SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Psychological Security
Introduction to the emerging field of PsySec.
Presented by:
Zachary Eikenberry
CEO & CoFounder of Hook Security Inc;
world’s first PsySec company.
First things first. The vast majority of
human history, security
dealt with physical
security. (PhySec)
● Guards
● Gates
● Guns
Let’s set this up one step further.
Computers + Internet =
Information Security (InfoSec)
70+ InfoSec Areas
Cyber Security Product Categories (in alphabetical order) / Application Control Application Security Testing / Authentication (User Authentication,
Biometric Authentication and PKI) / Automotive Cyber Security / Behavior Analytics (User and Entity) / Big Data Security / Browser Security (Secure
Virtual Browser and Remote Browser) / Cloud Access Security Broker / Cloud Security / Compliance Management / Container Security / Maneuver
(Network Masking) / Cyber Threat Hunting / Data Discovery / Data Loss (Leakage) Prevention (DLP) / Data Masking / Data Security / Data-at-Rest
Encryption / Data-in-Motion/Transit (Network) Encryption and VPN / Database Security / DDoS Protection / Deception-Based Security / Digital
Forensic Investigation and Computer Forensics / Digital Rights Management / Digital Risk Monitoring / Embedded Security /Endpoint Protection
and Anti-virus / Endpoint Threat Detection and Response /File Content Security / Firewall Configuration and Management / Fraud Prevention /
Governance/Compliance Management / Hypervisor Security / Identity and Access Management / Identity Theft Detection / Industrial Security
(ICS/SCADA Security) / Internet of Things (IoT) Security / Intrusion Prevention Systems (and Intrusion Detection Systems) / Malware Detection and
Analysis / Managed Security Service Providers / Messaging Security / Mobile Data Protection / Mobile Device Management / Network Access
Control / Network Behavior Analysis and Anomaly Detection / Network Firewall (includes Next Generation Firewalls) / Network Monitoring and
Forensics / Password Manager / Patch Configuration and Management / Penetration Testing / Pervasive Trust Services / Risk and Compliance
Management / Risk and Vulnerability Assessment/ Secure File Transfer / Secure Web Gateway / Security Configuration Management / Security
Incident Management and Response / Security Information and Event Management (and Log Management) / Security Operations Automation and
Orchestration / Security Rating / Security Training Software / Specialized Threat Analysis and Protection / SSL and Digital Certificate Authority and
Management / Threat Intelligence and Signature Feeds / Transport Access Control / Trusted Computing, Cross Domain / Security and Multi Level
Security / Unified Threat Management
What if?
Computers People
Furthermore,
What if?
Computers Brains
What is a “field?”
New Fields are
often a Synthesis;
combining 2
distinct knowledge
domains.
Old Field +
New Knowledge
Insights =
A New Synthetic Field
What are some of the
latest psychological
insights that could lead to
a new field?
A brief listing of scientific phenomena.
Blindsight: The “unconscious” ability to see once a
person becomes blind.
Serial Position Effect: The ability to only recall the
first and last thing is a list of 4 or more items.
Fundamental Attribution Error: The inability to
describe another’s behavior from one’s own
personal characteristics.
McGurk Effect: When someone watches a dubbed
video different from the voice, so that the audience
makes up a new third understanding of the
presentation.
Apophenia (Patternicity / Agenticity): The
phenomena of recognizing patterns in chaos or
assumptions of patterns.
Template Matching Patterns: The foremost going
theory that we only recognized patterns based upon
inherited narratives or previous experience.
Multiple Brains:
Multiple
Theories
One Thousand Brains:
The multi-processes for object
recognition to determine against
a series of other objects.
What if InfoSec solutions
are training the wrong
part of the brain?
Cognitive
Security: CogSec
High Resolution work and
training engaging the deals with
increasing complexity and
multiple variables.
This is where security
professionals live and learn.
Example: This presentation.
PsySec
Focused on the ability for
individuals to recognize and
respond to security threats and
manipulation.
An early PsySec Manifesto
1. Psychographics > Demographics
2. Culture eats compliance for breakfast.
3. Feedback, Feedback, Feedback
4. Security is too important to take
seriously.
5. Stories Matter.
6. Brains are not computers.
7. Don’t make it easy a.k.a. Build
games.
Psychographics. Training should be based
upon your people’s
interests, opinions,
conceptual focus, and
motivations.
*Not synonymous with
Myers-Briggs, DISC,
Strengthsfinder, or Enneagram.*
Culture. Training should be owned
by all levels of the
organizations and
unconscious by every
member.
*Yes, this means security lives in
the mission and vision of all
organizational levels.*
Feedback. Training should include
feedback and multiple and
ongoing reinforcement.
*The greater the distance between
training and reinforcement
diminishes the training’s
effectiveness.*
Importance. Training should be
self-aware, own its faults,
and disarming
(non-punitive).
*Seriousness and fear-based
training counteracts effective
training recognition.*
Stories. Training should be based
upon narrative structures
and mirror best practice
content delivery.
*Think memes, YouTube, Netflix,
and widely (not critic) acclaimed
content. Also, think game-based
narratives and stories like Candy
Crush or Angry Birds.*
Brains. Training should be aimed
to engage the subcognitive
elements.
*Security folks see and experience
the world differently; do not select
or endorse training that is effective
for you or you prefer without larger
considerations. *
Ease. Training should be
challenging and aim at
growth.
*All purpose of training is lost if
becomes a theatrical act by
members if there is experience
discontinuity between professed
importance and challenge.*
This is only the beginning.
Will you build with us?
#psysec
Contact Us For more information, please contact
us at:
hello@hooksecurity.co
Or follow us on LinkedIn:
https://www.linkedin.com/company/
hooksecurity/

