7 Things We Learned at Tessian Human Layer Security Summit
Tessian •
Tuesday, March 2nd 2021
Tessian Cloud Email Security intelligently prevents advanced email threats and protects against data loss, to strengthen email security and build smarter security cultures in modern enterprises.
That’s a wrap! Thanks to our incredible line-up of speakers and panelists, the first Human Layer Security Summit of 2021 was jam-packed with insights and advice that will help you level-up your security strategy, connect with your employees, and thrive in your role.
Looking for a recap? We’ve rounded up the top seven things we learned.
1. CISOs can’t succeed without building cross-functional relationships
Today, security leaders are responsible for communicating risk, enabling individuals and teams, and influencing change at all levels of the organization.
That’s easier said than done, though…especially when research shows less than 50% of employees (including executives) can identify their CISO.
The key is building relationships with the right people. But how?
Patricia Patton, Human Capital Strategist and Executive Coach, Annick O’Brien, Data Protection Officer and Cyber Risk Officer, and Gaynor Rich, Global Director Cybersecurity Strategy & Transformation at Unilever tackled this topic head-on and introduced a new framework for security leaders to use: Relationship 15.
“This framework gives you the opportunity to be intentional about the relationships you want to build and be proactive in making connections versus repairing broken relationships. This helps build trust, which is essential for security leaders. You must build trust with the rest of the business to succeed.”
Patricia Patton
Human Capital Strategist and Executive Coach
Find out more by watching the full session below or check out this blog to download a template for the Relationship 15 Framework.
2. Securing your own organization isn’t enough. You have to consider your supply chain’s attack surface and risk profile, too
We often talk about how cybersecurity is a team sport. And it is. But, today your “team” needs to extend beyond your own network.
Why? Because more and more often, bad actors are gaining access to the email accounts of trusted senders (suppliers, customers, and other third-parties) to breach a target company in account takeover (ATO) attacks.
The problem is, you’re only as strong as the weakest (cybersecurity) link in your supply chain, and these sophisticated attacks slip right past Secure Email Gateways (SEGs), legacy tools, and rule-based solutions.
Marie Measures, CTO, at Sanne Group, and Joe Hancock, Head of Cyber at Mishcon de Reya explain how firms in both the legal sector and financial services are preventing these threats by consulting enterprise risk management frameworks, partnering with customers, and leveraging technology.
3. If you want to understand and reduce risk, you need data (and smart tech)
Throughout the Human Layer Security Summit, one word was repeated over, and over, and over again. Visibility.
It makes sense. Clear visibility of threats is the first step in effectively reducing risk. But, because so many security solutions are black boxes that make investigation, remediation, and reporting admin-intensive, this can be a real challenge.
We have a solution, though. Tessian Human Layer Risk Hub. This game-changing product (coming soon!) enables security and risk management leaders to deeply understand their organization’s security posture by providing granular visibility and reporting into individual user risk levels.
How? Each user is assigned a risk score based on dozens of factors and risk drivers, including email behavior, training track record, and access to sensitive information. This clearly shows administrators who needs help (on an individual level and a team level).
The tool also intelligently recommends actions to take within and outside the Tessian portal to mitigate risk. Finally, withindustry benchmarkingand dashboards that show how risk changes over time, you’ll be able to easily track and report progress.
4. Rule-based solutions aren’t enough to prevent data exfiltration
“They say security is a thankless job. But Tessian was the first security platform that we deployed across the organization where I personally received 'thank you’s' from employees who would have made a mistake with potentially dire consequences, but didn’t because of Tessian.”
Elsa Ferreira
CISO at Evercore
If you’re interested in learning more about Human Layer Security, this is the session for you.
David Aird, IT Director at DAC Beachcroft, and Elsa Ferreira, CISO at Evercore take a deep dive into why people make mistakes, what the consequences of those mistakes are, and how they – as security leaders – can support their employees while protecting the organization.
Spoiler alert: blunt rules, blocking by default, and one-and-done training sessions aren’t enough.
To learn how they’re using Tessian to automatically prevent data exfiltration and reinforce training/policies – and to hear what prompted Elsa to say “They say security is a thankless job. But Tessian was the first security platform that we deployed across the organization where I personally received ‘thank you’s’ from employees…”– watch the full session.
5. When it comes to security awareness training, one size doesn’t fit all
Security awareness training is an essential part of every cybersecurity strategy. But, when it comes to phishing prevention, are traditional simulation techniques effective?
According to Joe Mancini, VP Enterprise Risk at BankProv, and Ian Schneller, CISO, at RealPage they’re important… but not good enough on their own.
Their advice:
Find ways to make training more engaging and tailored to your business initiatives and employees’ individual risk levels
Focus on education and awareness versus “catching” people
Make sure training is continuously reinforced (Tessian in-the-moment warnings can help with that)
Don’t just consider who clicks; pay attention to who reports the phish, too
Consider what happens if an employee fails a phishing test once, twice, or three times
Nina Schick, Deepfakes expert, Dan Raywood, Former deputy-editor at Infosec Magazine, and Samy Kamkar, Privacy and Security Researcher and Hacker went back and forth, discussing the biggest moments in security over the last year, what’s top of mind today, and what we should prepare for in the next 5-10 years.
Insider threats, state-sponsored threats, and human error made everyone’s lists…and so did AI.
“AI will change the industry over the next decade, both as a tool against threats and for malicious use. It will be at the center of solutions, but it will also be weaponized.”
Nina Schick
Deepfakes Expert
Watch the full session to hear more expert insights.
7. Hackers can – and do – use social media and OOO messages to help them craft targeted social engineering attacks against organizations
Spear phishing, Business Email Compromise (BEC), and other forms of social engineering attacks are top of mind for security leaders. And, while most organizations have a defense strategy in place – including training, policies, and technology – there’s one vulnerability most of us aren’t accounting for. Our digital footprints.
Every photo we post, status we update, person we tag, and place we check-in to reveals valuable information about our personal and professional lives. With this information, hackers are able to craft more targeted, more believable, and – most importantly – more effective social engineering attacks.
So, what can you do to level-up your defenses? Jenny Radcliffe, Host of The Human Factor, and James McQuiggan, CISSP Security Awareness Advocate, KnowBe4, share personal anecdotes and actionable advice in the first session of the Human Layer Security Summit.
Want to join us next time? Subscribe to our blog below to be the first to hear about events, product updates, and new research.
Tessian
Subscribe to our blog
Industry insights, straight to your inbox every week
Manage Cookie Consent
By clicking "Accept all" or closing this banner you will allow use of cookies as outlined in our Cookie Policy.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
By clicking "Accept all" or closing this banner you will allow use of cookies as outlined in our Cookie Policy.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.