Each year, HRMCon brings together cybersecurity thought leaders and practitioners to present a half-day virtual conference geared toward continuously evolving the power of behavior change in mitigating risks.
HRM HRM Con on Demand
Dive into the insights and discussions from HRMCon.
Each year Human Risk Management Conference brings together cybersecurity risk management thought leaders and practitioners to present a virtual conference geared towards continuously evolving the power of behavior change in mitigating human risks.
Breakout Tracks |
|||
Human RiskQuantification |
Risk-BasedPolicy & Training Interventions |
Workforce Educationand Enablement |
PositiveSecurity Culture |
Quantifying Behaviors to Mitigate Human Risk in HRMChris Poirel, Living Security |
Targeting Awareness of Cyber Threats with Risk-Based Policies & Training InterventionsDavid Tunley, Rivian |
Hook, Line, and SinkerAaron Strong, Syniverse |
Building a Robust Security CultureTerry Smith, Blackbaud |
|
|||
Human Risk Management 2.0Jon Brickey, Mastercard |
Empowring Your Human Firewall: Orchestration for Cyber Resilience and TrainingSandy Evancs, Living Security |
How to Deepen Your Career in Security AwarenessCassie Clark, Consultant |
HRM's Role Cultivating a Positive Security Culture for your OrganizationShawnee Delaney, Vaillance Group |
|
|||
The State of Human Risk QuantificationMaria Long, Violet Sullivan & Julian Sylvestro |
MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization SynergyAllen Ohanian, LA County |
Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous ImprovementErik Book, Living Security |
Borrowing Brilliance: What Security Awareness and Training Should Steal from MarketingMike Taylor, Nationwide |
Connecting Emerging Threat Intel to Human Risk QuantificationJosh Bartolomie, Cofense |
Evolving from Annual Security Compliance Training to Risk-Based Policy and TrainingMichele Kim, Fitch Ratings |
Using Human Risk Management to Drive Behavioral ChangeBrandy Harris, CyberEd |
Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure FutureNick Marchiselli, Living Security |
LA County Department of Children and Family Services (DCFS) | Chief Information Security Officer
MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organizational Synergy
Exploring the transformative potential of combining cybersecurity and psychology to elevate organizational cyber resilience. This session delves into how understanding human behavior and leveraging AI to enhance security protocols and foster a positive security culture. Learn strategies to integrate these insights into your organization, creating a proactive and cohesive approach to cybersecurity. Gain practical knowledge from real-world examples and case studies that highlight successful implementations of these interdisciplinary approaches.
About Allen Ohanian
Mr. Ohanian is the Chief Information Security Officer for Los Angeles (LA) County Department of Children and Family Services (DCFS), the largest child welfare institution in the nation. He has 20 years of experience in information technology, cybersecurity and defense strategies, risk management, forensics, privacy, compliance, cloud security, business continuity, and software engineering in the private and public sectors. Before DCFS, he served as the first Chief Information Security and Privacy Officer at LA County Counsel where he established an Information Security and Privacy program and ensured compliance with legal mandates. As a visionary and innovative Information Security Officer, Mr. Ohanian has architected and implemented cybersecurity and privacy programs from the ground up, interwoven cybersecurity into the business culture creating a security-conscious enterprise, and assertively achieved the organization’s mission of service excellence through outstanding leadership, governance, strategic planning, business acumen, and cost-saving transformation initiatives. Mr. Ohanian is an active member of various Cybersecurity taskforce and workgroups and leads and oversees the Countywide Risk Management Cybersecurity Team responsible for developing and implementing administrative, technical, and tactical strategies to assess and reduce cybersecurity risks to County information assets. Mr. Ohanian has been a keynote speaker and panel member in numerous conferences such as Interop, Los Angeles Government Summit, and National Cybersecurity Awareness seminars. In addition, he is a Ph.D. dissertation committee member for cybersecurity using Artificial Intelligence (AI) at Center for Information Systems & Technology Claremont Graduate University. Mr. Ohanian’s accomplishments in improving organizations’ cybersecurity posture has led to various excellence awards including multiple Information Security Officer of the year awards. Mr. Ohanian has a Bachelor’s degree in Computer Science, Master’s Degree in Cybersecurity and Business Administration. He is currently pursing Ph.D in I/O Psychology.
Living Security Blog
Protect your organization by tracking security behaviors before breaches happen. Explore how Living Security measures and mitigates insider risks with actionable insights.
Jinan Budge
Jess Burn, principal analyst at Forrester specializing in incident response, crisis management, and email security, presents The Future is Now: Introducing Human Risk Management. This session examines the major expected changes in SA&T as the cybersecurity risk management industry transitions to an approach that centers on behavior, prioritizing positively influencing behavior and instilling a security culture within organizations.
WATCH SESSIONDecorated independent investigative reporter, Brian Krebs, joins Living Security CEO, Ashley Rose, for a Fireside Chat: What Breaches Teach Us. From data spills, breaches and thefts, to breach fatigue, apathy and cynicism, this discussion will examine some of the more alarming trends in cybercrime, and offer perspectives on how businesses can up their cybersecurity risk management game in response.
WATCH SESSIONDetect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.
Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes.
Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.
Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.
Jinan Budge
A monthly series bringing together the industry's top experts focusing on a variety of cybersecurity and human risk management topics.
Living Security’s experts assess your organizations readiness to transition to comprehensive human risk management.
See how your organization can easily identify groups with similar risks and protect with nudges, training, and policy updates.