8:40 am - 9:00 am PT 3:40 pm - 4:00 pm UTC | In Person Opening Remarks |
9:00 am - 9:20 am PT 4:00 pm - 4:20 pm UTC | In Person Table Top Introductions For those joining us in Las Vegas, use this time to get to know your neighbor!
Show More
|
9:20 am - 10:00 am PT 4:20 pm - 5:00 pm UTC | In Person Keynote |
10:00 am - 10:20 am PT 5:00 pm - 5:20 pm UTC | In Person Break |
10:20 am - 10:55 am PT 5:20 pm - 5:55 pm UTC | In Person The Transparency Imperative: Harnessing Value from Security Incidents to Transform How We Manage Human Risk Noelle Warburton , Senior Director, Strategic Communications and Enablement , Cisco Systems In May of 2022, Cisco identified a security incident targeting corporate IT infrastructure. The events and investigation to follow revealed a series of employee behaviors that allowed a bad actor to access part of the environment. What did these behaviors have in common? How can we educate our people to understand how great an impact each micro-decision can have? How much real-world information can we share to discontinue and prevent bad behaviors? If we turned back the clock to May 2022, do employees have both the awareness and ability to stop history from repeating itself? In this session, Senior Director, Strategic Communications and Enablement Noelle Warburton and Keep Cisco Safe Program Leader Jeanne Hernandez explore how Cisco leveraged a security incident to transform its approach to security training across its global enterprise. Together you’ll examine the importance of transparency in managing human risk. How can we foster a security culture of sharing to encourage transparency around security events? By embracing honest conversations about the true cause of an incident, we allow our security teams to transparently educate our workers on how to mitigate future risks. Whether you have a workforce of 100,000 or 100, learn how your organization can harness the value of using real-life events and data to promote awareness and drive behavior change.
Show More
|
10:20 am - 10:55 am PT 5:20 pm - 5:55 pm UTC | Virtual The aftermath of a social engineering pentest. - Are we being ethically responsible? Over the years, pentesting humans by leveraging social engineering techniques have become increasingly important to many organizations. While many focus on the performance of a social engineering engagement, fewer deal with the post-engagement process. How are the results handled? How does a target feel afterward knowing they have been duped, and who is helping them in overcoming adversarial feelings in the wake of a test? A social engineering pentest puts humans, and not systems as seen in technical pentests, to the test. By doing so, the people affected can feel they have failed as humans and not just failed professionally. Distress, psychological strain, and self-blame are just some of the factors that can affect a human not being treated correctly in the aftermath of a pentest. When are we doing it right, and when are we doing it wrong? Is there a right or wrong way? This presentation seeks to highlight the possible pitfalls in handling the aftermath of social engineering engagements and explores various challenges and proposed solutions to problems that may arise for companies both conducting the tests and those that orders them.
Show More
|
11:00 am - 11:35 am PT 6:00 pm - 6:35 pm UTC | In Person Phishing for insights not passwords! Cathy Click, National and Global Campaigns for FedEx information security You have a well-run phishing program with scheduled simulations that keep your users informed and tested. You provide regular education to keep them up to date on criminal activity, but what else can you do to reduce risk? By collecting and analyzing email filtering metrics, you can develop a more effective phishing program that helps you identify and address areas that need improvement, ultimately reducing your risk of compromise. Conducting targeted phishing simulations and measuring their effectiveness are also critical steps in minimizing the risk of phishing attacks. During this presentation, you'll learn about three effective methods for staying ahead of criminal activities. Cathy will share examples of how email filtering metrics can be utilized to provide valuable insights, including near real-time feedback to users, a comprehensive overview of determining high-risk areas, and identification of ongoing malicious campaigns. Using email filtering metrics to inform your phishing program, you can create a more effective and targeted training program that helps your users become more aware of the dangers of phishing attacks and how to avoid them. Carrier launched its Security Awareness program in March 2021, following its split from UTC. We were challenged to build an industry-leading Security Awareness program for a global remote audience amid the Covid-19 pandemic. In February 2023, the Security Awareness team had a recruit – an associate from Carrier’s Digital Technology Leadership Program (DTLP), who would do an 8-month rotation in Security Awareness. To challenge her, we encouraged her to come up with a strategy to achieve our 2023 goal of getting 1,000 cyber champions (we call them the Enterprise Defenders) in just 10 business days. Between Feb 28 and Mar. This session outlines how she achieved this. The audience will get actionable takeaways and tips that include: - The advantage of using someone without experience, like an intern
- Timing the campaign. We coincided it with International Women’s Day
- How to win over your audience. Our DTLP came up with a CyberSHEurity
- Empowering Women inCybersecurity campaign.
