AWS and Cloudanix team co-authored this blog: Real-Time Threat and Anomaly Detection for Workloads on AWS

Security And Human Behaviour Cassie Clark

To enhance security program effectiveness, infuse security into daily practices of engineering and others. A simple example could be doing a security review as part of the code review process in SDLC.Training and Awareness programs should be continuous and actionable with a focus on behavioral risks in addition to technical controls.Choice architecture plays a major role in implementing security programs at organizations. A few examples could be the option of a password manager vs a specific password manager. Option of using a specific MFA provider vs support for multiple providers.

In this episode of the Scale To Zero podcast, we have discovered how psychological factors contribute to cybersecurity risks, and learn effective strategies to mitigate them.

Watch this thought-provoking discussion on the intersection of security and human behavior. From understanding security fatigue to leveraging user behavioral analytics, Cassie Clark has shared valuable insights for building a more resilient security posture.

intersection of Security and Human Behavior

You can read the complete transcript of the epiosde here >

Learnings from the podcast

  1. To enhance security program effectiveness, infuse security into daily practices of engineering and others. A simple example could be doing a security review as part of the code review process in SDLC.
  2. Training and Awareness programs should be continuous and actionable with a focus on behavioral risks in addition to technical controls.
  3. Choice architecture plays a major role in implementing security programs at organizations. A few examples could be the option of a password manager vs a specific password manager. Option of using a specific MFA provider vs support for multiple providers.

Learning resources recommended by Cassie Clark

  1. The Cliffs of Night

Actress Grania Kirk is stressed and worn out, so she goes to Ireland for some quiet time. Here, she meets charming Quinn Griffin, and also three strangers in the ruins of an ancient keep. Soon Grania is embroiled in danger and romance. Whom can she trust?

Get Sandworm on Goodreads.com now >

  1. Get smarter about habits and behavioral design, effortlessly.

The best articles, videos, podcasts, and exclusive premium content from the world of behavioral science and business.

Signup to your Habit Weekly newsletter >

  1. Follow Dr. Jessica Barker and Perry Carpenter

These individuals are undeniably the foremost thought leaders in Cassie’s opinion. They have authored several books. Cassie highly recommends their work for valuable insights into security awareness and security culture in particular.

Dr. Jessica Barker > | Perry Carpenter >

cta-image

Secure Every Layer of Your Cloud Stack with Cloudanix

Unify your security workflows with Cloudanix — one dashboard for misconfigurations, drift detection, CI/CD, and identity protection.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, Sep 30, 2025

Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security

The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of

Read More

Friday, Aug 08, 2025

User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment

Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi

Read More

Saturday, Aug 02, 2025

Streamlining Just-in-Time Access: Balancing Security and Developer Workflow Integration

Introduction Just-in-Time (JIT) access is an undisputed cornerstone of modern cloud security. By eliminating standin

Read More