Each year, HRMCon brings together cybersecurity thought leaders and practitioners to present a half-day virtual conference geared toward continuously evolving the power of behavior change in mitigating risks.
HRM HRM Con on Demand
Dive into the insights and discussions from HRMCon.
Each year Human Risk Management Conference brings together cybersecurity risk management thought leaders and practitioners to present a virtual conference geared towards continuously evolving the power of behavior change in mitigating human risks.
Breakout Tracks |
|||
Human RiskQuantification |
Risk-BasedPolicy & Training Interventions |
Workforce Educationand Enablement |
PositiveSecurity Culture |
Quantifying Behaviors to Mitigate Human Risk in HRMChris Poirel, Living Security |
Targeting Awareness of Cyber Threats with Risk-Based Policies & Training InterventionsDavid Tunley, Rivian |
Hook, Line, and SinkerAaron Strong, Syniverse |
Building a Robust Security CultureTerry Smith, Blackbaud |
|
|||
Human Risk Management 2.0Jon Brickey, Mastercard |
Empowring Your Human Firewall: Orchestration for Cyber Resilience and TrainingSandy Evancs, Living Security |
How to Deepen Your Career in Security AwarenessCassie Clark, Consultant |
HRM's Role Cultivating a Positive Security Culture for your OrganizationShawnee Delaney, Vaillance Group |
|
|||
The State of Human Risk QuantificationMaria Long, Violet Sullivan & Julian Sylvestro |
MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization SynergyAllen Ohanian, LA County |
Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous ImprovementErik Book, Living Security |
Borrowing Brilliance: What Security Awareness and Training Should Steal from MarketingMike Taylor, Nationwide |
Connecting Emerging Threat Intel to Human Risk QuantificationJosh Bartolomie, Cofense |
Evolving from Annual Security Compliance Training to Risk-Based Policy and TrainingMichele Kim, Fitch Ratings |
Using Human Risk Management to Drive Behavioral ChangeBrandy Harris, CyberEd |
Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure FutureNick Marchiselli, Living Security |
Munich Re Specialty Insurance | Vice President, Cyber Underwriter & Risk Management Portfolio Leader
It’s undeniable that the vast majority of cyber events can be attributed to human error. From falling victim to a phishing attack to misconfiguration of security controls, humans have the power to be the weakest link or the strongest asset when it comes to avoiding a cyber-attack. So how does the cyber insurance market quantify human susceptibility when evaluating an insured? In this session, an expert panel of cyber insurance risk managers and advocates discuss the status quo of human risk quantification, and how we hope to evolve evaluation of this risk facet.
Maria long is tenured cyber insurance risk professional and a Certified Information Privacy Manager (CIPM). In addition to underwriting cyber and technology risks, she is responsible for curating and deploying valuable risk management programs for insureds to drive cyber and privacy resilience and shape the maturity of organizations in an effort to generate loss avoidance. Maria has spearheaded numerous initiatives aimed at enhancing risk resilience and sustainable growth. Her collaborative approach and ability to foster strong partnerships have earned her recognition as a trusted advisor among clients and colleagues alike. Maria currently serves as Vice President within the Cyber and Technology E&O practice at Munich Re Specialty, and is responsible for the launch of their Reflex™ program, a complimentary cyber risk management program for cyber insureds. Beyond her professional endeavors, Maria is passionate about mentorship and empowering the next generation of risk management professionals. She actively participates in mentoring programs and industry forums, dedicating her time to nurturing talent and fostering innovation within the field.
Living Security Blog
Protect your organization by tracking security behaviors before breaches happen. Explore how Living Security measures and mitigates insider risks with actionable insights.
Jinan Budge
Jess Burn, principal analyst at Forrester specializing in incident response, crisis management, and email security, presents The Future is Now: Introducing Human Risk Management. This session examines the major expected changes in SA&T as the cybersecurity risk management industry transitions to an approach that centers on behavior, prioritizing positively influencing behavior and instilling a security culture within organizations.
WATCH SESSIONDecorated independent investigative reporter, Brian Krebs, joins Living Security CEO, Ashley Rose, for a Fireside Chat: What Breaches Teach Us. From data spills, breaches and thefts, to breach fatigue, apathy and cynicism, this discussion will examine some of the more alarming trends in cybercrime, and offer perspectives on how businesses can up their cybersecurity risk management game in response.
WATCH SESSIONDetect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.
Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes.
Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.
Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.
Jinan Budge
A monthly series bringing together the industry's top experts focusing on a variety of cybersecurity and human risk management topics.
Living Security’s experts assess your organizations readiness to transition to comprehensive human risk management.
See how your organization can easily identify groups with similar risks and protect with nudges, training, and policy updates.