<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/8th-layer-insights" rel="self" type="application/rss+xml"/>
    <title>8th Layer Insights</title>
    <link>https://8thlayerinsights.com/</link>
    <language>en</language>
    <copyright>© 8th Layer Media</copyright>
    <description>Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/f5479b52-ac4f-11eb-98b2-3f5655e86aac/image/8th-Layer-Insights-cover-art.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>8th Layer Insights</title>
      <link>https://8thlayerinsights.com/</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle></itunes:subtitle>
    <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
    <itunes:summary>Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>Perry Carpenter | N2K Networks</itunes:name>
      <itunes:email>hello@8thLayerMedia.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/f5479b52-ac4f-11eb-98b2-3f5655e86aac/image/8th-Layer-Insights-cover-art.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Technology">
    </itunes:category>
    <itunes:category text="Science">
      <itunes:category text="Social Sciences"/>
    </itunes:category>
    <itunes:category text="Business">
    </itunes:category>
    <item>
      <title>Cognitive Heists series #7: The Trojan Gift</title>
      <description>Hey folks! It's been a few weeks, but now the gift is here. :) It's the 7th installment of the "Cognitive Heists" series. This one is titled, "The Trojan Gift." 🎁 

Not all traps look like traps. Some arrive with a bow on top.

The Trojan Horse is the oldest example. But today, the gift often looks like a free service. No charge, no strings… except the ones you don’t see.

Because the real price isn’t money. It’s privacy.

-- It’s data.

 -- It’s you.



In this issue of Cognitive Heists, we explore:

 🔹 How “free” has always been one of the most effective disguises in the con artist’s playbook

 🔹 Folklore warnings about cursed gifts that crumble into ash

 🔹 Why reciprocity, curiosity, and flattery make us drag danger through our own gates

 🔹 And how modern Trojan Gifts hide in inboxes, QR codes, cloud apps, and “free” platforms

The cost of convenience is rarely written on the tag.



Enjoy!



Next up: The Double Agent—where the betrayal sits across the table, smiling like a friend.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Sep 2025 23:06:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6077e83c-8d9c-11f0-a7c6-57f0dcbf015f/image/3e36ef12c97ad0c8ff9de123e8c07687.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hey folks! It's been a few weeks, but now the gift is here. :) It's the 7th installment of the "Cognitive Heists" series. This one is titled, "The Trojan Gift." 🎁 

Not all traps look like traps. Some arrive with a bow on top.

The Trojan Horse is the oldest example. But today, the gift often looks like a free service. No charge, no strings… except the ones you don’t see.

Because the real price isn’t money. It’s privacy.

-- It’s data.

 -- It’s you.



In this issue of Cognitive Heists, we explore:

 🔹 How “free” has always been one of the most effective disguises in the con artist’s playbook

 🔹 Folklore warnings about cursed gifts that crumble into ash

 🔹 Why reciprocity, curiosity, and flattery make us drag danger through our own gates

 🔹 And how modern Trojan Gifts hide in inboxes, QR codes, cloud apps, and “free” platforms

The cost of convenience is rarely written on the tag.



Enjoy!



Next up: The Double Agent—where the betrayal sits across the table, smiling like a friend.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hey folks! It's been a few weeks, but now the gift is here. :) It's the 7th installment of the "Cognitive Heists" series. This one is titled, "The Trojan Gift." 🎁 </p>
<p>Not all traps look like traps. Some arrive with a bow on top.</p>
<p>The Trojan Horse is the oldest example. But today, the gift often looks like a free service. No charge, no strings… except the ones you don’t see.</p>
<p>Because the real price isn’t money. It’s privacy.</p>
<p>-- It’s data.</p>
<p> -- It’s you.</p>
<p><br></p>
<p>In this issue of Cognitive Heists, we explore:</p>
<p> 🔹 How “free” has always been one of the most effective disguises in the con artist’s playbook</p>
<p> 🔹 Folklore warnings about cursed gifts that crumble into ash</p>
<p> 🔹 Why reciprocity, curiosity, and flattery make us drag danger through our own gates</p>
<p> 🔹 And how modern Trojan Gifts hide in inboxes, QR codes, cloud apps, and “free” platforms</p>
<p>The cost of convenience is rarely written on the tag.</p>
<p><br></p>
<p>Enjoy!</p>
<p><br></p>
<p>Next up: The Double Agent—where the betrayal sits across the table, smiling like a friend.</p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>649</itunes:duration>
      <guid isPermaLink="false"><![CDATA[6077e83c-8d9c-11f0-a7c6-57f0dcbf015f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4177064365.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cognitive Heist series #6: The Shill</title>
      <description>Some cons don’t succeed because of the smooth-talking seller. Instead, they succeed because of the crowd.

Enter The Shill -- a hidden accomplice pretending to be just another customer, audience member, or lucky passerby. They're in the crowd, acting as a 'normal' audience member... all with the goal of bringing validation to the con-artist's claims. 

They clap first, they nod enthusiastically. They “buy” the tonic. They shout “this stuff really works!”

And we believe them… because we think they’re one of us. That’s the power of the shill: weaponized trust and manufactured consensus.



Next time: The Trojan Gift - when the real danger is hidden inside the prize.



===== In other news: =====

The FAIK Files: It's a Personality Problem: 


  Audio version: https://pod.link/1771521321/episode/ZWVmYWYxMDgtZGU4ZC0xMWVmLWIwNGQtMmY0YjJkNzQ3YzEx


  YouTube version: https://youtu.be/RNw1T4CSIU8?si=99tQN5tcPwIaAlV6





Interesting Thing of the Week:


  The Washington Post has a great article titled, "Making cash off ‘AI slop’: The surreal video business taking over the web." The article covers the -- as the title states -- AI Slop: the internet's latest hustle. 



Get the book, FAIK!


  Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com.


P.P.S -- Did you know that we have an text version of this newsletter? Check it out on LinkedIn or my Website. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c5ed4d98-8b5c-11f0-8c97-e35fb75e7c01/image/4e18c8eb49d0dfdb8d7c0f2e47cfeec3.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Some cons don’t succeed because of the smooth-talking seller. Instead, they succeed because of the crowd.

Enter The Shill -- a hidden accomplice pretending to be just another customer, audience member, or lucky passerby. They're in the crowd, acting as a 'normal' audience member... all with the goal of bringing validation to the con-artist's claims. 

They clap first, they nod enthusiastically. They “buy” the tonic. They shout “this stuff really works!”

And we believe them… because we think they’re one of us. That’s the power of the shill: weaponized trust and manufactured consensus.



Next time: The Trojan Gift - when the real danger is hidden inside the prize.



===== In other news: =====

The FAIK Files: It's a Personality Problem: 


  Audio version: https://pod.link/1771521321/episode/ZWVmYWYxMDgtZGU4ZC0xMWVmLWIwNGQtMmY0YjJkNzQ3YzEx


  YouTube version: https://youtu.be/RNw1T4CSIU8?si=99tQN5tcPwIaAlV6





Interesting Thing of the Week:


  The Washington Post has a great article titled, "Making cash off ‘AI slop’: The surreal video business taking over the web." The article covers the -- as the title states -- AI Slop: the internet's latest hustle. 



Get the book, FAIK!


  Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com.


P.P.S -- Did you know that we have an text version of this newsletter? Check it out on LinkedIn or my Website. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some cons don’t succeed because of the smooth-talking seller. Instead, they succeed because of the crowd.</p>
<p>Enter The Shill -- a hidden accomplice pretending to be just another customer, audience member, or lucky passerby. They're in the crowd, acting as a 'normal' audience member... all with the goal of bringing validation to the con-artist's claims. </p>
<p>They clap first, they nod enthusiastically. They “buy” the tonic. They shout “this stuff really works!”</p>
<p>And we believe them… because we think they’re one of us. That’s the power of the shill: weaponized trust and manufactured consensus.</p>
<p><br></p>
<p><u><strong>Next time</strong></u><strong>: </strong><em><strong>The Trojan Gift</strong></em><strong> - when the real danger is hidden inside the prize.</strong></p>
<p><br></p>
<p><strong>===== In other news: =====</strong></p>
<p><strong>The FAIK Files: It's a Personality Problem</strong>: </p>
<ul>
  <li>Audio version: <a href="https://pod.link/1771521321/episode/ZWVmYWYxMDgtZGU4ZC0xMWVmLWIwNGQtMmY0YjJkNzQ3YzEx">https://pod.link/1771521321/episode/ZWVmYWYxMDgtZGU4ZC0xMWVmLWIwNGQtMmY0YjJkNzQ3YzEx</a>
</li>
  <li>YouTube version: <a href="https://youtu.be/RNw1T4CSIU8?si=99tQN5tcPwIaAlV6">https://youtu.be/RNw1T4CSIU8?si=99tQN5tcPwIaAlV6</a>
</li>
</ul>
<p><br></p>
<p><strong>Interesting Thing of the Week:</strong></p>
<ul>
  <li>The Washington Post has a great article titled, "<a href="https://www.washingtonpost.com/technology/2025/08/17/ai-video-slop-creators/?utm_source=chatgpt.com">Making cash off ‘AI slop’: The surreal video business taking over the web</a>." The article covers the -- as the title states -- <em>AI Slop: </em>the internet's latest hustle.<em> </em>
</li>
</ul>
<p><strong>Get the book, FAIK!</strong></p>
<ul>
  <li>Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: <a href="https://thisbookisfaik.com/"><strong>https://ThisBookIsFAIK.com</strong></a>.</li>
</ul>
<p>P.P.S -- Did you know that we have an text version of this newsletter? Check it out on <a href="https://www.linkedin.com/newsletters/deceptive-minds-7319922626200510464/">LinkedIn</a> or my <a href="https://TheDeceptionProject.com">Website</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>563</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5ed4d98-8b5c-11f0-8c97-e35fb75e7c01]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6135593801.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cognitive Heist series #5: The Long Con</title>
      <description>Welcome to Deceptive Minds - An audio newsletter about how we are fooled, how we fool ourselves, and what we can do about it. 

This one is all about "The Long Con."



When the lie moves in next door.

Not every con kicks down the door. Some knock politely, charm their way inside, and stay for dinner.

In this issue , we explore the anatomy of the long con... a psychological slow-burn that trades urgency for intimacy. Think of these as more than just scams. They’re stories that unfold like relationships... until the final betrayal.





In other news:

New FAIK Files episode (Video Killed the ...)


  Audio version: https://pod.link/1771521321/episode/012b4c787fc35a8cd9df3d8f99fcd569


  YouTube version: https://youtu.be/mYFwURVoPE8 




Interesting Thing of the Week: 

Hany Farid's TED Talk, How to spot fake AI photos: https://www.ted.com/talks/hany_farid_how_to_spot_fake_ai_photos



Until next week... stay safe out there!

Perry

P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: ⁠https://ThisBookIsFAIK.com⁠.

P.P.S -- Did you know that we have a text version of this newsletter? Check it out on ⁠LinkedIn⁠ or at ⁠The Deception Project⁠ website. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Aug 2025 05:06:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f19b550-766a-11f0-b06a-63b5ce14b4cb/image/0cd7f9ee87955a1ae28f6347c7c93d49.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome to Deceptive Minds - An audio newsletter about how we are fooled, how we fool ourselves, and what we can do about it. 

This one is all about "The Long Con."



When the lie moves in next door.

Not every con kicks down the door. Some knock politely, charm their way inside, and stay for dinner.

In this issue , we explore the anatomy of the long con... a psychological slow-burn that trades urgency for intimacy. Think of these as more than just scams. They’re stories that unfold like relationships... until the final betrayal.





In other news:

New FAIK Files episode (Video Killed the ...)


  Audio version: https://pod.link/1771521321/episode/012b4c787fc35a8cd9df3d8f99fcd569


  YouTube version: https://youtu.be/mYFwURVoPE8 




Interesting Thing of the Week: 

Hany Farid's TED Talk, How to spot fake AI photos: https://www.ted.com/talks/hany_farid_how_to_spot_fake_ai_photos



Until next week... stay safe out there!

Perry

P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: ⁠https://ThisBookIsFAIK.com⁠.

P.P.S -- Did you know that we have a text version of this newsletter? Check it out on ⁠LinkedIn⁠ or at ⁠The Deception Project⁠ website. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to Deceptive Minds - An audio newsletter about how we are fooled, how we fool ourselves, and what we can do about it. </p>
<p>This one is all about "The Long Con."</p>
<p><br></p>
<p>When the lie moves in next door.</p>
<p>Not every con kicks down the door. Some knock politely, charm their way inside, and stay for dinner.</p>
<p>In this issue , we explore the anatomy of the long con... a psychological slow-burn that trades urgency for intimacy. Think of these as more than just scams. They’re stories that unfold like relationships... until the final betrayal.</p>
<p><br></p>
<p><br></p>
<p>In other news:</p>
<p><strong>New FAIK Files episode (Video Killed the ...)</strong></p>
<ul>
  <li>Audio version: <a href="https://pod.link/1771521321/episode/012b4c787fc35a8cd9df3d8f99fcd569">https://pod.link/1771521321/episode/012b4c787fc35a8cd9df3d8f99fcd569</a>
</li>
  <li>YouTube version: <a href="https://youtu.be/mYFwURVoPE8">https://youtu.be/mYFwURVoPE8</a> </li>
</ul>
<p><br></p>
<p><strong>Interesting Thing of the Week: </strong></p>
<p>Hany Farid's TED Talk, <em>How to spot fake AI photos</em>: <a href="https://www.ted.com/talks/hany_farid_how_to_spot_fake_ai_photos">https://www.ted.com/talks/hany_farid_how_to_spot_fake_ai_photos</a></p>
<p><br></p>
<p>Until next week... stay safe out there!</p>
<p>Perry</p>
<p>P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: <a href="https://thisbookisfaik.com/">⁠<strong>https://ThisBookIsFAIK.com</strong>⁠</a>.</p>
<p>P.P.S -- Did you know that we have a text version of this newsletter? Check it out on <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7319922626200510464">⁠LinkedIn⁠</a> or at <a href="https://TheDeceptionProject.com">⁠The Deception Project⁠</a> website. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>684</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f19b550-766a-11f0-b06a-63b5ce14b4cb]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1528518437.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cognitive Heist series #4: The Ghost - Panic, Urgency, and the Speed of Deception</title>
      <description>👻 New Deceptive Minds issue: Cognitive Heist series issue #4 -- The Ghost

The ghost doesn’t break in. It doesn’t even exist. It just panics you into acting-- fast, unthinking, exposed.

This issue explores one of the most dangerous tools in a scammer’s toolkit: urgency. We unpack:

 🧠 The psychology of panic and why urgency shuts down critical thinking

 📞 Real-world scams that weaponize fake emergencies

 🕯️ A chilling tie-in to folklore: the crying child at the door

 🐙 And yes, there are tentacles. Always tentacles.

The Ghost's superpower is tricking you into moving before you think.

---

Check out the most recent FAIK Files podcast: Dark Knowledge &amp; Hidden Agendas


  Audio version: https://pod.link/1771521321/episode/ae2224ed846ac80ad3c8e2fbc0185087


  YouTube version: https://youtu.be/U7447dpffao



Interesting research of the week: Sweet-talk the bots: New research shows how LLMs respond to human persuasion tricks


  Geekwire article: https://www.geekwire.com/2025/sweet-talk-the-bots-new-research-shows-how-llms-respond-to-human-persuasion-tricks/


  Wharton School blog post: https://gail.wharton.upenn.edu/research-and-insights/call-me-a-jerk-persuading-ai/





Until next week... stay safe out there!

Perry

P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com.

P.P.S -- Did you know that we have a text version of this newsletter? Check it out on LinkedIn or at The Deception Project website. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Aug 2025 23:53:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/85613524-6bdf-11f0-9d06-1b5680d7932d/image/227eb3097204a6863d32838a167d6a1a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>👻 New Deceptive Minds issue: Cognitive Heist series issue #4 -- The Ghost

The ghost doesn’t break in. It doesn’t even exist. It just panics you into acting-- fast, unthinking, exposed.

This issue explores one of the most dangerous tools in a scammer’s toolkit: urgency. We unpack:

 🧠 The psychology of panic and why urgency shuts down critical thinking

 📞 Real-world scams that weaponize fake emergencies

 🕯️ A chilling tie-in to folklore: the crying child at the door

 🐙 And yes, there are tentacles. Always tentacles.

The Ghost's superpower is tricking you into moving before you think.

---

Check out the most recent FAIK Files podcast: Dark Knowledge &amp; Hidden Agendas


  Audio version: https://pod.link/1771521321/episode/ae2224ed846ac80ad3c8e2fbc0185087


  YouTube version: https://youtu.be/U7447dpffao



Interesting research of the week: Sweet-talk the bots: New research shows how LLMs respond to human persuasion tricks


  Geekwire article: https://www.geekwire.com/2025/sweet-talk-the-bots-new-research-shows-how-llms-respond-to-human-persuasion-tricks/


  Wharton School blog post: https://gail.wharton.upenn.edu/research-and-insights/call-me-a-jerk-persuading-ai/





Until next week... stay safe out there!

Perry

P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com.

P.P.S -- Did you know that we have a text version of this newsletter? Check it out on LinkedIn or at The Deception Project website. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>👻 New Deceptive Minds issue: Cognitive Heist series issue #4 -- The Ghost</p>
<p>The ghost doesn’t break in. It doesn’t even exist. It just panics you into acting-- fast, unthinking, exposed.</p>
<p>This issue explores one of the most dangerous tools in a scammer’s toolkit: urgency. We unpack:</p>
<p> 🧠 The psychology of panic and why urgency shuts down critical thinking</p>
<p> 📞 Real-world scams that weaponize fake emergencies</p>
<p> 🕯️ A chilling tie-in to folklore: the crying child at the door</p>
<p> 🐙 And yes, there are tentacles. Always tentacles.</p>
<p>The Ghost's superpower is tricking you into moving before you think.</p>
<p>---</p>
<p><strong>Check out the most recent FAIK Files podcast</strong>: <em><strong>Dark Knowledge &amp; Hidden Agendas</strong></em></p>
<ul>
  <li>Audio version: <a href="https://pod.link/1771521321/episode/ae2224ed846ac80ad3c8e2fbc0185087">https://pod.link/1771521321/episode/ae2224ed846ac80ad3c8e2fbc0185087</a>
</li>
  <li>YouTube version: <a href="https://youtu.be/U7447dpffao">https://youtu.be/U7447dpffao</a>
</li>
</ul>
<p><strong>Interesting research of the week</strong>: Sweet-talk the bots: New research shows how LLMs respond to human persuasion tricks</p>
<ul>
  <li>Geekwire article: <a href="https://www.geekwire.com/2025/sweet-talk-the-bots-new-research-shows-how-llms-respond-to-human-persuasion-tricks/">https://www.geekwire.com/2025/sweet-talk-the-bots-new-research-shows-how-llms-respond-to-human-persuasion-tricks/</a>
</li>
  <li>Wharton School blog post: <a href="https://gail.wharton.upenn.edu/research-and-insights/call-me-a-jerk-persuading-ai/">https://gail.wharton.upenn.edu/research-and-insights/call-me-a-jerk-persuading-ai/</a>
</li>
</ul>
<p><br></p>
<p>Until next week... stay safe out there!</p>
<p>Perry</p>
<p>P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: <a href="https://thisbookisfaik.com/"><strong>https://ThisBookIsFAIK.com</strong></a>.</p>
<p>P.P.S -- Did you know that we have a text version of this newsletter? Check it out on <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7319922626200510464">LinkedIn</a> or at <a href="https://TheDeceptionProject.com">The Deception Project</a> website. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>729</itunes:duration>
      <guid isPermaLink="false"><![CDATA[85613524-6bdf-11f0-9d06-1b5680d7932d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9006346096.mp3?updated=1753727511" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cognitive Heists series #3: The Call Is Coming from Inside Your Mind</title>
      <description>📞 The Call Is Coming from Inside Your Mind

 

Welcome to #3 of the "Cognitive Heists" series.  The Voice in Your Head -- Authority, Audio Deepfakes, and the Power of a Familiar Voice



In 2019, a UK energy firm received a call. The voice on the other end sounded exactly like the CEO of their German parent company. 



The request? Transfer €220,000 immediately to a trusted vendor. It wasn’t the CEO. It was a deepfake.



This was the first confirmed deepfake voice fraud used to commit corporate theft—and it’s only the beginning.



This issue dives into:

 🎧 Why voice is one of the most powerful trust signals—and why that’s dangerous now

 😨 How vishing, voice cloning, and audio deepfakes hijack your certainty

 👻 A classic urban legend (yep—the babysitter and the call from inside the house)

 🧠 The psychology of obedience, panic, and auditory illusion

 🧯 And how to train your brain to pause the response before the wire transfer



In a world where your boss’s voice can be faked, what part of your brain do you not listen to?



A couple relevant sources related to AI based voice scams:




  
[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing: (this is my story about having an AI voice bot participate in DEFCON's Social Engineering Community Capture the Flag competition). https://blog.knowbe4.com/proved-unsuspecting-call-recipients-are-super-vulnerable-to-ai-vishing


  
Seeing (and Hearing) Isn’t Believing: My SEC Presentation on AI-Driven Scams: https://blog.knowbe4.com/seeing-and-hearing-isnt-believing-my-sec-presentation-on-ai-driven-scams





The FAIK Files: AI Oopsies!


  
Audio version: https://pod.link/1771521321/episode/af214a2812ad672b675870a9fb56f4cb


  
YouTube version: https://www.youtube.com/watch?v=NY31aE5-PxA





TechCrunch story: Google’s Gemini panicked when playing Pokémon: https://techcrunch.com/2025/06/17/googles-gemini-panicked-when-playing-pokemon/



P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Jul 2025 17:30:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5a50f34a-65ce-11f0-9c4d-a7b4ef0ba248/image/2ada6606b7fdd7fb2cfb938ee8e0b138.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>📞 The Call Is Coming from Inside Your Mind

 

Welcome to #3 of the "Cognitive Heists" series.  The Voice in Your Head -- Authority, Audio Deepfakes, and the Power of a Familiar Voice



In 2019, a UK energy firm received a call. The voice on the other end sounded exactly like the CEO of their German parent company. 



The request? Transfer €220,000 immediately to a trusted vendor. It wasn’t the CEO. It was a deepfake.



This was the first confirmed deepfake voice fraud used to commit corporate theft—and it’s only the beginning.



This issue dives into:

 🎧 Why voice is one of the most powerful trust signals—and why that’s dangerous now

 😨 How vishing, voice cloning, and audio deepfakes hijack your certainty

 👻 A classic urban legend (yep—the babysitter and the call from inside the house)

 🧠 The psychology of obedience, panic, and auditory illusion

 🧯 And how to train your brain to pause the response before the wire transfer



In a world where your boss’s voice can be faked, what part of your brain do you not listen to?



A couple relevant sources related to AI based voice scams:




  
[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing: (this is my story about having an AI voice bot participate in DEFCON's Social Engineering Community Capture the Flag competition). https://blog.knowbe4.com/proved-unsuspecting-call-recipients-are-super-vulnerable-to-ai-vishing


  
Seeing (and Hearing) Isn’t Believing: My SEC Presentation on AI-Driven Scams: https://blog.knowbe4.com/seeing-and-hearing-isnt-believing-my-sec-presentation-on-ai-driven-scams





The FAIK Files: AI Oopsies!


  
Audio version: https://pod.link/1771521321/episode/af214a2812ad672b675870a9fb56f4cb


  
YouTube version: https://www.youtube.com/watch?v=NY31aE5-PxA





TechCrunch story: Google’s Gemini panicked when playing Pokémon: https://techcrunch.com/2025/06/17/googles-gemini-panicked-when-playing-pokemon/



P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>📞 The Call Is Coming from Inside Your Mind</p>
<p> </p>
<p>Welcome to #3 of the "Cognitive Heists" series. <strong> The Voice in Your Head -- Authority, Audio Deepfakes, and the Power of a Familiar Voice</strong></p>
<p><br></p>
<p>In 2019, a UK energy firm received a call. The voice on the other end sounded exactly like the CEO of their German parent company. </p>
<p><br></p>
<p>The request? Transfer €220,000 immediately to a trusted vendor. It wasn’t the CEO. It was a deepfake.</p>
<p><br></p>
<p>This was the first confirmed deepfake voice fraud used to commit corporate theft—and it’s only the beginning.</p>
<p><br></p>
<p>This issue dives into:</p>
<p> 🎧 Why voice is one of the most powerful trust signals—and why that’s dangerous now</p>
<p> 😨 How vishing, voice cloning, and audio deepfakes hijack your certainty</p>
<p> 👻 A classic urban legend (yep—the babysitter and the call from inside the house)</p>
<p> 🧠 The psychology of obedience, panic, and auditory illusion</p>
<p> 🧯 And how to train your brain to pause the response before the wire transfer</p>
<p><br></p>
<p>In a world where your boss’s voice can be faked, what part of your brain do you not listen to?</p>
<p><br></p>
<p>A couple relevant sources related to AI based voice scams:</p>
<p><br></p>
<ul>
  <li>
<strong>[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing</strong>: (this is my story about having an AI voice bot participate in DEFCON's Social Engineering Community Capture the Flag competition). <a href="https://blog.knowbe4.com/proved-unsuspecting-call-recipients-are-super-vulnerable-to-ai-vishing"><strong>https://blog.knowbe4.com/proved-unsuspecting-call-recipients-are-super-vulnerable-to-ai-vishing</strong></a>
</li>
  <li>
<strong>Seeing (and Hearing) Isn’t Believing: My SEC Presentation on AI-Driven Scams</strong>: <a href="https://blog.knowbe4.com/seeing-and-hearing-isnt-believing-my-sec-presentation-on-ai-driven-scams"><strong>https://blog.knowbe4.com/seeing-and-hearing-isnt-believing-my-sec-presentation-on-ai-driven-scams</strong></a>
</li>
</ul>
<p><br></p>
<p><u><strong>The FAIK Files: AI Oopsies!</strong></u></p>
<ul>
  <li>
<strong>Audio version</strong>: <a href="https://pod.link/1771521321/episode/af214a2812ad672b675870a9fb56f4cb">https://pod.link/1771521321/episode/af214a2812ad672b675870a9fb56f4cb</a>
</li>
  <li>
<strong>YouTube version</strong>: <a href="https://www.youtube.com/watch?v=NY31aE5-PxA">https://www.youtube.com/watch?v=NY31aE5-PxA</a>
</li>
<p><br></p>
</ul>
<p><strong>TechCrunch story: Google’s Gemini panicked when playing Pokémon: </strong><a href="https://techcrunch.com/2025/06/17/googles-gemini-panicked-when-playing-pokemon/">https://techcrunch.com/2025/06/17/googles-gemini-panicked-when-playing-pokemon/</a></p>
<p><br></p>
<p>P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: <a href="https://thisbookisfaik.com/"><strong>https://ThisBookIsFAIK.com</strong></a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>732</itunes:duration>
      <guid isPermaLink="false"><![CDATA[5a50f34a-65ce-11f0-9c4d-a7b4ef0ba248]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5762162676.mp3?updated=1753926492" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cognitive Heist series #2: The Bait Man</title>
      <description>Welcome to part 2 of the Cognitive Heist miniseries: The Bait Man


  🗝️ He doesn’t pick the lock. 

  🚪 He doesn’t sneak in the back. 

  🪝 He just leaves something shiny on the ground and waits for you to pick it up.


Enter "The Bait Man": the scammer who lets your own curiosity or greed do all the work.

Part 2 of Cognitive Heist explores: 

👉 Why bait-based scams (phishing, “found” USBs, QR traps, honeytexts) work so well 

👉 The irresistible psychology of forbidden knowledge and too-good-to-miss offers 

👉 A chilling parallel with the Nazi gold train legend—possibly the most expensive “nothing” in history

👉 The ancient myth of Pandora’s Box... and what it says about modern clickbait

👉 And as always: tentacles, noir, and cognitive traps.



In other news:

👉 The FAIK Files: Climbing Through the Context Window


  Audio version: https://pod.link/1771521321/episode/3ec38fa7cd599b26e3c7fde25651a3f0


  YouTube version: https://www.youtube.com/watch?v=3ntZlQ4Lbkw 


👉  Research Paper of the Week: Project Vend-- Can Claude run a small shop? (And why does that matter?)


  
Anthropic's page discussing the experiment


  Business Insider




P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Jul 2025 22:13:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f25ec90-6354-11f0-8c5f-c307c8126dac/image/359419fd178b7eff58ad43ebebc31ce1.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome to part 2 of the Cognitive Heist miniseries: The Bait Man


  🗝️ He doesn’t pick the lock. 

  🚪 He doesn’t sneak in the back. 

  🪝 He just leaves something shiny on the ground and waits for you to pick it up.


Enter "The Bait Man": the scammer who lets your own curiosity or greed do all the work.

Part 2 of Cognitive Heist explores: 

👉 Why bait-based scams (phishing, “found” USBs, QR traps, honeytexts) work so well 

👉 The irresistible psychology of forbidden knowledge and too-good-to-miss offers 

👉 A chilling parallel with the Nazi gold train legend—possibly the most expensive “nothing” in history

👉 The ancient myth of Pandora’s Box... and what it says about modern clickbait

👉 And as always: tentacles, noir, and cognitive traps.



