Cloudanix Joins AWS ISV Accelerate Program

Security And Human Behaviour Cassie Clark

To enhance security program effectiveness, infuse security into daily practices of engineering and others. A simple example could be doing a security review as part of the code review process in SDLC.Training and Awareness programs should be continuous and actionable with a focus on behavioral risks in addition to technical controls.Choice architecture plays a major role in implementing security programs at organizations. A few examples could be the option of a password manager vs a specific password manager. Option of using a specific MFA provider vs support for multiple providers.

In this episode of the Scale To Zero podcast, we have discovered how psychological factors contribute to cybersecurity risks, and learn effective strategies to mitigate them.

Watch this thought-provoking discussion on the intersection of security and human behavior. From understanding security fatigue to leveraging user behavioral analytics, Cassie Clark has shared valuable insights for building a more resilient security posture.

You can read the complete transcript of the epiosde here >

Learnings from the podcast

  1. To enhance security program effectiveness, infuse security into daily practices of engineering and others. A simple example could be doing a security review as part of the code review process in SDLC.
  2. Training and Awareness programs should be continuous and actionable with a focus on behavioral risks in addition to technical controls.
  3. Choice architecture plays a major role in implementing security programs at organizations. A few examples could be the option of a password manager vs a specific password manager. Option of using a specific MFA provider vs support for multiple providers.

Learning resources recommended by Cassie Clark

  1. The Cliffs of Night

Actress Grania Kirk is stressed and worn out, so she goes to Ireland for some quiet time. Here, she meets charming Quinn Griffin, and also three strangers in the ruins of an ancient keep. Soon Grania is embroiled in danger and romance. Whom can she trust?

Get Sandworm on Goodreads.com now >

  1. Get smarter about habits and behavioral design, effortlessly.

The best articles, videos, podcasts, and exclusive premium content from the world of behavioral science and business.

Signup to your Habit Weekly newsletter >

  1. Follow Dr. Jessica Barker and Perry Carpenter

These individuals are undeniably the foremost thought leaders in Cassie’s opinion. They have authored several books. Cassie highly recommends their work for valuable insights into security awareness and security culture in particular.

Dr. Jessica Barker > | Perry Carpenter >

Ready to see your graph?

Connect a cloud account in under 30 minutes. See every finding rooted in identity, asset, and blast radius — with a fix path attached.

Book a Demo

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, Apr 14, 2026

Top 15 Cloud Misconfigurations in 2026 - How to Fix Them?

Most cloud breaches today are not the result of sophisticated zero-day exploits. They are the result of misconfiguration

Read More

Monday, Apr 13, 2026

Top 18 Challenges of Cloud Security in 2026

The rapid adoption of cloud computing has brought unprecedented agility and scalability, making it a cornerstone of mode

Read More

Tuesday, Feb 10, 2026

The 2026 CNAPP Compliance Framework: Turning Audit from Crisis to Continuity

Introduction: The Death of the Point-in-Time Audit In the high-velocity cloud landscape of 2026, the traditional app

Read More