In the wake of organizational change employees must alter their behavior so that they may perform new tasks, meet new requirements and standards, or to drive new outcomes. In short, change. But, even with a strong competency plan that will help them develop skills, both quick adoption and sustained [...]
Hend Ezzeddine was recently interviewed by Office Products International as a follow-up to Expressworks' participation in their Global CEO Forum held in November, 2016. If you're interested in the top five things companies should be doing to reduce risk of...
This series of articles is for the leaders in the trenches … the senior workers, line and middle managers who are responsible, sometimes unknowingly, for half the market cap of a corporation. One error, incident, or security compromise can negatively impact a company overnight. Unfortunately, senior leaders often don’t [...]
I bought my dad an Amazon Alexa device for his birthday. He surprised me when he asked, “Aren’t these smart devices the kind of thing that brought the Internet down last week?” Now that cyber criminals are targeting connected household items, people that weren’t necessarily aware of the importance of [...]
The concept of “psychology of security” is often a foreign concept to IT professionals, yet they all acknowledge that users are the biggest challenge. When hackers are unsuccessful at exploiting technical vulnerabilities, they turn their attention towards users. They scan for responses to psychological triggers and cognitive patterns that can [...]
Dr. Hend Ezzeddinne, Cyber Security Practice Director for Expressworks, gave this talk at Austin Bsides conference in March. Folks there were quick to acknowle…
Eventbrite - Tech Regiment presents Insider Threat Summit 2016 - Tuesday, March 29, 2016 | Wednesday, March 30, 2016 at Hyatt Regency Monterey Hotel and Spa on Del Monte Golf Course, Monterey, CA. Find event and registration information.
The December 2015 cyberattacks on Ukranian power utilities were rare in that actual damage was inflicted. But there's ample evidence of widespread infiltration into organisations' operational systems.