In other news:

👉 The FAIK Files: Climbing Through the Context Window


  Audio version: https://pod.link/1771521321/episode/3ec38fa7cd599b26e3c7fde25651a3f0


  YouTube version: https://www.youtube.com/watch?v=3ntZlQ4Lbkw 


👉  Research Paper of the Week: Project Vend-- Can Claude run a small shop? (And why does that matter?)


  
Anthropic's page discussing the experiment


  Business Insider




P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Welcome to part 2 of the Cognitive Heist miniseries: The Bait Man</strong></p>
<ul>
  <li>🗝️ He doesn’t pick the lock. </li>
  <li>🚪 He doesn’t sneak in the back. </li>
  <li>🪝 He just leaves something shiny on the ground and waits for you to pick it up.</li>
</ul>
<p>Enter "The Bait Man": the scammer who lets your own curiosity or greed do all the work.</p>
<p>Part 2 of Cognitive Heist explores: </p>
<p>👉 Why bait-based scams (phishing, “found” USBs, QR traps, honeytexts) work so well </p>
<p>👉 The irresistible psychology of forbidden knowledge and too-good-to-miss offers </p>
<p>👉 A chilling parallel with the Nazi gold train legend—possibly the most expensive “nothing” in history</p>
<p>👉 The ancient myth of Pandora’s Box... and what it says about modern clickbait</p>
<p>👉 And as always: tentacles, noir, and cognitive traps.</p>
<p><br></p>
<p><strong>In other news:</strong></p>
<p>👉 The FAIK Files: Climbing Through the Context Window</p>
<ul>
  <li>Audio version: <a href="https://pod.link/1771521321/episode/3ec38fa7cd599b26e3c7fde25651a3f0">https://pod.link/1771521321/episode/3ec38fa7cd599b26e3c7fde25651a3f0</a>
</li>
  <li>YouTube version: <a href="https://www.youtube.com/watch?v=3ntZlQ4Lbkw">https://www.youtube.com/watch?v=3ntZlQ4Lbkw</a> </li>
</ul>
<p>👉  Research Paper of the Week: Project Vend-- Can Claude run a small shop? (And why does that matter?)</p>
<ul>
  <li>
<strong></strong><a href="https://www.anthropic.com/research/project-vend-1"><strong>Anthropic's page discussing the experiment</strong></a><strong></strong>
</li>
  <li><a href="https://www.businessinsider.com/claude-ran-store-anthropic-ai-agent-lessons-learned-middle-managers-2025-6?utm_source=chatgpt.com">Business Insider</a></li>
</ul>
<p><br></p>
<p>P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: <a href="https://thisbookisfaik.com/"><strong>https://ThisBookIsFAIK.com</strong></a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>811</itunes:duration>
      <guid isPermaLink="false"><![CDATA[9f25ec90-6354-11f0-8c5f-c307c8126dac]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4013668050.mp3?updated=1753935209" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cognitive Heists series #1: The Insider -- Trust by Proximity, not Proof</title>
      <description>🕵️‍♂️ New Deceptive Minds mini-series: Behind the Scams (Cognitive Heists) 🕵️‍♂️ 

They didn’t pick the lock. 

They didn’t sneak in through the vents. 

You held the door open for them.

This week’s issue kicks off a new 10-part series: Cognitive Heist—a deep dive into the psychological exploits behind the world’s most effective social engineering attacks.T

his week is all about "The Insider": Trust by proximity.

Why do we let people in—not because they’re verified, but because they seem like they belong?

We unpack:

 ⚡ The psychology of in-group bias and “trust theater”

 ⚡ Real-world infiltration tactics (think BEC, fake IT staff, Slack scams) 

⚡ Urban legends and conspiracies that make insiders feel mythic

 ⚡ How your mind, not your firewall, is the real attack surface

You’ll never look at the new guy in the group chat the same way again.Oh... and there are a couple other fun bits in there as well. 

Enjoy!




  
Cognitive Inoculation: Winn Schwartau and the Metawar -- FAIK Files Podcast (audio version): https://thecyberwire.com/podcasts/the-faik-files/41/notes

  
Cognitive Inoculation: Winn Schwartau and the Metawar -- FAIK Files Podcast (YouTube version): https://www.youtube.com/watch?v=3ntZlQ4Lbkw


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Jul 2025 19:26:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/033837f0-5acd-11f0-93bc-0be442d19806/image/91617770b6501b11c9a511c1bd9b7022.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>🕵️‍♂️ New Deceptive Minds mini-series: Behind the Scams (Cognitive Heists) 🕵️‍♂️ 

They didn’t pick the lock. 

They didn’t sneak in through the vents. 

You held the door open for them.

This week’s issue kicks off a new 10-part series: Cognitive Heist—a deep dive into the psychological exploits behind the world’s most effective social engineering attacks.T

his week is all about "The Insider": Trust by proximity.

Why do we let people in—not because they’re verified, but because they seem like they belong?

We unpack:

 ⚡ The psychology of in-group bias and “trust theater”

 ⚡ Real-world infiltration tactics (think BEC, fake IT staff, Slack scams) 

⚡ Urban legends and conspiracies that make insiders feel mythic

 ⚡ How your mind, not your firewall, is the real attack surface

You’ll never look at the new guy in the group chat the same way again.Oh... and there are a couple other fun bits in there as well. 

Enjoy!




  
Cognitive Inoculation: Winn Schwartau and the Metawar -- FAIK Files Podcast (audio version): https://thecyberwire.com/podcasts/the-faik-files/41/notes

  
Cognitive Inoculation: Winn Schwartau and the Metawar -- FAIK Files Podcast (YouTube version): https://www.youtube.com/watch?v=3ntZlQ4Lbkw


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>🕵️‍♂️ New Deceptive Minds mini-series: Behind the Scams (Cognitive Heists) 🕵️‍♂️ </p>
<p>They didn’t pick the lock. </p>
<p>They didn’t sneak in through the vents. </p>
<p>You held the door open for them.</p>
<p>This week’s issue kicks off a new 10-part series: Cognitive Heist—a deep dive into the psychological exploits behind the world’s most effective social engineering attacks.T</p>
<p>his week is all about "The Insider": Trust by proximity.</p>
<p>Why do we let people in—not because they’re verified, but because they seem like they belong?</p>
<p>We unpack:</p>
<p> ⚡ The psychology of in-group bias and “trust theater”</p>
<p> ⚡ Real-world infiltration tactics (think BEC, fake IT staff, Slack scams) </p>
<p>⚡ Urban legends and conspiracies that make insiders feel mythic</p>
<p> ⚡ How your mind, not your firewall, is the real attack surface</p>
<p>You’ll never look at the new guy in the group chat the same way again.Oh... and there are a couple other fun bits in there as well. </p>
<p>Enjoy!</p>
<p><br></p>
<ul>
  <li>
<strong>Cognitive Inoculation: Winn Schwartau and the Metawar -- FAIK Files Podcast (audio version):</strong> https://thecyberwire.com/podcasts/the-faik-files/41/notes</li>
  <li>
<strong>Cognitive Inoculation: Winn Schwartau and the Metawar -- FAIK Files Podcast (YouTube version): </strong>https://www.youtube.com/watch?v=3ntZlQ4Lbkw</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>788</itunes:duration>
      <guid isPermaLink="false"><![CDATA[033837f0-5acd-11f0-93bc-0be442d19806]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3675713949.mp3?updated=1753060093" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Narrative Armor: Why Some Stories Become Immune to the Truth</title>
      <description>When it comes to deception, everything is about story. 

And the stories people cling hardest to are ones that aren't solely about information... they are about self-protection. They explain the world. They spark emotion. They reinforce identity.

And once we believe them, we don’t just share them…We defend them.

In this issue of Deceptive Minds, I explore why some narratives become immune to fact-checking, critique, or correction — and how we end up reinforcing falsehoods just by wanting them to be true.

 🛡️ Why emotionally charged stories resist disproof

 🧠 How narratives come preloaded with defenses (mockery, morality, tribalism)

 📜 Real-world &amp; historical examples of story-based immunity

 🧩 And how to tell when you're dealing with a belief that's been bulletproofed

Because when deception takes the form of a story you want to believe… truth never even gets a chance.



Deceptive Minds: newsletter about how we are fooled, how we fool ourselves, and what we can do about it.



Check out the print newsletter on ⁠⁠LinkedIn⁠⁠ or on my ⁠⁠website⁠⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Jun 2025 20:03:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/eb78aaa0-545a-11f0-9c62-7b7ecd45560c/image/a1f7252a738f2b0be568069c07e14a61.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>When it comes to deception, everything is about story. 

And the stories people cling hardest to are ones that aren't solely about information... they are about self-protection. They explain the world. They spark emotion. They reinforce identity.

And once we believe them, we don’t just share them…We defend them.

In this issue of Deceptive Minds, I explore why some narratives become immune to fact-checking, critique, or correction — and how we end up reinforcing falsehoods just by wanting them to be true.

 🛡️ Why emotionally charged stories resist disproof

 🧠 How narratives come preloaded with defenses (mockery, morality, tribalism)

 📜 Real-world &amp; historical examples of story-based immunity

 🧩 And how to tell when you're dealing with a belief that's been bulletproofed

Because when deception takes the form of a story you want to believe… truth never even gets a chance.



Deceptive Minds: newsletter about how we are fooled, how we fool ourselves, and what we can do about it.



Check out the print newsletter on ⁠⁠LinkedIn⁠⁠ or on my ⁠⁠website⁠⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>When it comes to deception, everything is about story. </p>
<p>And the stories people cling hardest to are ones that aren't solely about information... they are about self-protection. They explain the world. They spark emotion. They reinforce identity.</p>
<p>And once we believe them, we don’t just share them…We defend them.</p>
<p>In this issue of Deceptive Minds, I explore why some narratives become immune to fact-checking, critique, or correction — and how we end up reinforcing falsehoods just by wanting them to be true.</p>
<p> 🛡️ Why emotionally charged stories resist disproof</p>
<p> 🧠 How narratives come preloaded with defenses (mockery, morality, tribalism)</p>
<p> 📜 Real-world &amp; historical examples of story-based immunity</p>
<p> 🧩 And how to tell when you're dealing with a belief that's been bulletproofed</p>
<p>Because when deception takes the form of a story you want to believe… truth never even gets a chance.</p>
<p><br></p>
<p><strong>Deceptive Minds: newsletter about how we are fooled, how we fool ourselves, and what we can do about it.</strong></p>
<p><br></p>
<p>Check out the print newsletter on <a href="https://www.linkedin.com/newsletters/deceptive-minds-7319922626200510464/">⁠⁠LinkedIn⁠⁠</a> or on my <a href="https://www.thedeceptionproject.com/">⁠⁠website⁠⁠</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>685</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb78aaa0-545a-11f0-9c62-7b7ecd45560c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3179337427.mp3?updated=1752263212" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Repeat Until Real</title>
      <description>Hey Friends!

This is one of the most important issues so far -- please share!

Ever find yourself believing something… just because you’ve heard it enough? That’s the Illusory Truth Effect at work. "Illusory Truth" is the cognitive glitch that makes repetition feel like credibility.

In this issue of Deceptive Minds, we explore: 

   🧠 Why familiar lies feel more believable than unfamiliar truths 

   📢 How repetition is used in marketing, politics, scams, and propagan

   🛡️ And how to defend your mind against one of the most powerful tools in deception

If it’s been said often enough, we stop asking whether it’s true. We just… feel like it is.

🧩 How This Connects to Previous Deceptive Minds Issues


  
Narrative sets the stage.

  
Attention brings focus.

  
Plausibility helps the lie land.

  
Fluency makes it feel smooth.

  
Emotion gives it velocity.

  
Credibility theater dresses it in trust signals.

  
Repetition cements it.


Repetition is the glue that binds these elements together. It gives them staying power. It builds the illusion of consensus — even when there is none.



Want to see my Bigfoot Security Tips video? Here are links to the video on YouTube, LinkedIn, and TikTok. 



Till next time!

Perry



Check out the print newsletter on LinkedIn or on my website. 


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Jun 2025 22:27:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/231be310-4a55-11f0-9e02-33c61d3f13e9/image/3b0067659e34be5162434ddda037d8d7.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hey Friends!

This is one of the most important issues so far -- please share!

Ever find yourself believing something… just because you’ve heard it enough? That’s the Illusory Truth Effect at work. "Illusory Truth" is the cognitive glitch that makes repetition feel like credibility.

In this issue of Deceptive Minds, we explore: 

   🧠 Why familiar lies feel more believable than unfamiliar truths 

   📢 How repetition is used in marketing, politics, scams, and propagan

   🛡️ And how to defend your mind against one of the most powerful tools in deception

If it’s been said often enough, we stop asking whether it’s true. We just… feel like it is.

🧩 How This Connects to Previous Deceptive Minds Issues


  
Narrative sets the stage.

  
Attention brings focus.

  
Plausibility helps the lie land.

  
Fluency makes it feel smooth.

  
Emotion gives it velocity.

  
Credibility theater dresses it in trust signals.

  
Repetition cements it.


Repetition is the glue that binds these elements together. It gives them staying power. It builds the illusion of consensus — even when there is none.



Want to see my Bigfoot Security Tips video? Here are links to the video on YouTube, LinkedIn, and TikTok. 



Till next time!

Perry



Check out the print newsletter on LinkedIn or on my website. 


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hey Friends!</p>
<p>This is one of the most important issues so far -- please share!</p>
<p>Ever find yourself believing something… just because you’ve heard it enough? That’s the Illusory Truth Effect at work. "Illusory Truth" is the cognitive glitch that makes repetition feel like credibility.</p>
<p>In this issue of Deceptive Minds, we explore: </p>
<p>   🧠 Why familiar lies feel more believable than unfamiliar truths </p>
<p>   📢 How repetition is used in marketing, politics, scams, and propagan</p>
<p>   🛡️ And how to defend your mind against one of the most powerful tools in deception</p>
<p>If it’s been said often enough, we stop asking whether it’s true. We just… feel like it is.</p>
<p>🧩 How This Connects to Previous Deceptive Minds Issues</p>
<ul>
  <li>
<a href="https://www.linkedin.com/pulse/artifacts-deception-perry-carpenter-hhjyc/?trackingId=FFyzwfN3Sl2biIAM%2FpuoUQ%3D%3D"><strong>Narrative</strong></a> sets the stage.</li>
  <li>
<a href="https://www.linkedin.com/pulse/look-here-why-every-great-deception-starts-stolen-perry-carpenter-veprc/?trackingId=ERjSvc%2FhSeS7szbEKJumvg%3D%3D">Attention</a> brings focus.</li>
  <li>
<a href="https://www.linkedin.com/pulse/when-plausibility-beats-truth-perry-carpenter-frxdc/?trackingId=JIyvqdQqRuaTPmDgouCNIA%3D%3D"><strong>Plausibility</strong></a> helps the lie land.</li>
  <li>
<a href="https://www.linkedin.com/pulse/too-easy-true-fluency-trap-lie-slides-right-past-you-perry-carpenter-lbw3c/?trackingId=w9xPWpR6TTm8Qgp0qw27NA%3D%3D"><strong>Fluency</strong></a> makes it feel smooth.</li>
  <li>
<a href="https://www.linkedin.com/pulse/feel-first-think-never-your-emotions-exploit-perry-carpenter-hgjnc/?trackingId=lwXVKYv9Sr2PoGRXPuIDbw%3D%3D"><strong>Emotion</strong></a> gives it velocity.</li>
  <li>
<a href="https://www.linkedin.com/pulse/costume-truth-why-we-trust-logo-lab-coat-lanyard-perry-carpenter-qqfmc/?trackingId=%2FL1l%2BBKQSIiS5hX9DuQb8A%3D%3D"><strong>Credibility theater</strong></a> dresses it in trust signals.</li>
  <li>
<strong>Repetition</strong> cements it.</li>
</ul>
<p>Repetition is the <strong>glue</strong> that binds these elements together. It gives them staying power. It builds the <em>illusion</em> of consensus — even when there is none.</p>
<p><br></p>
<p>Want to see my Bigfoot Security Tips video? Here are links to the video on <a href="https://youtube.com/shorts/tMPEZiurjKU?feature=share">YouTube</a>, <a href="https://www.linkedin.com/feed/update/urn:li:activity:7339387658789339137/">LinkedIn</a>, and <a href="https://www.tiktok.com/@digitalfolklore/video/7515534609711402270">TikTok</a>. </p>
<p><br></p>
<p>Till next time!</p>
<p>Perry</p>
<p><br></p>
<p>Check out the print newsletter on <a href="https://www.linkedin.com/newsletters/deceptive-minds-7319922626200510464/">LinkedIn</a> or on my <a href="https://www.thedeceptionproject.com/">website</a>. </p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[231be310-4a55-11f0-9e02-33c61d3f13e9]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4347558622.mp3?updated=1752263180" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Truth Hurts. So We Lie.</title>
      <description>Ok. This one's pretty uncomfortable. It's about the lies we tell ourselves and why we believe them.

We all like to think we’re rational. But the truth is, our minds are masters of defense... not just against deception, but against discomfort. 

In this issue, I explore the mental machinery behind "motivated reasoning" and "cognitive dissonance." These are mechanisms we use to try to protect ourselves from inconvenient facts. 


  🔍 Why we reject information that threatens identity 

  🛡️ How our beliefs start defending themselves 

  🎭 Why feeling right often beats being right


This theme hits at the core of the Deceptive Minds mission: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it.

Want to check out the print version? You can ⁠⁠get here as a LinkedIn newslette⁠r⁠. Or you can subscribe to the email version on my website: ⁠⁠https://TheDeceptionProject.com⁠⁠

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com



Other references for this issue:


  https://en.wikipedia.org/wiki/Modern_flat_Earth_beliefs

  https://en.wikipedia.org/wiki/Repressed_memory

  https://www.cdc.gov/tuskegee/about/index.html

  Jessica Barker's newsletter: Human Nature of Cyber Security: https://www.linkedin.com/newsletters/7312575416190255104/


  Jessica Barker's LinkedIn profile: https://www.linkedin.com/in/jessica-barker/


  The FAIK FILES Audio version here: https://thecyberwire.com/podcasts/the-faik-files/38/notes


  FAIK FILES YouTube version: https://youtu.be/Sy67tVZ_OVk


  Apple's controversial research paper: https://ml-site.cdn-apple.com/papers/the-illusion-of-thinking.pdf


  Nate Jones' thoughts on the Apple paper: https://www.youtube.com/watch?v=I9tYAvjkOQk 



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Jun 2025 21:13:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/51285a68-455a-11f0-bf6a-3bb2f3ccc1d4/image/390e4f2d65e5090c21dc8c396afcbd0f.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ok. This one's pretty uncomfortable. It's about the lies we tell ourselves and why we believe them.

We all like to think we’re rational. But the truth is, our minds are masters of defense... not just against deception, but against discomfort. 

In this issue, I explore the mental machinery behind "motivated reasoning" and "cognitive dissonance." These are mechanisms we use to try to protect ourselves from inconvenient facts. 


  🔍 Why we reject information that threatens identity 

  🛡️ How our beliefs start defending themselves 

  🎭 Why feeling right often beats being right


This theme hits at the core of the Deceptive Minds mission: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it.

Want to check out the print version? You can ⁠⁠get here as a LinkedIn newslette⁠r⁠. Or you can subscribe to the email version on my website: ⁠⁠https://TheDeceptionProject.com⁠⁠

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com



Other references for this issue:


  https://en.wikipedia.org/wiki/Modern_flat_Earth_beliefs

  https://en.wikipedia.org/wiki/Repressed_memory

  https://www.cdc.gov/tuskegee/about/index.html

  Jessica Barker's newsletter: Human Nature of Cyber Security: https://www.linkedin.com/newsletters/7312575416190255104/


  Jessica Barker's LinkedIn profile: https://www.linkedin.com/in/jessica-barker/


  The FAIK FILES Audio version here: https://thecyberwire.com/podcasts/the-faik-files/38/notes


  FAIK FILES YouTube version: https://youtu.be/Sy67tVZ_OVk


  Apple's controversial research paper: https://ml-site.cdn-apple.com/papers/the-illusion-of-thinking.pdf


  Nate Jones' thoughts on the Apple paper: https://www.youtube.com/watch?v=I9tYAvjkOQk 



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ok. This one's pretty uncomfortable. It's about the lies we tell ourselves and why we believe them.</p>
<p>We all like to think we’re rational. But the truth is, our minds are masters of defense... not just against deception, but against discomfort. </p>
<p>In this issue, I explore the mental machinery behind "motivated reasoning" and "cognitive dissonance." These are mechanisms we use to try to protect ourselves from inconvenient facts. </p>
<ul>
  <li>🔍 Why we reject information that threatens identity </li>
  <li>🛡️ How our beliefs start defending themselves </li>
  <li>🎭 Why feeling right often beats being right</li>
</ul>
<p>This theme hits at the core of the Deceptive Minds mission: a newsletter about how we are fooled, <strong>how we fool ourselves</strong>, and what we can do about it.</p>
<p>Want to check out the print version? You can ⁠<a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7319922626200510464">⁠get here as a LinkedIn newslette⁠</a>r⁠. Or you can subscribe to the email version on my website: <a href="https://TheDeceptionProject.com">⁠⁠https://TheDeceptionProject.com⁠⁠</a></p>
<p>Anything you'd like me to cover in a future edition? </p>
<p>Stay sharp, </p>
<p>— Perry</p>
<p>hello [at] 8thLayerMedia [dot] com</p>
<p><br></p>
<p>Other references for this issue:</p>
<ul>
  <li><a href="https://en.wikipedia.org/wiki/Modern_flat_Earth_beliefs">https://en.wikipedia.org/wiki/Modern_flat_Earth_beliefs</a></li>
  <li><a href="https://en.wikipedia.org/wiki/Repressed_memory">https://en.wikipedia.org/wiki/Repressed_memory</a></li>
  <li><a href="https://www.cdc.gov/tuskegee/about/index.html">https://www.cdc.gov/tuskegee/about/index.html</a></li>
  <li>Jessica Barker's newsletter: Human Nature of Cyber Security: <a href="https://www.linkedin.com/newsletters/7312575416190255104/">https://www.linkedin.com/newsletters/7312575416190255104/</a>
</li>
  <li>Jessica Barker's LinkedIn profile: <a href="https://www.linkedin.com/in/jessica-barker/">https://www.linkedin.com/in/jessica-barker/</a>
</li>
  <li>The FAIK FILES Audio version here: <a href="https://thecyberwire.com/podcasts/the-faik-files/38/notes">https://thecyberwire.com/podcasts/the-faik-files/38/notes</a>
</li>
  <li>FAIK FILES YouTube version: <a href="https://youtu.be/Sy67tVZ_OVk">https://youtu.be/Sy67tVZ_OVk</a>
</li>
  <li>Apple's controversial research paper: <a href="https://ml-site.cdn-apple.com/papers/the-illusion-of-thinking.pdf">https://ml-site.cdn-apple.com/papers/the-illusion-of-thinking.pdf</a>
</li>
  <li>Nate Jones' thoughts on the Apple paper: <a href="https://www.youtube.com/watch?v=I9tYAvjkOQk%20">https://www.youtube.com/watch?v=I9tYAvjkOQk </a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1043</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[51285a68-455a-11f0-bf6a-3bb2f3ccc1d4]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2689826816.mp3?updated=1752263160" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Costume of Truth: Why We Trust the Logo, the Lab Coat, and the Lanyard</title>
      <description>Not all deception hides in the shadows. Some of it walks right in — wearing a badge, a clipboard, or a lab coat.

In the latest issue of Deceptive Minds, I explore one of the most powerful tools in the scammer’s playbook: credibility theater — the subtle art of looking legitimate enough to bypass your skepticism.

Inside this issue:

🎭 Why we trust uniforms, logos, and titles more than facts
🧠 The psychology behind “surface-level trust”
📜 Historical scams that used nothing but confidence and costumes
🔍 How social engineers, phishers, and marketers use the same tricks today
🛡️ And how to train your brain (and your team) to see through the performance



Because sometimes, the most dangerous deception doesn’t sneak past you — it gets waved through the front door.


🧠 Join 4,000+ others exploring how deception works — and what to do about it.



Want to check out the print version? You can ⁠⁠get here as a LinkedIn newslette⁠r⁠. Or you can subscribe to the email version on my website: ⁠⁠https://TheDeceptionProject.com⁠⁠

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com



Check out The FAIK Files, episode 27: Prove Yourself!!


  Audio version of the podcast: https://thecyberwire.com/podcasts/the-faik-files/37/notes


  YouTube Version: https://youtu.be/m4TYB40oThg?si=AqzkaqHqD3QBXLLu



Link to my Google VEO 3 experiment, "The Sandwich Incident: https://youtu.be/DvsFm1XII6U
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Jun 2025 22:02:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a673666-3b8f-11f0-b4ab-4b59d8c51497/image/de3d7aeffd2d19c00c2096626019d8f4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Not all deception hides in the shadows. Some of it walks right in — wearing a badge, a clipboard, or a lab coat.

In the latest issue of Deceptive Minds, I explore one of the most powerful tools in the scammer’s playbook: credibility theater — the subtle art of looking legitimate enough to bypass your skepticism.

Inside this issue:

🎭 Why we trust uniforms, logos, and titles more than facts
🧠 The psychology behind “surface-level trust”
📜 Historical scams that used nothing but confidence and costumes
🔍 How social engineers, phishers, and marketers use the same tricks today
🛡️ And how to train your brain (and your team) to see through the performance



Because sometimes, the most dangerous deception doesn’t sneak past you — it gets waved through the front door.


🧠 Join 4,000+ others exploring how deception works — and what to do about it.



Want to check out the print version? You can ⁠⁠get here as a LinkedIn newslette⁠r⁠. Or you can subscribe to the email version on my website: ⁠⁠https://TheDeceptionProject.com⁠⁠

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com



Check out The FAIK Files, episode 27: Prove Yourself!!


  Audio version of the podcast: https://thecyberwire.com/podcasts/the-faik-files/37/notes


  YouTube Version: https://youtu.be/m4TYB40oThg?si=AqzkaqHqD3QBXLLu



Link to my Google VEO 3 experiment, "The Sandwich Incident: https://youtu.be/DvsFm1XII6U
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Not all deception hides in the shadows. Some of it walks right in — wearing a badge, a clipboard, or a lab coat.</strong></p>
<p>In the latest issue of <em>Deceptive Minds</em>, I explore one of the most powerful tools in the scammer’s playbook: <strong>credibility theater</strong> — the subtle art of <em>looking</em> legitimate enough to bypass your skepticism.</p>
<p>Inside this issue:</p>
<p>🎭 Why we trust uniforms, logos, and titles more than facts
🧠 The psychology behind “surface-level trust”
📜 Historical scams that used nothing but confidence and costumes
🔍 How social engineers, phishers, and marketers use the same tricks today
🛡️ And how to train your brain (and your team) to see through the performance</p>
<p><br></p>
<p>Because sometimes, the most dangerous deception doesn’t sneak past you — it gets waved through the front door.</p>
<p>
🧠 Join 4,000+ others exploring how deception works — and what to do about it.</p>
<p><br></p>
<p>Want to check out the print version? You can ⁠<a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7319922626200510464">⁠get here as a LinkedIn newslette⁠</a>r⁠. Or you can subscribe to the email version on my website: <a href="https://TheDeceptionProject.com">⁠⁠https://TheDeceptionProject.com⁠⁠</a></p>
<p>Anything you'd like me to cover in a future edition? </p>
<p>Stay sharp, </p>
<p>— Perry</p>
<p>hello [at] 8thLayerMedia [dot] com</p>
<p><br></p>
<p>Check out The FAIK Files, episode 27: Prove Yourself!!</p>
<ul>
  <li>Audio version of the podcast: <a href="https://thecyberwire.com/podcasts/the-faik-files/37/notes">https://thecyberwire.com/podcasts/the-faik-files/37/notes</a>
</li>
  <li>YouTube Version: <a href="https://youtu.be/m4TYB40oThg?si=AqzkaqHqD3QBXLLu">https://youtu.be/m4TYB40oThg?si=AqzkaqHqD3QBXLLu</a>
</li>
</ul>
<p>Link to my Google VEO 3 experiment, "The Sandwich Incident: <a href="https://youtu.be/DvsFm1XII6U">https://youtu.be/DvsFm1XII6U</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>824</itunes:duration>
      <guid isPermaLink="false"><![CDATA[8a673666-3b8f-11f0-b4ab-4b59d8c51497]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5487022935.mp3?updated=1752263119" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Feel First, Think Never: Your Emotions Are the Exploit</title>
      <description>If it made you panic, rage, or rush… it probably bypassed your cognitive defenses.

In the latest issue of Deceptive Minds, I dig into the dark cognitive malware of emotional hijacking: how scammers, manipulators, and even well-meaning voices use fear, urgency, outrage, and hope to short-circuit your critical thinking.