- How to use common tools like Microsoft to run the campaign.
- How to get leadership support
Show More
|
11:00 am - 11:35 am PT 6:00 pm - 6:35 pm UTC | Virtual Trolls In a Basement: When Security Awareness and Customer Service Collide Have you ever been trapped in customer service hell? We’ve all been there: unhelpful chatbots, emails sent into a black hole, or hours spent on hold, listening to Muzak and yearning to talk to a human being? Hellish service experiences are almost universally frustrating and can drive customers away for good. So why do we ignore employee experience in security awareness programs? What happens to a company’s security culture when an employee’s requests for help feel like a shout into the void? In this session, we’ll explore the nexus of security teams and how internal communication can help (or hinder) organizations’ security culture and awareness efforts, including: - Shaping the Security team’s “voice” and “anchor” in your organization
- The effects of user experience on security reporting and attitude
- Building trust between the Security team and wider workforce
- Separating external security perception from internal divisions
- Leveraging the power of recognition
- Practical tips for designing effective intake, triage, and response protocols
Show More
|
11:40 am - 12:15 pm PT 6:40 pm - 7:15 pm UTC | In Person Conversational Security Awareness: Putting Humanity into Your Human Risk Management Program Security teams are beginning to appreciate the importance of building a strong human defense layer. As a result, most organizations have adopted some form of security awareness, behavior, and culture program. But there is a complication: in building these people-focused programs, security teams often forget that people are, by nature, relational beings. This impacts everything, from executive support to the trust (or apprehension) employees associate with your security team.
In this session, Perry and Jess will provide practical guidance for understanding, managing, and maturing your program to best foster a positive relationship and culture. This includes establishing the best voice/tone for communications and finding relevant narratives and programmatic elements for your initiatives.
Show More
|
11:40 am - 12:15 pm PT 6:40 pm - 7:15 pm UTC | Virtual SecOps: The missing link in Security Awareness Programs Security Awareness Programs are an essential component of any organization's security strategy. However, many organizations struggle to get the desired results from these programs. In this talk, I will discuss how Security Operations (SecOps) teams can add value to Security Awareness Programs and make them more effective. Introduction The Role of SecOps in Security Awareness Programs - SecOps as a bridge between Security and Operations teams
- SecOps' unique perspective on security risks and threats
- SecOps' expertise in identifying security weaknesses and vulnerabilities
III. How SecOps can add value to Security Awareness Programs Recap of key points Attendees will learn how SecOps teams can play a vital role in making Security Awareness Programs more effective and will understand the unique perspective and expertise that SecOps teams bring to the table.
Show More
|
12:20 pm - 1:30 pm PT 7:20 pm - 8:30 pm UTC | In Person Lunch |
1:30 pm - 2:05 pm PT 8:30 pm - 9:05 pm UTC | In Person Instructions Not Included: Technical Communicators Rewrite How Security Speaks Cyber Have you ever purchased a product and the manufacturer didn’t include your language’s version of the instruction manual? You get frustrated trying to understand it, only to toss it aside saying it’s someone else’s responsibility. That’s usually how most employees feel when their company communicates cybersecurity initiatives and security awareness strategies to them.
Although cybersecurity professionals are technically skilled individuals, they tend to have difficulty translating their knowledge to the typical end user. And to truly capture business understanding and acceptance of security initiatives, we need to move past telling end users the ‘what’ of security and educating them on the ‘why.’This presentation will show audiences how Parsons took the new cybersecurity role of the Business Information Security Officer (BISO) and created four distinctive groups of security professionals (creating an entire ‘office’ of advisors) that focus on each business group’s unique goals, methods, and workstreams to connect business and cybersecurity.
Then, we’ll dig deeper into our security awareness, communications, and education strategy by explaining BISO Outreach: cybersecurity professionals, specialized in technical communication, who translate cyber to the non-cyber employee. We’ll explain why there is a current industry need for this type of non-traditional cybersecurity role and break down how we used their special skill sets of data visualization and storytelling in presentations, reports, learning modules, and other security awareness projects to capture our audiences’ attention, moving them to act.We’ll prove our success by sharing our security awareness engagement statistics, milestones, and our goals moving forward. To encourage other cybersecurity teams to invest in non-traditional roles, we’ll introduce different technical communicator roles and how they can enhance your security awareness program.
