Security is Alive
8th Layer Insights - Un pódcast de Perry Carpenter | N2K Networks
Categorías:
Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves. On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link. Guests: Samantha – Facial Recognition Software Dave – Password Devon – Secure Email Gateway Barb – Phishing Email Books and Resources: MasterClass -- Margaret Atwood Teaches Creative Writing "Everything is Alive" Podcast Krebs on Security - Password Do’s and Don’ts What makes a good password? 9 rules to protect you from cyberattacks World Password Day: Roger Grimes on passwords Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate How does facial recognition work? Facial recognition: top 7 trends (tech, vendors, use cases) NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification How Accurate are Facial Recognition Systems – and Why Does It Matter? Social Engineering Red Flags Email Security Gap Analysis Shows 10.5% Miss Rate What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization? The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry On Writing: A Memoir of the Craft by Stephen King Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland Music and Sound Effects by Blue Dot Sessions, Envato Elements, & SmartSound Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: hello [at] 8thLayerInsights [dot] com