Holistically Mitigating Human Vulnerabilities and Attacks

Posted on in Presentations

Most data breaches result from user failings. The response is to implement awareness, but alone it is unsuccessful. In this lab, attendees will work through common attacks targeting people; identify an appropriate combination of technology, process and awareness; and prepare their organizations to effectively mitigate human vulnerabilities with a combination of technology, process and awareness.

Learning Objectives:
1: Identify root enablers of attacks targeting people.
2: Identify technologies and processes that can mitigate attacks.
3: Determine the best balance of countermeasures to optimally mitigate attacks.

Tracy Celaya Brown


President, Go Consulting International

Ira Winkler


CISO, Skyline Technology Solutions

Hackers & Threats

security operations security consulting security awareness access control



Share With Your Community