Más contenido relacionado

La actualidad más candente

The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitShawn Tuma
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...JoAnna Cheshire
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and ComplianceAnton Chuvakin
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory RealmShawn Tuma
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...EC-Council
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Information System Security
Information System Security Information System Security
Information System Security Syed Asif Sherazi
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Leonardo
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyie-Democracy Conference
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Aurora - Lessons Learned
Aurora - Lessons LearnedAurora - Lessons Learned
Aurora - Lessons Learnedpchronis
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework helpOlivia Fournier
 

La actualidad más candente (20)

The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
 
Security in it
Security in it Security in it
Security in it
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Information System Security
Information System Security Information System Security
Information System Security
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyi
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Aurora - Lessons Learned
Aurora - Lessons LearnedAurora - Lessons Learned
Aurora - Lessons Learned
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
 

Similar a Psychological Security: Introducing the PsySec Field

1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patchingphanleson
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementMighty Guides, Inc.
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Janghyuck Choi
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challengescyberprosocial
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguissamis
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxInfosectrain3
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 

Similar a Psychological Security: Introducing the PsySec Field (20)

Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Main Menu
Main MenuMain Menu
Main Menu
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
Unit-I PPT.pptx
Unit-I PPT.pptxUnit-I PPT.pptx
Unit-I PPT.pptx
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
information security management
information security managementinformation security management
information security management
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguis
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 

Último

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Psychological Security: Introducing the PsySec Field

