Using Assessment, Training and Analytics to Drive Success in a Cybersecurity Compliance Program [SCCE Seattle Regional Conference Preview]

1
433

Regardless of your industry, cybersecurity is likely one of the top 3 compliance risk topics for your organization. The examples of cyber breaches grow on a daily basis, putting the training, compliance and security teams front and center in tackling this potential risk.

In this session, hear from Expeditors’ Director of Cybersecurity, Nate Lynch about the state of cybersecurity and how he partnered with internal and external resources to tackle the employee behavior question when facing a cyber threat. Morgan Wilson, Sr. Manager Training & Personnel Development, will share how Expeditors used a combined approach, assessing employee knowledge of cybersecurity before identifying the appropriate and necessary training. Morgan will also discuss the ongoing plans to offer additional and more detailed trainings, specific to the higher risk IT team. Finally, Beth Noble from NYSE Governance Services will share examples of cross-industry analytics specific to employee choices in cybersecurity.

See a preview of their session below and don’t forget to register for SCCE’s Seattle Regional Compliance & Ethics Conference in Seattle on November 18, 2016.

[clickToTweet tweet=”Using Assessment, Training and Analytics to Drive Success in a Cybersecurity Compliance Program – PPT” quote=”Using Assessment, Training and Analytics to Drive Success in a Cybersecurity Compliance Program -PPT ” theme=”style3″]

1 COMMENT

  1. Cyberattacks are common in healthcare industry recently. Providing proper training to whole staff in the organization is the best way to reduce risk of cyber-attacks.Your employees are an important line of defense against a data breach or cyber attack that could lead to financial or reputation loss for your company. Opsfolio.com, an online community for those involved with healthcare cyber security, this may be helpful to healthcare guys and employees in healthcare sector to know more about cybersecurity precautions, rectification methods, which is a right guide for me to know about cybersecurity path.

Comments are closed.