Each year, HRMCon brings together cybersecurity thought leaders and practitioners to present a half-day virtual conference geared toward continuously evolving the power of behavior change in mitigating risks.
“[Human Risk Management Conference] is an invaluable oportuntiy to learn from peers, discover best practices, and gain insights that will shape the success of [your] security programs.” - Ashley Rose | CEO, Living Security
Dive into insightful sessions presented by industry professionals, including a keynote presentation by Jinan Budge of Forrester.
Breakout Tracks |
|||
Human RiskQuantification |
Risk-BasedPolicy & Training Interventions |
Workforce Educationand Enablement |
PositiveSecurity Culture |
Quantifying Behaviors to Mitigate Human Risk in HRMChris Poirel, Living Security |
Targeting Awareness of Cyber Threats with Risk-Based Policies & Training InterventionsDavid Tunley, Rivian |
Hook, Line, and SinkerAaron Strong, Syniverse |
Building a Robust Security CultureTerry Smith, Blackbaud |
|
|||
Human Risk Management 2.0Jon Brickey, Mastercard |
Empowring Your Human Firewall: Orchestration for Cyber Resilience and TrainingSandy Evancs, Living Security |
How to Deepen Your Career in Security AwarenessCassie Clark, Consultant |
HRM's Role Cultivating a Positive Security Culture for your OrganizationShawnee Delaney, Vaillance Group |
|
|||
The State of Human Risk QuantificationMaria Long, Violet Sullivan & Julian Sylvestro |
MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization SynergyAllen Ohanian, LA County |
Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous ImprovementErik Book, Living Security |
Borrowing Brilliance: What Security Awareness and Training Should Steal from MarketingMike Taylor, Nationwide |
Connecting Emerging Threat Intel to Human Risk QuantificationJosh Bartolomie, Cofense |
Evolving from Annual Security Compliance Training to Risk-Based Policy and TrainingMichele Kim, Fitch Ratings |
Using Human Risk Management to Drive Behavioral ChangeBrandy Harris, CyberEd |
Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure FutureNick Marchiselli, Living Security |
TrustedSec | Founder and CEO TrustedSec
Hackers are using the rapid advancements on multiple fronts including AI to produce numerous types of sophisticated attack. This includes voice cloning and advancements in capabilities around ransomware attacks. During this keynote hear war stories and discoveries of these advanced attacks. We’ll dive into how can businesses prepare for these advanced scams and attacks.
David is a subject matter expert in cybersecurity with over 19 years of experience, whose career has ranged from a Chief Security Officer (CSO) for a Fortune 1000 company, to testifying in front of Congress, and guest appearances on hundreds of national news and syndicated TV shows. With a mission of continuing to drive the cybersecurity industry forward and to make the world a better place, David has started several large-scale and successful cybersecurity businesses with employees all over the world.
Living Security Blog
Autonomous AI is here. Explore how Living Security is evolving HRM to secure a blended workforce of humans and AI agents—before risks scale out of control.
Jinan Budge
Jinan Budge