Advanced SOC Operations / CSOC , Governance & Risk Management , Privacy

The Power of Human Intel

Rohyt Belani of PhishMe on the Not-So-Weak Link

Conventional wisdom has long held that humans, because of the mistakes they make, are the weakest links in the security chain. But that's not so, says Rohyt Belani, CEO and co-founder of PhishMe.

See Also: Best Practices to Protect Communication and Email Fraud with Technology

In fact, not only are humans not the weakest link, but when properly conditioned, they can be a very strong asset for security teams. "Gray matter versus hackers" is a powerful weapon in the cybersecurity arsenal, he explains.

In a video interview at RSA Conference 2017, Belani also discusses:

  • What's changing in phishing email schemes;
  • How PhishMe differentiates itself from other anti-phishing solution providers in a crowded market;
  • Ways to defend against phishing attacks.

Belani has more than 15 years of experience in the information security industry, with prior roles including co-founder and CEO of Intrepidus Group (acquired by NCC Group), managing director at Mandiant, principal consultant at Foundstone (acquired by McAfee), and researcher at the Software Engineering Institute. He has served as an adjunct professor at Carnegie Mellon University and is a contributing author for "Hack Notes - Network Security and Extrusion Detection: Security Monitoring for Internal Intrusions."

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.