
Security is Alive
02/22/22 • 49 min
1 Listener
Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.
On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.
Guests:
- Samantha – Facial Recognition Software
- Dave – Password
- Devon – Secure Email Gateway
- Barb – Phishing Email
Books and Resources:
- MasterClass -- Margaret Atwood Teaches Creative Writing
- "Everything is Alive" Podcast
- Krebs on Security - Password Do’s and Don’ts
- What makes a good password? 9 rules to protect you from cyberattacks
- World Password Day: Roger Grimes on passwords
- Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate
- How does facial recognition work?
- Facial recognition: top 7 trends (tech, vendors, use cases)
- NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification
- How Accurate are Facial Recognition Systems – and Why Does It Matter?
- Social Engineering Red Flags
- Email Security Gap Analysis Shows 10.5% Miss Rate
- What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?
- The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry
- On Writing: A Memoir of the Craft by Stephen King
- Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter
- The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer
Production Credits:
Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland
Music and Sound Effects by Blue Dot Sessions, Envato Elements, & SmartSound
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:
Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.
On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.
Guests:
- Samantha – Facial Recognition Software
- Dave – Password
- Devon – Secure Email Gateway
- Barb – Phishing Email
Books and Resources:
- MasterClass -- Margaret Atwood Teaches Creative Writing
- "Everything is Alive" Podcast
- Krebs on Security - Password Do’s and Don’ts
- What makes a good password? 9 rules to protect you from cyberattacks
- World Password Day: Roger Grimes on passwords
- Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate
- How does facial recognition work?
- Facial recognition: top 7 trends (tech, vendors, use cases)
- NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification
- How Accurate are Facial Recognition Systems – and Why Does It Matter?
- Social Engineering Red Flags
- Email Security Gap Analysis Shows 10.5% Miss Rate
- What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?
- The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry
- On Writing: A Memoir of the Craft by Stephen King
- Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter
- The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer
Production Credits:
Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland
Music and Sound Effects by Blue Dot Sessions, Envato Elements, & SmartSound
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:
Previous Episode

How to Fool The White House -- A conversation with James Linton (aka The Email Prankster)
On this episode, Perry sits down with James Linton (formerly known as The Email Prankster). In 2017, James went on a virtual joyride exploiting the ways that people interact with emails. One of the most interesting things about James' story is that his exploits didn't rely on any type of highly technical method(s); they were simple display name deceptions. But that didn't stop him from fooling CEOs from some of the worlds largest banks, celebrities, and high ranking staff members in the White House.
James' success using these simple methods serves as a warning for us all. We don't fall for scams because they are technically sophisticated or because we are stupid. We fall for scams because we are human.
Guest: James Linton (LinkedIn) (Website)
Books and Resources:
- Anatomy Of An Email Impersonation Spree: Who Got Pranked And Why
- An email prankster is hitting the CEOs of the world's biggest banks
- How to Prank the Rich and Powerful Without Really Trying
- Morgan Stanley CEO James Gorman falls for email prank
- This Man Pranked Eric Trump And Harvey Weinstein — Now He Just Wants A Job
- Media Coverage YouTube Playlist
- James Linton -- Wikipedia Entry
- The Journal of Best Practices: A Memoir of Marriage, Asperger Syndrome, and One Man's Quest to Be a Better Husband by David Finch
- Perry -- Interview on Springbrook's Converge Autism Radio
- Perry -- Security Weekly Interview
- Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village
- Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter
- The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer
Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:
Learn more about your ad choices. Visit megaphone.fm/adchoices
Next Episode

World's Greatest Con – A Conversation with Brian Brushwood
If you love learning about cons, scams, and tricks, then this is the episode for you. Listen as Perry sits down with Brian Brushwood, someone who has made understanding and teaching scams and tricks his life's work. Brian is the creator of Scam School, Scam Nation, Hacking the System, Modern Rogue, and more. For the past 20 years, he's toured around the world teaching and demonstrating everything from side show stunts, to sleight-of-hand magic, to the intricacies of con artistry.
Brian’s new podcast, World’s Greatest Con is a deep-dive into the stories and tactics behind the most intricate and interesting cons imaginable. In season 1, he told the story of Operation Mincemeat, a WWII plot devised by Ian Fleming (creator of James Bond) to trick none other than Adolf Hitler. Season 2 covers five different cons all related to the game show industry... it’s both entertaining and riveting in some very unexpected ways.
A big thank you to my friends over at the PodCube podcast for creating a custom skit for this episode. If you are a fan of sketch comedy, be sure to check out their show! (PodCube: The Future, is YesterdayTM).
Guest: Brian Brushwood (Website) (Twitter)
Books and Resources
- Brian's Website
- World's Greatest Con podcast site
- Scam School YouTube Channel
- Modern Rogue YouTube Channel
- Brian Brushwood Mistreats His Tongue
- Brian doing psychic surgery on Penn & Teller: Fool Us
- Brian doing the "hidden ghost" trick
- Brian's Entire Bizarre Magic Stage Show
- How to make a fake tongue (without using a deer tongue)
- Operation Mincemeat -- Wikipedia
- 13 Unbelievably Fascinating Game Show Cheating Scandals That'll Shock Both Devoted And Casual Fans -- Buzzfeed
- Project Alpha -- Wikipedia
- Going Mental: A Conversation with Banachek -- 8th Layer Insights S1E7
- PodCube Podcast
- Thinking, Fast and Slow by Daniel Kahneman
- Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini
- Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter
- The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer
Production Credits:
- The opening skit featured the voice talents of Rich Daigle (a.k.a. Mouth Almighty), Hannah Trusty, Adriana Beals, and Rob McCollum.
- Writing support for this episode's opening section from Terry Hicks
- Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks.
- Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
- 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/8th-layer-insights-188347/security-is-alive-19589860"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to security is alive on goodpods" style="width: 225px" /> </a>
Copy