Inside:

🧠 Why your emotions beat your rational mind to the punch 

📞 How scam messages and panic phishing bypass logic 

📣 What viral rage-bait and fear-mongering have in common 

🔥 Plus: how a single fire reshaped a nation — and how the “lie that felt true” still outperforms facts today

The stronger the feeling, the weaker the scrutiny.



Want the print version? It's available on LinkedIn or my website. 



References: 


  The Great Moon Hoax: https://blogs.loc.gov/folklife/2014/08/the-great-moon-hoax/


  Moon Shot: Race, a Hoax, and the Birth of Fake News: https://www.newyorker.com/books/page-turner/moon-shot-race-a-hoax-and-the-birth-of-fake-news


  The True Story of the Reichstag Fire and the Nazi Rise to Power: https://www.smithsonianmag.com/history/true-story-reichstag-fire-and-nazis-rise-power-180962240/


  The Missile Gap: https://en.wikipedia.org/wiki/Missile_gap





Episode 26 of The FAIK Files:


  Listen here: https://thecyberwire.com/podcasts/the-faik-files/36/notes


  Watch here: https://youtu.be/2slM09Czy_s?si=D3ZotFEef3zdGbZA



Anthropic's Claude 4 Attempts to Blackmail a Researcher:


  Claude 4 System Card: https://www-cdn.anthropic.com/6be99a52cb68eb70eb9572b4cafad13df32ed995.pdf


  Something Wild Happens If AI Looks Through Your Emails and Discovers You're Having an Affair: https://futurism.com/ai-email-affair



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 May 2025 02:54:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4b31597a-3b6e-11f0-b8ad-3b6573375a6b/image/634c804dcf66f10cd7aa866d996fe9f7.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>If it made you panic, rage, or rush… it probably bypassed your cognitive defenses.

In the latest issue of Deceptive Minds, I dig into the dark cognitive malware of emotional hijacking: how scammers, manipulators, and even well-meaning voices use fear, urgency, outrage, and hope to short-circuit your critical thinking.

Inside:

🧠 Why your emotions beat your rational mind to the punch 

📞 How scam messages and panic phishing bypass logic 

📣 What viral rage-bait and fear-mongering have in common 

🔥 Plus: how a single fire reshaped a nation — and how the “lie that felt true” still outperforms facts today

The stronger the feeling, the weaker the scrutiny.



Want the print version? It's available on LinkedIn or my website. 



References: 


  The Great Moon Hoax: https://blogs.loc.gov/folklife/2014/08/the-great-moon-hoax/


  Moon Shot: Race, a Hoax, and the Birth of Fake News: https://www.newyorker.com/books/page-turner/moon-shot-race-a-hoax-and-the-birth-of-fake-news


  The True Story of the Reichstag Fire and the Nazi Rise to Power: https://www.smithsonianmag.com/history/true-story-reichstag-fire-and-nazis-rise-power-180962240/


  The Missile Gap: https://en.wikipedia.org/wiki/Missile_gap





Episode 26 of The FAIK Files:


  Listen here: https://thecyberwire.com/podcasts/the-faik-files/36/notes


  Watch here: https://youtu.be/2slM09Czy_s?si=D3ZotFEef3zdGbZA



Anthropic's Claude 4 Attempts to Blackmail a Researcher:


  Claude 4 System Card: https://www-cdn.anthropic.com/6be99a52cb68eb70eb9572b4cafad13df32ed995.pdf


  Something Wild Happens If AI Looks Through Your Emails and Discovers You're Having an Affair: https://futurism.com/ai-email-affair



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>If it made you panic, rage, or rush… it probably bypassed your cognitive defenses.</p>
<p>In the latest issue of Deceptive Minds, I dig into the dark cognitive malware of emotional hijacking: how scammers, manipulators, and even well-meaning voices use fear, urgency, outrage, and hope to short-circuit your critical thinking.</p>
<p>Inside:</p>
<p>🧠 Why your emotions beat your rational mind to the punch </p>
<p>📞 How scam messages and panic phishing bypass logic </p>
<p>📣 What viral rage-bait and fear-mongering have in common </p>
<p>🔥 Plus: how a single fire reshaped a nation — and how the “lie that felt true” still outperforms facts today</p>
<p>The stronger the feeling, the weaker the scrutiny.</p>
<p><br></p>
<p>Want the print version? It's available on <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7319922626200510464">LinkedIn</a> or my <a href="https://TheDeceptionProject.com">website</a>. </p>
<p><br></p>
<p><strong>References: </strong></p>
<ul>
  <li>The Great Moon Hoax: <a href="https://blogs.loc.gov/folklife/2014/08/the-great-moon-hoax/">https://blogs.loc.gov/folklife/2014/08/the-great-moon-hoax/</a>
</li>
  <li>Moon Shot: Race, a Hoax, and the Birth of Fake News: <a href="https://www.newyorker.com/books/page-turner/moon-shot-race-a-hoax-and-the-birth-of-fake-news">https://www.newyorker.com/books/page-turner/moon-shot-race-a-hoax-and-the-birth-of-fake-news</a>
</li>
  <li>The True Story of the Reichstag Fire and the Nazi Rise to Power: <a href="https://www.smithsonianmag.com/history/true-story-reichstag-fire-and-nazis-rise-power-180962240/">https://www.smithsonianmag.com/history/true-story-reichstag-fire-and-nazis-rise-power-180962240/</a>
</li>
  <li>The Missile Gap: <a href="https://en.wikipedia.org/wiki/Missile_gap">https://en.wikipedia.org/wiki/Missile_gap</a>
</li>
</ul>
<p><br></p>
<p><strong>Episode 26 of The FAIK Files:</strong></p>
<ul>
  <li>Listen here: <a href="https://thecyberwire.com/podcasts/the-faik-files/36/notes">https://thecyberwire.com/podcasts/the-faik-files/36/notes</a>
</li>
  <li>Watch here: <a href="https://youtu.be/2slM09Czy_s?si=D3ZotFEef3zdGbZA">https://youtu.be/2slM09Czy_s?si=D3ZotFEef3zdGbZA</a>
</li>
</ul>
<p><strong>Anthropic's Claude 4 Attempts to Blackmail a Researcher</strong>:</p>
<ul>
  <li>Claude 4 System Card: <a href="https://www-cdn.anthropic.com/6be99a52cb68eb70eb9572b4cafad13df32ed995.pdf">https://www-cdn.anthropic.com/6be99a52cb68eb70eb9572b4cafad13df32ed995.pdf</a>
</li>
  <li>Something Wild Happens If AI Looks Through Your Emails and Discovers You're Having an Affair: <a href="https://futurism.com/ai-email-affair">https://futurism.com/ai-email-affair</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>793</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b31597a-3b6e-11f0-b8ad-3b6573375a6b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9175582225.mp3?updated=1752263096" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Too Easy to Be True: The Fluency Trap and the Lie That Slides Right Past You</title>
      <description>Some lies try hard to fool you. Others just make it easy for you to believe them.

That’s the danger of cognitive fluency: the simpler something feels, the more likely we are to think it’s true.

In the latest issue of Deceptive Minds, I explore: 


  Why fake documents with grainy photos often seem more real than verified ones

  How anti-intellectualism and slogan-based disinfo campaigns thrive on fluency bias 

  And what makes even seasoned professionals fall for staged “leaks,” forged letters, and photo ops


💡 The truth can feel complex and overwhelming. But, the best deceptions...are frictionless.

Want to check out the print version? You can ⁠⁠get here as a LinkedIn newslette⁠r⁠. Or you can subscribe to the email version on my website: ⁠⁠https://TheDeceptionProject.com⁠⁠

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 May 2025 18:06:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/063cee98-3519-11f0-9536-07138fd8527e/image/3d165f3b441ffe932cb26e65b1a351fa.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Some lies try hard to fool you. Others just make it easy for you to believe them.

That’s the danger of cognitive fluency: the simpler something feels, the more likely we are to think it’s true.

In the latest issue of Deceptive Minds, I explore: 


  Why fake documents with grainy photos often seem more real than verified ones

  How anti-intellectualism and slogan-based disinfo campaigns thrive on fluency bias 

  And what makes even seasoned professionals fall for staged “leaks,” forged letters, and photo ops


💡 The truth can feel complex and overwhelming. But, the best deceptions...are frictionless.

Want to check out the print version? You can ⁠⁠get here as a LinkedIn newslette⁠r⁠. Or you can subscribe to the email version on my website: ⁠⁠https://TheDeceptionProject.com⁠⁠

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some lies try hard to fool you. Others just make it easy for you to believe them.</p>
<p>That’s the danger of <strong>cognitive fluency</strong>: the simpler something <em>feels</em>, the more likely we are to <em>think it’s true</em>.</p>
<p>In the latest issue of Deceptive Minds, I explore: </p>
<ul>
  <li>Why fake documents with grainy photos often seem more real than verified ones</li>
  <li>How anti-intellectualism and slogan-based disinfo campaigns thrive on fluency bias </li>
  <li>And what makes even seasoned professionals fall for staged “leaks,” forged letters, and photo ops</li>
</ul>
<p>💡 The truth can feel complex and overwhelming. But, the best deceptions...are <em>frictionless</em>.</p>
<p>Want to check out the print version? You can ⁠<a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7319922626200510464">⁠get here as a LinkedIn newslette⁠</a>r⁠. Or you can subscribe to the email version on my website: <a href="https://TheDeceptionProject.com">⁠⁠https://TheDeceptionProject.com⁠⁠</a></p>
<p>Anything you'd like me to cover in a future edition? </p>
<p>Stay sharp, </p>
<p>— Perry</p>
<p>hello [at] 8thLayerMedia [dot] com</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>747</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[063cee98-3519-11f0-9536-07138fd8527e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9694584585.mp3?updated=1752263059" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Plausibility Effect</title>
      <description>Hey friends,

Let’s start with a weird truth: People don’t fall for things because they’re true. They fall for things because they’re plausible.

That’s the dark magic of deception — it doesn’t need to be airtight, or flawless, or even particularly clever. It just needs to feel true enough. Something your brain can accept without asking too many questions.

Welcome to the Plausibility Effect — the sneaky cognitive glitch that powers scams, fuels misinformation, and makes even the dumbest conspiracies stubbornly sticky.



Want to check out the print version? You can ⁠get here as a LinkedIn newsletter⁠. Or you can subscribe to the email version on my website: ⁠https://TheDeceptionProject.com⁠

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 May 2025 23:03:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b30aad46-3117-11f0-96c7-2f2bcaaef2ad/image/6625f6aaa2d62d9ca725e1dd5adedddc.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hey friends,

Let’s start with a weird truth: People don’t fall for things because they’re true. They fall for things because they’re plausible.

That’s the dark magic of deception — it doesn’t need to be airtight, or flawless, or even particularly clever. It just needs to feel true enough. Something your brain can accept without asking too many questions.

Welcome to the Plausibility Effect — the sneaky cognitive glitch that powers scams, fuels misinformation, and makes even the dumbest conspiracies stubbornly sticky.



Want to check out the print version? You can ⁠get here as a LinkedIn newsletter⁠. Or you can subscribe to the email version on my website: ⁠https://TheDeceptionProject.com⁠

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hey friends,</p>
<p>Let’s start with a weird truth: <strong>People don’t fall for things because they’re true. They fall for things because they’re </strong><em><strong>plausible.</strong></em></p>
<p>That’s the dark magic of deception — it doesn’t need to be airtight, or flawless, or even particularly clever. It just needs to feel <em>true enough</em>. Something your brain can accept without asking too many questions.</p>
<p>Welcome to the <strong>Plausibility Effect</strong> — the sneaky cognitive glitch that powers scams, fuels misinformation, and makes even the dumbest conspiracies stubbornly sticky.</p>
<p><br></p>
<p>Want to check out the print version? You can ⁠<a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7319922626200510464">get here as a LinkedIn newslette</a>r⁠. Or you can subscribe to the email version on my website: <a href="https://TheDeceptionProject.com">⁠https://TheDeceptionProject.com⁠</a></p>
<p>Anything you'd like me to cover in a future edition? </p>
<p>Stay sharp, </p>
<p>— Perry</p>
<p>hello [at] 8thLayerMedia [dot] com</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>702</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b30aad46-3117-11f0-96c7-2f2bcaaef2ad]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3547419092.mp3?updated=1752263036" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>👁️ Look Here: Why Every Great Deception Starts with Stolen Attention</title>
      <description>Welcome to issue #3 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it.

In this week's episode: 🚨 Your attention is under attack! 🚨

From WWII rubber tanks to 2023’s phantom Paris bedbugs, the first strike of any scam is the same: steal your gaze, shape your reality. This issue of Deceptive Minds is all about “attention theft”—how con-artists, phishers, and AI-powered tricksters hijack that split-second between stimulus and thought…and what to do about it. 

🕵️‍♂️🗞️I NSIDE:


  Operation Fortitude’s audacious distraction playbook

  The modern attention-hijack toolkit (urgency, authority, AI personalization)

  Fast-action defenses to keep your cognitive perimeter intact

  ... and a few other fun items from the past week!


Listen now: turn the tables on the impostors, and guard the one resource every attacker wants first: your focus.



Want to check out the print version? You can get here as a LinkedIn newsletter. Or you can subscribe to the email version on my website: https://TheDeceptionProject.com

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 May 2025 13:15:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fa4dea6-2840-11f0-a385-530a9dbc4ff0/image/1db5fdc8c9144aa6ee3deb1708db1fb6.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome to issue #3 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it.

In this week's episode: 🚨 Your attention is under attack! 🚨

From WWII rubber tanks to 2023’s phantom Paris bedbugs, the first strike of any scam is the same: steal your gaze, shape your reality. This issue of Deceptive Minds is all about “attention theft”—how con-artists, phishers, and AI-powered tricksters hijack that split-second between stimulus and thought…and what to do about it. 

🕵️‍♂️🗞️I NSIDE:


  Operation Fortitude’s audacious distraction playbook

  The modern attention-hijack toolkit (urgency, authority, AI personalization)

  Fast-action defenses to keep your cognitive perimeter intact

  ... and a few other fun items from the past week!


Listen now: turn the tables on the impostors, and guard the one resource every attacker wants first: your focus.



Want to check out the print version? You can get here as a LinkedIn newsletter. Or you can subscribe to the email version on my website: https://TheDeceptionProject.com

Anything you'd like me to cover in a future edition? 

Stay sharp, 

— Perry

hello [at] 8thLayerMedia [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to issue #3 of <em>Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it.</em></p>
<p><strong>In this week's episode: 🚨 Your attention is under attack! 🚨</strong></p>
<p>From WWII rubber tanks to 2023’s phantom Paris bedbugs, the first strike of any scam is the same: steal your gaze, shape your reality. This issue of Deceptive Minds is all about “attention theft”—how con-artists, phishers, and AI-powered tricksters hijack that split-second between stimulus and thought…and what to do about it. </p>
<p>🕵️‍♂️🗞️I NSIDE:</p>
<ul>
  <li>Operation Fortitude’s audacious distraction playbook</li>
  <li>The modern attention-hijack toolkit (urgency, authority, AI personalization)</li>
  <li>Fast-action defenses to keep your cognitive perimeter intact</li>
  <li>... and a few other fun items from the past week!</li>
</ul>
<p>Listen now: turn the tables on the impostors, and guard the one resource every attacker wants first: your focus.</p>
<p><br></p>
<p>Want to check out the print version? You can <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7319922626200510464">get here as a LinkedIn newsletter</a>. Or you can subscribe to the email version on my website: <a href="https://TheDeceptionProject.com">https://TheDeceptionProject.com</a></p>
<p>Anything you'd like me to cover in a future edition? </p>
<p>Stay sharp, </p>
<p>— Perry</p>
<p>hello [at] 8thLayerMedia [dot] com</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>813</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8fa4dea6-2840-11f0-a385-530a9dbc4ff0]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5596595318.mp3?updated=1752263009" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Artifacts of Deception (Deceptive Minds - issue #2)</title>
      <description>Hey friends! Here's issue 2 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it.

🔥 Since starting this newsletter last week, we're already closing in on 3,000 subscribers to the print edition! 🔥  Huge thanks to everyone who's jumped in early! 

This week, I'm diving into what I call the “artifacts of deception,” and why the flashy stuff (deepfakes, fake emails, cloned voices) isn’t the real trick you need to watch for.

Hope you enjoy this exploration into the hidden mechanics of how deception *really* works.

Here we go…

— Perry

The Deception Project
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Apr 2025 02:42:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e08ca19a-248b-11f0-a517-4f3e0b347f90/image/8850de4c95c706c5dac033e64061196f.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hey friends! Here's issue 2 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it.

🔥 Since starting this newsletter last week, we're already closing in on 3,000 subscribers to the print edition! 🔥  Huge thanks to everyone who's jumped in early! 

This week, I'm diving into what I call the “artifacts of deception,” and why the flashy stuff (deepfakes, fake emails, cloned voices) isn’t the real trick you need to watch for.

Hope you enjoy this exploration into the hidden mechanics of how deception *really* works.

Here we go…

— Perry

The Deception Project
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hey friends! Here's issue 2 of <em><strong>Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it</strong></em>.</p>
<p>🔥 Since starting this newsletter last week, we're already closing in on 3,000 subscribers to the <a>print edition</a>! 🔥  Huge thanks to everyone who's jumped in early! </p>
<p>This week, I'm diving into what I call the “artifacts of deception,” and why the flashy stuff (deepfakes, fake emails, cloned voices) isn’t the real trick you need to watch for.</p>
<p>Hope you enjoy this exploration into the hidden mechanics of how deception *really* works.</p>
<p>Here we go…</p>
<p>— Perry</p>
<p><a href="https://thedeceptionproject.com">The Deception Project</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>729</itunes:duration>
      <guid isPermaLink="false"><![CDATA[e08ca19a-248b-11f0-a517-4f3e0b347f90]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8033636916.mp3?updated=1752262874" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deceptive Minds (the audio experience): Issue #1</title>
      <description> Hey listeners, Perry Carpenter here. Yeah, it's been a while since I've posted this feed, but I've got something exciting that I think you'll be interested in. It's the audio version of a newsletter that I recently started. 

The newsletter is called Deceptive Minds, and it's all about how we are fooled, how we fool ourselves, and what we can do about it.

In other words, it's the exact right newsletter for the 8th Layer Insights audience. So for the next little bit at least, I'm going to post these audio newsletters into the 8Li feed -- exactly where you are right now. We'll see if it grows into something else or if it fades into oblivion. But regardless, I hope you enjoy it while it's here. 

So with that, let's get to episode one... or I guess I should call it issue number one of Deceptive Minds, the audio newsletter, 

If you're interested in the print version, it's a LinkedIn newsletter and you can also subscribe on my new website, The Deception Project, at https://thedeceptionproject.com. So, regardless of your format of choice, unless you want to see my face reading this on video,  you can get the audio version right here or you can read the print version on LinkedIn or in an email that will make its way to your inbox and hopefully not to your spam filter. 

With that, let's go ahead and get to issue number one. 

Thanks!

Perry
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Apr 2025 02:41:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/907debac-2489-11f0-a215-cffed202d353/image/0f75a8651fb9077c0cf04cc53bb608cd.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary> Hey listeners, Perry Carpenter here. Yeah, it's been a while since I've posted this feed, but I've got something exciting that I think you'll be interested in. It's the audio version of a newsletter that I recently started. 

The newsletter is called Deceptive Minds, and it's all about how we are fooled, how we fool ourselves, and what we can do about it.

In other words, it's the exact right newsletter for the 8th Layer Insights audience. So for the next little bit at least, I'm going to post these audio newsletters into the 8Li feed -- exactly where you are right now. We'll see if it grows into something else or if it fades into oblivion. But regardless, I hope you enjoy it while it's here. 

So with that, let's get to episode one... or I guess I should call it issue number one of Deceptive Minds, the audio newsletter, 

If you're interested in the print version, it's a LinkedIn newsletter and you can also subscribe on my new website, The Deception Project, at https://thedeceptionproject.com. So, regardless of your format of choice, unless you want to see my face reading this on video,  you can get the audio version right here or you can read the print version on LinkedIn or in an email that will make its way to your inbox and hopefully not to your spam filter. 

With that, let's go ahead and get to issue number one. 

Thanks!

Perry
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> Hey listeners, Perry Carpenter here. Yeah, it's been a while since I've posted this feed, but I've got something exciting that I think you'll be interested in. It's the audio version of a newsletter that I recently started. </p>
<p>The newsletter is called <strong>Deceptive Minds</strong>, and it's all <em>about</em> <em><strong>how we are fooled, how we fool ourselves, and what we can do about it</strong></em>.</p>
<p>In other words, it's the exact right newsletter for the 8th Layer Insights audience. So for the next little bit at least, I'm going to post these audio newsletters into the 8Li feed -- exactly where you are right now. We'll see if it grows into something else or if it fades into oblivion. But regardless, I hope you enjoy it while it's here. </p>
<p>So with that, let's get to episode one... or I guess I should call it issue number one of <strong>Deceptive Minds,</strong> the audio newsletter, </p>
<p>If you're interested in the print version, it's a <a href="">LinkedIn newsletter</a> and you can also subscribe on my new website, <a href="https://thedeceptionproject.com">The Deception Project</a>, at <a href="https://thedeceptionproject.com">https://thedeceptionproject.com</a>. So, regardless of your format of choice, unless you want to see my face reading this on video,  you can get the audio version right here or you can read the print version on LinkedIn or in an email that will make its way to your inbox and hopefully not to your spam filter. </p>
<p>With that, let's go ahead and get to issue number one. </p>
<p>Thanks!</p>
<p>Perry</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[907debac-2489-11f0-a215-cffed202d353]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8436624330.mp3?updated=1752262833" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The FAIK Files | Holiday Special: AI Safety Update</title>
      <description>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of 2024. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. 

In our holiday episode, Mason opens a rather unique Christmas present from Perry, we invite a special guest to help explain the infamous "Paperclip Maximizer" thought experiment, and we discuss an interesting (and somewhat disturbing) new AI Safety paper from Apollo Research.

Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz


*** NOTES AND REFERENCES ***

An interesting cluster of new AI safety research papers:

Apollo research: Frontier Models are Capable of In-context Scheming (Dec 5, 2024)

YouTube Video: Apollo Research - AI Models Are Capable Of In Context Scheming Dec 2024


YouTube Video: Cognitive Revolution - Emergency Pod: o1 Schemes Against Users, with Alexander Meinke from Apollo Research


OpenAI o1 System Card (Dec 5, 2024)

Anthropic: Alignment Faking in Large Language Models (Dec 18, 2024)

Anthropic: Sycophancy to subterfuge: Investigating reward tampering in language models (June 17, 2024)

Fudan University: Frontier AI systems have surpassed the self-replicating red line (Dec 9, 2024)


Other Interesting Bits:

The Paperclip Maximizer thought experiment explanation


Theory of Instrumental Convergence


iPhone Game: Universal Paperclips


VoxEU: AI and the paperclip problem


Real Paperclips! 500 Pack Paper Clips (assorted sizes)



OpenAI Announces New o3 Reasoning Model:

OpenAI's "12 Days of Ship-mas" announcement page


YouTube video: OpenAI's announcement of their o3 Model


TechCrunch: OpenAI announces new o3 models


Wired: OpenAI Upgrades Its Smartest AI Model With Improved Reasoning Skills


TechCrunch: OpenAI trained o1 and o3 to ‘think’ about its safety policy


Matthew Berman YouTube video: OpenAI Unveils o3! AGI ACHIEVED!


NewScientist: OpenAI's o3 model aced a test of AI reasoning – but it's still not AGI


Yahoo Finance: OpenAI considers AGI clause removal for Microsoft investment



*** THE BOILERPLATE ***
About The FAIK Files: 
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. 

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions  (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458


Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA


Other: https://digitalfolklore.fm 



Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter


Perry on X: https://x.com/perrycarpenter 


Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Dec 2024 07:00:00 -0000</pubDate>
      <itunes:title>The FAIK Files | Holiday Special: AI Safety Update</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2b036540-c1b0-11ef-b22a-4b89266ab2c6/image/aa36393364f353eaf47b872e949a2fa0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of 2024. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. 

In our holiday episode, Mason opens a rather unique Christmas present from Perry, we invite a special guest to help explain the infamous "Paperclip Maximizer" thought experiment, and we discuss an interesting (and somewhat disturbing) new AI Safety paper from Apollo Research.

Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz


*** NOTES AND REFERENCES ***

An interesting cluster of new AI safety research papers:

Apollo research: Frontier Models are Capable of In-context Scheming (Dec 5, 2024)

YouTube Video: Apollo Research - AI Models Are Capable Of In Context Scheming Dec 2024


YouTube Video: Cognitive Revolution - Emergency Pod: o1 Schemes Against Users, with Alexander Meinke from Apollo Research


OpenAI o1 System Card (Dec 5, 2024)

Anthropic: Alignment Faking in Large Language Models (Dec 18, 2024)

Anthropic: Sycophancy to subterfuge: Investigating reward tampering in language models (June 17, 2024)

Fudan University: Frontier AI systems have surpassed the self-replicating red line (Dec 9, 2024)


Other Interesting Bits:

The Paperclip Maximizer thought experiment explanation


Theory of Instrumental Convergence


iPhone Game: Universal Paperclips


VoxEU: AI and the paperclip problem


Real Paperclips! 500 Pack Paper Clips (assorted sizes)



OpenAI Announces New o3 Reasoning Model:

OpenAI's "12 Days of Ship-mas" announcement page


YouTube video: OpenAI's announcement of their o3 Model


TechCrunch: OpenAI announces new o3 models


Wired: OpenAI Upgrades Its Smartest AI Model With Improved Reasoning Skills


TechCrunch: OpenAI trained o1 and o3 to ‘think’ about its safety policy


Matthew Berman YouTube video: OpenAI Unveils o3! AGI ACHIEVED!


