Session

"Why Do Cybersecurity Breaches Persist Despite Billions Invested in Tech and Awareness Training?

Here’s one way to counter it.

In this one-hour talk, we will explore essential strategies for creating a robust human firewall within your organization. A human firewall is the frontline defence against cybersecurity threats by empowering all employees to recognize and respond to risks effectively. This session will cover:

1. A Mismatch of the Battle Ground.

o Hackers are conducting psychological warfare. Organizations are defending with technology. We leave one half of the battle ground undefended!

o 3 weaknesses of an employee exploited time and again by hackers:
• Knowledge Risks
• Psychological Risks
• Behavioural Risks

o How hackers use the simple Cialdini’s weapons of persuasion (knowingly or by practice) in getting the better of employees:
• Reciprocity, Commitment/Consistency, Social Proof, Liking, Authority, Scarcity.

o 80% of hacks are on humans not machines. Because it’s easier, faster and cheaper. Why and how HR should shoulder as much responsibility in cybersecurity.

2. Pragmatic Steps to Building a Human Firewall:

o Role of the CEO, CHRO, CIO: The culture must exist to allow a human firewall to happen. How to create one.

o Making Every Employee A Cybersecurity Vigilante: Giving them a practical tool (an IOC dashboard), and the knowhow to monitor and triage concerns (Actual implementation to be shown)

o Knowledge Training: Effective methods for raising knowledge over awareness by providing immersive workshops on their role in the human firewall.

o Engagement Techniques: Democratising of cybersecurity vigilance to the general employee. It has to pass the toothbrush test.

o Behavioural Change: How to achieve behavioural change through empowerment of each employee.

o Policy Adherence: Ensuring consistent compliance with security policies and protocols.

3. Psychology of Employee Mindset:

o Understanding Mindset: “IT has us covered!” Insights into how employees perceive cybersecurity threats.

o Coping Mechanisms: Identifying outlier emotional modalities (too unhappy, too optimistic, too fatigued, too energised) of employees at work and incorporating this risk into cybersecurity vigilance.

o Personality Traits: Leveraging personality traits to enhance security awareness and behaviour. How strengths and weaknesses are equally exploitable.

o Tailored Approaches: Customizing training and communication based on different personality types and coping styles.

4. Lessons Learned from the Field:

o Common pitfalls and challenges organizations face in building a human firewall.

o Real-life case studies showcasing successful and unsuccessful attempts.

o Practical tips and best practices derived from hands-on experience.

5. Interactive Q&A Session:

o Engaging the audience with questions and scenarios to apply the discussed concepts.

o Addressing specific concerns and providing tailored advice.

By the end of this talk, attendees will have a clear, actionable roadmap to enhance their organization's cybersecurity posture through a strong human firewall. They will gain insights and lessons from real-world applications and an understanding of the psychological factors that influence employee behaviour in the context of cybersecurity. This talk is specifically tailored for users of Microsoft 365, providing relevant and practical tips for integrating these strategies within the Microsoft ecosystem.

Specifically for users of Mocrosoft 365.

David Lo

Fortifying Employees Against Hackers

Kuala Lumpur, Malaysia

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top