Impact 2023: Replay

Cyber Security Quirks
How can we personalise security training and awareness programmes to improve human cyber resilience?
Inka Karppinen, Lead Behavioral Scientist of CybSafe


The purpose of a CISO
A look through the lenses of identity, power, and masculinity
Joseph Da Silva, CISO of RS Group PLC


Security Convergence: Building an evidence-based roadmap
Why do organisations adopt convergence, and how do they implement it?
Emma Boakes, University of Portsmouth


Cybersecurity is in the eye of the beholder
Can we use eye tracking to understand why people engage with phishing emails?
John McAlaney, Professor of Bournemouth University


Respecting employees as security decision-makers
To practice secure working, employees must be supported in the workplace
Simon Parkin, Assistant Professor of Delft University of Technology


Compliance or Impact?
Insights into how U.S. government organizations determine the effectiveness of security awareness programs
Julie Haney, Computer Scientist and Usable Security Researcher of National Institute of Standards and Technology

Cybersecurity awareness and training
A look at past practises and future needs
Maria Bada, Lecturer of Queen Mary University


Keynote
Changing Minds, Changing Behaviors: A BS Approach
Lisa Plaggemier, Executive Director of National Cyber Security Alliance