NewScientist: OpenAI's o3 model aced a test of AI reasoning – but it's still not AGI


Yahoo Finance: OpenAI considers AGI clause removal for Microsoft investment



*** THE BOILERPLATE ***
About The FAIK Files: 
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. 

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions  (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458


Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA


Other: https://digitalfolklore.fm 



Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter


Perry on X: https://x.com/perrycarpenter 


Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of 2024. This will give you a chance to get a feel for the new show and </strong><a href="https://thecyberwire.com/podcasts/the-faik-files"><strong>subscribe to the new feed</strong></a><strong> if you want to keep following in 2025. </strong></p><p><br></p><p>Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. </p><p><br></p><p>In our holiday episode, Mason opens a rather unique Christmas present from Perry, we invite a special guest to help explain the infamous "Paperclip Maximizer" thought experiment, and we discuss an interesting (and somewhat disturbing) new AI Safety paper from Apollo Research.</p><p><br></p><p>Want to leave us a <strong>voicemail</strong>? Here's the magic link to do just that: <a href="https://sayhi.chat/FAIK">https://sayhi.chat/FAIK</a></p><p>You can also join our <strong>Discord</strong> server here: <a href="https://discord.gg/cThqEnMhJz">https://discord.gg/cThqEnMhJz</a></p><p><br></p><p><br></p><p><strong>*** NOTES AND REFERENCES ***</strong></p><p><br></p><p><strong>An interesting cluster of new AI safety research papers:</strong></p><ul>
<li>Apollo research: <a href="https://www.apolloresearch.ai/research/scheming-reasoning-evaluations">Frontier Models are Capable of In-context Scheming</a> (Dec 5, 2024)</li>
<li>YouTube Video: <a href="https://www.youtube.com/watch?v=xIqtVkMXc8o">Apollo Research - AI Models Are Capable Of In Context Scheming Dec 2024</a>
</li>
<li>YouTube Video: <a href="https://www.youtube.com/watch?v=pB3gvX-GOqU">Cognitive Revolution - Emergency Pod: o1 Schemes Against Users, with Alexander Meinke from Apollo Research</a>
</li>
<li>OpenAI <a href="https://openai.com/index/openai-o1-system-card/">o1 System Card</a> (Dec 5, 2024)</li>
<li>Anthropic: <a href="https://www.anthropic.com/news/alignment-faking">Alignment Faking in Large Language Models</a> (Dec 18, 2024)</li>
<li>Anthropic: <a href="https://www.anthropic.com/research/reward-tampering">Sycophancy to subterfuge: Investigating reward tampering in language models</a> (June 17, 2024)</li>
<li>Fudan University: <a href="https://www.arxiv.org/abs/2412.12140">Frontier AI systems have surpassed the self-replicating red line</a> (Dec 9, 2024)</li>
</ul><p><br></p><p><strong>Other Interesting Bits:</strong></p><ul>
<li>The Paperclip Maximizer <a href="https://aicorespot.io/the-paperclip-maximiser">thought experiment explanation</a>
</li>
<li>Theory of <a href="https://en.wikipedia.org/wiki/Instrumental_convergence">Instrumental Convergence</a>
</li>
<li>iPhone Game: <a href="https://apps.apple.com/us/app/universal-paperclips/id1300634274">Universal Paperclips</a>
</li>
<li>VoxEU: <a href="https://cepr.org/voxeu/columns/ai-and-paperclip-problem">AI and the paperclip problem</a>
</li>
<li>Real Paperclips! <a href="https://amzn.to/402Pb5s">500 Pack Paper Clips (assorted sizes)</a>
</li>
</ul><p><br></p><p><strong>OpenAI Announces New o3 Reasoning Model:</strong></p><ul>
<li>OpenAI's <a href="https://openai.com/12-days/">"12 Days of Ship-mas" announcement page</a>
</li>
<li>YouTube video: <a href="https://www.youtube.com/live/SKBG1sqdyIU?">OpenAI's announcement of their o3 Model</a>
</li>
<li>TechCrunch: <a href="https://techcrunch.com/2024/12/20/openai-announces-new-o3-model/">OpenAI announces new o3 models</a>
</li>
<li>Wired: <a href="https://www.wired.com/story/openai-o3-reasoning-model-google-gemini/">OpenAI Upgrades Its Smartest AI Model With Improved Reasoning Skills</a>
</li>
<li>TechCrunch: <a href="https://techcrunch.com/2024/12/22/openai-trained-o1-and-o3-to-think-about-its-safety-policy/">OpenAI trained o1 and o3 to ‘think’ about its safety policy</a>
</li>
<li>Matthew Berman YouTube video: <a href="https://www.youtube.com/watch?v=UWvebURU9Kk">OpenAI Unveils o3! AGI ACHIEVED!</a>
</li>
<li>NewScientist: <a href="https://www.newscientist.com/article/2462000-openais-o3-model-aced-a-test-of-ai-reasoning-but-its-still-not-agi/">OpenAI's o3 model aced a test of AI reasoning – but it's still not AGI</a>
</li>
<li>Yahoo Finance: <a href="https://finance.yahoo.com/news/openai-considers-agi-clause-removal-123030732.html">OpenAI considers AGI clause removal for Microsoft investment</a>
</li>
</ul><p><br></p><p><strong>*** THE BOILERPLATE ***</strong></p><p><strong>About The FAIK Files: </strong></p><p>The FAIK Files is an offshoot project from Perry Carpenter's most recent book, <em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions.</em> </p><ul>
<li>Get the Book: <a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a>  (Amazon Associates link)</li>
<li>Check out the website for more info: <a href="https://thisbookisfaik.com/">https://thisbookisfaik.com</a>
</li>
</ul><p><br></p><p><strong>Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:</strong></p><ul>
<li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458">https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458</a>
</li>
<li>Spotify: <a href="https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA">https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA</a>
</li>
<li>Other: <a href="https://digitalfolklore.fm%20/">https://digitalfolklore.fm </a>
</li>
</ul><p><br></p><p><strong>Want to connect with us? Here's how:</strong></p><p><strong>Connect with Perry:</strong></p><ul>
<li>Perry on LinkedIn: <a href="https://www.linkedin.com/in/perrycarpenter?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app">https://www.linkedin.com/in/perrycarpenter</a>
</li>
<li>Perry on X: <a href="https://x.com/perrycarpenter%20">https://x.com/perrycarpenter </a>
</li>
<li>Perry on BlueSky: <a href="https://bsky.app/profile/perrycarpenter.bsky.social">https://bsky.app/profile/perrycarpenter.bsky.social</a>
</li>
</ul><p><strong>Connect with Mason:</strong></p><ul>
<li>Mason on LinkedIn: <a href="https://www.linkedin.com/in/mason-amadeus-a853a7242/">https://www.linkedin.com/in/mason-amadeus-a853a7242/</a>
</li>
<li>Mason on BlueSky: <a href="https://bsky.app/profile/pregnantsonic.com">https://bsky.app/profile/pregnantsonic.com</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2304</itunes:duration>
      <guid isPermaLink="false"><![CDATA[2b036540-c1b0-11ef-b22a-4b89266ab2c6]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2298215161.mp3?updated=1740072992" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The FAIK Files | The Butcher Will Scam You Now</title>
      <description>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. 

Warning: today's episode gets a bit dark as we chat with seasoned prosecutor and founder of Operation Shamrock, Erin West, about a devastating combination of attacks known as "Pig Butchering" scams. We go deep into how they work and what we can do about them.

Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz


*** NOTES AND REFERENCES ***

Learn more about Erin West

Erin's LinkedIn Profile


Operation Shamrock


Pig Butchering Scams:

CNN Story featuring Erin West: Killed by a scam: A father took his life after losing his savings to international criminal gangs. He’s not the only one 

CNN Story: Hear how this man lost $1M in a 'pig butchering' crypto scam


CNN Story: Myanmar-based gangs force trafficking victims to scam Americans online


YouTube video: John Oliver episode


FBI Internet Crime Complaint Center (IC3)



Ok, doomer! Let's talk P(doom):

NY Times article: Silicon Valley Confronts a Grim New A.I. Metric


FastCompany article: P(doom) is AI's latest apocalypse metric. Here's how to calculate your score 

Wikipedia Entry

PauseAI P(doom) records


*** THE BOILERPLATE ***
About The FAIK Files: 
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. 

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions  (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458


Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA


Other: https://digitalfolklore.fm 



Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter


Perry on X: https://x.com/perrycarpenter 


Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>The FAIK Files | The Butcher Will Scam You Now</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6421839a-bd76-11ef-a610-e3808e18ddee/image/ef2549565b8805dd539dba73223b7184.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. 

Warning: today's episode gets a bit dark as we chat with seasoned prosecutor and founder of Operation Shamrock, Erin West, about a devastating combination of attacks known as "Pig Butchering" scams. We go deep into how they work and what we can do about them.

Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz


*** NOTES AND REFERENCES ***

Learn more about Erin West

Erin's LinkedIn Profile


Operation Shamrock


Pig Butchering Scams:

CNN Story featuring Erin West: Killed by a scam: A father took his life after losing his savings to international criminal gangs. He’s not the only one 

CNN Story: Hear how this man lost $1M in a 'pig butchering' crypto scam


CNN Story: Myanmar-based gangs force trafficking victims to scam Americans online


YouTube video: John Oliver episode


FBI Internet Crime Complaint Center (IC3)



Ok, doomer! Let's talk P(doom):

NY Times article: Silicon Valley Confronts a Grim New A.I. Metric


FastCompany article: P(doom) is AI's latest apocalypse metric. Here's how to calculate your score 

Wikipedia Entry

PauseAI P(doom) records


*** THE BOILERPLATE ***
About The FAIK Files: 
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. 

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions  (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458


Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA


Other: https://digitalfolklore.fm 



Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter


Perry on X: https://x.com/perrycarpenter 


Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and </strong><a href="https://thecyberwire.com/podcasts/the-faik-files"><strong>subscribe to the new feed</strong></a><strong> if you want to keep following in 2025. </strong></p><p><br></p><p>Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. </p><p><br></p><p><strong>Warning: today's episode gets a bit dark</strong> as we chat with seasoned prosecutor and founder of Operation Shamrock, Erin West, about a devastating combination of attacks known as "Pig Butchering" scams. We go deep into how they work and what we can do about them.</p><p><br></p><p>Want to leave us a <strong>voicemail</strong>? Here's the magic link to do just that: <a href="https://sayhi.chat/FAIK">https://sayhi.chat/FAIK</a></p><p>You can also join our <strong>Discord</strong> server here: <a href="https://discord.gg/cThqEnMhJz">https://discord.gg/cThqEnMhJz</a></p><p><br></p><p><br></p><p><strong>*** NOTES AND REFERENCES ***</strong></p><p><br></p><p><strong>Learn more about Erin West</strong></p><ul>
<li>Erin's <a href="https://cms.megaphone.fm/organizations/cd9023bc-9a2c-11ea-bbcb-a7f75b26f845/podcasts/f6133fb2-ac2a-11ef-bb47-37848759bfc1/episodes/166f49c6-acc7-11ef-baaa-2b1d30b76296/LinkedIn%20Profile">LinkedIn Profile</a>
</li>
<li><a href="https://operationshamrock.org/">Operation Shamrock</a></li>
</ul><p><br></p><p><strong>Pig Butchering Scams</strong>:</p><ul>
<li>CNN Story featuring Erin West: <a href="https://www.cnn.com/2024/06/17/us/video/pigbutchering-online-scam-digvid">Killed by a scam: A father took his life after losing his savings to international criminal gangs. He’s not the only one</a> </li>
<li>CNN Story: <a href="https://www.cnn.com/videos/world/2023/12/22/myanmar-pig-butchering-scams-watson-pkg-intl-ldn-vpx.cnn">Hear how this man lost $1M in a 'pig butchering' crypto scam</a>
</li>
<li>CNN Story: <a href="https://www.cnn.com/videos/world/2023/12/27/exp-myanmar-pig-butchering-financial-scam-watson-pkg-122702aseg1-cnni-world.cnn">Myanmar-based gangs force trafficking victims to scam Americans online</a>
</li>
<li>YouTube video: <a href="https://www.youtube.com/watch?v=pLPpl2ISKTg">John Oliver episode</a>
</li>
<li>FBI <a href="https://www.ic3.gov/">Internet Crime Complaint Center (IC3)</a>
</li>
</ul><p><br></p><p><strong>Ok, doomer! Let's talk P(doom):</strong></p><ul>
<li>NY Times article: <a href="https://www.nytimes.com/2023/12/06/business/dealbook/silicon-valley-artificial-intelligence.html">Silicon Valley Confronts a Grim New A.I. Metric</a>
</li>
<li>FastCompany article: <a href="https://www.fastcompany.com/90994526/pdoom-explained-how-to-calculate-your-score-on-ai-apocalypse-metric">P(doom) is AI's latest apocalypse metric. Here's how to calculate your score</a> </li>
<li><a href="https://en.wikipedia.org/wiki/P(doom)">Wikipedia Entry</a></li>
<li><a href="https://pauseai.info/pdoom">PauseAI P(doom) records</a></li>
</ul><p><br></p><p><strong>*** THE BOILERPLATE ***</strong></p><p><strong>About The FAIK Files: </strong></p><p>The FAIK Files is an offshoot project from Perry Carpenter's most recent book, <em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions.</em> </p><ul>
<li>Get the Book: <a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a>  (Amazon Associates link)</li>
<li>Check out the website for more info: <a href="https://thisbookisfaik.com/">https://thisbookisfaik.com</a>
</li>
</ul><p><br></p><p><strong>Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:</strong></p><ul>
<li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458">https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458</a>
</li>
<li>Spotify: <a href="https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA">https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA</a>
</li>
<li>Other: <a href="https://digitalfolklore.fm%20/">https://digitalfolklore.fm </a>
</li>
</ul><p><br></p><p><strong>Want to connect with us? Here's how:</strong></p><p><strong>Connect with Perry:</strong></p><ul>
<li>Perry on LinkedIn: <a href="https://www.linkedin.com/in/perrycarpenter?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app">https://www.linkedin.com/in/perrycarpenter</a>
</li>
<li>Perry on X: <a href="https://x.com/perrycarpenter%20">https://x.com/perrycarpenter </a>
</li>
<li>Perry on BlueSky: <a href="https://bsky.app/profile/perrycarpenter.bsky.social">https://bsky.app/profile/perrycarpenter.bsky.social</a>
</li>
</ul><p><strong>Connect with Mason:</strong></p><ul>
<li>Mason on LinkedIn: <a href="https://www.linkedin.com/in/mason-amadeus-a853a7242/">https://www.linkedin.com/in/mason-amadeus-a853a7242/</a>
</li>
<li>Mason on BlueSky: <a href="https://bsky.app/profile/pregnantsonic.com">https://bsky.app/profile/pregnantsonic.com</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3563</itunes:duration>
      <guid isPermaLink="false"><![CDATA[6421839a-bd76-11ef-a610-e3808e18ddee]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8992707864.mp3?updated=1740073191" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The FAIK Files | AI Gone Wild: Worrisome Leaks, Misguided Conspiracies, and More</title>
      <description>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Welcome back to The FAIK Files--- the show about artificial intelligence and natural nonsense!

In this week's episode:

Mason shares how ChatGPT became an unexpected hero in solving his home networking and studio challenges

Perry dives into the mysterious case of "David Mayer" and how a simple ChatGPT privacy patch sparked widespread conspiracy theories

We explore Tencent's bold entry into AI video generation with their open-source HunyuanVideo model

And in our AI Dumpster Fire of the Week, we unpack the drama surrounding leaks of multiple models from OpenAI


Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz

*** NOTES AND REFERENCES ***

The ChatGPT Privacy Patch Conspiracy:

TechCrunch: Why does the name 'David Mayer' crash ChatGPT? OpenAI says privacy tool went rogue 

FastCompany: The Internet is Freaking Out Because ChatGPT Won't Say the Name "David Mayer" 


USA Today: Why won't ChatGPT acknowledge the name David Mayer? Internet users uncover mystery


YouTube: Solved: Why ChatGPT Will Not Say "David Mayer"


The Decoder: New York Times writer exposes how AI models can be fooled by invisible text on websites


NYT: How Do You Change a Chatbot's Mind?



Tencent's HunyuanVideo Release:

The Decoder: Tencent introduces open source video generator HunyuanVideo and challenges Sora 

TechNode: Tencent launches and open-sources Hunyuan video-generation model


YouTube: New AI Video Model Storms Onto The Scene! 

HuggingFace: HunyuanVideo Official Model Page


Research paper about text based sound generation for videos. SonicVisionLM: Playing Sound with Vision Language Models



AI Dumpster Fire of the Week (The Sora Leak):

TechCrunch: OpenAI's Sora video generator appears to have leaked 

Washington Post: OpenAI hits pause on video model Sora after artists leak access in protest 


Tom's Guide: OpenAI's o1 model leaked on Friday and it is wild — here's what happened 

Leopold Aschenbrenner: SITUATIONAL AWARENESS: The Decade Ahead


Additional Sora leak from internal preview 


*** THE BOILERPLATE ***
About The FAIK Files:
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions.

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458



Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA



Other: https://digitalfolklore.fm 


Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter



Perry on X: https://x.com/perrycarpenter



Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>The FAIK Files | AI Gone Wild: Worrisome Leaks, Misguided Conspiracies, and More</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/19f36fea-b4b6-11ef-9515-6f67647ff067/image/74a5cb4e95ac044309ea5e02d9f2eefa.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Welcome back to The FAIK Files--- the show about artificial intelligence and natural nonsense!

In this week's episode:

Mason shares how ChatGPT became an unexpected hero in solving his home networking and studio challenges

Perry dives into the mysterious case of "David Mayer" and how a simple ChatGPT privacy patch sparked widespread conspiracy theories

We explore Tencent's bold entry into AI video generation with their open-source HunyuanVideo model

And in our AI Dumpster Fire of the Week, we unpack the drama surrounding leaks of multiple models from OpenAI


Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz

*** NOTES AND REFERENCES ***

The ChatGPT Privacy Patch Conspiracy:

TechCrunch: Why does the name 'David Mayer' crash ChatGPT? OpenAI says privacy tool went rogue 

FastCompany: The Internet is Freaking Out Because ChatGPT Won't Say the Name "David Mayer" 


USA Today: Why won't ChatGPT acknowledge the name David Mayer? Internet users uncover mystery


YouTube: Solved: Why ChatGPT Will Not Say "David Mayer"


The Decoder: New York Times writer exposes how AI models can be fooled by invisible text on websites


NYT: How Do You Change a Chatbot's Mind?



Tencent's HunyuanVideo Release:

The Decoder: Tencent introduces open source video generator HunyuanVideo and challenges Sora 

TechNode: Tencent launches and open-sources Hunyuan video-generation model


YouTube: New AI Video Model Storms Onto The Scene! 

HuggingFace: HunyuanVideo Official Model Page


Research paper about text based sound generation for videos. SonicVisionLM: Playing Sound with Vision Language Models



AI Dumpster Fire of the Week (The Sora Leak):

TechCrunch: OpenAI's Sora video generator appears to have leaked 

Washington Post: OpenAI hits pause on video model Sora after artists leak access in protest 


Tom's Guide: OpenAI's o1 model leaked on Friday and it is wild — here's what happened 

Leopold Aschenbrenner: SITUATIONAL AWARENESS: The Decade Ahead


Additional Sora leak from internal preview 


*** THE BOILERPLATE ***
About The FAIK Files:
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions.

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458



Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA



Other: https://digitalfolklore.fm 


Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter



Perry on X: https://x.com/perrycarpenter



Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and </strong><a href="https://thecyberwire.com/podcasts/the-faik-files"><strong>subscribe to the new feed</strong></a><strong> if you want to keep following in 2025. </strong></p><p><br></p><p>Welcome back to The FAIK Files--- the show about artificial intelligence and natural nonsense!</p><p><br></p><p>In this week's episode:</p><ul>
<li>Mason shares how ChatGPT became an unexpected hero in solving his home networking and studio challenges</li>
<li>Perry dives into the mysterious case of "David Mayer" and how a simple ChatGPT privacy patch sparked widespread conspiracy theories</li>
<li>We explore Tencent's bold entry into AI video generation with their open-source HunyuanVideo model</li>
<li>And in our AI Dumpster Fire of the Week, we unpack the drama surrounding leaks of multiple models from OpenAI</li>
</ul><p><br></p><p>Want to leave us a <strong>voicemail</strong>? Here's the magic link to do just that: <a href="https://sayhi.chat/FAIK">https://sayhi.chat/FAIK</a></p><p>You can also join our <strong>Discord</strong> server here: <a href="https://discord.gg/cThqEnMhJz">https://discord.gg/cThqEnMhJz</a></p><p><br></p><p><strong>*** NOTES AND REFERENCES ***</strong></p><p><br></p><p><strong>The ChatGPT Privacy Patch Conspiracy:</strong></p><ul>
<li>TechCrunch: <a href="https://techcrunch.com/2024/12/03/why-does-the-name-david-mayer-crash-chatgpt-digital-privacy-requests-may-be-at-fault/">Why does the name 'David Mayer' crash ChatGPT? OpenAI says privacy tool went rogue</a> </li>
<li>FastCompany: <a href="https://www.fastcompany.com/91238932/chatgpt-wont-recognize-david-mayer">The Internet is Freaking Out Because ChatGPT Won't Say the Name "David Mayer" </a>
</li>
<li>USA Today: <a href="https://www.usatoday.com/story/tech/news/2024/12/02/david-mayer-chatgpt-ai/76698820007/">Why won't ChatGPT acknowledge the name David Mayer? Internet users uncover mystery</a>
</li>
<li>YouTube: <a href="https://www.youtube.com/watch?v=77W3xWGofNs">Solved: Why ChatGPT Will Not Say "David Mayer"</a>
</li>
<li>The Decoder: <a href="https://the-decoder.com/new-york-times-writer-exposes-how-ai-models-can-be-fooled-by-invisible-text-on-websites/">New York Times writer exposes how AI models can be fooled by invisible text on websites</a>
</li>
<li>NYT: <a href="https://www.nytimes.com/2024/08/30/technology/ai-chatbot-chatgpt-manipulation.html">How Do You Change a Chatbot's Mind?</a>
</li>
</ul><p><br></p><p><strong>Tencent's HunyuanVideo Release:</strong></p><ul>
<li>The Decoder: <a href="https://the-decoder.com/tencent-introduces-open-source-video-generator-hunyuanvideo-and-challenges-sora/">Tencent introduces open source video generator HunyuanVideo and challenges Sora</a> </li>
<li>TechNode: <a href="https://technode.com/2024/12/04/tencent-launches-and-open-sources-hunyuan-video-generation-model/">Tencent launches and open-sources Hunyuan video-generation model</a>
</li>
<li>YouTube: <a href="https://www.youtube.com/watch?v=gCZCTor2Xco">New AI Video Model Storms Onto The Scene!</a> </li>
<li>HuggingFace: <a href="https://huggingface.co/tencent/HunyuanVideo">HunyuanVideo Official Model Page</a>
</li>
<li>Research paper about text based sound generation for videos. <a href="https://arxiv.org/pdf/2401.04394">SonicVisionLM: Playing Sound with Vision Language Models</a>
</li>
</ul><p><br></p><p><strong>AI Dumpster Fire of the Week (The Sora Leak):</strong></p><ul>
<li>TechCrunch: <a href="https://techcrunch.com/2024/11/26/artists-appears-to-have-leaked-access-to-openais-sora/">OpenAI's Sora video generator appears to have leaked</a> </li>
<li>Washington Post: <a href="https://www.washingtonpost.com/technology/2024/11/26/openai-sora-ai-video-model-artists-protest/">OpenAI hits pause on video model Sora after artists leak access in protest </a>
</li>
<li>Tom's Guide: <a href="https://www.tomsguide.com/ai/chatgpt/openais-o1-model-leaked-on-friday-and-it-is-wild-heres-what-happened">OpenAI's o1 model leaked on Friday and it is wild — here's what happened</a> </li>
<li>Leopold Aschenbrenner: SITUATIONAL AWARENESS: The Decade Ahead</li>
<li>
<a href="https://x.com/AndrewCurran_/status/1865775856398061610">Additional Sora leak</a> from internal preview </li>
</ul><p><br></p><p><strong>*** THE BOILERPLATE ***</strong></p><p><strong>About The FAIK Files:</strong></p><p><strong>The FAIK Files is an offshoot project from Perry Carpenter's most recent book, </strong><em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions.</em></p><ul>
<li>Get the Book: <a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a> (Amazon Associates link)</li>
<li>Check out the website for more info: <a href="https://thisbookisfaik.com/">https://thisbookisfaik.com</a>
</li>
</ul><p><br></p><p><strong>Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:</strong></p><ul>
<li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458">https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458</a>
</li>
<li>
<strong>Spotify: </strong><a href="https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA">https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA</a>
</li>
<li>
<strong>Other: </strong>https://digitalfolklore.fm </li>
</ul><p><br></p><p><strong>Want to connect with us? Here's how:</strong></p><p><strong>Connect with Perry:</strong></p><ul>
<li>Perry on LinkedIn: <a href="https://www.linkedin.com/in/perrycarpenter?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app">https://www.linkedin.com/in/perrycarpenter</a>
</li>
<li>
<strong>Perry on X: </strong><a href="https://x.com/perrycarpenter%20">https://x.com/perrycarpenter</a>
</li>
<li>
<strong>Perry on BlueSky: </strong><a href="https://bsky.app/profile/perrycarpenter.bsky.social">https://bsky.app/profile/perrycarpenter.bsky.social</a>
</li>
</ul><p><strong>Connect with Mason:</strong></p><ul>
<li>Mason on LinkedIn: <a href="https://www.linkedin.com/in/mason-amadeus-a853a7242/">https://www.linkedin.com/in/mason-amadeus-a853a7242/</a>
</li>
<li>Mason on BlueSky:<strong> </strong><a href="https://bsky.app/profile/pregnantsonic.com">https://bsky.app/profile/pregnantsonic.com</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3173</itunes:duration>
      <guid isPermaLink="false"><![CDATA[19f36fea-b4b6-11ef-9515-6f67647ff067]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1709294615.mp3?updated=1740073099" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The FAIK Files | A Hunch about Hutch</title>
      <description>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Welcome back to The FAIK Files— the show about artificial intelligence and natural nonsense!

In this week’s episode:

Mason has an update on last week's shocking story of Google Gemini’s alleged threats against a user. Is this a glitch, a hack, or something more sinister?

We sit down with cybersecurity expert Justin “Hutch” Hutchins (author of The Language of Deception) to dive into his experience weaponizing large language models and what it means for the future of AI.

And finally, we lighten things up with some fun AI music experiments, showing that Perry &amp; Mason may have too much time on their hands,


Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz

*** NOTES AND REFERENCES ***
Hutch's stuff:

Justin's Book: The Language of Deception: Weaponizing Next Generation AI


AI podcast: The Frontier Today (Apple Podcasts) (Spotify) 

Justin and Len Noe’s podcast: Cyber Cognition (Apple Podcasts) (Spotify)

RSA Conference talk: Autonomous Hacking Systems - Future Risk or FUD


Houston Security Conference talk: This is how we lose control - Focused on the catastrophic/societal risks - P(Doom)



Mason's update on theories about Google Gemini threatening people:

AI Didn’t Threaten Humanity—The Media Did: Breaking Down the Gemini Incident

LLM Context Windows

Lost in the Middle: How Language Models Use Long Contexts


Attention Sorting Combats Recency Bias in Long Context Large Language Models 

Cognitive Overload Attack: Prompt Injection for Long Context


Suno and Generative AI Music Generation:


Suno 


Udio 

Whispers in the Static (full song generated on Suno)

Experimental outro from today's episode (Suno)

Wired: US Record Labels Sue AI Music Generators Suno and Udio for Copyright Infringement


Soundiiz Blog: The music industry is at war against AI: Suno and Udio’s case



*** THE BOILERPLATE ***
About The FAIK Files: 
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. 

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions  (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458


Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA


Other: https://digitalfolklore.fm 



Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter


Perry on X: https://x.com/perrycarpenter 


Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>The FAIK Files | A Hunch about Hutch</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1cf458ee-b1fa-11ef-ba5d-c3a33fb4f043/image/e986525ab6236623cd1a2e53c44851c1.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Welcome back to The FAIK Files— the show about artificial intelligence and natural nonsense!

In this week’s episode:

Mason has an update on last week's shocking story of Google Gemini’s alleged threats against a user. Is this a glitch, a hack, or something more sinister?

We sit down with cybersecurity expert Justin “Hutch” Hutchins (author of The Language of Deception) to dive into his experience weaponizing large language models and what it means for the future of AI.