  • 1. Psychological Security Introduction to the emerging field of PsySec.
  • 2. Presented by: Zachary Eikenberry CEO & CoFounder of Hook Security Inc; world’s first PsySec company.
  • 3. First things first. The vast majority of human history, security dealt with physical security. (PhySec) ● Guards ● Gates ● Guns
  • 4. Let’s set this up one step further. Computers + Internet = Information Security (InfoSec)
  • 5. 70+ InfoSec Areas Cyber Security Product Categories (in alphabetical order) / Application Control Application Security Testing / Authentication (User Authentication, Biometric Authentication and PKI) / Automotive Cyber Security / Behavior Analytics (User and Entity) / Big Data Security / Browser Security (Secure Virtual Browser and Remote Browser) / Cloud Access Security Broker / Cloud Security / Compliance Management / Container Security / Maneuver (Network Masking) / Cyber Threat Hunting / Data Discovery / Data Loss (Leakage) Prevention (DLP) / Data Masking / Data Security / Data-at-Rest Encryption / Data-in-Motion/Transit (Network) Encryption and VPN / Database Security / DDoS Protection / Deception-Based Security / Digital Forensic Investigation and Computer Forensics / Digital Rights Management / Digital Risk Monitoring / Embedded Security /Endpoint Protection and Anti-virus / Endpoint Threat Detection and Response /File Content Security / Firewall Configuration and Management / Fraud Prevention / Governance/Compliance Management / Hypervisor Security / Identity and Access Management / Identity Theft Detection / Industrial Security (ICS/SCADA Security) / Internet of Things (IoT) Security / Intrusion Prevention Systems (and Intrusion Detection Systems) / Malware Detection and Analysis / Managed Security Service Providers / Messaging Security / Mobile Data Protection / Mobile Device Management / Network Access Control / Network Behavior Analysis and Anomaly Detection / Network Firewall (includes Next Generation Firewalls) / Network Monitoring and Forensics / Password Manager / Patch Configuration and Management / Penetration Testing / Pervasive Trust Services / Risk and Compliance Management / Risk and Vulnerability Assessment/ Secure File Transfer / Secure Web Gateway / Security Configuration Management / Security Incident Management and Response / Security Information and Event Management (and Log Management) / Security Operations Automation and Orchestration / Security Rating / Security Training Software / Specialized Threat Analysis and Protection / SSL and Digital Certificate Authority and Management / Threat Intelligence and Signature Feeds / Transport Access Control / Trusted Computing, Cross Domain / Security and Multi Level Security / Unified Threat Management
  • 8. What is a “field?”
  • 9. New Fields are often a Synthesis; combining 2 distinct knowledge domains. Old Field + New Knowledge Insights = A New Synthetic Field
  • 10. What are some of the latest psychological insights that could lead to a new field?
  • 11. A brief listing of scientific phenomena. Blindsight: The “unconscious” ability to see once a person becomes blind. Serial Position Effect: The ability to only recall the first and last thing is a list of 4 or more items. Fundamental Attribution Error: The inability to describe another’s behavior from one’s own personal characteristics. McGurk Effect: When someone watches a dubbed video different from the voice, so that the audience makes up a new third understanding of the presentation. Apophenia (Patternicity / Agenticity): The phenomena of recognizing patterns in chaos or assumptions of patterns. Template Matching Patterns: The foremost going theory that we only recognized patterns based upon inherited narratives or previous experience.
  • 12. Multiple Brains: Multiple Theories One Thousand Brains: The multi-processes for object recognition to determine against a series of other objects.
  • 13. What if InfoSec solutions are training the wrong part of the brain?
  • 14. Cognitive Security: CogSec High Resolution work and training engaging the deals with increasing complexity and multiple variables. This is where security professionals live and learn. Example: This presentation.
  • 15. PsySec Focused on the ability for individuals to recognize and respond to security threats and manipulation.
  • 16. An early PsySec Manifesto 1. Psychographics > Demographics 2. Culture eats compliance for breakfast. 3. Feedback, Feedback, Feedback 4. Security is too important to take seriously. 5. Stories Matter. 6. Brains are not computers. 7. Don’t make it easy a.k.a. Build games.
  • 17. Psychographics. Training should be based upon your people’s interests, opinions, conceptual focus, and motivations. *Not synonymous with Myers-Briggs, DISC, Strengthsfinder, or Enneagram.*
  • 18. Culture. Training should be owned by all levels of the organizations and unconscious by every member. *Yes, this means security lives in the mission and vision of all organizational levels.*
  • 19. Feedback. Training should include feedback and multiple and ongoing reinforcement. *The greater the distance between training and reinforcement diminishes the training’s effectiveness.*
  • 20. Importance. Training should be self-aware, own its faults, and disarming (non-punitive). *Seriousness and fear-based training counteracts effective training recognition.*
  • 21. Stories. Training should be based upon narrative structures and mirror best practice content delivery. *Think memes, YouTube, Netflix, and widely (not critic) acclaimed content. Also, think game-based narratives and stories like Candy Crush or Angry Birds.*
  • 22. Brains. Training should be aimed to engage the subcognitive elements. *Security folks see and experience the world differently; do not select or endorse training that is effective for you or you prefer without larger considerations. *
  • 23. Ease. Training should be challenging and aim at growth. *All purpose of training is lost if becomes a theatrical act by members if there is experience discontinuity between professed importance and challenge.*
  • 24. This is only the beginning. Will you build with us?
  • 26. Contact Us For more information, please contact us at: hello@hooksecurity.co Or follow us on LinkedIn: https://www.linkedin.com/company/ hooksecurity/