Most data breaches result from user failings. The response is to implement awareness, but alone it is unsuccessful. In this lab, attendees will work through common attacks targeting people; identify an appropriate combination of technology, process and awareness; and prepare their organizations to effectively mitigate human vulnerabilities with a combination of technology, process and awareness.
1: Identify root enablers of attacks targeting people.
2: Identify technologies and processes that can mitigate attacks.
3: Determine the best balance of countermeasures to optimally mitigate attacks.
National Practice Lead for Security Awareness and Training, EY
President, Go Consulting International
CISO, Skyline Technology Solutions
Hackers & Threats
security operations security consulting security awareness access control
Share With Your Community