And finally, we lighten things up with some fun AI music experiments, showing that Perry &amp; Mason may have too much time on their hands,


Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz

*** NOTES AND REFERENCES ***
Hutch's stuff:

Justin's Book: The Language of Deception: Weaponizing Next Generation AI


AI podcast: The Frontier Today (Apple Podcasts) (Spotify) 

Justin and Len Noe’s podcast: Cyber Cognition (Apple Podcasts) (Spotify)

RSA Conference talk: Autonomous Hacking Systems - Future Risk or FUD


Houston Security Conference talk: This is how we lose control - Focused on the catastrophic/societal risks - P(Doom)



Mason's update on theories about Google Gemini threatening people:

AI Didn’t Threaten Humanity—The Media Did: Breaking Down the Gemini Incident

LLM Context Windows

Lost in the Middle: How Language Models Use Long Contexts


Attention Sorting Combats Recency Bias in Long Context Large Language Models 

Cognitive Overload Attack: Prompt Injection for Long Context


Suno and Generative AI Music Generation:


Suno 


Udio 

Whispers in the Static (full song generated on Suno)

Experimental outro from today's episode (Suno)

Wired: US Record Labels Sue AI Music Generators Suno and Udio for Copyright Infringement


Soundiiz Blog: The music industry is at war against AI: Suno and Udio’s case



*** THE BOILERPLATE ***
About The FAIK Files: 
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. 

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions  (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458


Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA


Other: https://digitalfolklore.fm 



Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter


Perry on X: https://x.com/perrycarpenter 


Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and </strong><a href="https://thecyberwire.com/podcasts/the-faik-files"><strong>subscribe to the new feed</strong></a><strong> if you want to keep following in 2025. </strong></p><p><br></p><p>Welcome back to The FAIK Files— the show about artificial intelligence and natural nonsense!</p><p><br></p><p>In this week’s episode:</p><ul>
<li>Mason has an update on last week's shocking story of Google Gemini’s alleged threats against a user. Is this a glitch, a hack, or something more sinister?</li>
<li>We sit down with cybersecurity expert Justin “Hutch” Hutchins (author of <em>The Language of Deception</em>) to dive into his experience weaponizing large language models and what it means for the future of AI.</li>
<li>And finally, we lighten things up with some fun AI music experiments, showing that Perry &amp; Mason may have too much time on their hands,</li>
</ul><p><br></p><p>Want to leave us a <strong>voicemail</strong>? Here's the magic link to do just that: <a href="https://sayhi.chat/FAIK">https://sayhi.chat/FAIK</a></p><p>You can also join our <strong>Discord</strong> server here: <a href="https://discord.gg/cThqEnMhJz">https://discord.gg/cThqEnMhJz</a></p><p><br></p><p><strong>*** NOTES AND REFERENCES ***</strong></p><p><strong>Hutch's stuff:</strong></p><ul>
<li>Justin's Book: <a href="https://amzn.to/4g5imKy">The Language of Deception: Weaponizing Next Generation AI</a>
</li>
<li>AI podcast: The Frontier Today (<a href="https://podcasts.apple.com/gb/podcast/the-frontier-today/id1775585751">Apple Podcasts</a>) (<a href="https://open.spotify.com/show/1ItPl3RTlNLp7gQk8lKRNN?si=a684dd6b218a4c0c">Spotify</a>) </li>
<li>Justin and Len Noe’s podcast: Cyber Cognition (<a href="https://podcasts.apple.com/gb/podcast/cyber-cognition/id1689688971">Apple Podcasts</a>) (<a href="https://open.spotify.com/show/157nYiPOlMBKl2jmt3E4eg?si=86ba1e315b5a43ed">Spotify</a>)</li>
<li>RSA Conference talk: <a href="https://www.rsaconference.com/Library/presentation/USA/2024/Autonomous%20Hacking%20Systems%20-%20Future%20Risk%20or%20FUD">Autonomous Hacking Systems - Future Risk or FUD</a>
</li>
<li>Houston Security Conference talk: <a href="https://youtu.be/OfVctfWL5Fw?si=ubvjCO8iT558nOqP">This is how we lose control - Focused on the catastrophic/societal risks - P(Doom)</a>
</li>
</ul><p><br></p><p><strong>Mason's update on theories about Google Gemini threatening people</strong>:</p><ul>
<li><a href="https://www.youtube.com/watch?v=HH7zkh06y1I">AI Didn’t Threaten Humanity—The Media Did: Breaking Down the Gemini Incident</a></li>
<li><a href="https://www.ibm.com/think/topics/context-window">LLM Context Windows</a></li>
<li><a href="https://cs.stanford.edu/~nfliu/papers/lost-in-the-middle.arxiv2023.pdf">Lost in the Middle: How Language Models Use Long Contexts</a></li>
<li>
<a href="https://arxiv.org/pdf/2310.01427">Attention Sorting Combats Recency Bias in Long Context Large Language Models</a> </li>
<li><a href="https://arxiv.org/pdf/2410.11272">Cognitive Overload Attack: Prompt Injection for Long Context</a></li>
</ul><p><br></p><p><strong>Suno and Generative AI Music Generation</strong>:</p><ul>
<li>
<a href="https://suno.com/">Suno</a> </li>
<li>
<a href="https://www.udio.com/">Udio</a> </li>
<li><a href="https://suno.com/song/b754c602-6116-4033-816e-ddf837c0f343">Whispers in the Static (full song generated on Suno)</a></li>
<li><a href="https://suno.com/song/b754c602-6116-4033-816e-ddf837c0f343">Experimental outro from today's episode (Suno)</a></li>
<li>Wired: <a href="https://www.wired.com/story/ai-music-generators-suno-and-udio-sued-for-copyright-infringement/">US Record Labels Sue AI Music Generators Suno and Udio for Copyright Infringement</a>
</li>
<li>Soundiiz Blog: <a href="https://soundiiz.com/blog/the-music-industry-is-at-war-against-ai-suno-and-udios-case/">The music industry is at war against AI: Suno and Udio’s case</a>
</li>
</ul><p><br></p><p><strong>*** THE BOILERPLATE ***</strong></p><p><strong>About The FAIK Files: </strong></p><p>The FAIK Files is an offshoot project from Perry Carpenter's most recent book, <em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions.</em> </p><ul>
<li>Get the Book: <a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a>  (Amazon Associates link)</li>
<li>Check out the website for more info: <a href="https://thisbookisfaik.com/">https://thisbookisfaik.com</a>
</li>
</ul><p><br></p><p><strong>Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:</strong></p><ul>
<li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458">https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458</a>
</li>
<li>Spotify: <a href="https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA">https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA</a>
</li>
<li>Other: <a href="https://digitalfolklore.fm%20/">https://digitalfolklore.fm </a>
</li>
</ul><p><br></p><p><strong>Want to connect with us? Here's how:</strong></p><p><strong>Connect with Perry:</strong></p><ul>
<li>Perry on LinkedIn: <a href="https://www.linkedin.com/in/perrycarpenter?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app">https://www.linkedin.com/in/perrycarpenter</a>
</li>
<li>Perry on X: <a href="https://x.com/perrycarpenter%20">https://x.com/perrycarpenter </a>
</li>
<li>Perry on BlueSky: <a href="https://bsky.app/profile/perrycarpenter.bsky.social">https://bsky.app/profile/perrycarpenter.bsky.social</a>
</li>
</ul><p><strong>Connect with Mason:</strong></p><ul>
<li>Mason on LinkedIn: <a href="https://www.linkedin.com/in/mason-amadeus-a853a7242/">https://www.linkedin.com/in/mason-amadeus-a853a7242/</a>
</li>
<li>Mason on BlueSky: <a href="https://bsky.app/profile/pregnantsonic.com">https://bsky.app/profile/pregnantsonic.com</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3096</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1cf458ee-b1fa-11ef-ba5d-c3a33fb4f043]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7937088865.mp3?updated=1740073264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The FAIK Files | Consciousness, Scams, &amp; Death Threats</title>
      <description>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Happy FAIKs-giving everyone! Welcome to the newly renovated and relaunched FAIK Files podcast. On this week's episode, Perry &amp; Mason cover Anthropic's recent hiring of an employee focused on AI well-being, an AI grandmother from hell (for scammers), and Google's Gemini chatbot allegedly tells a user what it really thinks of them. Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. 

Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz


*** NOTES AND REFERENCES ***
AI Wellbeing:

Anthropic has hired an 'AI welfare' researcher:https://www.transformernews.ai/p/anthropic-ai-welfare-researcher


It’s time to take AI welfare seriously: https://www.transformernews.ai/p/ai-welfare-paper


Taking AI Welfare Seriously: https://arxiv.org/pdf/2411.00986 


The problem of sycophancy in AI:

Suckup software: How sycophancy threatens the future of AI: https://www.freethink.com/robots-ai/ai-sycophancy 

Towards Understanding Sycophancy in Language Models:https://arxiv.org/pdf/2310.13548



AI Interpretability: 

Mapping the Mind of a Large Language Model: https://www.anthropic.com/news/mapping-mind-language-model 

Lex Fridman podcast interview with Dario Amodei, Amanda Askell, &amp; Chris Olah: https://youtu.be/ugvHCXCOmm4 


Deceptive and self-serving tendencies in AI systems:

Sycophancy to subterfuge: Investigating reward tampering in language models: https://www.anthropic.com/research/reward-tampering 

OpenAI o1 System Card: https://openai.com/index/openai-o1-system-card/

Announcing our updated Responsible Scaling Policy: https://www.anthropic.com/news/announcing-our-updated-responsible-scaling-policy



AI Grandmother from Hell (for scammers):

Phone network employs AI "grandmother" to waste scammers' time with meandering conversations: https://www.techspot.com/news/105571-phone-network-employs-ai-grandmother-waste-scammers-time.html


YouTube video of Daisy: https://www.youtube.com/watch?v=RV_SdCfZ-0s 



AI Dumpster Fire of the Week (Gemini tells an end user what it really thinks about him):

Article: https://people.com/ai-chatbot-alarms-user-with-unsettling-message-human-please-die-8746112


Gemini interaction: https://gemini.google.com/share/6d141b742a13




*** THE BOILERPLATE ***
About The FAIK Files: 
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. 

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions  (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458


Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA


Other: https://digitalfolklore.fm 



Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter


Perry on X: https://x.com/perrycarpenter 


Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Nov 2024 07:00:00 -0000</pubDate>
      <itunes:title>The FAIK Files | Consciousness, Scams, &amp; Death Threats</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8078cff8-ac8c-11ef-a3b2-bb4777314c6d/image/ebdaf2c5d5e31764cbd158e941cd9204.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. 

Happy FAIKs-giving everyone! Welcome to the newly renovated and relaunched FAIK Files podcast. On this week's episode, Perry &amp; Mason cover Anthropic's recent hiring of an employee focused on AI well-being, an AI grandmother from hell (for scammers), and Google's Gemini chatbot allegedly tells a user what it really thinks of them. Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. 

Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK
You can also join our Discord server here: https://discord.gg/cThqEnMhJz


*** NOTES AND REFERENCES ***
AI Wellbeing:

Anthropic has hired an 'AI welfare' researcher:https://www.transformernews.ai/p/anthropic-ai-welfare-researcher


It’s time to take AI welfare seriously: https://www.transformernews.ai/p/ai-welfare-paper


Taking AI Welfare Seriously: https://arxiv.org/pdf/2411.00986 


The problem of sycophancy in AI:

Suckup software: How sycophancy threatens the future of AI: https://www.freethink.com/robots-ai/ai-sycophancy 

Towards Understanding Sycophancy in Language Models:https://arxiv.org/pdf/2310.13548



AI Interpretability: 

Mapping the Mind of a Large Language Model: https://www.anthropic.com/news/mapping-mind-language-model 

Lex Fridman podcast interview with Dario Amodei, Amanda Askell, &amp; Chris Olah: https://youtu.be/ugvHCXCOmm4 


Deceptive and self-serving tendencies in AI systems:

Sycophancy to subterfuge: Investigating reward tampering in language models: https://www.anthropic.com/research/reward-tampering 

OpenAI o1 System Card: https://openai.com/index/openai-o1-system-card/

Announcing our updated Responsible Scaling Policy: https://www.anthropic.com/news/announcing-our-updated-responsible-scaling-policy



AI Grandmother from Hell (for scammers):

Phone network employs AI "grandmother" to waste scammers' time with meandering conversations: https://www.techspot.com/news/105571-phone-network-employs-ai-grandmother-waste-scammers-time.html


YouTube video of Daisy: https://www.youtube.com/watch?v=RV_SdCfZ-0s 



AI Dumpster Fire of the Week (Gemini tells an end user what it really thinks about him):

Article: https://people.com/ai-chatbot-alarms-user-with-unsettling-message-human-please-die-8746112


Gemini interaction: https://gemini.google.com/share/6d141b742a13




*** THE BOILERPLATE ***
About The FAIK Files: 
The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. 

Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions  (Amazon Associates link)

Check out the website for more info: https://thisbookisfaik.com



Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:

Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458


Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA


Other: https://digitalfolklore.fm 



Want to connect with us? Here's how:
Connect with Perry:

Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter


Perry on X: https://x.com/perrycarpenter 


Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social


Connect with Mason:

Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/


Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and </strong><a href="https://thecyberwire.com/podcasts/the-faik-files"><strong>subscribe to the new feed</strong></a><strong> if you want to keep following in 2025. </strong></p><p><br></p><p>Happy FAIKs-giving everyone! Welcome to the newly renovated and relaunched FAIK Files podcast. On this week's episode, Perry &amp; Mason cover Anthropic's recent hiring of an employee focused on AI well-being, an AI grandmother from hell (for scammers), and Google's Gemini chatbot allegedly tells a user what it really thinks of them. Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. </p><p><br></p><p>Want to leave us a <strong>voicemail</strong>? Here's the magic link to do just that: <a href="https://sayhi.chat/FAIK">https://sayhi.chat/FAIK</a></p><p>You can also join our <strong>Discord</strong> server here: <a href="https://discord.gg/cThqEnMhJz">https://discord.gg/cThqEnMhJz</a></p><p><br></p><p><br></p><p><strong>*** NOTES AND REFERENCES ***</strong></p><p><strong>AI Wellbeing:</strong></p><ul>
<li>Anthropic has hired an 'AI welfare' researcher:<a href="https://www.transformernews.ai/p/anthropic-ai-welfare-researcher">https://www.transformernews.ai/p/anthropic-ai-welfare-researcher</a>
</li>
<li>It’s time to take AI welfare seriously: <a href="https://www.transformernews.ai/p/ai-welfare-paper">https://www.transformernews.ai/p/ai-welfare-paper</a>
</li>
<li>Taking AI Welfare Seriously: <a href="https://arxiv.org/pdf/2411.00986">https://arxiv.org/pdf/2411.00986</a> </li>
</ul><p><br></p><p><strong>The problem of sycophancy in AI</strong>:</p><ul>
<li>Suckup software: How sycophancy threatens the future of AI: <a href="https://www.freethink.com/robots-ai/ai-sycophancy">https://www.freethink.com/robots-ai/ai-sycophancy</a> </li>
<li>Towards Understanding Sycophancy in Language Models:<a href="https://arxiv.org/pdf/2310.13548">https://arxiv.org/pdf/2310.13548</a>
</li>
</ul><p><br></p><p><strong>AI Interpretability: </strong></p><ul>
<li>Mapping the Mind of a Large Language Model: <a href="https://www.anthropic.com/news/mapping-mind-language-model">https://www.anthropic.com/news/mapping-mind-language-model</a> </li>
<li>Lex Fridman podcast interview with Dario Amodei, Amanda Askell, &amp; Chris Olah: <a href="https://youtu.be/ugvHCXCOmm4">https://youtu.be/ugvHCXCOmm4</a> </li>
</ul><p><br></p><p><strong>Deceptive and self-serving tendencies in AI systems:</strong></p><ul>
<li>Sycophancy to subterfuge: Investigating reward tampering in language models: <a href="https://www.anthropic.com/research/reward-tampering">https://www.anthropic.com/research/reward-tampering</a> </li>
<li>OpenAI o1 System Card: https://openai.com/index/openai-o1-system-card/</li>
<li>Announcing our updated Responsible Scaling Policy: <a href="https://www.anthropic.com/news/announcing-our-updated-responsible-scaling-policy">https://www.anthropic.com/news/announcing-our-updated-responsible-scaling-policy</a>
</li>
</ul><p><br></p><p><strong>AI Grandmother from Hell (for scammers):</strong></p><ul>
<li>Phone network employs AI "grandmother" to waste scammers' time with meandering conversations: <a href="https://www.techspot.com/news/105571-phone-network-employs-ai-grandmother-waste-scammers-time.html">https://www.techspot.com/news/105571-phone-network-employs-ai-grandmother-waste-scammers-time.html</a>
</li>
<li>YouTube video of Daisy: <a href="https://www.youtube.com/watch?v=RV_SdCfZ-0s%20">https://www.youtube.com/watch?v=RV_SdCfZ-0s </a>
</li>
</ul><p><br></p><p><strong>AI Dumpster Fire of the Week (Gemini tells an end user what it really thinks about him):</strong></p><ul>
<li>Article: <a href="https://people.com/ai-chatbot-alarms-user-with-unsettling-message-human-please-die-8746112?utm_source=chatgpt.com">https://people.com/ai-chatbot-alarms-user-with-unsettling-message-human-please-die-8746112</a>
</li>
<li>Gemini interaction: <a href="https://gemini.google.com/share/6d141b742a13">https://gemini.google.com/share/6d141b742a13</a>
</li>
</ul><p><br></p><p><br></p><p><strong>*** THE BOILERPLATE ***</strong></p><p><strong>About The FAIK Files: </strong></p><p>The FAIK Files is an offshoot project from Perry Carpenter's most recent book, <em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions.</em> </p><ul>
<li>Get the Book: <a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a>  (Amazon Associates link)</li>
<li>Check out the website for more info: <a href="https://thisbookisfaik.com/">https://thisbookisfaik.com</a>
</li>
</ul><p><br></p><p><strong>Check out Perry &amp; Mason's other show, the Digital Folklore Podcast:</strong></p><ul>
<li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458">https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458</a>
</li>
<li>Spotify: <a href="https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA">https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA</a>
</li>
<li>Other: <a href="https://digitalfolklore.fm%20/">https://digitalfolklore.fm </a>
</li>
</ul><p><br></p><p><strong>Want to connect with us? Here's how:</strong></p><p><strong>Connect with Perry:</strong></p><ul>
<li>Perry on LinkedIn: <a href="https://www.linkedin.com/in/perrycarpenter?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app">https://www.linkedin.com/in/perrycarpenter</a>
</li>
<li>Perry on X: <a href="https://x.com/perrycarpenter%20">https://x.com/perrycarpenter </a>
</li>
<li>Perry on BlueSky: <a href="https://bsky.app/profile/perrycarpenter.bsky.social">https://bsky.app/profile/perrycarpenter.bsky.social</a>
</li>
</ul><p><strong>Connect with Mason:</strong></p><ul>
<li>Mason on LinkedIn: <a href="https://www.linkedin.com/in/mason-amadeus-a853a7242/">https://www.linkedin.com/in/mason-amadeus-a853a7242/</a>
</li>
<li>Mason on BlueSky: <a href="https://bsky.app/profile/pregnantsonic.com">https://bsky.app/profile/pregnantsonic.com</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3024</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8078cff8-ac8c-11ef-a3b2-bb4777314c6d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3622407849.mp3?updated=1740073067" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FAIK Miniseries (sneak peek) | Chapter 3: The Mindset and Tools of a Digital Manipulator</title>
      <description>This is Part Three of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications.

Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions

Check out the website for more info: https://thisbookisfaik.com

Voice credits for the opening "Whispers from the Static": Kayla Temshiv 

This is the last episode we are publishing in this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes.

Links to the show: 


Apple Podcasts: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321


Spotify: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ


All others: https://www.buzzsprout.com/2409237


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Oct 2024 23:12:00 -0000</pubDate>
      <itunes:title>FAIK Miniseries (sneak peek) | Chapter 3: The Mindset and Tools of a Digital Manipulator</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fe8dc624-846d-11ef-93b4-a727ff68d73c/image/67197d4b0173ea03aea8babf27bbdd44.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This is Part Three of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications.

Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions

Check out the website for more info: https://thisbookisfaik.com

Voice credits for the opening "Whispers from the Static": Kayla Temshiv 

This is the last episode we are publishing in this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes.

Links to the show: 


Apple Podcasts: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321


Spotify: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ


All others: https://www.buzzsprout.com/2409237


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This is Part Three of a ten-part miniseries exploring Perry Carpenter's latest book, <em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</em>. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications.</p><p><br></p><p><strong>Get the Book (Amazon Associate Link): </strong><a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a></p><p><br></p><p><strong>Check out the website for more info: </strong><a href="https://thisbookisfaik.com/"><strong>https://thisbookisfaik.com</strong></a></p><p><br></p><p><strong>Voice credits for the opening "Whispers from the Static": </strong><a href="https://www.kaylatemshiv.com/"><strong>Kayla Temshiv</strong></a><strong> </strong></p><p><br></p><p><strong>This is the last episode we are publishing in this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes.</strong></p><p><br></p><p><strong>Links to the show: </strong></p><ul>
<li>
<strong>Apple Podcasts</strong>: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321</li>
<li>
<strong>Spotify</strong>: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ</li>
<li>
<strong>All others</strong>: https://www.buzzsprout.com/2409237</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1916</itunes:duration>
      <guid isPermaLink="false"><![CDATA[fe8dc624-846d-11ef-93b4-a727ff68d73c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6814652030.mp3?updated=1740073047" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FAIK Miniseries (sneak peek) | Chapter 2: New Frontiers of Deception: AI and Synthetic Media</title>
      <description>This is Part Two of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications. 

Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions

Check out the website for more info: https://thisbookisfaik.com

We'll be posting episodes 1 through 3 on this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes.

Links to the show: 


Apple Podcasts: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321


Spotify: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ


All others: https://www.buzzsprout.com/2409237


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Sep 2024 23:10:00 -0000</pubDate>
      <itunes:title>FAIK Miniseries (sneak peek) | Chapter 2: New Frontiers of Deception: AI and Synthetic Media</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f78b0c2-7f7d-11ef-83ad-bbc635bab24f/image/be7fa4e1c72d951fd37cb172e6ca2f99.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This is Part Two of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications. 

Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions

Check out the website for more info: https://thisbookisfaik.com

We'll be posting episodes 1 through 3 on this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes.

Links to the show: 


Apple Podcasts: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321


Spotify: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ


All others: https://www.buzzsprout.com/2409237


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This is Part Two of a ten-part miniseries exploring Perry Carpenter's latest book, <em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</em>. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications. </p><p><br></p><p><strong>Get the Book (Amazon Associate Link): </strong><a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a></p><p><br></p><p><strong>Check out the website for more info: </strong><a href="https://thisbookisfaik.com/"><strong>https://thisbookisfaik.com</strong></a></p><p><br></p><p><strong>We'll be posting episodes 1 through 3 on this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes.</strong></p><p><br></p><p><strong>Links to the show: </strong></p><ul>
<li>
<strong>Apple Podcasts</strong>: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321</li>
<li>
<strong>Spotify</strong>: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ</li>
<li>
<strong>All others</strong>: https://www.buzzsprout.com/2409237</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1796</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8f78b0c2-7f7d-11ef-83ad-bbc635bab24f]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4789589623.mp3?updated=1740073181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FAIK Miniseries (sneak peek) | Chapter 1: The Eternal Battle for the Mind</title>
      <description>This is Part One of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications. 

Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions

Check out the website for more info: https://thisbookisfaik.com

We'll be posting episodes 1 through 3 on this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes.

Links to the show: 


Apple Podcasts: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321


Spotify: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ


All others: https://www.buzzsprout.com/2409237


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Sep 2024 23:00:00 -0000</pubDate>
      <itunes:title>FAIK Miniseries (sneak peek) | Chapter 1: The Eternal Battle for the Mind</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c69a9be8-7f7c-11ef-9e6e-c38e3ba0f262/image/2e376e45287a2bce6871f31e81922078.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This is Part One of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications. 

Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions

Check out the website for more info: https://thisbookisfaik.com

We'll be posting episodes 1 through 3 on this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes.

Links to the show: 


Apple Podcasts: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321


Spotify: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ


All others: https://www.buzzsprout.com/2409237


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This is Part One of a ten-part miniseries exploring Perry Carpenter's latest book, <em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</em>. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications. </p><p><br></p><p><strong>Get the Book (Amazon Associate Link): </strong><a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a></p><p><br></p><p><strong>Check out the website for more info: </strong><a href="https://thisbookisfaik.com/"><strong>https://thisbookisfaik.com</strong></a></p><p><br></p><p><strong>We'll be posting episodes 1 through 3 on this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes.</strong></p><p><br></p><p><strong>Links to the show: </strong></p><ul>
<li>
<strong>Apple Podcasts</strong>: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321</li>
<li>
<strong>Spotify</strong>: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ</li>
<li>
<strong>All others</strong>: https://www.buzzsprout.com/2409237</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1942</itunes:duration>
      <guid isPermaLink="false"><![CDATA[c69a9be8-7f7c-11ef-9e6e-c38e3ba0f262]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7511681867.mp3?updated=1740073085" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Digital Mindhunters</title>
      <description>In this conversation, Perry sits down with Dr. Bilyana Lilly to discuss her new book Digital Mindhunters (Coming Oct 30) and the intersection of cybersecurity, disinformation, and AI. She describes the narrative structure of her book, navigating a world of cyber threats and influence operations, and the evolving landscape of disinformation with AI amplifying threats. Dr. Lilly emphasizes the importance of awareness and education in combating misinformation and highlights the global threats posed by countries like Russia and China. 

Guests:
Dr. Bilyana Lilly (LinkedIn) (Twitter)

References:


Digital Mindhunters, by Dr. Bilyana Lilly  (Amazon Associates Link)

EU vs. Disinfo website


International Fact-Checking Network (IFCN) Code of Principles 

Quote Origin: A Lie Can Travel Halfway Around the World While the Truth Is Putting On Its Shoes


SE Community John Henry competition (where Perry's AI bot was able to compete!)

[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing

Perry's LinkedIn post talking about the competition results

Perry's Books (Amazon Associate Links)


NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions


Book website: https://thisbookisfaik.com



Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Sep 2024 21:22:00 -0000</pubDate>
      <itunes:title>Digital Mindhunters</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/612f3d0a-c9f0-11ee-82f0-7b57df8b72ca/image/7c43b365564bd916b3d50cdf39baac79.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>In this conversation, Perry sits down with Dr. Bilyana Lilly to discuss her new book Digital Mindhunters (Coming Oct 30) and the intersection of cybersecurity, disinformation, and AI. She describes the narrative structure of her book, navigating a world of cyber threats and influence operations, and the evolving landscape of disinformation with AI amplifying threats. Dr. Lilly emphasizes the importance of awareness and education in combating misinformation and highlights the global threats posed by countries like Russia and China. 

Guests:
Dr. Bilyana Lilly (LinkedIn) (Twitter)

References:


Digital Mindhunters, by Dr. Bilyana Lilly  (Amazon Associates Link)

EU vs. Disinfo website


International Fact-Checking Network (IFCN) Code of Principles 

Quote Origin: A Lie Can Travel Halfway Around the World While the Truth Is Putting On Its Shoes


SE Community John Henry competition (where Perry's AI bot was able to compete!)

[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing

Perry's LinkedIn post talking about the competition results

Perry's Books (Amazon Associate Links)


NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions


Book website: https://thisbookisfaik.com



Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this conversation, Perry sits down with Dr. Bilyana Lilly to discuss her new book <a href="https://amzn.to/3XusRiJ"><em>Digital Mindhunters</em></a> (Coming Oct 30) and the intersection of cybersecurity, disinformation, and AI. She describes the narrative structure of her book, navigating a world of cyber threats and influence operations, and the evolving landscape of disinformation with AI amplifying threats. Dr. Lilly emphasizes the importance of awareness and education in combating misinformation and highlights the global threats posed by countries like Russia and China. </p><p><br></p><h3>Guests:</h3><ul><li>Dr. Bilyana Lilly (<a href="https://www.linkedin.com/in/dr-bilyana-lilly-983b8119/">LinkedIn</a>) (<a href="https://x.com/BilyanaLilly">Twitter</a>)</li></ul><p><br></p><h3><strong>References:</strong></h3><ul>
<li>
<a href="https://amzn.to/3XusRiJ">Digital Mindhunters</a>, by Dr. Bilyana Lilly  (Amazon Associates Link)</li>
<li><a href="https://euvsdisinfo.eu/">EU vs. Disinfo website</a></li>
<li>
<a href="https://ifcncodeofprinciples.poynter.org/the-commitments">International Fact-Checking Network (IFCN) Code of Principles</a> </li>
<li><a href="https://quoteinvestigator.com/2014/07/13/truth/">Quote Origin: A Lie Can Travel Halfway Around the World While the Truth Is Putting On Its Shoes</a></li>
<li>
<a href="https://www.se.community/john-henry-competition/">SE Community John Henry competition</a> (where Perry's AI bot was able to compete!)</li>
<li><a href="https://blog.knowbe4.com/proved-unsuspecting-call-recipients-are-super-vulnerable-to-ai-vishing">[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing</a></li>
<li><a href="https://www.linkedin.com/feed/update/urn:li:activity:7228169054992146432/">Perry's LinkedIn post talking about the competition results</a></li>
</ul><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<strong>NEW BOOK (Oct 1, 2024)</strong>: <a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a>
</li>
<li>Book website: <a href="https://thisbookisfaik.com/">https://thisbookisfaik.com</a>
</li>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[612f3d0a-c9f0-11ee-82f0-7b57df8b72ca]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1729993553.mp3?updated=1740073156" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Let's talk Social Engineering</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/49/notes</link>
      <description>In this episode, Perry catches-up with Stephanie (Snow) &amp; JC Carruthers. They talk about social engineering, the DEFCON Social Engineering Community / Village, and share their favorite (and most embarrassing) social engineering stories. 

Perry also gives a quick update on his recent exploits entering an AI chatbot into the Social Engineering Village CTF, speaking at the DEFCON AI Village, and the release of his new book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions.

Guests: 

Stephanie (Snow) Carruthers: (LinkedIn) (Twitter) 

JC Carruthers: (LinkedIn) (Twitter)

 
References:

Social Engineering Community website

SE Community twitter page


SE Community John Henry competition (where Perry's AI bot was able to compete!)

[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing

Perry's LinkedIn post talking about the competition results


Perry's Books (Amazon Associate Links)


NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions


Book website: https://thisbookisfaik.com



Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Sep 2024 17:29:00 -0000</pubDate>
      <itunes:title>Let's talk Social Engineering</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/342eff96-b962-11ee-9f87-af9576c282c0/image/80124f6e9b57e2c88ac56bb2afd4ed73.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>In this episode, Perry catches-up with Stephanie (Snow) &amp; JC Carruthers. They talk about social engineering, the DEFCON Social Engineering Community / Village, and share their favorite (and most embarrassing) social engineering stories. 

Perry also gives a quick update on his recent exploits entering an AI chatbot into the Social Engineering Village CTF, speaking at the DEFCON AI Village, and the release of his new book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions.

Guests: 

Stephanie (Snow) Carruthers: (LinkedIn) (Twitter) 

JC Carruthers: (LinkedIn) (Twitter)

 
References:

Social Engineering Community website

SE Community twitter page


SE Community John Henry competition (where Perry's AI bot was able to compete!)

[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing

Perry's LinkedIn post talking about the competition results


Perry's Books (Amazon Associate Links)


NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions


Book website: https://thisbookisfaik.com



Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Perry catches-up with Stephanie (Snow) &amp; JC Carruthers. They talk about social engineering, the DEFCON Social Engineering Community / Village, and share their favorite (and most embarrassing) social engineering stories. </p><p><br></p><p>Perry also gives a quick update on his recent exploits entering an AI chatbot into the Social Engineering Village CTF, speaking at the DEFCON AI Village, and the release of his new book, <a href="https://thisbookisfaik.com/"><em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</em></a>.</p><p><br></p><h3>Guests: </h3><ul>
<li>Stephanie (Snow) Carruthers: (<a href="https://www.linkedin.com/in/stephanie-carruthers/">LinkedIn</a>) (<a href="https://x.com/_sn0ww">Twitter</a>) </li>
<li>JC Carruthers: (<a href="https://www.linkedin.com/in/jcsocal/">LinkedIn</a>) (<a href="https://x.com/jc_socal">Twitter</a>)</li>
</ul><p> </p><h3><strong>References:</strong></h3><ul>
<li><a href="https://www.se.community/">Social Engineering Community website</a></li>
<li><a href="https://x.com/sec_defcon?lang=en">SE Community twitter page</a></li>
<li>
<a href="https://www.se.community/john-henry-competition/">SE Community John Henry competition</a> (where Perry's AI bot was able to compete!)</li>
<li><a href="https://blog.knowbe4.com/proved-unsuspecting-call-recipients-are-super-vulnerable-to-ai-vishing">[PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing</a></li>
<li><a href="https://www.linkedin.com/feed/update/urn:li:activity:7228169054992146432/">Perry's LinkedIn post talking about the competition results</a></li>
</ul><h3><br></h3><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<strong>NEW BOOK (Oct 1, 2024)</strong>: <a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a>
</li>
<li>Book website: <a href="https://thisbookisfaik.com/">https://thisbookisfaik.com</a>
</li>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><br></h3><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3343</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[342eff96-b962-11ee-9f87-af9576c282c0]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2642004686.mp3?updated=1740073198" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What About Ethics?</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/48/notes</link>
      <description>On this episode, Perry gets to sit down with Ed Skoudis to discuss the simplicity and complexities of cybersecurity ethics. Ed's new book is The Code of Honor: Embracing Ethics in Cybersecurity. 

