
HRMCon 2024 brought together over 1000 registrants with:
Fill out one form to access all the recordings from this event.


Jinan Budge
Crum & Forster | AVP, Cyber Solutions Team Leader
It’s undeniable that the vast majority of cyber events can be attributed to human error. From falling victim to a phishing attack to misconfiguration of security controls, humans have the power to be the weakest link or the strongest asset when it comes to avoiding a cyber-attack. So how does the cyber insurance market quantify human susceptibility when evaluating an insured? In this session, an expert panel of cyber insurance risk managers and advocates discuss the status quo of human risk quantification, and how we hope to evolve evaluation of this risk facet.
Ms. Sullivan is an industry-leading cybersecurity and privacy attorney and Certified Information Privacy Professional (CIPP/US) who has provided thousands of clients with cybersecurity, privacy and emerging technology (AI) services. She currently leads the Crum & Forster Cyber Solutions Team, providing cyber insurance policyholders with value added resources before, during and after a cyber incident. Her expertise in preparing businesses for cyber incidents and managing scaled breach responses has made her a trusted authority for public and private sector clients, including many Fortune 100 companies. Ms. Sullivan also serves as a professor of Cybersecurity & Privacy Law for Baylor Law School’s LLM. Program, where her focus on litigation management has made her course especially valuable to general counsels and leading law firms nationwide.
Living Security Blog
New Anthropic research shows how a Chinese state sponsored group used AI to automate reconnaissance, exploit development, and credential harvesting across global targets. The attack succeeded because stolen usernames and passwords unlocked high privilege access. This article explains how Human Risk Management strengthens the identity layer by correlating security signals to human behavior and reducing the weak points AI driven attackers now exploit.