The intersection of Security and Human Behavior Ft. Cassie Clark

Episode No: 70

In this episode of the Scale To Zero podcast, we have discovered how psychological factors contribute to cybersecurity risks, and learn effective strategies to mitigate them.

Watch this thought-provoking discussion on the intersection of security and human behavior. From understanding security fatigue to leveraging user behavioral analytics, Cassie Clark has shared valuable insights for building a more resilient security posture.

Learnings from the podcast

  1. To enhance security program effectiveness, infuse security into daily practices of engineering and others. A simple example could be doing a security review as part of the code review process in SDLC.
  2. Training and Awareness programs should be continuous and actionable with a focus on behavioral risks in addition to technical controls.
  3. Choice architecture plays a major role in implementing security programs at organizations. A few examples could be the option of a password manager vs a specific password manager. Option of using a specific MFA provider vs support for multiple providers.

Learning resources recommended by Cassie Clark

  1. The Cliffs of Night

    Actress Grania Kirk is stressed and worn out, so she goes to Ireland for some quiet time. Here, she meets charming Quinn Griffin, and also three strangers in the ruins of an ancient keep. Soon Grania is embroiled in danger and romance. Whom can she trust?

    Get Sandworm on Goodreads.com now >



  2. Get smarter about habits and behavioral design, effortlessly.

    The best articles, videos, podcasts, and exclusive premium content from the world of behavioral science and business.

    Signup to your Habit Weekly newsletter >



  3. Follow Dr. Jessica Barker and Perry Carpenter

    These individuals are undeniably the foremost thought leaders in Cassie’s opinion. They have authored several books. Cassie highly recommends their work for valuable insights into security awareness and security culture in particular.

    Dr. Jessica Barker > | Perry Carpenter >

Insights from Cloudanix

threat modeling

What is Shared Responsibility Model?

Cloud Security, Shared! Our guide clarifies the Shared Responsibility Model: benefits, best practices for users, CSP & customer duties, & potential collaboration

Cloud compliance checklist - Cloudanix

Checklist for you

A collection of several free checklists for you to use. You can customize, stack rank, backlog these items and share with your other team members.

Go to checklists
Cloudanix Documentation

Cloudanix docs

Cloudanix offers you a single dashboard to secure your workloads. Learn how to setup Cloudanix for your cloud platform from our documents.

Take a look
Monthly changelog

Monthly Changelog

Level up your experience! Dive into our latest features and fixes. Check monthly updates that keep you ahead of the curve.

Take a look
Learn repository

CISO's Secret Weapon: Emotional Intelligence for Security Leaders

This guide explores emotional intelligence, its importance for security leaders, & how it fosters a positive security culture.

Read more