Guest:
Ed Skoudis (LinkedIn) (Twitter) (Website)
Books and References:


The Code of Honor: Embracing Ethics in Cybersecurity, by Paul J. Maurer and Ed Skoudis


The Mysterious Case of Rudolf Diesel: Genius, Power, and Deception on the Eve of World War I, by Douglas Brunt

The Cybersecurity Code (downloadable): https://www.montreat.edu/cybersecurity-code/


The Code of Honor book page

YouTube Video: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 2023


Perry's Books (Amazon Associate Links)


NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions


Book website: https://thisbookisfaik.com



Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Jul 2024 04:00:00 -0000</pubDate>
      <itunes:title>What About Ethics?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3365522c-b962-11ee-9f87-c3d18f3fa023/image/1f3ec4f902c3e4b845fe9b29269823f6.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>On this episode, Perry gets to sit down with Ed Skoudis to discuss the simplicity and complexities of cybersecurity ethics. Ed's new book is The Code of Honor: Embracing Ethics in Cybersecurity. 

Guest:
Ed Skoudis (LinkedIn) (Twitter) (Website)
Books and References:


The Code of Honor: Embracing Ethics in Cybersecurity, by Paul J. Maurer and Ed Skoudis


The Mysterious Case of Rudolf Diesel: Genius, Power, and Deception on the Eve of World War I, by Douglas Brunt

The Cybersecurity Code (downloadable): https://www.montreat.edu/cybersecurity-code/


The Code of Honor book page

YouTube Video: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 2023


Perry's Books (Amazon Associate Links)


NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions


Book website: https://thisbookisfaik.com



Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry gets to sit down with Ed Skoudis to discuss the simplicity and complexities of cybersecurity ethics. Ed's new book is <a href="https://amzn.to/4dozKZs">The Code of Honor: Embracing Ethics in Cybersecurity</a>. </p><p><br></p><h3><strong>Guest:</strong></h3><ul><li>Ed Skoudis (<a href="https://www.linkedin.com/in/edskoudis/">LinkedIn</a>) (<a href="https://x.com/edskoudis">Twitter</a>) (<a href="https://www.counterhack.com/">Website</a>)</li></ul><h3><strong>Books and References:</strong></h3><ul>
<li>
<a href="https://amzn.to/4dozKZs">The Code of Honor: Embracing Ethics in Cybersecurity</a>, by Paul J. Maurer and Ed Skoudis</li>
<li>
<a href="https://amzn.to/3SqVfQY">The Mysterious Case of Rudolf Diesel: Genius, Power, and Deception on the Eve of World War I,</a> by Douglas Brunt</li>
<li>The Cybersecurity Code (downloadable): <a href="https://www.montreat.edu/cybersecurity-code/">https://www.montreat.edu/cybersecurity-code/</a>
</li>
<li><a href="https://cybercodeofhonor.com/">The Code of Honor book page</a></li>
<li>YouTube Video: <a href="https://www.youtube.com/watch?v=M9UArxKlI70&amp;ab_channel=SANSInstitute">Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 2023</a>
</li>
</ul><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<strong>NEW BOOK (Oct 1, 2024)</strong>: <a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a>
</li>
<li>Book website: <a href="https://thisbookisfaik.com">https://thisbookisfaik.com</a>
</li>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3365522c-b962-11ee-9f87-c3d18f3fa023]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3811894486.mp3?updated=1740073287" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can You Really Tell if Something is Written by an AI?</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/47/notes</link>
      <description>On this episode, Perry gets to sit down with Jon Gillham. Jon is the founder and CEO of Originality.ai -- an AI content detection platform designed to help website owners, content marketers, writers and publishers hit 'publish' with integrity in the world of generative AI.

In this interview, we get the lowdown on how AI content detection works, what it is good at, and where some of the current limits are.

Guest:
Jon Gillham (LinkedIn) (Twitter) (Website)
Books and References:


AI Content Detector Accuracy Review + Open Source Dataset and Research Tool, Originality.ai blog post


Is Using AI Tools the Same as Plagiarizing? A Legal Perspective, Originality.ai blog post


Empirical Study of AI-Generated Text Detection — Results as per An Empirical Study of AI-Generated Text Detection Tools, Originality.ai blog post

A Survey on LLM-Generated Text Detection: Necessity, Methods, and Future Directions

LLM-as-a-Coauthor: The Challenges of Detecting LLM-Human Mixcase

Perry's Books (Amazon Associate Links)


NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions



Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Jul 2024 04:00:00 -0000</pubDate>
      <itunes:title>Can You Really Tell if Something is Written by an AI?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/33ffec06-b962-11ee-9f87-c335ddd54252/image/cca4262bc01a3e3929d50fe2b37f6427.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>On this episode, Perry gets to sit down with Jon Gillham. Jon is the founder and CEO of Originality.ai -- an AI content detection platform designed to help website owners, content marketers, writers and publishers hit 'publish' with integrity in the world of generative AI.

In this interview, we get the lowdown on how AI content detection works, what it is good at, and where some of the current limits are.

Guest:
Jon Gillham (LinkedIn) (Twitter) (Website)
Books and References:


AI Content Detector Accuracy Review + Open Source Dataset and Research Tool, Originality.ai blog post


Is Using AI Tools the Same as Plagiarizing? A Legal Perspective, Originality.ai blog post


Empirical Study of AI-Generated Text Detection — Results as per An Empirical Study of AI-Generated Text Detection Tools, Originality.ai blog post

A Survey on LLM-Generated Text Detection: Necessity, Methods, and Future Directions

LLM-as-a-Coauthor: The Challenges of Detecting LLM-Human Mixcase

Perry's Books (Amazon Associate Links)


NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions



Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry gets to sit down with Jon Gillham. Jon is the founder and CEO of Originality.ai -- an AI content detection platform designed to help website owners, content marketers, writers and publishers hit 'publish' with integrity in the world of generative AI.</p><p><br></p><p>In this interview, we get the lowdown on how AI content detection works, what it is good at, and where some of the current limits are.</p><p><br></p><p><strong>Guest:</strong></p><ul><li>Jon Gillham (<a href="https://www.linkedin.com/in/jon-gillham-80912a14a/">LinkedIn</a>) (<a href="https://x.com/JonGillhams">Twitter</a>) (<a href="https://originality.ai/">Website</a>)</li></ul><h3><strong>Books and References:</strong></h3><ul>
<li>
<a href="https://originality.ai/blog/ai-content-detection-accuracy">AI Content Detector Accuracy Review + Open Source Dataset and Research Tool</a>, Originality.ai blog post</li>
<li>
<a href="https://originality.ai/blog/ai-tools-vs-plagiarism">Is Using AI Tools the Same as Plagiarizing? A Legal Perspective</a>, Originality.ai blog post</li>
<li>
<a href="https://originality.ai/blog/empirical-study-ai-generated-text-detection">Empirical Study of AI-Generated Text Detection — Results as per An Empirical Study of AI-Generated Text Detection Tools</a>, Originality.ai blog post</li>
<li><a href="https://arxiv.org/abs/2310.14724v3">A Survey on LLM-Generated Text Detection: Necessity, Methods, and Future Directions</a></li>
<li><a href="https://arxiv.org/abs/2401.05952v1">LLM-as-a-Coauthor: The Challenges of Detecting LLM-Human Mixcase</a></li>
</ul><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<strong>NEW BOOK (Oct 1, 2024)</strong>: <a href="https://amzn.to/4cIAjww">FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</a>
</li>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2871</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33ffec06-b962-11ee-9f87-c335ddd54252]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2341255620.mp3?updated=1740073299" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Money Laundering 101: a chat with Investigative Journalist Geoff White</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/46/notes</link>
      <description>On this episode, Perry gets to sit down with investigative journalist, author, and podcaster, Geoff White. They discuss Geoff's new book, "Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks", the state of global cybercrime, and (everybody's favorite topic) artificial intelligence.  
Guest: 
Geoff White (LinkedIn) (Twitter)
Books and References:


Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks, by Geoff White


RinsedGPT -- Generative AI questions/answers from the book, Rinsed


The Lazarus Heist: Based on the hit podcast, by Geoff White


Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global, by Geoff White


The Lazarus Heist podcast (BBC)

YouTube video: Three Key Types of Cybercriminals, by Geoff White

Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Jun 2024 04:00:00 -0000</pubDate>
      <itunes:title>Money Laundering 101: a chat with Investigative Journalist Geoff White</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/33cc99b4-b962-11ee-9f87-5f8c6d01994a/image/409006137855c9d28ca3a375631e3b6b.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>On this episode, Perry gets to sit down with investigative journalist, author, and podcaster, Geoff White. They discuss Geoff's new book, "Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks", the state of global cybercrime, and (everybody's favorite topic) artificial intelligence.  
Guest: 
Geoff White (LinkedIn) (Twitter)
Books and References:


Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks, by Geoff White


RinsedGPT -- Generative AI questions/answers from the book, Rinsed


The Lazarus Heist: Based on the hit podcast, by Geoff White


Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global, by Geoff White


The Lazarus Heist podcast (BBC)

YouTube video: Three Key Types of Cybercriminals, by Geoff White

Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry gets to sit down with investigative journalist, author, and podcaster, Geoff White. They discuss Geoff's new book,<em> "Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks",</em> the state of global cybercrime, and (everybody's favorite topic) artificial intelligence.  </p><p><strong>Guest: </strong></p><ul><li>Geoff White (<a href="https://www.linkedin.com/in/geoffwhitetech/">LinkedIn</a>) (<a href="https://twitter.com/geoffwhite247">Twitter</a>)</li></ul><h3><strong>Books and References:</strong></h3><ul>
<li>
<a href="https://amzn.to/3X8X7Bo">Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks</a>, by Geoff White</li>
<li>
<a href="https://rinsedgpt.com/">RinsedGPT</a> -- Generative AI questions/answers from the book, Rinsed</li>
<li>
<a href="https://amzn.to/3Ku8lZo">The Lazarus Heist: Based on the hit podcast</a>, by Geoff White</li>
<li>
<a href="https://amzn.to/4bWxkk4">Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global</a>, by Geoff White</li>
<li>
<a href="https://www.bbc.co.uk/programmes/w13xtvg9/episodes/downloads">The Lazarus Heist podcast</a> (BBC)</li>
<li>YouTube video: <a href="https://www.youtube.com/watch?v=Z4PhdNPT-0w">Three Key Types of Cybercriminals</a>, by Geoff White</li>
</ul><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2977</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33cc99b4-b962-11ee-9f87-5f8c6d01994a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6006058364.mp3?updated=1740073346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Communicating Complex Topics with Creativity and Passion</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/45/notes</link>
      <description>In this episode, Perry sits down with award winning cybersecurity author, George Finney to discuss his recent book, Project Zero Trust. This is a broad discussion that hits on the concepts of Zero Trust, George's approach to writing the book, his passion for storytelling, and much more. 

Guest:
George Finney (LinkedIn) (Website)
Books and References:


Project Zero Trust: A Story about a Strategy for Aligning Security and the Business, by George Finney


Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future, by George Finney


The history and evolution of zero-trust security, TechTarget

Wikipedia: Zero Trust Security Model


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 May 2024 07:27:00 -0000</pubDate>
      <itunes:title>Communicating Complex Topics with Creativity and Passion</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3398dd54-b962-11ee-9f87-6f0983a68417/image/d97205661d45fb59119c926f05cf5857.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>In this episode, Perry sits down with award winning cybersecurity author, George Finney to discuss his recent book, Project Zero Trust. This is a broad discussion that hits on the concepts of Zero Trust, George's approach to writing the book, his passion for storytelling, and much more. 

Guest:
George Finney (LinkedIn) (Website)
Books and References:


Project Zero Trust: A Story about a Strategy for Aligning Security and the Business, by George Finney


Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future, by George Finney


The history and evolution of zero-trust security, TechTarget

Wikipedia: Zero Trust Security Model


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Perry sits down with award winning cybersecurity author, George Finney to discuss his recent book, <em>Project Zero Trust</em>. This is a broad discussion that hits on the concepts of Zero Trust, George's approach to writing the book, his passion for storytelling, and much more. </p><h3>
<strong>Guest</strong>:</h3><ul><li>George Finney (<a href="https://www.linkedin.com/in/georgefinney/">LinkedIn</a>) (<a href="https://wellawaresecurity.com/">Website</a>)</li></ul><h3><strong>Books and References:</strong></h3><ul>
<li>
<a href="https://amzn.to/3Qxx3eM">Project Zero Trust: A Story about a Strategy for Aligning Security and the Business</a>, by George Finney</li>
<li>
<a href="https://amzn.to/3UOTn6p">Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future</a>, by George Finney</li>
<li>
<a href="https://www.techtarget.com/whatis/feature/History-and-evolution-of-zero-trust-security">The history and evolution of zero-trust security</a>, TechTarget</li>
<li>Wikipedia: <a href="https://en.wikipedia.org/wiki/Zero_trust_security_model">Zero Trust Security Model</a>
</li>
</ul><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3398dd54-b962-11ee-9f87-6f0983a68417]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5340542544.mp3?updated=1740073385" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Rachel Tobac Hacked Me</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/44/notes</link>
      <description>In this episode Perry Carpenter sits down with Rachel Tobac to debrief after her recent KB4-CON session, "How I'd Hack You Live" where she... well... hacked Perry live. Perry and Rachel explore how age-old deception techniques are being revamped for the digital age. The discussion spans the future of social engineering, the increasing role of AI in security, and a few other fun bits. 

Guest:
Rachel Tobac (LinkedIn) (Twitter / X) (Website)
Books and References (Books are Amazon Associate Links and help support the show):


KB4-CON 2024 Main Stage Sessions (Registration required)


Deepfake scammer walks off with $25 million in first-of-its-kind AI heist, Ars Technica


The Social Engineer's Playbook: A Practical Guide to Pretexting, by Jeremiah Talamantes


The Art of Deception: Controlling the Human Element of Security, by Kevin Mitnick

YouTube video: 60 minutes Here’s how I used AI to clone a 60 Minutes correspondent’s voice to trick a colleague


YouTube video: It Was Easy to Hack a Billionaire


YouTube video: Inside the Mind of an Ethical Hacker


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Apr 2024 04:00:00 -0000</pubDate>
      <itunes:title>How Rachel Tobac Hacked Me</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3331f4e0-b962-11ee-9f87-9b3756241604/image/79ed37f886daf6407c666c364649125c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>In this episode Perry Carpenter sits down with Rachel Tobac to debrief after her recent KB4-CON session, "How I'd Hack You Live" where she... well... hacked Perry live. Perry and Rachel explore how age-old deception techniques are being revamped for the digital age. The discussion spans the future of social engineering, the increasing role of AI in security, and a few other fun bits. 

Guest:
Rachel Tobac (LinkedIn) (Twitter / X) (Website)
Books and References (Books are Amazon Associate Links and help support the show):


KB4-CON 2024 Main Stage Sessions (Registration required)


Deepfake scammer walks off with $25 million in first-of-its-kind AI heist, Ars Technica


The Social Engineer's Playbook: A Practical Guide to Pretexting, by Jeremiah Talamantes


The Art of Deception: Controlling the Human Element of Security, by Kevin Mitnick

YouTube video: 60 minutes Here’s how I used AI to clone a 60 Minutes correspondent’s voice to trick a colleague


YouTube video: It Was Easy to Hack a Billionaire


YouTube video: Inside the Mind of an Ethical Hacker


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode Perry Carpenter sits down with Rachel Tobac to debrief after her recent KB4-CON session, "How I'd Hack You Live" where she... well... hacked Perry live. Perry and Rachel explore how age-old deception techniques are being revamped for the digital age. The discussion spans the future of social engineering, the increasing role of AI in security, and a few other fun bits. </p><h3>
<strong>Guest</strong>:</h3><ul><li>Rachel Tobac (<a href="https://www.linkedin.com/in/racheltobac/">LinkedIn</a>) (<a href="https://twitter.com/RachelTobac">Twitter / X</a>) (<a href="https://www.socialproofsecurity.com/">Website</a>)</li></ul><h3><strong>Books and References (Books are Amazon Associate Links and help support the show):</strong></h3><ul>
<li>
<a href="https://www.knowbe4.com/kb4-con">KB4-CON 2024 Main Stage Sessions</a> (Registration required)</li>
<li>
<a href="https://arstechnica.com/information-technology/2024/02/deepfake-scammer-walks-off-with-25-million-in-first-of-its-kind-ai-heist/">Deepfake scammer walks off with $25 million in first-of-its-kind AI heis</a>t, Ars Technica</li>
<li>
<a href="https://amzn.to/49y1uZ0">The Social Engineer's Playbook: A Practical Guide to Pretexting</a>, by Jeremiah Talamantes</li>
<li>
<a href="https://amzn.to/3U76NdE">The Art of Deception: Controlling the Human Element of Security</a>, by Kevin Mitnick</li>
<li>YouTube video: <a href="https://www.youtube.com/watch?v=WhfY4Rh98UI">60 minutes Here’s how I used AI to clone a 60 Minutes correspondent’s voice to trick a colleague</a>
</li>
<li>YouTube video: <a href="https://www.youtube.com/watch?v=7-lDRgxbU1Y">It Was Easy to Hack a Billionaire</a>
</li>
<li>YouTube video: <a href="https://www.youtube.com/watch?v=UwPK_ietuxg">Inside the Mind of an Ethical Hacker</a>
</li>
</ul><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2023</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3331f4e0-b962-11ee-9f87-9b3756241604]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2867485079.mp3?updated=1740073387" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How AI Can Deceive and be Deceived</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/43/notes</link>
      <description>On this episode Perry sits down with Dr. Matthew Canham to explore ways in which AI can be weaponized against us, and how age old social engineering tactics can be used to trick large language models.

Guest:
Dr. Matthew Canham (LinkedIn) (Website)
Books and References (Books are Amazon Associate Links and help support the show):

Cognitive Security Institute YouTube Channel

Cognitive Security Institute website

YouTube video: BlackHat Presentation -- Me and My Evil Digital Twin: The Psychology of Human Exploitation by AI Assistants

YouTube video: NEW AI Jailbreak Method SHATTERS GPT4, Claude, Gemini, LLaMA


Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them, by Ram Shankar Siva Kumar &amp; Hyrum Anderson


Six Thinking Hats, the de Bono Group


Six Thinking Hats: Looking at Decision in Different Ways, MindTools


AI + Six Thinking Hats, LifeArchitect.ai

8Li Season 4, episode 10: Artificial Intelligence Insights &amp; Oddities


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>How AI Can Deceive and be Deceived</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On this episode Perry sits down with Dr. Matthew Canham to explore ways in which AI can be weaponized against us, and how age old social engineering tactics can be used to trick large language models.

Guest:
Dr. Matthew Canham (LinkedIn) (Website)
Books and References (Books are Amazon Associate Links and help support the show):

Cognitive Security Institute YouTube Channel

Cognitive Security Institute website

YouTube video: BlackHat Presentation -- Me and My Evil Digital Twin: The Psychology of Human Exploitation by AI Assistants

YouTube video: NEW AI Jailbreak Method SHATTERS GPT4, Claude, Gemini, LLaMA


Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them, by Ram Shankar Siva Kumar &amp; Hyrum Anderson


Six Thinking Hats, the de Bono Group


Six Thinking Hats: Looking at Decision in Different Ways, MindTools


AI + Six Thinking Hats, LifeArchitect.ai

8Li Season 4, episode 10: Artificial Intelligence Insights &amp; Oddities


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode Perry sits down with Dr. Matthew Canham to explore ways in which AI can be weaponized against us, and how age old social engineering tactics can be used to trick large language models.</p><h3>
<strong>Guest</strong>:</h3><ul><li>Dr. Matthew Canham (<a href="https://www.linkedin.com/in/matthew-c-971855100/">LinkedIn</a>) (<a href="https://drmatthewcanham.com/">Website</a>)</li></ul><h3><strong>Books and References (Books are Amazon Associate Links and help support the show):</strong></h3><ul>
<li><a href="https://www.youtube.com/channel/UCcjtBmZGno8co3APMD56fuQ">Cognitive Security Institute YouTube Channel</a></li>
<li><a href="https://cognitivesecurity.institute/">Cognitive Security Institute website</a></li>
<li><a href="https://www.youtube.com/watch?v=qjhfWWEQCgQ">YouTube video: BlackHat Presentation -- Me and My Evil Digital Twin: The Psychology of Human Exploitation by AI Assistants</a></li>
<li><a href="https://www.youtube.com/watch?v=5cEvNO9rZgI&amp;t=5s">YouTube video: NEW AI Jailbreak Method SHATTERS GPT4, Claude, Gemini, LLaMA</a></li>
<li>
<a href="https://amzn.to/3x0AqUS">Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them</a>, by Ram Shankar Siva Kumar &amp; Hyrum Anderson</li>
<li>
<a href="https://www.debonogroup.com/services/core-programs/six-thinking-hats/">Six Thinking Hats</a>, the de Bono Group</li>
<li>
<a href="https://www.mindtools.com/ajlpp1e/six-thinking-hats">Six Thinking Hats: Looking at Decision in Different Ways</a>, MindTools</li>
<li>
<a href="https://lifearchitect.ai/hats/">AI + Six Thinking Hats</a>, LifeArchitect.ai</li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/40/notes">8Li Season 4, episode 10: Artificial Intelligence Insights &amp; Oddities</a></li>
</ul><p><br></p><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3301c842-b962-11ee-9f87-5fe9ba8d07cd]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1511658747.mp3?updated=1740073459" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Frame the Future: The Art of Becoming a Futurist</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/42/notes</link>
      <description>On this episode Perry sits down with Jeremy Treadwell, a people-first technologist and futurist, to get the lowdown on how a futurist approaches the world.

Guest:
Jeremy Treadwell (LinkedIn) (Twitter)

Books and References (Books are Amazon Associate Links and help support the show):

YouTube Video: What UX/UI Taught Me about Improving Security Awareness [SANS Security Awareness Summit 2022], Jeremy Treadwell

YouTube Video: Reimagine the Future of Data, Privacy + Security with Technologist Jeremy Treadwell


The Institute for the Future website


Four Questions to Turn Everyone in Your Company Into a Futurist, FastCompany article


How Does a Futurist See the Future, LinkedIn Article by Jacob Morgan


The Black Swan: Second Edition: The Impact of the Highly Improbable: With a new section: "On Robustness and Fragility", by Nassim Nicholas Taleb


The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore, by Michele Wucker 


William Gibson’s Future Is Now, Pagan Kennedy, the New York Times

8Li Season 1, episode 8: The Risk Episode: Black Swans, Grey Rhinos, Angels &amp; Demons


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Feb 2024 05:00:00 -0000</pubDate>
      <itunes:title>Frame the Future: The Art of Becoming a Futurist</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On this episode Perry sits down with Jeremy Treadwell, a people-first technologist and futurist, to get the lowdown on how a futurist approaches the world.

Guest:
Jeremy Treadwell (LinkedIn) (Twitter)

Books and References (Books are Amazon Associate Links and help support the show):

YouTube Video: What UX/UI Taught Me about Improving Security Awareness [SANS Security Awareness Summit 2022], Jeremy Treadwell

YouTube Video: Reimagine the Future of Data, Privacy + Security with Technologist Jeremy Treadwell


The Institute for the Future website


Four Questions to Turn Everyone in Your Company Into a Futurist, FastCompany article


How Does a Futurist See the Future, LinkedIn Article by Jacob Morgan


The Black Swan: Second Edition: The Impact of the Highly Improbable: With a new section: "On Robustness and Fragility", by Nassim Nicholas Taleb


The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore, by Michele Wucker 


William Gibson’s Future Is Now, Pagan Kennedy, the New York Times

8Li Season 1, episode 8: The Risk Episode: Black Swans, Grey Rhinos, Angels &amp; Demons


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode Perry sits down with Jeremy Treadwell, a people-first technologist and futurist, to get the lowdown on how a futurist approaches the world.</p><h3>
<strong>Guest</strong>:</h3><ul><li>Jeremy Treadwell (<a href="https://www.linkedin.com/in/jeremytreadwell/">LinkedIn</a>) (<a href="https://twitter.com/jtread0000">Twitter</a>)</li></ul><p><br></p><h3><strong>Books and References (Books are Amazon Associate Links and help support the show):</strong></h3><ul>
<li>YouTube Video: <a href="https://www.youtube.com/watch?v=gIDGGzy15G0">What UX/UI Taught Me about Improving Security Awareness [SANS Security Awareness Summit 2022]</a>, Jeremy Treadwell</li>
<li>YouTube Video: <a href="https://www.youtube.com/watch?v=H-9LVp52onY">Reimagine the Future of Data, Privacy + Security with Technologist Jeremy Treadwell</a>
</li>
<li><a href="https://www.iftf.org/">The Institute for the Future website</a></li>
<li>
<a href="https://www.fastcompany.com/3066740/four-questions-to-turn-everyone-in-your-company-into-a-futurist">Four Questions to Turn Everyone in Your Company Into a Futurist</a>, FastCompany article</li>
<li>
<a href="https://www.linkedin.com/pulse/how-does-futurist-see-future-4-questions-you-need-know-jacob-morgan/">How Does a Futurist See the Future</a>, LinkedIn Article by Jacob Morgan</li>
<li>
<a href="https://amzn.to/48qs3ik">The Black Swan: Second Edition: The Impact of the Highly Improbable: With a new section: "On Robustness and Fragility"</a>, by Nassim Nicholas Taleb</li>
<li>
<a href="https://amzn.to/3uPgJ1w">The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore</a>, by Michele Wucker </li>
<li>
<a href="https://www.nytimes.com/2012/01/15/books/review/distrust-that-particular-flavor-by-william-gibson-book-review.html">William Gibson’s Future Is Now</a>, Pagan Kennedy, the New York Times</li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/8/notes">8Li Season 1, episode 8: The Risk Episode: Black Swans, Grey Rhinos, Angels &amp; Demons</a></li>
</ul><p><br></p><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[32d1b9b8-b962-11ee-9f87-d7a5b618ab03]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2671480655.mp3?updated=1740073498" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Scam a Romance Scammer</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/41/notes</link>
      <description>Welcome to season 5 of 8th Layer Insights!
To celebrate Valentine's Day, Perry sits down with Emmy winning reporter Kerry Tomlinson to talk about the time she turned the tables on a romance scammer.

Guest:
Kerry Tomlinson (LinkedIn) (Website) (YouTube)

Books and References:

YouTube video: Inside a romance scam: how to make a catfisher sing


YouTube video: Scammers are stealing people's faces for live video calls


National Cybersecurity Alliance : Online Romance and Dating Scams


National Cybersecurity Alliance : Romance Scams Resource Kit


Federal Trade Commission: Romance scammers’ favorite lies exposed


Know Your Meme: On the Internet, Nobody Knows You're A Dog


‘NOBODY KNOWS YOU’RE A DOG’: As iconic Internet cartoon turns 20, creator Peter Steiner knows the joke rings as relevant as ever

Wikipedia: On the Internet, nobody knows you're a dog



Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Feb 2024 11:34:00 -0000</pubDate>
      <itunes:title>How to Scam a Romance Scammer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Welcome to season 5 of 8th Layer Insights!
To celebrate Valentine's Day, Perry sits down with Emmy winning reporter Kerry Tomlinson to talk about the time she turned the tables on a romance scammer.

