Topic: Human-Centric Approach to Cybersecurity
Abstract: A human-centered approach to cybersecurity is crucial, as it emphasizes the need to understand human behavior, promote security awareness, and design systems that account for potential human error. In this session, we will explore the critical role of humans in cybersecurity and how, although they may be considered the weakest link, they can be transformed into vital defense assets. Establishing trust is another key element, and it is vital for those we protect to help strengthen our defenses against cyberattacks. This approach involves incorporating user education and training into cybersecurity strategies, enabling individuals to make more informed and secure decisions online.
In addition to awareness, organizations must focus on addressing user needs, recognizing the importance of diversity, including neurodivergence, and ensuring that awareness programs move beyond simple check-the-box activities. The session will highlight the benefits of gamification, role-specific training, and regionally tailored content for cultivating a strong security culture. It will also emphasize the importance of embedding cybersecurity into the organization’s culture to build a resilient and proactive defense.
Key Takeaways:
- Prioritizing user awareness and training
- Designing security with the user in mind
- Fostering a culture of shared responsibility
Speaker:
Malcolm Xavier, IT Security Manager, EET Fuels
Bio: Malcolm Xavier is a cybersecurity expert with an expansive global presence. His role revolves around fortifying the security and resilience of the organization’s digital assets and operations, ensuring strict adherence to industry standards and regulations.
With 20+ years within the digital technology industry, he has navigated diverse domains and sectors, including IT services, banking, insurance, telecom, and energy.
His expertise spans a spectrum of vital areas, encompassing IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management. Demonstrating his commitment to excellence, he holds certifications in key areas such as CISSP, TOGAF, Prince 2, Azure, and Google Cloud. These credentials underscore his proficiency in implementing robust security measures and aligning IT strategies with business objectives.