Each year, HRMCon brings together cybersecurity thought leaders and practitioners to present a half-day virtual conference geared toward continuously evolving the power of behavior change in mitigating risks.
Security is often called “everyone’s responsibility,” but it rarely factors into how performance is measured or managed.
In this session, experts from Living Security will explore how human risk scorecards—for both individuals and managers—bring security into everyday performance conversations.
You’ll learn how to:
A Sneak Peek into Living Security's Scorecards:
Breakout Tracks |
|||
Human RiskQuantification |
Risk-BasedPolicy & Training Interventions |
Workforce Educationand Enablement |
PositiveSecurity Culture |
Quantifying Behaviors to Mitigate Human Risk in HRMChris Poirel, Living Security |
Targeting Awareness of Cyber Threats with Risk-Based Policies & Training InterventionsDavid Tunley, Rivian |
Hook, Line, and SinkerAaron Strong, Syniverse |
Building a Robust Security CultureTerry Smith, Blackbaud |
|
|||
Human Risk Management 2.0Jon Brickey, Mastercard |
Empowring Your Human Firewall: Orchestration for Cyber Resilience and TrainingSandy Evancs, Living Security |
How to Deepen Your Career in Security AwarenessCassie Clark, Consultant |
HRM's Role Cultivating a Positive Security Culture for your OrganizationShawnee Delaney, Vaillance Group |
|
|||
The State of Human Risk QuantificationMaria Long, Violet Sullivan & Julian Sylvestro |
MindSecure: Elevating Cyber Resilience through Cyberpsychology and Organization SynergyAllen Ohanian, LA County |
Own Your Security Journey: Empower All Levels to Track Human Risk & Drive Continuous ImprovementErik Book, Living Security |
Borrowing Brilliance: What Security Awareness and Training Should Steal from MarketingMike Taylor, Nationwide |
Connecting Emerging Threat Intel to Human Risk QuantificationJosh Bartolomie, Cofense |
Evolving from Annual Security Compliance Training to Risk-Based Policy and TrainingMichele Kim, Fitch Ratings |
Using Human Risk Management to Drive Behavioral ChangeBrandy Harris, CyberEd |
Scorecards & Vigilance: Unleashing the Power of Your Workforce for a More Secure FutureNick Marchiselli, Living Security |
TrustedSec | Founder and CEO TrustedSec
Hackers are using the rapid advancements on multiple fronts including AI to produce numerous types of sophisticated attack. This includes voice cloning and advancements in capabilities around ransomware attacks. During this keynote hear war stories and discoveries of these advanced attacks. We’ll dive into how can businesses prepare for these advanced scams and attacks.
David is a subject matter expert in cybersecurity with over 19 years of experience, whose career has ranged from a Chief Security Officer (CSO) for a Fortune 1000 company, to testifying in front of Congress, and guest appearances on hundreds of national news and syndicated TV shows. With a mission of continuing to drive the cybersecurity industry forward and to make the world a better place, David has started several large-scale and successful cybersecurity businesses with employees all over the world.
Living Security Blog
Wall Street Journal says phishing training doesn’t work. We explain why it is just the first step — and how Human Risk Management cuts risky users by half.
Jinan Budge
Jinan Budge