Greg Silberman: Risk And Privacy… Can You Choose One?
Matthew Stephenson interviews Greg Silberman to delve into the world of risk and privacy and discuss whether it’s possible to choose one over the other.
Brian Proctor: Keeping The People Cool, Warm And Secure
Brian Proctor, the Director of Energy Solutions at Finite State, discusses cyber threats in the utility sector and keeping people cool, warm, and secure.
Kip Boyle: People Make the Cybersecurity World Go Around
Kip Boyle presents actionable tips and approaches for bridging the communication chasm among the people and teams within the cybersecurity space.
Theresa Payton: Security And Privacy In The World Of Insider Threats With Theresa Payton
Theresa Payton, the co-author of Privacy in the Age of Big Data, delves into security and privacy in the world of insider threats.
Tim Callahan: Is Any Fire Friendly?
Tim Callahan, the Global CISO at Aflac, dives deep into friendly fires within the cybersecurity space and how he is preventing and responding to those threats.
Insight Global: The Human-Centric Side Of Security With Jonathan Waldrop
Jonathan Waldrop, the Senior Director at Insight Global, shares how the company leverages the human element when it comes to security and dealing with threats.
Kai Roer – Awareness… Culture… Behavior… OH MY!
Kai Roer, the Author of Build a Security Culture, shares her insight into the importance and impact of security culture.
Ira Winkler: Stop Relying On The Human Firewall
Data security needs more than relying on user awareness. Ira Winkler balances criticism and promotion of security awareness to bring about effective change in data security models.
Chad Skipper: The landscape looks partly cloudy with major chances of breaches.
Protect your network from internal threats with measures discussed by Chad Skipper. Learn about cybercrime in digital transformation and multi-cloud and get tips on protecting systems before a breach.
Tim Brown: Lessons Learned When Crisis Strikes
When a cybersecurity breach happens, expect things to go crazy. Tune in and learn from Tim Brown, VP of Security & CISO at SolarWinds, on what to do when a crisis strikes your precious data.
"Our Dynamic Cyber Trust solution leverages the Elevate Security platform to create a uniquely scalable approach that holistically targets one of cybersecurity’s root causes of failure – people."
Executive Vice President, Chief Technology Officer Global Commercial Business, Booz Allen Hamilton
"User risk management remains a key area of cyber risk for ransomware, phishing, and lateral attacker movement. By having additional visibility into high-risk users and employees, enterprises can implement another dimension of security controls and tailored security training."
Vice President, Corporate Development and Investments, Cisco
"Adding human risk to our security calculus eliminates implicit trust, continuously validates digital interactions, and provides transparent and measurable feedback to reduce security gaps over time."
Vice President, Cyber Strategy Solutions, Booz Allen Hamilton
"Risk is not uniformly distributed among organizations, that much is clear from the results of our research. In fact, some users represent orders of magnitude more risk than others."
Cyentia Institute Partner and Data Scientist
"By joining forces with Elevate Security, we can bring best-of-breed security awareness and cyber risk monitoring to the market. This is critical for organizations needing to protect sensitive data, strengthen information security, and reduce the human risk associated with cyber attacks and data breaches."
President of Fortra
"A one-size-fits-all approach to securing user access will not guard against threat actors skilled at targeting people susceptible to engagement with deceptive online interactions or prone to poor judgment computing behaviors."
Founder and CEO of TAG Cyber