What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
IndustrialCyber.webp 2023-12-07 00:00:00 Épisode 11: Êtes-vous expérimenté par utilisateur?Appliquer les principes d'Ux & Ur au parcours de cybersécurité
EPISODE 11: Are You User Experienced? Applying The Principles of UX & UR To The Cybersecurity Journey
(lien direct)
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by Helena Hill, a seasoned UX Strategist and Consultant and AI expert with a wealth of experience spanning diverse clients, from pre-start-ups to global industry giants. In this episode, we explore the fascinating topic of UX and cybersecurity.We\'re going to learn from the UX function to see how we can create a better user experience for people on their security journey, learn how to get buy-in from the business about implementing controls such as MFA,  and how to \'sell\' our security value offering as a positive user experience. And of course, crucially, how to take those first few steps to engage with the UX team! Key Takeaways for this episode are:UX and Cybersecurity share the same challenge of educating and getting buy-in from the organization to elevate their importance on the business agenda.Understanding the user journey is crucial for both UX and Cybersecurity teams to build a better usable security journey.Empathy mapping helps build a picture of a person and understand their needs and expectations.Leveraging user expectations and their ease of use thresholds can help create appropriate security controls.Collaboration between UX/UR and Cybersecurity teams can lead to innovation in the security space and improve the user experience.This is the first of our two part conversation with Helena, next week we will be talking about her other specialism in AI, which kicks off our Christmas miniseries on AI Links to everything Helena discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don\'t forget to share on LinkedIn and in your teams.It really helps us spread the word and get high-quality guests, like Helena, on future episodes.  We hope you enjoyed this episode - See you next time, keep secure, and don\'t forget to ask yourself, \'Am I the compromising position here?\' Show NotesWhat is a Persona Non Grata? Developed at DePaul University, the Persona non-grata approach makes threat modelling more tractable by asking users to focus on attackers, their motivations, and their abilities. Once this step is completed, users are asked to brainstorm about targets and likely attack mechanisms that the attackers would deploy. Read more: Cyber Threat Modelling: An Evaluation of Three Methods  by FORREST SHULL AND NANCY R. MEAD Threat Studies ★★
IndustrialCyber.webp 2023-11-23 00:00:00 Épisode 9: Ce que l'équipe de cybersécurité veut et ne peut pas vous dire (parce qu'ils ont besoin de plus de science du comportement)
EPISODE 9: What the Cybersecurity Team Wants and Can\\'t Tell You (Because they Need More Behavioural Science)
(lien direct)
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! Join your hosts, Lianne Potter, Cyber Anthropologist and Head of Security Operations for a major retailer, and Jeff Watkins, Cybersecurity enthusiast and CTO for a software consultancy as they interview this week\'s guest!This week our guest is Melina Palmer, a renowned keynote speaker in behavioural economics and the CEO of The Brainy Business, as well as hosting one of the best podcasts on the subject of the practical application of behavioural economics.In this episode, we discuss how silos and tribal mentalities occur in the workplace due to confirmation bias and how we can expand the circle of empathy to create a more cohesive team.We\'ll also delve into the issue of time discounting, availability bias and optimism bias to understand why people are drawn to the easy option in the moment.We shall explore how the cybersecurity team\'s curse of knowledge can be a barrier to effective communication, and the need to create easier-to-digest content that enables \'buy-in.\' Key takeaways for this episode are:Understanding the behaviour that leads to insecure cybersecurity behaviour is crucial in developing effective cybersecurity strategies. Silos and tribal mentalities in the workplace can be detrimental to team dynamics and productivity. Leaders should work towards creating a \'team company\' culture. Confirmation bias and focusing illusion can lead to negative relationships and narrow perspectives. It\'s important to listen and build positive connections. Cybersecurity messages should be framed in a way that resonates with users and takes into account their knowledge and habits. To effectively communicate cybersecurity information, it\'s important to get into the mind space of the person you\'re communicating with and provide easy-to-digest content.If you\'re interested in understanding the behavioural science behind cybersecurity and how we can communicate more effectively, then you\'re in the right place. Links to everything Melina discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don\'t forget to share on LinkedIn and in your teams.It really helps us spread the word and get high-quality guests, like Melina, on future episodes.  We hope you enjoyed this episode - See you next time, keep secure, and don\'t forget to ask yourself, \'Am I the compromising position here?\' SHOW NOTES Studies ★★
Last update at: 2024-06-27 14:11:42
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter