Select Page
FREE WEBINAR

How to talk like a human risk manager

Language matters: Using risk terminology to build personal credibility

How to talk like a human risk manager speakers

Are you a security awareness professional, or in the business of managing human risk?

If so, understanding the relational differences between risksthreats and vulnerabilities is not optional, certainly if you want to be credible within security, and to be effective at managing risk.

This understanding will make you more effective in your job, and it will allow you to discuss risks and security behaviors more confidently with your security teams – as a genuine human risk specialist.

Help your security team make better risk decisions.

Build credibility in the eyes of leadership security peers.

Be considered more than just an “educator”, or a “communicator”.

What you’ll learn:

^

The differences and relationships between risksthreats and vulnerabilities

^

The differences between risk, risks, and risk-outcomes

^

Calculating probability, impact, and risk exposure as they relate to user security behavior

Who’s it for?

Security awareness & Human risk management professionals

CISOs, CIOs, and data protection officers

CTOs, IT Directors, and IT Managers

Information security officers, managers, and analysts

Anyone wanting to develop their understanding of risks, threats, and vulnerabilities

Join the conversation

Our speakers:

CybSafe logo
Oz Alashe MBE How to talk like a human risk manager

Oz Alashe MBE

CEO & Founder, CybSafe

Oz leads CybSafe. He has been the driving force behind CybSafe – the concept, vision and platform.

A former UK Special Forces Lieutenant Colonel, Oz is focused on making society more secure by helping organisations address the human aspect of cyber security.

Oz has a deep background in the areas of intelligence insight, complex human networks, and human cyber risk & resilience. He’s also passionate about reducing societal threats to stability and security by making the most of opportunities presented through advancements in technology.

Oz was made an MBE in 2010 for his personal leadership in the most complex of conflict environments.

Oz chairs the UK Government’s (DCMS) Cyber Resilience Expert Advisory Group. He also sits on the Advisory Board for the Research Institute in Sociotechnical Cyber Security (RISCS). And he’s an Expert Fellow at The Security, Privacy, Identity and Trust Engagement NetworkPlus (SPRITE+), as well as the Royal United Services Institute (RUSI).

CybSafe logo
Liz Banbury How to talk like a human risk manager

Liz Banbury

CISO, Thames Water

Liz is a strategy focussed leader with a passion for Information and Cyber Security. These days this is a fast paced, ever changing and sometimes complex environment and you not only need a good team, but you need to have the mindset to be a trusted partner and ‘advisor’ to the key stakeholders within the organisation that you are striving to protect. Without that partnership the ability to provide an environment that enables the business to grow securely is undermined.

As the Chief Information Security Officer, Liz has put in place a strategy for Information security which spans several years and has initiated and put in place several significant areas of work to further mature the overall security posture of the organisation. At Standard Chartered I held the role of Global Head of Information and Cyber Security Policy where a complete Policy Framework was put in place with a solid understanding of the minimum baseline of controls required to secure the organisation. Liz started her career in technology and held several roles at JPMorgan Chase, which provided a sound introduction and understanding of systems, applications, environment management and software configuration which enabled Liz to be successful at ANZ Bank, where she supported 8 countries within Asia, UK, US from both an Information Security and Technology Risk perspective.

CybSafe logo
Greg van der Gaast How to talk like a human risk manager

Greg van der Gaast

Managing Director, Sequoia Consulting

Greg van der Gaast boasts a distinguished, yet diverse, 25+ year career in information security and cybersecurity. Deemed one of the World’s Top 5 Most Infamous Hackers and an FBI most-wanted, Greg now uses his expertise as a force for good – having since worked as an undercover FBI and DoD operative.

Driving change in information security practices, Greg shares his in-depth understanding of how to maintain the security of data as a business-minded CISO and cutting-edge technical consultant.

Aside from his business commitments, Greg is also sought after as a keynote speaker – sharing his expertise on how organisations can protect themselves from cyber threats with unconventional approaches.