Show More
|
1:30 pm - 2:05 pm PT 8:30 pm - 9:05 pm UTC | Virtual Behavior change in action - use cases from a global organization Tim Ward, CEO & Co-founder,, Think Cyber Security Ltd Enough talk about the theory of security behaviour change... this talk explores what it can look like in action! James van den Bergh from DLA Piper and Tim Ward from ThinkCyber explore three specific use cases where behaviour change interventions can be used to reduce organisational risk in a global organisation. This joint talk features James van den Bergh Head of Security Awareness at DLA Piper and Tim Ward CEO, ThinkCyber. James and Tim will explore three quite specific case studies in the lifecycle of an employee where risk profiles and the way to tackle those differ. They will do this through the lens of behavioural science and with a focus on offering actionable take aways that can be applied in organisations large and small. Firstly induction, how can we harness the “fresh start effect” where people join wanting to be their best self. How do we understand employee risk profiles at this point and then target specific behaviours to embed good habits. Secondly James will explore the idea of offering “stabilisers” to staff encountering greater risk in their role, or who are showing riskier behaviours than the norm. How can we understand, support and guide these individuals to reduce our organisational risk profile? Finally James will touch on leavers, who have the potential to represent data loss risks for an organisation, whether unthinking or malicious. How can we gently reinforce expected behaviours at this point in an employee’s lifecycle? Throughout this exploration Tim will talk to the behavioural science behind effective delivery of these interventions. From nudge theory (BJ Fogg, EAST) to playing to cognitive biases such as availability, priming social proof. James will highlight real-world context and examples of theories in action. Attendees will take away an understanding of: - How awareness can be targeted to different stages in an employees lifecycle with an organisation
- the importance of understanding your awareness audience to effectively target and embed secure behaviours
- Why and How content can be tailored to different employee needs be they culture, risk profile or other demographics
- How to apply behaviour change models and an understanding of cognitive biases to various security awareness challenges including phishing, data handling and general cyber hygiene.
Show More
|
2:10 pm - 2:45 pm PT 9:10 pm - 9:45 pm UTC | In Person How We Achieved Our 2023 Goal of 1,000 New Cyber Champions in Just 10 days! Dennis Legori, Associate Director - Security Awareness & Digital Communications, Carrier Carrier launched its Security Awareness program in March 2021, following its split from UTC. We faced the challenge of building an industry-leading Security Awareness program for a global remote audience amid the Covid-19 pandemic. In February 2023, we had a new recruit, Jeleasa Grayned, an associate from Carrier’s Digital Technology Leadership Program (DTLP), who joined our Security Awareness team for an 8-month rotation. To challenge her, we encouraged Jeleasa to come up with a strategy to achieve our 2023 goal of getting 1,000 new cyber champions (whom we call Enterprise Defenders) in just 10 business days. Between Feb 28 and Mar 13, Jeleasa worked with our internal teams and recruited 1,080 new Enterprise Defenders! At the time of writing, we have 4,773 Enterprise Defenders from over 100 countries and are on track to achieve our 2024 goal of 5,000 Defenders by June 2023! In this session, we will share how we achieved our goal and provide actionable takeaways and tips, including: - The advantage of using someone without experience, like an intern, to bring fresh perspectives and creative ideas
- Timing your campaign strategically. We coincided ours with International Women’s Day
- How to win over your audience. Our DTLP, Jeleasa, came up with aCyberSHEcurity – Empowering Women in Cybersecuritycampaign
- How to use common tools like Microsoft to run your campaign effectively
- How to get leadership support for your initiatives
- Tips for building a strong cyber culture in your organization.
