file:hum-w10-welcome-to-the-age-of-immersive-security.pdf file:hum-w02f-workplace-violence-and-it-sabotage-two-sides-of-the-same-coin.pdf file:hum-t11-how-to-improve-phishing-awareness-by-300-percent-in-18-months.pdf file:hum-t10r-a-field-guide-to-insider-threat-helps-manage-the-risk.pdf file:hum-t09-building-a-strategic-plan-for-your-security-awareness-program.pdf file:hum-r11-privacy-enhancing-technologies-work-but-can-anyone-use-them.pdf file:hum-r10f-gamification-using-science-of-habit-cycle-to-transform-user-behavior.pdf file:hum-r03r-expanding-your-blue-team-by-creating-security-culture.pdf file:hum-r02f-how-to-transform-developers-into-security-people.pdf file:hum-f03-recognizing-preventing-and-responding-to-radicalization-in-the-workplace.pdf file:hum-f01-lessons-from-a-billion-breached-records.pdf