Guest:
Kerry Tomlinson (LinkedIn) (Website) (YouTube)

Books and References:

YouTube video: Inside a romance scam: how to make a catfisher sing


YouTube video: Scammers are stealing people's faces for live video calls


National Cybersecurity Alliance : Online Romance and Dating Scams


National Cybersecurity Alliance : Romance Scams Resource Kit


Federal Trade Commission: Romance scammers’ favorite lies exposed


Know Your Meme: On the Internet, Nobody Knows You're A Dog


‘NOBODY KNOWS YOU’RE A DOG’: As iconic Internet cartoon turns 20, creator Peter Steiner knows the joke rings as relevant as ever

Wikipedia: On the Internet, nobody knows you're a dog



Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to season 5 of 8th Layer Insights!</p><p>To celebrate Valentine's Day, Perry sits down with Emmy winning reporter Kerry Tomlinson to talk about the time she turned the tables on a romance scammer.</p><h3>
<strong>Guest</strong>:</h3><ul><li>Kerry Tomlinson (<a href="https://www.linkedin.com/in/kerry-tomlinson-6131b8110/">LinkedIn</a>) (<a href="https://www.amperesec.com/news">Website</a>) (<a href="https://www.youtube.com/channel/UCVgvPIhl1JRSwMmf1tIjGgA">YouTube</a>)</li></ul><p><br></p><h3><strong>Books and References:</strong></h3><ul>
<li>YouTube video: <a href="https://www.youtube.com/watch?v=elqZ0Uz9bf8&amp;ab_channel=AmpereNews">Inside a romance scam: how to make a catfisher sing</a>
</li>
<li>YouTube video: <a href="https://www.youtube.com/watch?v=17kk4miPGIM&amp;ab_channel=AmpereNews">Scammers are stealing people's faces for live video calls</a>
</li>
<li>National Cybersecurity Alliance : <a href="https://staysafeonline.org/online-safety-privacy-basics/romance-scams/">Online Romance and Dating Scams</a>
</li>
<li>National Cybersecurity Alliance : <a href="https://staysafeonline.org/resources/romance-scams-toolkit/">Romance Scams Resource Kit</a>
</li>
<li>Federal Trade Commission: <a href="https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2023/02/romance-scammers-favorite-lies-exposed">Romance scammers’ favorite lies exposed</a>
</li>
<li>Know Your Meme: <a href="On%20the%20Internet,%20Nobody%20Knows%20You're%20a%20Dog">On the Internet, Nobody Knows You're A Dog</a>
</li>
<li><a href="https://www.washingtonpost.com/blogs/comic-riffs/post/nobody-knows-youre-a-dog-as-iconic-internet-cartoon-turns-20-creator-peter-steiner-knows-the-joke-rings-as-relevant-as-ever/2013/07/31/73372600-f98d-11e2-8e84-c56731a202fb_blog.html">‘NOBODY KNOWS YOU’RE A DOG’: As iconic Internet cartoon turns 20, creator Peter Steiner knows the joke rings as relevant as ever</a></li>
<li>Wikipedia: <a href="https://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you%27re_a_dog">On the Internet, nobody knows you're a dog</a>
</li>
</ul><p><br></p><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3351</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[32a00a3a-b962-11ee-9f87-b334cfa6ad81]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6495160155.mp3?updated=1740073567" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Artificial Intelligence: Insights &amp; Oddities</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/40/notes</link>
      <description>On this episode, Perry celebrates the one year birthday of ChatGPT by taking a look at AI from technological, philosophical, and folkloric perspectives. We see how AI was formed based on human words and works, and how it can now shape the future of human legend and belief.
Guests: 



Brandon Karpf, Vice President at N2K Networks (LinkedIn) (Website)



Dr. Lynne S. McNeill, Associate Professor at Utah State University (LinkedIn) (Twitter) 



Dr. John Laudun, Professor at University of Louisiana at Lafayette (LinkedIn) (Twitter) (Website)



Lev Gorelov, Research Director at Handshake Consulting (LinkedIn) (Twitter) (Website)



Resources






Interview with the AI, part one, by the Brandon Karpf / the CyberWire






'Hard Fork': An Interview With Sam Altman, by The New York Times






The Exciting, Perilous Journey Toward AGI, Ilya Sutskever TED Talk






Ilya: the AI scientist shaping the world, by The Guardian






Meet Loab, the AI Art Woman Haunting the Internet: Is she a demon? A Cryptid? Or nothing at all..., the Guardian






In 2016, Microsoft’s Racist Chatbot Revealed the Dangers of Online Conversation The bot learned language from people on Twitter—but it also learned values, IEEE Spectrum



Perry's Digital Folklore episode about AI






Handshake's Generative AI Masterclass on Maven




Perry's Books (Amazon Associate links)






Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter






The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer




Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news.
Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:



LinkedIn



Twitter



Instagram



Email: perry [at] 8thLayerMedia [dot] com




Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Nov 2023 05:00:00 -0000</pubDate>
      <itunes:title>Artificial Intelligence: Insights &amp; Oddities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On this episode, Perry celebrates the one year birthday of ChatGPT by taking a look at AI from technological, philosophical, and folkloric perspectives. We see how AI was formed based on human words and works, and how it can now shape the future of human legend and belief.
Guests: 



Brandon Karpf, Vice President at N2K Networks (LinkedIn) (Website)



Dr. Lynne S. McNeill, Associate Professor at Utah State University (LinkedIn) (Twitter) 



Dr. John Laudun, Professor at University of Louisiana at Lafayette (LinkedIn) (Twitter) (Website)



Lev Gorelov, Research Director at Handshake Consulting (LinkedIn) (Twitter) (Website)



Resources






Interview with the AI, part one, by the Brandon Karpf / the CyberWire






'Hard Fork': An Interview With Sam Altman, by The New York Times






The Exciting, Perilous Journey Toward AGI, Ilya Sutskever TED Talk






Ilya: the AI scientist shaping the world, by The Guardian






Meet Loab, the AI Art Woman Haunting the Internet: Is she a demon? A Cryptid? Or nothing at all..., the Guardian






In 2016, Microsoft’s Racist Chatbot Revealed the Dangers of Online Conversation The bot learned language from people on Twitter—but it also learned values, IEEE Spectrum



Perry's Digital Folklore episode about AI






Handshake's Generative AI Masterclass on Maven




Perry's Books (Amazon Associate links)






Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter






The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer




Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news.
Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:



LinkedIn



Twitter



Instagram



Email: perry [at] 8thLayerMedia [dot] com




Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry celebrates the one year birthday of ChatGPT by taking a look at AI from technological, philosophical, and folkloric perspectives. We see how AI was formed based on human words and works, and how it can now shape the future of human legend and belief.</p><h3>Guests: </h3><ul>
<li><br></li>
<li>Brandon Karpf, Vice President at N2K Networks (<a href="https://www.linkedin.com/in/brandon-karpf/">LinkedIn</a>) (<a href="https://thecyberwire.com/pages/meet-the-team.html">Website</a>)</li>
<li><br></li>
<li>Dr. Lynne S. McNeill, Associate Professor at Utah State University (<a href="https://www.linkedin.com/in/lynnesmcneill/">LinkedIn</a>) (<a href="https://twitter.com/lynneSmcneill">Twitter</a>) </li>
<li><br></li>
<li>Dr. John Laudun, Professor at University of Louisiana at Lafayette (<a href="https://www.linkedin.com/in/johnlaudun/">LinkedIn</a>) (<a href="https://twitter.com/johnlaudun">Twitter</a>) (<a href="https://johnlaudun.net/">Website</a>)</li>
<li><br></li>
<li>Lev Gorelov, Research Director at Handshake Consulting (<a href="https://www.linkedin.com/in/levgorelov/">LinkedIn</a>) (<a href="https://twitter.com/handshake_fyi">Twitter</a>) (<a href="https://handshake.fyi/">Website</a>)</li>
<li><br></li>
</ul><h3>Resources</h3><ul>
<li><br></li>
<li><br></li>
<li>
<a href="https://thecyberwire.com/podcasts/special-edition/48/notes">Interview with the AI, part one</a>, by the Brandon Karpf / the CyberWire</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.youtube.com/watch?v=wBX4xeefPiA&amp;t=60s&amp;ab_channel=NewYorkTimesPodcasts">'Hard Fork': An Interview With Sam Altman</a>, by The New York Times</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.youtube.com/watch?v=SEkGLj0bwAU&amp;ab_channel=TED">The Exciting, Perilous Journey Toward AGI</a>, Ilya Sutskever TED Talk</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.theguardian.com/technology/video/2023/nov/02/ilya-the-ai-scientist-shaping-the-world">Ilya: the AI scientist shaping the world</a>, by The Guardian</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.cnet.com/science/what-is-loab-the-haunting-ai-art-woman-explained/">Meet Loab, the AI Art Woman Haunting the Internet: Is she a demon? A Cryptid? Or nothing at all...</a>, the Guardian</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://spectrum.ieee.org/in-2016-microsofts-racist-chatbot-revealed-the-dangers-of-online-conversation">In 2016, Microsoft’s Racist Chatbot Revealed the Dangers of Online Conversation The bot learned language from people on Twitter—but it also learned values</a>, IEEE Spectrum</li>
<li><br></li>
<li>Perry's <a href="https://pod.link/1657374458/episode/f341e328e9baa854a52e210d34762c7c">Digital Folklore episode</a> about AI</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://maven.com/handshake/tech-bootcamp">Handshake's Generative AI Masterclass</a> on Maven</li>
<li><br></li>
</ul><p><br></p><h3>Perry's Books (Amazon Associate links)</h3><ul>
<li><br></li>
<li><br></li>
<li>
<a href="https://amzn.to/3MSIo8e">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://amzn.to/3opaCgQ">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
<li><br></li>
</ul><p><br></p><p><strong>Be sure to check out Perry's other show, <em>Digital Folklore.</em> </strong>It's all about the oddities and importance of online culture. Head over to the show's website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, shop for <a href="https://digitalfolklore.fm/shop">merch</a>, support the show on <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a>.</p><h3>Production Credits:</h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>8Li cover art by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3>Want to get in touch with Perry? Here's how:</h3><ul>
<li><br></li>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><br></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><br></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><br></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
<li><br></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3942</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[314c42a0-8da4-11ee-959d-572b4c30dcef]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5395882761.mp3?updated=1740073619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Technology and the Law of Unintended Consequences (Encore)</title>
      <description>Let's face it. Most of us have a love/hate relationship with technology and technological advances. We dream about the new thing... but when it arrives, we are usually a little disappointed. Many of us also lament the constant erosion of privacy, the changes in social norms, and more. And, little-by-little, we allow those aspects of new technology to make us numb. We accept the cognitive dissonance of not totally being happy with the trade-offs; yet we still make the trade.
In this episode, we explore a few of the positives and some of the unintended consequences associated with recent technological advancements. We'll hear from Dr. Lydia, Kostopoulos, Dr. Charles Chaffin, Andra Zaharia, and Aaron Barr.
Guests:

Dr. Lydia Kostopoulos (LinkedIn) (Website)

Dr. Charles Chaffin (LinkedIn) (Website)

Andra Zaharia (LinkedIn) (Website)

Aaron Barr (LinkedIn) (Website)

Books and Resources:

IEEE Article: Decoupling Human Characteristics from Algorithmic Capabilities by Dr. Lydia Kostopoulos


Numb: How the Information Age Dulls Our Senses and How We Can Get them Back by Dr. Charles Chaffin (Amazon Associate Links)


The Numb Podcast by Dr. Charles Chaffin


The Cyber Empathy Podcast by Andra Zaharia

Reminder: Your 'smart AI' often involves a low-paid contractor surveilling you

How creepy is your smart speaker?

Newton's Laws of Motion

Unintended Consequences

Elon Musk's warning regarding AI


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon Associate Link)


Everything is Alive podcast by PRX and Radiotopia


Production Credits:
Additional voice talent provided by Kristina Leigh.
Additional research by Nyla Gennaoui.
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerMedia [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Oct 2023 04:00:00 -0000</pubDate>
      <itunes:title>Technology and the Law of Unintended Consequences (Encore)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Let's face it. Most of us have a love/hate relationship with technology and technological advances. We dream about the new thing... but when it arrives, we are usually a little disappointed. Many of us also lament the constant erosion of privacy, the changes in social norms, and more. And, little-by-little, we allow those aspects of new technology to make us numb. We accept the cognitive dissonance of not totally being happy with the trade-offs; yet we still make the trade.
In this episode, we explore a few of the positives and some of the unintended consequences associated with recent technological advancements. We'll hear from Dr. Lydia, Kostopoulos, Dr. Charles Chaffin, Andra Zaharia, and Aaron Barr.
Guests:

Dr. Lydia Kostopoulos (LinkedIn) (Website)

Dr. Charles Chaffin (LinkedIn) (Website)

Andra Zaharia (LinkedIn) (Website)

Aaron Barr (LinkedIn) (Website)

Books and Resources:

IEEE Article: Decoupling Human Characteristics from Algorithmic Capabilities by Dr. Lydia Kostopoulos


Numb: How the Information Age Dulls Our Senses and How We Can Get them Back by Dr. Charles Chaffin (Amazon Associate Links)


The Numb Podcast by Dr. Charles Chaffin


The Cyber Empathy Podcast by Andra Zaharia

Reminder: Your 'smart AI' often involves a low-paid contractor surveilling you

How creepy is your smart speaker?

Newton's Laws of Motion

Unintended Consequences

Elon Musk's warning regarding AI


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon Associate Link)


Everything is Alive podcast by PRX and Radiotopia


Production Credits:
Additional voice talent provided by Kristina Leigh.
Additional research by Nyla Gennaoui.
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerMedia [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Let's face it. Most of us have a love/hate relationship with technology and technological advances. We dream about the new thing... but when it arrives, we are usually a little disappointed. Many of us also lament the constant erosion of privacy, the changes in social norms, and more. And, little-by-little, we allow those aspects of new technology to make us numb. We accept the cognitive dissonance of not totally being happy with the trade-offs; yet we still make the trade.</p><p>In this episode, we explore a few of the positives and some of the unintended consequences associated with recent technological advancements. We'll hear from Dr. Lydia, Kostopoulos, Dr. Charles Chaffin, Andra Zaharia, and Aaron Barr.</p><p><strong>Guests</strong>:</p><ul>
<li>Dr. Lydia Kostopoulos (<a href="https://www.linkedin.com/in/lydiak/">LinkedIn</a>) (<a href="https://www.lkcyber.com/">Website</a>)</li>
<li>Dr. Charles Chaffin (<a href="https://www.linkedin.com/in/dr-charles-chaffin-74932418/">LinkedIn</a>) (<a href="https://charleschaffin.com/">Website</a>)</li>
<li>Andra Zaharia (<a href="https://www.linkedin.com/in/andrazaharia/">LinkedIn</a>) (<a href="https://andrazaharia.com/">Website</a>)</li>
<li>Aaron Barr (<a href="https://www.linkedin.com/in/aaronbarr3/">LinkedIn</a>) (<a href="https://www.piiqmedia.com/">Website</a>)</li>
</ul><p><strong>Books and Resources</strong>:</p><ul>
<li>IEEE Article: <a href="https://lkcyber.medium.com/decoupling-human-characteristics-from-algorithmic-capabilities-9c49b314b0a5">Decoupling Human Characteristics from Algorithmic Capabilities</a> by Dr. Lydia Kostopoulos</li>
<li>
<a href="https://amzn.to/3Q18xBS">Numb: How the Information Age Dulls Our Senses and How We Can Get them Back</a> by Dr. Charles Chaffin (Amazon Associate Links)</li>
<li>
<a href="https://charleschaffin.com/podcast/">The Numb Podcast</a> by Dr. Charles Chaffin</li>
<li>
<a href="https://cyberempathy.org/">The Cyber Empathy Podcast</a> by Andra Zaharia</li>
<li><a href="https://mashable.com/article/amazon-echo-humans-listening-recordings-smart-tech">Reminder: Your 'smart AI' often involves a low-paid contractor surveilling you</a></li>
<li><a href="https://www.economist.com/leaders/2019/05/11/how-creepy-is-your-smart-speaker">How creepy is your smart speaker?</a></li>
<li><a href="https://www.britannica.com/science/Newtons-laws-of-motion">Newton's Laws of Motion</a></li>
<li><a href="https://en.wikipedia.org/wiki/Unintended_consequences">Unintended Consequences</a></li>
<li><a href="https://youtu.be/B-Osn1gMNtw">Elon Musk's warning regarding AI</a></li>
<li>
<a href="https://amzn.to/40oe7Dj">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter (Amazon Associate Link)</li>
<li>
<a href="https://www.radiotopia.fm/podcasts/everything-is-alive">Everything is Alive</a> podcast by PRX and Radiotopia</li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Additional voice talent provided by Kristina Leigh.</p><p>Additional research by Nyla Gennaoui.</p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerMedia</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3103</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d499c6de-71d0-11ee-b633-a38c7e639717]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1371473175.mp3?updated=1740073647" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity First Principles w/Rick Howard</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/39/notes</link>
      <description>On today's show, Perry sits down with Rick Howard to discuss Rick's new book and the concept of "First Principles" as they apply in the domain of cybersecurity.
Rick Howard is the CSO of N2K and the Chief Analyst, and Senior Fellow at the N2K Cyber, formerly CyberWire. His past lives include CSO at Palo Alto Networks, CISO at TASC, the GM at Verisign/iDefense, the Counterpane SOC Director, and the Commander of the Army's Computer Emergency Response Team (CERT). Rick served 25 years in the Army, taught computer science at West Point, and recently published , "Cybersecurity First Principles: A Reboot of Strategy and Tactics."

Guest: Rick Howard (LinkedIn)

Rick's book, podcasts, and other stuff 


Cybersecurity First Principles: A Reboot of Strategy and Tactics (Amazon Associate link)

Promo video for Rick's Cybersecurity First Principles video course

CSO Perspectives Podcast

Word Notes


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news.
Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Oct 2023 04:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity First Principles w/Rick Howard</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On today's show, Perry sits down with Rick Howard to discuss Rick's new book and the concept of "First Principles" as they apply in the domain of cybersecurity.
Rick Howard is the CSO of N2K and the Chief Analyst, and Senior Fellow at the N2K Cyber, formerly CyberWire. His past lives include CSO at Palo Alto Networks, CISO at TASC, the GM at Verisign/iDefense, the Counterpane SOC Director, and the Commander of the Army's Computer Emergency Response Team (CERT). Rick served 25 years in the Army, taught computer science at West Point, and recently published , "Cybersecurity First Principles: A Reboot of Strategy and Tactics."

Guest: Rick Howard (LinkedIn)

Rick's book, podcasts, and other stuff 


Cybersecurity First Principles: A Reboot of Strategy and Tactics (Amazon Associate link)

Promo video for Rick's Cybersecurity First Principles video course

CSO Perspectives Podcast

Word Notes


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news.
Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On today's show, Perry sits down with Rick Howard to discuss Rick's new book and the concept of "First Principles" as they apply in the domain of cybersecurity.</p><p>Rick Howard is the CSO of N2K and the Chief Analyst, and Senior Fellow at the N2K Cyber, formerly CyberWire. His past lives include CSO at Palo Alto Networks, CISO at TASC, the GM at Verisign/iDefense, the Counterpane SOC Director, and the Commander of the Army's Computer Emergency Response Team (CERT). Rick served 25 years in the Army, taught computer science at West Point, and recently published , "Cybersecurity First Principles: A Reboot of Strategy and Tactics."</p><p><br></p><p><strong>Guest: Rick Howard </strong>(<a href="https://www.linkedin.com/in/rickhoward/">LinkedIn</a>)</p><p><br></p><p><strong>Rick's book, podcasts, and other stuff </strong></p><ul>
<li>
<a href="https://amzn.to/3PGKMi8">Cybersecurity First Principles: A Reboot of Strategy and Tactics</a> (Amazon Associate link)</li>
<li><a href="https://www.youtube.com/watch?v=DJUZzqmRGX4">Promo video for Rick's Cybersecurity First Principles video course</a></li>
<li><a href="https://thecyberwire.com/podcasts/cso-perspectives">CSO Perspectives Podcast</a></li>
<li><a href="https://thecyberwire.com/podcasts/word-notes">Word Notes</a></li>
</ul><p><br></p><p><strong>Perry's Books (Amazon Associate links)</strong></p><ul>
<li>
<a href="https://amzn.to/3MSIo8e">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/3opaCgQ">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Be sure to check out Perry's other show, <em>Digital Folklore.</em> </strong>It's all about the oddities and importance of online culture. Head over to the show's website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, shop for <a href="https://digitalfolklore.fm/shop">merch</a>, support the show on <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a>.</p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>8Li cover art by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2442</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16b96fa2-dd2e-11ed-9a49-f38ee0886984]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5986338286.mp3?updated=1740073669" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OSINT, Curiosity, Creativity, &amp; Career Pivots: A Conversation with Rae Baker</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/38/notes</link>
      <description>If you’ve been listening to this show for a while, you’ll know that we’ve touched on the topic of Open Source Intelligence (otherwise known as OSINT) several times. It is an area of information security that penetration testing that’s been getting quite a bit of attention over the past several years. When you think about the digital world we live in, where we have a proliferation of personal, organizational, and governmental data on the internet...and the simple fact that data likes to leak…we can safely predict that OSINT investigation techniques will continue to be in demand.
On this episode, Perry sits down with Rae Baker. Rae is the author of the book Deep Dive: Exploring the Real-world Value of Open Source Intelligence, which was released in April of this year from Wiley publishing. In this discussion with Rae, you’ll hear a bit about her career pivot to OSINT specialist from being a graphic designer, how creativity fuels her job, advice for aspiring cybersecurity and OSINT professionals, and a lot more.


Guest:
Rae Baker (LinkedIn) (Twitter) (Website)

Books and References:


Deep Dive: Exploring the Real-world Value of Open Source Intelligence, by Rae Baker (Amazon Associate link)

Kase Scenarios: https://kasescenarios.com/ 


The OSINT Curious project

TraceLabs

YouTube Playlist from the 2022 SANS OSINT Summit


YouTube video by The Cyber Mentor: Learn OSINT in 4.5 Hours


Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html



Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Sep 2023 04:00:00 -0000</pubDate>
      <itunes:title>OSINT, Curiosity, Creativity, &amp; Career Pivots: A Conversation with Rae Baker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>If you’ve been listening to this show for a while, you’ll know that we’ve touched on the topic of Open Source Intelligence (otherwise known as OSINT) several times. It is an area of information security that penetration testing that’s been getting quite a bit of attention over the past several years. When you think about the digital world we live in, where we have a proliferation of personal, organizational, and governmental data on the internet...and the simple fact that data likes to leak…we can safely predict that OSINT investigation techniques will continue to be in demand.
On this episode, Perry sits down with Rae Baker. Rae is the author of the book Deep Dive: Exploring the Real-world Value of Open Source Intelligence, which was released in April of this year from Wiley publishing. In this discussion with Rae, you’ll hear a bit about her career pivot to OSINT specialist from being a graphic designer, how creativity fuels her job, advice for aspiring cybersecurity and OSINT professionals, and a lot more.


Guest:
Rae Baker (LinkedIn) (Twitter) (Website)

Books and References:


Deep Dive: Exploring the Real-world Value of Open Source Intelligence, by Rae Baker (Amazon Associate link)

Kase Scenarios: https://kasescenarios.com/ 


The OSINT Curious project

TraceLabs

YouTube Playlist from the 2022 SANS OSINT Summit


YouTube video by The Cyber Mentor: Learn OSINT in 4.5 Hours


Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html



Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>If you’ve been listening to this show for a while, you’ll know that we’ve touched on the topic of <a href="https://www.crowdstrike.com/cybersecurity-101/osint-open-source-intelligence/">Open Source Intelligence (otherwise known as OSINT)</a> several times. It is an area of information security that penetration testing that’s been getting quite a bit of attention over the past several years. When you think about the digital world we live in, where we have a proliferation of personal, organizational, and governmental data on the internet...and the simple fact that data likes to leak…we can safely predict that OSINT investigation techniques will continue to be in demand.</p><p>On this episode, Perry sits down with Rae Baker. Rae is the author of the book Deep Dive: Exploring the Real-world Value of Open Source Intelligence, which was released in April of this year from Wiley publishing. In this discussion with Rae, you’ll hear a bit about her career pivot to OSINT specialist from being a graphic designer, how creativity fuels her job, advice for aspiring cybersecurity and OSINT professionals, and a lot more.</p><p><br></p><h3>
<strong>Guest</strong>:</h3><ul><li>Rae Baker (<a href="https://www.linkedin.com/in/raebakerosint/">LinkedIn</a>) (<a href="https://twitter.com/wondersmith_rae">Twitter</a>) (<a href="https://www.raebaker.net/">Website</a>)</li></ul><p><br></p><h3><strong>Books and References:</strong></h3><ul>
<li>
<a href="https://amzn.to/455lpfU">Deep Dive: Exploring the Real-world Value of Open Source Intelligence</a>, by Rae Baker (Amazon Associate link)</li>
<li>Kase Scenarios: <a href="https://kasescenarios.com/%20">https://kasescenarios.com/ </a>
</li>
<li><a href="https://osintcurio.us/aboutus/">The OSINT Curious project</a></li>
<li><a href="https://www.tracelabs.org/">TraceLabs</a></li>
<li>YouTube Playlist from the <a href="https://www.youtube.com/watch?v=fbyFp1u2lQY&amp;list=PLs4eo9Tja8biLhHrp8W-N9LheHjUkaSDr&amp;ab_channel=SANSCyberDefense">2022 SANS OSINT Summit</a>
</li>
<li>YouTube video by The Cyber Mentor: <a href="https://www.youtube.com/watch?v=qwA6MmbeGNo&amp;ab_channel=TheCyberMentor">Learn OSINT in 4.5 Hours</a>
</li>
<li>Lockheed Martin Cyber Kill-Chain: <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html</a>
</li>
</ul><p><br></p><h3><strong>Perry's Books (Amazon Associate Links)</strong></h3><ul>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2030</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[169ca5e8-dd2e-11ed-9a49-ff43b221a945]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9079810956.mp3?updated=1740073689" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Conversational Security Awareness: Putting Humanity into Your Human Risk Management Program</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/37/notes</link>
      <description>Listen in as Perry Carpenter &amp; Dr. Jessica Barker present their joint session, "Conversational Security Awareness" at the SANS Managing Human Risk Summit. ... and stay tuned after the presentation for a quick conversation between Perry, Jessica, and Lance Spitzner (SANS) as they discuss themes from this year's event.
Guests:

Dr. Jessica Barker (LinkedIn) (Twitter)

Jeremy Treadwell (LinkedIn) (Twitter)

Lance Spitzner (LinkedIn) (Twitter)


Additional Resources:

Jessica Barker's great blog post summarizing this session

Jessica Barker's 2020 RSA Keynote


Related 8Li Episodes:

8Li S1 E9: Security ABCs Part 1: Make Awareness Transformational

8Li S1 E10: Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture

8Li S2 E10: The Next Evolution of Security Awareness

8Li S4 E3: Carrots, Sticks, and Culture: The Art and Science of Social Signaling

8Li S4 E5: We are the Champions

8Li S4 E6: Blending Awareness, Social Engineering, and Physical Penetration Testing -- A Conversation with Jayson E. Street


Relevant Books (Amazon Associate Links)


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Jessica Barker


Cybersecurity ABCs: Delivering awareness, behaviours and culture change by Jessica Barker, Adrian Davis, Bruce Hallas, &amp; Ciarán Mc Mahon


Mixed Signals: How Incentives Really Work, by Uri Gneezy


Security Awareness Program Builder: Practical guidelines for building your Information Security Awareness Program &amp; prep guide for the Security Awareness and Culture Professional (SACP)™ by Mark Majewski


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Sep 2023 04:00:00 -0000</pubDate>
      <itunes:title>Conversational Security Awareness: Putting Humanity into Your Human Risk Management Program</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Listen in as Perry Carpenter &amp; Dr. Jessica Barker present their joint session, "Conversational Security Awareness" at the SANS Managing Human Risk Summit. ... and stay tuned after the presentation for a quick conversation between Perry, Jessica, and Lance Spitzner (SANS) as they discuss themes from this year's event.
Guests:

Dr. Jessica Barker (LinkedIn) (Twitter)

Jeremy Treadwell (LinkedIn) (Twitter)

Lance Spitzner (LinkedIn) (Twitter)


Additional Resources:

Jessica Barker's great blog post summarizing this session

Jessica Barker's 2020 RSA Keynote


Related 8Li Episodes:

8Li S1 E9: Security ABCs Part 1: Make Awareness Transformational

8Li S1 E10: Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture

8Li S2 E10: The Next Evolution of Security Awareness

8Li S4 E3: Carrots, Sticks, and Culture: The Art and Science of Social Signaling

8Li S4 E5: We are the Champions

8Li S4 E6: Blending Awareness, Social Engineering, and Physical Penetration Testing -- A Conversation with Jayson E. Street


Relevant Books (Amazon Associate Links)


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Jessica Barker


Cybersecurity ABCs: Delivering awareness, behaviours and culture change by Jessica Barker, Adrian Davis, Bruce Hallas, &amp; Ciarán Mc Mahon


Mixed Signals: How Incentives Really Work, by Uri Gneezy


Security Awareness Program Builder: Practical guidelines for building your Information Security Awareness Program &amp; prep guide for the Security Awareness and Culture Professional (SACP)™ by Mark Majewski


Perry's Books (Amazon Associate Links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Listen in as Perry Carpenter &amp; Dr. Jessica Barker present their joint session, "<em>Conversational Security Awareness" </em>at the SANS Managing Human Risk Summit. ... and stay tuned after the presentation for a quick conversation between Perry, Jessica, and Lance Spitzner (SANS) as they discuss themes from this year's event.</p><p><strong>Guests</strong>:</p><ul>
<li>Dr. Jessica Barker (<a href="https://www.linkedin.com/in/jessica-barker/">LinkedIn</a>) (<a href="https://twitter.com/drjessicabarker">Twitter</a>)</li>
<li>Jeremy Treadwell (<a href="https://www.linkedin.com/in/jeremytreadwell/">LinkedIn</a>) (<a href="https://twitter.com/jtread0000">Twitter</a>)</li>
<li>Lance Spitzner (<a href="https://www.linkedin.com/in/lancespitzner/">LinkedIn</a>) (<a href="https://twitter.com/lspitzner">Twitter</a>)</li>
</ul><p><br></p><p><strong>Additional Resources</strong>:</p><ul>
<li><a href="https://www.cygenta.co.uk/post/sans-summit-2023">Jessica Barker's great blog post summarizing this session</a></li>
<li><a href="https://www.youtube.com/watch?v=2zqLkJBBP9o&amp;ab_channel=Cygenta">Jessica Barker's 2020 RSA Keynote</a></li>
</ul><p><br></p><p><strong>Related 8Li Episodes</strong>:</p><ul>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/9/notes">8Li S1 E9: Security ABCs Part 1: Make Awareness Transformational</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/10/notes">8Li S1 E10: Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/19/notes">8Li S2 E10: The Next Evolution of Security Awareness</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/33/notes">8Li S4 E3: Carrots, Sticks, and Culture: The Art and Science of Social Signaling</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/35/notes">8Li S4 E5: We are the Champions</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/36/notes">8Li S4 E6: Blending Awareness, Social Engineering, and Physical Penetration Testing -- A Conversation with Jayson E. Street</a></li>
</ul><p><br></p><p><strong>Relevant Books (Amazon Associate Links)</strong></p><ul>
<li>
<a href="https://amzn.to/3sQEkxx">Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career</a>, by Jessica Barker</li>
<li>
<a href="https://amzn.to/484cKwV">Cybersecurity ABCs: Delivering awareness, behaviours and culture change</a> by Jessica Barker, Adrian Davis, Bruce Hallas, &amp; Ciarán Mc Mahon</li>
<li>
<a href="https://amzn.to/44NpQLZ">Mixed Signals: How Incentives Really Work</a>, by Uri Gneezy</li>
<li>
<a href="https://amzn.to/3PxUX9U">Security Awareness Program Builder: Practical guidelines for building your Information Security Awareness Program &amp; prep guide for the Security Awareness and Culture Professional (SACP)™</a> by Mark Majewski</li>
</ul><p><br></p><p><strong>Perry's Books (Amazon Associate Links)</strong></p><ul>
<li>
<a href="https://amzn.to/3RbZiRy">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/45N4UGr">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p><br></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerInsights</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3409</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16673fac-dd2e-11ed-9a49-1b0f3b5793d2]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7803297410.mp3?updated=1740073769" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blending Awareness, Social Engineering, and Physical Penetration Testing -- A Conversation with Jayson E. Street</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/36/notes</link>
      <description>On today's show, Perry sits down with Jayson E. Street to discuss his unique blend of social engineering, physical penetration testing, and security awareness. Jayson refers to this as being trained by a simulated adversary. At the heart of Jayson's method is intense boldness in his approach to social engineering and penetration testing coupled with an equally intense passion for helping his clients and their employees improve their overall security posture and mindsets. It's about education rather than exploitation.
Guest: Jayson E. Street (LinkedIn) (Twitter) (Website)

YouTube videos of Jayson

2022 Saintcon: Hacker Striptease

Tomorrow Unlocked: Penetration tester Jayson E. Street helps banks by hacking them

Risks &amp; Reels: Who's a Hacker?


