Cyber security is continuing to experience a global wave of legal and regulatory changes. When an enterprise is unprepared for changes in compliance, they open themselves up to not only legal ramifications but also security threats. CISOs have an ever more important role to play in the execution of regulatory compliance frameworks.
There was a day not so long ago where privileged access management (PAM) involved simply locking down and controlling enterprise devices. Now, with the explosion of BYOD, the cloud, and digital transformations, PAM frameworks look entirely different. Discussed in this session:
Security happens where man meets machine (or fails to happen, as we see all too often!) As organizations have shifted from local-only to hybrid and cloud-hosted resources, the principles of zero-trust security have helped define human-friendly secure access regardless of a user’s location. While building a zero-trust strategy can improve security wherever a system must make an access decision, ignoring the behavior of the user and their experience can ground these initiatives before you’ve even taken off.
With this in mind, it becomes crucial to ask the right questions: what exactly happens where people and technology meet? At the very moment of human/system interaction, what factors in human psychology and industrial design are at play? And if we could pause time for a moment to catalog and identify those factors, could we design a better experience, a better outcome, and a better path to the future?
Join this session with J. Wolfgang Goerlich, an Advisory CISO at Duo Security, as he explores these questions and details lessons that cyber security practitioners can learn from the principles of industrial design.