InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Human Firewall: Building Resilience Against Cyber Deception

Presented by

Alex Holden, CISSP, Chief Information Security Officer | Hold Security, LLC

About this talk

Technology will remain one of our biggest security weaknesses; however, today most cyberattacks have a social engineering component, where threat actors target people as the most vulnerable part of the system. As cybersecurity professionals, we are tasked with training our personnel to avoid both simple and complex mistakes while still doing their jobs, delivering good customer experiences, and keeping business running. In recent years, threat actors have dissected business processes to find hidden vulnerabilities, leveraged AI to craft highly realistic scams, exploited employee trust, and even infiltrated corporate ranks from within. This talk will explore the latest techniques for detecting and preventing breaches at the human level, highlight practical approaches to security training, and discuss how we must adapt our business practices to operate under the constant assault on our social systems and trust, well beyond the realm of technology. Takeaways: - Technology isn’t the weakest link, people are. - Training must be practical, not theoretical. - Threat actors evolve, so should we. - Security is a business function, not just IT.
Information Security

Information Security

259124 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics