11 HRMCon LinkedIn Promo-3

HRMCon 2024 brought together over 1000 registrants with:

  • 3 Keynotes
  • 4 Tracks & 16 Breakout Sessions
  • 22 Speakers

Fill out one form to access all the recordings from this event. 

HRMCon Schedule Outline

 

26
25
24
27
23
HRMCon Registration Page Banner
testimonial bg testimonial mobile bg

The Future Is Now: Introducing Human Risk Management. This is not just a name change. It is a significant change of mindset, strategy, process, and technology about how we approach an old problem in a new world.

Jinan Budge

forrester-RGB-white_logo
# mobile

Maria Long

Munich Re Specialty Insurance | Vice President, Cyber Underwriter & Risk Management Portfolio Leader

The State of Human Risk Quantification

It’s undeniable that the vast majority of cyber events can be attributed to human error. From falling victim to a phishing attack to misconfiguration of security controls, humans have the power to be the weakest link or the strongest asset when it comes to avoiding a cyber-attack. So how does the cyber insurance market quantify human susceptibility when evaluating an insured? In this session, an expert panel of cyber insurance risk managers and advocates discuss the status quo of human risk quantification, and how we hope to evolve evaluation of this risk facet.

Maria Long

About Maria

Maria long is tenured cyber insurance risk professional and a Certified Information Privacy Manager (CIPM). In addition to underwriting cyber and technology risks, she is responsible for curating and deploying valuable risk management programs for insureds to drive cyber and privacy resilience and shape the maturity of organizations in an effort to generate loss avoidance. Maria has spearheaded numerous initiatives aimed at enhancing risk resilience and sustainable growth. Her collaborative approach and ability to foster strong partnerships have earned her recognition as a trusted advisor among clients and colleagues alike. Maria currently serves as Vice President within the Cyber and Technology E&O practice at Munich Re Specialty, and is responsible for the launch of their Reflex™ program, a complimentary cyber risk management program for cyber insureds. Beyond her professional endeavors, Maria is passionate about mentorship and empowering the next generation of risk management professionals. She actively participates in mentoring programs and industry forums, dedicating her time to nurturing talent and fostering innovation within the field.

Risk Quantification in Human Risk Management: Measuring Vulnerabilities and Mitigating Risk

Living Security Blog

Risk Quantification in Human Risk Management: Measuring Vulnerabilities and Mitigating Risk
link
The Little Dot in the Top Right Corner

Living Security Blog

The Little Dot in the Top Right Corner
link
From Pop-Ups to Panic: The Impact of Scareware on User Security

Living Security Blog

From Pop-Ups to Panic: The Impact of Scareware on User Security
link

Conference Tracks

Choose from four exciting conference tracks. 

1. Human Risk Quantification

Detect and measure human security behaviors by identifying vigilant and vulnerable members of your workforce. Use data from your existing identity and security tools to quantify human risk across the full spectrum of security risks including account compromise, data loss, malware, phishing, social engineering, and training compliance.

2. Risk-Based Policy & Training Interventions

Initiate policy and training interventions based upon human risk. Interventions should be based on best practices and provide next steps that can be taken in real-time to address risk such as nudges, reminders, microlearning modules, and policy changes (such as updating passwords).

3. Workforce Education and Enablement

Educate and enable the workforce to protect against cybersecurity risks. Empower individual employees, managers, and executives to measure progress and track vigilance across teams and departments.

4. Positive Security Culture

Build a positive security culture by empowering your workforce to actively participate in security vigilance, eliminate needless compliance activity, and incorporate intelligent capabilities that simplify security compliance.
# # # # # # # # # # # #