Human Computer Interaction in Cybersecurity

The “human agent” is at the center of all security research. Some people refer to human agents or users as the “weakest link in the security chain”. It is true that user behavior plays a part in many security failures. This introductory/intermediate course in the human aspects of cyber security will provide an overview of HCI related sciences and technology within the growing field of cyber security. In addition to learning about cyber security, participants will also learn how to manage and monitor their own online activities, security, and protect themselves from cyber attacks.

HCII 2018, Sunday, 15 July 2018, 08:30 – 12:30 Caesars Palace, Los Vegas , Nevada, USA 

Click to Register for Tutorials

AHFEI 2018, Saturday, July 21, 2018 -13:00- 17:00 The Loews Sapphire Falls Resort, Orlando, Florida, USA 

Click to Register for Tutorials

How to Design User-Friendly Dashboards, 2018, Las Vegas Nevada, USA

With a growing need for mass data visualization, most business and consumer applications display a dashboard page that includes an overview of the system status and content. Are all these dashboards effective? What are the basic principles behind designing effective and intuitive dashboards? This introductory/intermediate course in dashboard design will provide an overview of the fundamentals for designing and evaluating effective dashboards. Participants will then evaluate several dashboards and practice building an effective dashboard.

HCII 2018, Monday, 16 July 2018, 08:30 – 12:30 Caesars Palace, Los Vegas , Nevada, USA

Click to Register for Tutorials

AHFEI 2018, Sunday, July 22, 2018 -08:00- 12:00 The Loews Sapphire Falls Resort, Orlando, Florida, USA 

Click to Register for Tutorials

All you need to know and to protect yourself and your company from cyber attacks.

The objective of this training session to give awareness to the participants about the risks and teach them what they can do about it. After completion of this training session participants will have a very real and under stables knowledge about the cyber risk and a list of what they need to do to protect themselves at individual and company level.