Life of: A Cybersecurity Behavior Expert

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

As part of Infosecurity’s ‘Life of...’ series, this webinar will look at the role of consultants who specialise in social engineering and human behaviour as it relates to cybersecurity.
The social engineer is often a highly-skilled, highly-motivated adversary. As people and their working environment become more connected, hacking the human rather than the network is often the most effective route for an adversary. As any information security professional knows, the human is the weakest link in any defense strategy and consequently it is essential to understand how social engineers manipulate individuals and exploit security weaknesses.

Cybersecurity behavior experts are able to analyze and detect human behaviors and advise organizations and individuals how not to get stung by the social engineers. 
In this roundtable webinar, we will bring together some leading experts to discuss this topic and talk about what it’s like to be a cybersecurity behaviour expert or social engineering consultant.

This session will include: 

  • What skills and training are needed to be a successful behaviour expert 
  • The main challenges of a social engineering consultant
  • How to defend organizations and users from social engineering
  • Understanding the policies, procedures and technologies that need to be in place to address the social engineering threat
  • Advice on how users can be educated to protect themselves against behaviour-based attacks

Speakers

Photo of Jessica  Barker

Jessica Barker

Cyber Security Consultant, Co-Founder, Co-CEO, Cygenta

Photo of Sharon Conheady

Sharon Conheady

Director, First Defence Information Security Ltd

Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Michael Santarcangelo

Michael Santarcangelo

Founder, Security Catalyst

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Infosecurity Magazine here: https://privacy.rxglobal.com/en-gb.html. Please see Infosecurity Magazine’s privacy policy for more information.