eSummit

Cybersecurity Training and Awareness

On-Demand Event

Earn up to 1.5 CPE credits by attending this virtual conference.

The need for all-hands, no-exceptions cybersecurity training and awareness is beyond dispute. But what does a successful cybersecurity training and awareness program look like today?

SC Media hosted a one-day event focused on this topic to help cybersecurity professionals design and implement the awareness and training program that’s right for their organization — its culture, counterparties, and employee community.

This interactive learning program features experts on security awareness program development and technologies who discuss the discipline’s state of the art and lead a deep dive on topics including:

  • Knowing the strengths and weaknesses of your workforce and turning them to your advantage
  • Building security into the fabric of your culture
  • Understanding the threat of business email compromise and why it persists

To gain knowledge and perspective that will help you build cybersecurity buy-in from your company’s entry level to its C-suite, register now for this on-demand program.

FEATURED SPEAKER

AGENDA

10:45 AM ET 

Conference opens

11:00 AM ET 

Keynote | Security training’s vital role in building and preparing the future’s cyber workforce 
Dr. William Butler, Chair of Cybersecurity Programs, Capitol Technology University 

Infosec teams are bombarded by a seemingly endless barrage of cyber threats, and yet the talent available to defend against them is still in short global supply. In this keynote presentation, Dr. William Butler, director of the Center for Cybersecurity Research and Analysis (CCRA) at Capitol Technology University, and winner of SC Media’s 2021 Leadership Award for Outstanding Educator, addresses the challenges and benefits of developing cyber training and upskilling programs for current and future infosec leaders.

11:45 AM ET 

Visit exhibit hall

11:55 AM ET 

The mind’s lie: How our thoughts and actions can be hacked and hijacked 
Perry Carpenter, Chief Evangelist and Strategy Officer, KnowBe4 

Discover the art and science behind deception… and why you may still fall for dirty tricks even after you understand how they work. From the slight-of-hand used by magicians to the slight-of-tongue used for social engineering, we are all wired to deceive and to be deceived. See how threat actors use these techniques against your users and how security awareness training can help them spot deceptions before it’s too late. 

Join Perry Carpenter, KnowBe4’s CSO, as he shows you how easily we can be deceived and how that relates to our understanding of social engineering scams that come our way. During this intriguing session, Perry will share his insights into the answers to these questions: 

  • Are we wired for deception? 
  • Why are some more susceptible to manipulation than others? 
  • How do hackers use these techniques to create scenarios to entrap your employees? 
  • How can you ethically leverage these techniques to bring about desired behavior change? 

12:25 PM ET 

Visit exhibit hall

12:35 PM ET  

Walking the DarkSide: Malware analysis and beyond 
Andrew Costis, Senior Cyber Threat Consultant, EMEA,  AttackIQ 

New and emerging threats in the form of malware are prolific in our industry today. Malware analysis is a great skill for threat researchers, SOC analysts and incident responders to possess. While malware analysis is viewed by many to be a specialized area for an elite minority, malware analysis doesn’t have to be difficult, costly or time intensive. Malware analysis is highly advantageous and can aid with purple teaming, continuous security control validation and ultimately improve your overall security and defensive capabilities within your organization and beyond.   

Attend this session to learn:  

  • The who, what, where, when and why of malware analysis 
  • A walk through the recent DarkSide ransomware that impacted the Colonial Pipeline  
  • How malware analysis can drive collaboration to adopt a purple teaming strategy 
  • How malware analysis can drive continuous security control validation and beyond

1:05 PM ET  

Visit exhibit hall

Sponsors

0%
prestitial ad