Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.
On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.
Guests:
- Samantha – Facial Recognition Software
- Dave – Password
- Devon – Secure Email Gateway
- Barb – Phishing Email
Books and Resources:
- MasterClass -- Margaret Atwood Teaches Creative Writing
- "Everything is Alive" Podcast
- Krebs on Security - Password Do’s and Don’ts
- What makes a good password? 9 rules to protect you from cyberattacks
- World Password Day: Roger Grimes on passwords
- Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate
- How does facial recognition work?
- Facial recognition: top 7 trends (tech, vendors, use cases)
- NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification
- How Accurate are Facial Recognition Systems – and Why Does It Matter?
- Social Engineering Red Flags
- Email Security Gap Analysis Shows 10.5% Miss Rate
- What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?
- The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry
- On Writing: A Memoir of the Craft by Stephen King
- Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter
- The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer
Production Credits:
Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland
Music and Sound Effects by Blue Dot Sessions, Envato Elements, & SmartSound
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:
02/22/22 • 49 min
1 Listener
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/8th-layer-insights-188347/security-is-alive-19589860"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to security is alive on goodpods" style="width: 225px" /> </a>
Copy