively influencing behavior and instilling a security culture within organizations. The session will provide attendees with Forrester’s definition of human risk management and answer questions like:

  • What are the drivers and challenges of security awareness and training?
  • How is the human risk management market maturing?
  • What are the challenges, opportunities, and practicalities of moving from SA&T to human risk management?
Jess-Burn-1

About Jess

Jess is a principal analyst at Forrester serving security and risk (S&R) professionals. She contributes to Forrester’s research on the role of the CISO with a focus on security talent management. Additionally, Jess covers incident response and crisis management, and email security.

Previous Work Experience

Prior to her analyst role, Jess spent eight years as a principal advisor on Forrester’s Security & Risk Council. In this role, she was a trusted partner to a network of CISOs and S&R leaders, making and communicating critical decisions about and investments in their programs. Before she was an advisor, Jess led a Forrester Consulting practice focused on helping tech and service providers with their business and go-to-market strategies.

Education

Jess holds a Bachelor of Arts in communications, with concentrations in English and marketing, from the University of Connecticut.
Navigating the Vulnerability Management Lifecycle: A Step-by-Step Guide with Human Risk Mangement

Living Security Blog

Navigating the Vulnerability Management Lifecycle: A Step-by-Step Guide with Human Risk Mangement
link
Implementing Governance Risk and Compliance Software: Challenges and Solutions

Living Security Blog

Implementing Governance Risk and Compliance Software: Challenges and Solutions
link
Maximizing Cyber Risk Assessment Tools to Gain Visibility into Human Risk

Living Security Blog

Maximizing Cyber Risk Assessment Tools to Gain Visibility into Human Risk
link

Conference Tracks

Choose from four exciting conference tracks. 

1. Human Risk Quantification

Detect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.

2. Risk-Based Policy & Training Interventions

Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes (such as updating passwords).

3. Workforce Education and Enablement

Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.

4. Positive Security Culture

Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.
# # # # # # # # # # # #