Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end-users better protect themselves?

Join our experts as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss:

•  Proven best practices for increasing the effectiveness of cybersecurity education 
•  How to build a culture of security within your organization
•  Actionable guidance on executing security awareness and training initiatives that deliver measurable results

Already have a program going but need some guidance? Be sure to submit your questions for our experts during registration; we will try to get to as many as time allows. 

Generously Supported By:

supported by logo
Speakers
speaker photo
Dale Zabriskie
Security Awareness Evangelist, Proofpoint Security Awareness Training

As an evangelist for Proofpoint Security Awareness and Training products group, Dale consults with companies across the globe, advising on the implementation of effective security awareness strategies to change end-user behavior and reduce organizational risk. Known for his ability to relate both technically and conceptually in an authoritative yet entertaining style, Dale is a popular speaker and panelist, having made presentations on security awareness in over 50 countries. As a Certified Information Systems Security Professional (CISSP) who is also certified in Cloud Security Knowledge (CCSK), he has acted as a consultant to organizations such as Walmart, Disney, Allstate, FedEx, the States of Michigan and Florida, Adventist Health, Baylor University, BP, the U.S. Navy, and Saudi Aramco. His expertise is supported by over 25 years in cybersecurity, information technology, research and development, and regulatory compliance with companies like IBM, Symantec, SunGard, Fisher Scientific, and Veritas.

speaker photo
Donna Gomez
Security Risk and Compliance Analyst, Johnson County (KS) Government

Donna Gomez-Security Risk and Compliance Analyst, Johnson County (KS) Government. Donna Gomez , CRISC, has been an Information Security Awareness Professional for since 1999. She is a Certified Risk and Information Systems Control (CRISC) through ISACA, which is designed for IT professionals with hands-on experience with risk identification, assessment, evaluation, response and monitoring.

speaker photo
Benjamin Brooks
Co-Founder , Cyber Warrior Foundation

Benjamin Brooks is 19-year Navy veteran of Information Warfare, Electronic Warfare, and Special Warfare. He is a CISSP exam writing team member, and has written curriculum on Information and Cyber Security for three universities.

Benjamin currently serves as the President of the Board of Cyber Warrior Foundation, VP of Beryllium InfoSec Collaborative, and Training Officer for Navy Information Operations Command Texas, Minneapolis Branch.

His approach to information security is about balance between operations and security in a way that creates awareness throughout the organization. This ultimately leads to harmonious integration of security into the daily work processes with sufficient security for protecting the most vital information assets of the organization.

Moderator
speaker photo
Tom Bechtold
Director of Web Content, SecureWorld
Tom works with the vendor and practitioner communities to provide quality educational content for information security professionals. This includes forming a National Advisory Board of CISOs and Directors of Security from across North America, developing the SecureWorld web conference and digital marketing programs, and working with nationally-recognized industry thought leaders.