InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Managing the most vulnerable element in our cyber security strategy

Presented by

Kojo Degraft Donkor, Cisco Systems - Technology Transformation Group (TTG) CX America & Charles Boateng, AmeriHealth Caritas

About this talk

With a greater number of organizational activities relying on technology, the focus on how to protect the use of technology is primal for all organizations. Institutions are right to focus on external threat actors to safeguard their assets. But more importantly, it is imperative that the internal structures of organizations are tuned into the strategies used to protect their activities and assets. An overwhelming majority of cyber breaches are as a result of human actions within the organization. That is a fact. Conventional defenses are bound to fail due to the human element in the process of securing organizational infrastructure. Human behavior is only predictable to some extent. A recent report by Cyberchology notes that 80% of companies see an increased cybersecurity risk resulting from the human factor as a major challenge during the COVID-19 pandemic. The Human Factor, therefore cannot be ignored as we formulate strategies to secure organizational infrastructure. In this presentation, we will attempt to cover the following questions: • What is “The Human Factor?” • By the Numbers – Why should we worry about this Factor • Strategies to mitigate the Human Challenges • Case Studies
Information Security

Information Security

259763 subscribers736 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics