Holistically Mitigating Human Vulnerabilities and Attacks

Posted on in Presentations

Most data breaches result from user failings. The response is to implement awareness, but alone it is unsuccessful. In this lab, attendees will work through common attacks targeting people; identify an appropriate combination of technology, process and awareness; and prepare their organizations to effectively mitigate human vulnerabilities with a combination of technology, process and awareness.

Learning Objectives:
1: Identify root enablers of attacks targeting people.
2: Identify technologies and processes that can mitigate attacks.
3: Determine the best balance of countermeasures to optimally mitigate attacks.
Dr. Tracy Celaya Brown


Sr. Manager, Global Programs, Iron Mountain Data Centers

Alexandra Panaretos


National Practice Lead for Security Awareness and Training, EY

Ira Winkler


CISO, CYE Security

Hackers & Threats

security operations security consulting security awareness access control



Share With Your Community