Life of: A Cybersecurity Behavior Expert

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

As part of Infosecurity’s ‘Life of...’ series, this webinar will look at the role of consultants who specialise in social engineering and human behaviour as it relates to cybersecurity.
The social engineer is often a highly-skilled, highly-motivated adversary. As people and their working environment become more connected, hacking the human rather than the network is often the most effective route for an adversary. As any information security professional knows, the human is the weakest link in any defense strategy and consequently it is essential to understand how social engineers manipulate individuals and exploit security weaknesses.

Cybersecurity behavior experts are able to analyze and detect human behaviors and advise organizations and individuals how not to get stung by the social engineers. 
In this roundtable webinar, we will bring together some leading experts to discuss this topic and talk about what it’s like to be a cybersecurity behaviour expert or social engineering consultant.

This session will include: 

  • What skills and training are needed to be a successful behaviour expert 
  • The main challenges of a social engineering consultant
  • How to defend organizations and users from social engineering
  • Understanding the policies, procedures and technologies that need to be in place to address the social engineering threat
  • Advice on how users can be educated to protect themselves against behaviour-based attacks


Jessica  Barker

Cyber Security Consultant, Co-Founder, Co-CEO, Cygenta

Sharon Conheady

Director of First Defence Information Security and a founding member of The Risk Avengers

    Michael Santarcangelo

    Founder, Security Catalyst

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.