Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.
On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.
Guests: 

Samantha – Facial Recognition Software

Dave – Password

Devon – Secure Email Gateway

Barb – Phishing Email

Books and Resources:

MasterClass -- Margaret Atwood Teaches Creative Writing

"Everything is Alive" Podcast

Krebs on Security - Password Do’s and Don’ts

What makes a good password? 9 rules to protect you from cyberattacks

World Password Day: Roger Grimes on passwords

Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate

How does facial recognition work?

Facial recognition: top 7 trends (tech, vendors, use cases)

NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification

How Accurate are Facial Recognition Systems – and Why Does It Matter?

Social Engineering Red Flags

Email Security Gap Analysis Shows 10.5% Miss Rate

What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?

The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry

On Writing: A Memoir of the Craft by Stephen King

Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer

Production Credits:
Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland
Music and Sound Effects by Blue Dot Sessions, Envato Elements, & SmartSound
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: hello [at] 8thLayerInsights [dot] com

Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.

On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.

Guests: 


Samantha – Facial Recognition Software
Dave – Password
Devon – Secure Email Gateway
Barb – Phishing Email


Books and Resources:


MasterClass -- Margaret Atwood Teaches Creative Writing
"Everything is Alive" Podcast
Krebs on Security - Password Do’s and Don’ts
What makes a good password? 9 rules to protect you from cyberattacks
World Password Day: Roger Grimes on passwords
Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate
How does facial recognition work?
Facial recognition: top 7 trends (tech, vendors, use cases)
NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification
How Accurate are Facial Recognition Systems – and Why Does It Matter?
Social Engineering Red Flags
Email Security Gap Analysis Shows 10.5% Miss Rate
What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?
The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry
On Writing: A Memoir of the Craft by Stephen King

Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer


Production Credits:

Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland

Music and Sound Effects by Blue Dot SessionsEnvato Elements, & SmartSound

Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.

8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:


LinkedIn
Twitter
Instagram

Email: hello [at] 8thLayerInsights [dot] com

Twitter Mentions