Show More
|
2:10 pm - 2:45 pm PT 9:10 pm - 9:45 pm UTC | Virtual Hack and Play Your Way To Information Security Awareness For many organizations, Cybersecurity Awareness Month is an excellent opportunity to shine every October. At PepsiCo, our 2022 event was a new beginning for our education program, increasing employee engagement with cybersecurity topics. We knew our global workforce needed to understand current threats and where to find educational materials. After defining the objective and coordinating with our Incident Response team on which threats to highlight, we looked for an alternate way to demonstrate that good cybersecurity habits are vital to being more secure at home and at work. Something immersive and attractive was needed. After many brainstorming sessions, we landed on creating a game for Cybersecurity Awareness Month that connected all our activities -- phishing simulations, educational articles, our Security Advocacy program, and our Information Security portal – but we still needed a unique branding element to tie it all together. And that is how the character Hacker Harry was born. We introduced the game concept along with Hacker Harry in September, leading into Cybersecurity Awareness Month. In this presentation, you will see that educating a global organization is challenging, especially when employees are swamped with messages from many different locations. By catching people’s attention with a fun and engaging character, we raised awareness about the most common threats they are exposed to every day. We didn't want an overwhelming amount of information, so we concentrated on phishing and emphasized reporting any suspicious email using the Report Phish button. Overall, PepsiCo’s Cybersecurity Awareness Month program was effective and very well received and led to better outcomes throughout our awareness and training initiatives. Come meet Hacker Harry to see how you can create more impact in your Cybersecurity Awareness and Training program and get people to see your messages.
Show More
|
2:50 pm - 3:10 pm PT 9:50 pm - 10:10 pm UTC | In Person Break |
3:10 pm - 3:45 pm PT 10:10 pm - 10:45 pm UTC | In Person Laying the groundwork for impactful role-based cyber training & awareness Bring your HRM program to the next level by identifying your organization’s role-based cybersecurity risks and training needs through the creation of Personas. Personas are tools that provide a deeper understanding of who the audience is, their behaviors, their learning styles, how security is embedded into their day to day, and how they feel about security and the risks they face. Personas serve as the foundation to developing meaningful, tailored, role-based training and awareness content in a way that engages learners with applicable topics and improves overall security behaviors. This presentation will walk you through ways to map your enterprise into various personas, as well as how to engage with persona group members through surveys and focus groups. We’ll also discuss how to analyze and act on the data you collect to create impactful learning content focused on cyber risks.
Show More
|
3:10 pm - 3:45 pm PT 10:10 pm - 10:45 pm UTC | Virtual Combining ChatGPT and Fogg Behaviour Model to Design Your Program Building a security-conscious culture within an organization is no small feat. In this talk, we explore a powerful approach to reshape your human risk management program. By combining the capabilities of ChatGPT with proven behavior change frameworks such as the Fogg Behavior Model (FBM), organizations can create tailored interventions to motivate employees towards adopting secure practices like password managers and multi-factor authentication. Learn how this innovative approach can bolster your human risk management program and foster a culture of security awareness among employees, ultimately strengthening your organizational security posture.
Show More
|
3:50 pm - 4:25 pm PT 10:50 pm - 11:25 pm UTC | In Person Elevate Your Security Awareness Program: Harnessing the Power of Mindfulness Are your users distracted and clicking on phishing emails, despite all the efforts and dedication of your Security Awareness program? Are you wondering what the next level is for your Security Awareness program? Are you longing to make a significant and meaningful impact in your organization?
Mindfulness is becoming a cultural phenomenon tool that is helping organizations to transform. Renowned companies are adopting and incorporating wellbeing practices into their daily operations, and positively impacting their bottom line. In contrast to mindfulness, living in autopilot, being distracted, stressed, and overwhelmed are common challenges we face. If your workforce is distracted while they interact with technology, dealing with computers, devices, and data, your company could easily become the next cybercrime victim.In this session, you'll learn: - The step-by-step method to integrate mindfulness into your security awareness program.
- A powerful tool that can help you and your users to be safe and secure online.
- The I AM framework, which can help your users instantly get out of autopilot!
- And so much more! Attend this session so you can start integrating mindfulness into your Security Awareness Program and making a difference in the productivity and wellbeing of your employees.
Show More
|
3:50 pm - 4:25 pm PT 10:50 pm - 11:25 pm UTC | Virtual The Future Of Security Awareness & Training (hint - it isn't about awareness, or training) - How To Disrupt The Status Quo Security remains plagued with the legacy of compliance-driven, security awareness & training tools and methods. As more transformational security and tech leaders and vendors realize the importance of the human element, and the ineffectiveness of those, we will start to move towards behavior and culture change. In the medium term, this will be driven by evidence based human-risk management. In the long term, rebels and creators will demand the shaping of regulations, elevate the value and role of human-centric security and change the game to focus on the outcomes of training, rather than methods. Join us to: - get a view of future of security awareness & training;
- understand where to invest your human risk management resources; and
- be inspired on how to disrupt the status quo to reach actual outcomes of behavior & culture change.
Show More
|
4:30 pm - 4:45 pm PT 11:30 pm - 11:45 pm UTC | In Person Wrap-Up |