Jasyon's book (Amazon Associate link) 
Dissecting the Hack: The V3rb0t3n Network

Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news. Season 2 starts September 4, 2023.
Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Aug 2023 04:00:00 -0000</pubDate>
      <itunes:title>Blending Awareness, Social Engineering, and Physical Penetration Testing -- A Conversation with Jayson E. Street</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On today's show, Perry sits down with Jayson E. Street to discuss his unique blend of social engineering, physical penetration testing, and security awareness. Jayson refers to this as being trained by a simulated adversary. At the heart of Jayson's method is intense boldness in his approach to social engineering and penetration testing coupled with an equally intense passion for helping his clients and their employees improve their overall security posture and mindsets. It's about education rather than exploitation.
Guest: Jayson E. Street (LinkedIn) (Twitter) (Website)

YouTube videos of Jayson

2022 Saintcon: Hacker Striptease

Tomorrow Unlocked: Penetration tester Jayson E. Street helps banks by hacking them

Risks &amp; Reels: Who's a Hacker?


Jasyon's book (Amazon Associate link) 
Dissecting the Hack: The V3rb0t3n Network

Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news. Season 2 starts September 4, 2023.
Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On today's show, Perry sits down with <a href="https://jaysonestreet.com/">Jayson E. Street</a> to discuss his unique blend of social engineering, physical penetration testing, and security awareness. Jayson refers to this as being trained by a <a href="https://simulated-adversary.com/">simulated adversary</a>. At the heart of Jayson's method is intense boldness in his approach to social engineering and penetration testing coupled with an equally intense passion for helping his clients and their employees improve their overall security posture and mindsets. It's about education rather than exploitation.</p><p><strong>Guest: Jayson E. Street</strong> (<a href="https://www.linkedin.com/in/jstreet/">LinkedIn</a>) (<a href="https://twitter.com/jaysonstreet">Twitter</a>) (<a href="https://simulated-adversary.com/">Website</a>)</p><p><br></p><p><strong>YouTube videos of Jayson</strong></p><ul>
<li><a href="https://www.youtube.com/watch?v=WrvF9kFqHiQ">2022 Saintcon: Hacker Striptease</a></li>
<li><a href="https://www.youtube.com/watch?v=02Vf3NjTPsI">Tomorrow Unlocked: Penetration tester Jayson E. Street helps banks by hacking them</a></li>
<li><a href="https://www.youtube.com/watch?v=epVFICAZMsE">Risks &amp; Reels: Who's a Hacker?</a></li>
</ul><p><br></p><p><strong>Jasyon's book (Amazon Associate link) </strong></p><ul><li><a href="https://amzn.to/3qJaZo6">Dissecting the Hack: The V3rb0t3n Network</a></li></ul><p><br></p><p><strong>Perry's Books (Amazon Associate links)</strong></p><ul>
<li>
<a href="https://amzn.to/3MSIo8e">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/3opaCgQ">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Be sure to check out Perry's other show, <em>Digital Folklore.</em> </strong>It's all about the oddities and importance of online culture. Head over to the show's website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, shop for <a href="https://digitalfolklore.fm/shop">merch</a>, support the show on <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a>. <strong><em>Season 2 starts September 4, 2023</em></strong>.</p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>8Li cover art by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3969</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[164e0fa0-dd2e-11ed-9a49-4b675d77be7d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4366143801.mp3?updated=1740073852" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Fool the White House (Encore) </title>
      <description>Hey all! I'm at BlackHat and Defcon this week. If you're there, track me down. I'd love to meet you!

This week's episode is an encore of one of my favorites. My interview with James Linton (a.k.a. The Email Prankster). In 2017, James went on a virtual joyride exploiting the ways that people interact with emails. One of the most interesting things about James' story is that his exploits didn't rely on any type of highly technical method(s); they were simple display name deceptions. But that didn't stop him from fooling CEOs from some of the worlds largest banks, celebrities, and high ranking staff members in the White House.
James' success using these simple methods serves as a warning for us all. We don't fall for scams because they are technically sophisticated or because we are stupid. We fall for scams because we are human.
Guest: James Linton (LinkedIn) (Website)
Books and Resources:

Anatomy Of An Email Impersonation Spree: Who Got Pranked And Why

An email prankster is hitting the CEOs of the world's biggest banks

How to Prank the Rich and Powerful Without Really Trying

Morgan Stanley CEO James Gorman falls for email prank

This Man Pranked Eric Trump And Harvey Weinstein — Now He Just Wants A Job

Media Coverage YouTube Playlist

James Linton -- Wikipedia Entry


The Journal of Best Practices: A Memoir of Marriage, Asperger Syndrome, and One Man's Quest to Be a Better Husband by David Finch

Perry -- Interview on Springbrook's Converge Autism Radio

Perry -- Security Weekly Interview

Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Aug 2023 07:03:37 -0000</pubDate>
      <itunes:title>How to Fool the White House (Encore) </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hey all! I'm at BlackHat and Defcon this week. If you're there, track me down. I'd love to meet you!

This week's episode is an encore of one of my favorites. My interview with James Linton (a.k.a. The Email Prankster). In 2017, James went on a virtual joyride exploiting the ways that people interact with emails. One of the most interesting things about James' story is that his exploits didn't rely on any type of highly technical method(s); they were simple display name deceptions. But that didn't stop him from fooling CEOs from some of the worlds largest banks, celebrities, and high ranking staff members in the White House.
James' success using these simple methods serves as a warning for us all. We don't fall for scams because they are technically sophisticated or because we are stupid. We fall for scams because we are human.
Guest: James Linton (LinkedIn) (Website)
Books and Resources:

Anatomy Of An Email Impersonation Spree: Who Got Pranked And Why

An email prankster is hitting the CEOs of the world's biggest banks

How to Prank the Rich and Powerful Without Really Trying

Morgan Stanley CEO James Gorman falls for email prank

This Man Pranked Eric Trump And Harvey Weinstein — Now He Just Wants A Job

Media Coverage YouTube Playlist

James Linton -- Wikipedia Entry


The Journal of Best Practices: A Memoir of Marriage, Asperger Syndrome, and One Man's Quest to Be a Better Husband by David Finch

Perry -- Interview on Springbrook's Converge Autism Radio

Perry -- Security Weekly Interview

Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hey all! I'm at BlackHat and Defcon this week. If you're there, track me down. I'd love to meet you!</p><p><br></p><p>This week's episode is an encore of one of my favorites. My interview with James Linton (a.k.a. The Email Prankster). In 2017, James went on a virtual joyride exploiting the ways that people interact with emails. One of the most interesting things about James' story is that his exploits didn't rely on any type of highly technical method(s); they were simple display name deceptions. But that didn't stop him from fooling CEOs from some of the worlds largest banks, celebrities, and high ranking staff members in the White House.</p><p>James' success using these simple methods serves as a warning for us all. We don't fall for scams because they are technically sophisticated or because we are stupid. We fall for scams because we are human.</p><p><strong>Guest: </strong>James Linton (<a href="https://www.linkedin.com/in/james-linton-social-engineer-and-hacker/">LinkedIn</a>) (<a href="https://thewhole.io/">Website</a>)</p><p><strong>Books and Resources</strong>:</p><ul>
<li><a href="https://cybersecurityventures.com/anatomy-of-an-email-impersonation-spree-who-got-pranked-and-why/">Anatomy Of An Email Impersonation Spree: Who Got Pranked And Why</a></li>
<li><a href="https://www.businessinsider.com/an-email-prankster-is-hitting-the-ceos-of-the-worlds-biggest-banks-2017-6">An email prankster is hitting the CEOs of the world's biggest banks</a></li>
<li><a href="https://theoutline.com/post/2059/how-to-prank-the-rich-and-powerful-without-really-trying?zd=1&amp;zi=qbqck7z7">How to Prank the Rich and Powerful Without Really Trying</a></li>
<li><a href="https://nypost.com/2017/06/14/morgan-stanley-ceo-james-gorman-falls-for-email-prank/">Morgan Stanley CEO James Gorman falls for email prank</a></li>
<li><a href="https://www.buzzfeednews.com/article/ryanmac/the-email-prankster-sinon-reborn-is-calling-it-quits">This Man Pranked Eric Trump And Harvey Weinstein — Now He Just Wants A Job</a></li>
<li><a href="https://www.youtube.com/playlist?list=PL8vvdB2fAQx-ojvpsyxeVUa-0WTvmjqYH">Media Coverage YouTube Playlist</a></li>
<li><a href="https://en.wikipedia.org/wiki/James_Linton_(hacker)">James Linton -- Wikipedia Entry</a></li>
<li>
<a href="https://www.amazon.com/Journal-Best-Practices-Marriage-Asperger/dp/1439189714">The Journal of Best Practices: A Memoir of Marriage, Asperger Syndrome, and One Man's Quest to Be a Better Husband</a> by David Finch</li>
<li><a href="https://podcastaddict.com/episode/97669095">Perry -- Interview on Springbrook's Converge Autism Radio</a></li>
<li><a href="https://www.youtube.com/watch?v=2te_r4I5jgo&amp;ab_channel=SecurityWeekly">Perry -- Security Weekly Interview</a></li>
<li><a href="https://www.youtube.com/watch?v=5IraysvK38A&amp;ab_channel=DEFCONConference">Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village</a></li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p><br></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerInsights</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3921</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[161b73d8-dd2e-11ed-9a49-a38fd7c3396d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8643221170.mp3?updated=1740073899" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>We are the Champions</title>
      <description>There has been a lot of buzz for the past few years about the benefits and importance of establishing security champions programs. These are groups of people in your organization who become vital, responsible, and proactive contributing evangelists to the security culture of your organization. I often refer to them as "culture carriers." And, while there is general agreement that these are good programs to have, establishing them is currently a bit of a dark art.
On today's show, Perry sits down with Sarah Janes of Layer 8 security to discuss the importance of champion programs and tease out a few best practices.

Guest: Sarah Janes (LinkedIn) (Twitter) (Website)

Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Jul 2023 06:00:00 -0000</pubDate>
      <itunes:title>We are the Champions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There has been a lot of buzz for the past few years about the benefits and importance of establishing security champions programs. These are groups of people in your organization who become vital, responsible, and proactive contributing evangelists to the security culture of your organization. I often refer to them as "culture carriers." And, while there is general agreement that these are good programs to have, establishing them is currently a bit of a dark art.
On today's show, Perry sits down with Sarah Janes of Layer 8 security to discuss the importance of champion programs and tease out a few best practices.

Guest: Sarah Janes (LinkedIn) (Twitter) (Website)

Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There has been a lot of buzz for the past few years about the benefits and importance of establishing security champions programs. These are groups of people in your organization who become vital, responsible, and proactive contributing evangelists to the security culture of your organization. I often refer to them as "culture carriers." And, while there is general agreement that these are good programs to have, establishing them is currently a bit of a dark art.</p><p>On today's show, Perry sits down with <a href="https://www.linkedin.com/in/sarahjaneslayer8ltd">Sarah Janes</a> of <a href="https://layer8ltd.co.uk/">Layer 8</a> security to discuss the importance of champion programs and tease out a few best practices.</p><p><br></p><p><strong>Guest: Sarah Janes</strong> (<a href="https://www.linkedin.com/in/sarahjaneslayer8ltd">LinkedIn</a>) (<a href="https://twitter.com/sarahkjanes">Twitter</a>) (<a href="https://layer8ltd.co.uk/">Website</a>)</p><p><br></p><p><strong>Perry's Books (Amazon Associate links)</strong></p><ul>
<li>
<a href="https://amzn.to/3MSIo8e">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/3opaCgQ">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Be sure to check out Perry's other show, <em>Digital Folklore.</em> </strong>It's all about the oddities and importance of online culture. Head over to the show's website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, shop for <a href="https://digitalfolklore.fm/shop">merch</a>, support the show on <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a></p><h3><br></h3><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>8Li cover art by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2592</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16345bd2-dd2e-11ed-9a49-af5d5c5b6154]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3809843384.mp3?updated=1740073985" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Something Wicked This Way Comes: PenTesting Your Environment w/Chad Peterson of NetSPI</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/34/notes</link>
      <description>On this episode, Perry sits down with Chad Peterson, Managing Director at NetSPI, to discuss the importance of penetration testing. We touch on aspects of social engineering, discussing complex security issues with Boards of Directors, the prevalence of Ransomware, and some of the unique challenges facing the healthcare industry.

Guest: Chad Peterson (LinkedIn) (Twitter)

Books &amp; References (Books are Amazon Associate links)


CISO Desk Reference Guide: A Practical Guide for CISOs by Bill Bonney, Gary Hayslip, &amp; Matt Stamper


Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman 


Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray


Ransomware Protection Playbook by Roger Grimes


The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Christian Espinosa


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Perry's new show, Digital Folklore kicked-off Jan 16, 2023. It's all about the oddities and importance of online culture. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jun 2023 04:00:00 -0000</pubDate>
      <itunes:title>Something Wicked This Way Comes: PenTesting Your Environment w/Chad Peterson of NetSPI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, Perry sits down with Chad Peterson, Managing Director at NetSPI, to discuss the importance of penetration testing. We touch on aspects of social engineering, discussing complex security issues with Boards of Directors, the prevalence of Ransomware, and some of the unique challenges facing the healthcare industry.

Guest: Chad Peterson (LinkedIn) (Twitter)

Books &amp; References (Books are Amazon Associate links)


CISO Desk Reference Guide: A Practical Guide for CISOs by Bill Bonney, Gary Hayslip, &amp; Matt Stamper


Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman 


Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray


Ransomware Protection Playbook by Roger Grimes


The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Christian Espinosa


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Perry's new show, Digital Folklore kicked-off Jan 16, 2023. It's all about the oddities and importance of online culture. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry sits down with Chad Peterson, Managing Director at <a href="https://www.netspi.com/">NetSPI</a>, to discuss the importance of penetration testing. We touch on aspects of social engineering, discussing complex security issues with Boards of Directors, the prevalence of Ransomware, and some of the unique challenges facing the healthcare industry.</p><p><br></p><p><strong>Guest: Chad Peterson (</strong><a href="https://www.linkedin.com/in/chadapeterson/"><strong>LinkedIn</strong></a><strong>) (</strong><a href="https://twitter.com/NetSPI"><strong>Twitter</strong></a><strong>)</strong></p><p><br></p><h3><strong>Books &amp; References (Books are Amazon Associate links)</strong></h3><ul>
<li>
<a href="https://amzn.to/42T53Wq">CISO Desk Reference Guide: A Practical Guide for CISOs</a> by Bill Bonney, Gary Hayslip, &amp; Matt Stamper</li>
<li>
<a href="https://amzn.to/43LFOqd">Penetration Testing: A Hands-On Introduction to Hacking</a> by Georgia Weidman </li>
<li>
<a href="https://amzn.to/3Czk1X0">Practical Social Engineering: A Primer for the Ethical Hacker</a> by Joe Gray</li>
<li>
<a href="https://amzn.to/3qVZTvn">Ransomware Protection Playbook</a> by Roger Grimes</li>
<li>
<a href="https://amzn.to/3JhBh6Y">The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity</a> by Christian Espinosa</li>
</ul><p><br></p><p><strong>Perry's Books (Amazon Associate links)</strong></p><ul>
<li>
<a href="https://amzn.to/3MSIo8e">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/3opaCgQ">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Perry's new show, <em>Digital Folklore </em>kicked-off Jan 16, 2023. </strong>It's all about the oddities and importance of online culture. Check out the website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, check out our <a href="https://digitalfolklore.fm/shop">merch</a>, <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a></p><h3><br></h3><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>8Li cover art by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><br></h3><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2725</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[167f6118-dd2e-11ed-9a49-db277436cb4c]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9124305518.mp3?updated=1740074025" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Carrots, Sticks, and Culture: The Art and Science of Social Signaling</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/33/notes</link>
      <description>On this episode, what cybersecurity professionals need to understand about how social signaling and incentives really work.
Today's episode features a conversation with Uri Gneezy. In the field of cybersecurity, we are very interested in identifying proactive and positive ways to encourage the behavior we want. That's where Uri comes in. Uri is a well-known behavioral economist and professor of economics and strategy in the Rady School of Management at the University of California at San Diego.
Most of us recognize that many of our behaviors, beliefs, and values are caught rather than taught. So, if you are interested in developing a positive security culture in your workplace, then it’s important to understand the dynamics of how people both receive and signal their security-related beliefs and values so that associated behaviors become a natural result.
Listen in as Perry sits down with Uri to discuss key findings from Uri's new book, Mixed Signals: How Incentives Really Work. This is a fascinating deep dive into Uri’s research that has immediate applicability for anyone needing to design programs that work with, rather than against, human nature.

Guest: Uri Gneezy (LinkedIn) (Twitter) (Website)

Books &amp; References (Books are Amazon Associate links)


Mixed Signals: How Incentives Really Work, by Uri Gneezy



The Why Axis: Hidden Motives and the Undiscovered Economics of Everyday Life by Uri Gneezy &amp; John List


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Perry's new show, Digital Folklore kicked-off Jan 16, 2023. It's all about the oddities and importance of online culture. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Jun 2023 04:00:00 -0000</pubDate>
      <itunes:title>Carrots, Sticks, and Culture: The Art and Science of Social Signaling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, what cybersecurity professionals need to understand about how social signaling and incentives really work.
Today's episode features a conversation with Uri Gneezy. In the field of cybersecurity, we are very interested in identifying proactive and positive ways to encourage the behavior we want. That's where Uri comes in. Uri is a well-known behavioral economist and professor of economics and strategy in the Rady School of Management at the University of California at San Diego.
Most of us recognize that many of our behaviors, beliefs, and values are caught rather than taught. So, if you are interested in developing a positive security culture in your workplace, then it’s important to understand the dynamics of how people both receive and signal their security-related beliefs and values so that associated behaviors become a natural result.
Listen in as Perry sits down with Uri to discuss key findings from Uri's new book, Mixed Signals: How Incentives Really Work. This is a fascinating deep dive into Uri’s research that has immediate applicability for anyone needing to design programs that work with, rather than against, human nature.

Guest: Uri Gneezy (LinkedIn) (Twitter) (Website)

Books &amp; References (Books are Amazon Associate links)


Mixed Signals: How Incentives Really Work, by Uri Gneezy



The Why Axis: Hidden Motives and the Undiscovered Economics of Everyday Life by Uri Gneezy &amp; John List


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Perry's new show, Digital Folklore kicked-off Jan 16, 2023. It's all about the oddities and importance of online culture. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, what cybersecurity professionals need to understand about how social signaling and incentives really work.</p><p>Today's episode features a conversation with Uri Gneezy. In the field of cybersecurity, we are very interested in identifying proactive and positive ways to encourage the behavior we want. That's where Uri comes in. Uri is a well-known behavioral economist and professor of economics and strategy in the Rady School of Management at the University of California at San Diego.</p><p>Most of us recognize that many of our behaviors, beliefs, and values are caught rather than taught. So, if you are interested in developing a positive security culture in your workplace, then it’s important to understand the dynamics of how people both receive and signal their security-related beliefs and values so that associated behaviors become a natural result.</p><p>Listen in as Perry sits down with Uri to discuss key findings from Uri's new book, <strong><em>Mixed Signals: How Incentives Really Work</em></strong>. This is a fascinating deep dive into Uri’s research that has immediate applicability for anyone needing to design programs that work with, rather than against, human nature.</p><p><br></p><p><strong>Guest: Uri Gneezy (</strong><a href="https://www.linkedin.com/in/uri-gneezy-6292b988/"><strong>LinkedIn</strong></a><strong>) (</strong><a href="https://twitter.com/urigneezy?lang=en"><strong>Twitter</strong></a><strong>) (</strong><a href="https://rady.ucsd.edu/faculty-research/faculty/uri-gneezy.html"><strong>Website</strong></a><strong>)</strong></p><p><br></p><h3><strong>Books &amp; References (Books are Amazon Associate links)</strong></h3><ul>
<li>
<a href="https://amzn.to/3C8xZyT">Mixed Signals: How Incentives Re</a><a href="https://amzn.to/3oOkDEI">ally Work, by Uri Gneezy</a>
</li>
<li>
<a href="https://amzn.to/3oOkDEI">The Why Axis: Hidden Motives and the Undiscovered Economics of Everyday Life</a> by Uri Gneezy &amp; John List</li>
</ul><p><br></p><p><strong>Perry's Books (Amazon Associate links)</strong></p><ul>
<li>
<a href="https://amzn.to/3MSIo8e">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/3opaCgQ">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Perry's new show, <em>Digital Folklore </em>kicked-off Jan 16, 2023. </strong>It's all about the oddities and importance of online culture. Check out the website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, check out our <a href="https://digitalfolklore.fm/shop">merch</a>, <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a></p><h3><br></h3><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>8Li cover art by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2759</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1601eaee-dd2e-11ed-9a49-0f1c307df865]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3023512158.mp3?updated=1740074067" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking the Paranormal -- a conversation with Banachek</title>
      <description>In this episode, Perry Carpenter sits down with renowned mentalist and skeptic, Banachek. Banachek (Steve Shaw) grew up with a fascination in magic and a frustration with psychic frauds. As a teenager, he contacted magician and skeptic, James “The Amazing” Randi and ended up working with Randi on a special initiative known as Project Alpha, which set out to expose a general lack of objectivity in parapsychology research. Banachek served as the director for the James Randi Educational Foundation’s “One Million Dollar Paranormal Challenge” for 15 years and is now the President of the James Randi Educational Foundation. 
Perry and Banachek discuss Project Alpha, the ways of fake psychics and fraudulent faith healers, and issues associated with confirmation bias and framing effects. They also discuss Banachek’s new live mentalism show in Las Vegas, which incorporates theatrical mindreading and other mentalism effects along with a storyline that explores Banachek’s life, antics, and passion for critical thinking.

Guest: 

Banachek (Website) (twitter): Mentalist (Performing in Las Vegas add 'social' for 30% off tickets), Skeptic, President of the James Randi Educational Foundation


This episode also featured a quick comment from: George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security



Books and References (Book links are 'Amazon Associate' links which help support the show):

Brian Brushwood's podcast, World's Greatest Con


Banachek Wikipedia entry

Project Alpha Wikipedia entry

James Randi Wikipedia entry

Article about Houdini's efforts to debunk fake mediums

The Discoverie of Witchcraft Wikipedia entry

The Psychology of the Ouija

Barnum Effect Wikipedia entry

James Randi &amp; Project Alpha Video

Project Alpha lookback -- James Randi and Michael Edwards


Psychological Subtleties vol 1, by Banachek


Behind the Scenes with the Mediums, by David Abbott

The Discoverie of Witchcraft


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 May 2023 04:00:00 -0000</pubDate>
      <itunes:title>Hacking the Paranormal -- a conversation with Banachek</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Perry Carpenter sits down with renowned mentalist and skeptic, Banachek. Banachek (Steve Shaw) grew up with a fascination in magic and a frustration with psychic frauds. As a teenager, he contacted magician and skeptic, James “The Amazing” Randi and ended up working with Randi on a special initiative known as Project Alpha, which set out to expose a general lack of objectivity in parapsychology research. Banachek served as the director for the James Randi Educational Foundation’s “One Million Dollar Paranormal Challenge” for 15 years and is now the President of the James Randi Educational Foundation. 
Perry and Banachek discuss Project Alpha, the ways of fake psychics and fraudulent faith healers, and issues associated with confirmation bias and framing effects. They also discuss Banachek’s new live mentalism show in Las Vegas, which incorporates theatrical mindreading and other mentalism effects along with a storyline that explores Banachek’s life, antics, and passion for critical thinking.

Guest: 

Banachek (Website) (twitter): Mentalist (Performing in Las Vegas add 'social' for 30% off tickets), Skeptic, President of the James Randi Educational Foundation


This episode also featured a quick comment from: George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security



Books and References (Book links are 'Amazon Associate' links which help support the show):

Brian Brushwood's podcast, World's Greatest Con


Banachek Wikipedia entry

Project Alpha Wikipedia entry

James Randi Wikipedia entry

Article about Houdini's efforts to debunk fake mediums

The Discoverie of Witchcraft Wikipedia entry

The Psychology of the Ouija

Barnum Effect Wikipedia entry

James Randi &amp; Project Alpha Video

Project Alpha lookback -- James Randi and Michael Edwards


Psychological Subtleties vol 1, by Banachek


Behind the Scenes with the Mediums, by David Abbott

The Discoverie of Witchcraft


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Perry Carpenter sits down with renowned mentalist and skeptic, Banachek. Banachek (Steve Shaw) grew up with a fascination in magic and a frustration with psychic frauds. As a teenager, he contacted magician and skeptic, James “The Amazing” Randi and ended up working with Randi on a special initiative known as Project Alpha, which set out to expose a general lack of objectivity in parapsychology research. Banachek served as the director for the James Randi Educational Foundation’s “One Million Dollar Paranormal Challenge” for 15 years and is now the President of the James Randi Educational Foundation. </p><p>Perry and Banachek discuss Project Alpha, the ways of fake psychics and fraudulent faith healers, and issues associated with confirmation bias and framing effects. They also discuss Banachek’s new live mentalism show in Las Vegas, which incorporates theatrical mindreading and other mentalism effects along with a storyline that explores Banachek’s life, antics, and passion for critical thinking.</p><p><br></p><p><strong>Guest: </strong></p><ul>
<li>Banachek (<a href="https://banachek.com/">Website</a>) (<a href="https://twitter.com/Banachek">twitter</a>): Mentalist (<a href="https://tinyurl.com/ticketsBanachek">Performing in Las Vegas</a> add 'social' for 30% off tickets), Skeptic, President of the <a href="https://web.randi.org/">James Randi Educational Foundation</a>
</li>
<li>This episode also featured a quick comment from: <strong>George Finney</strong>: (<a href="https://www.linkedin.com/in/georgefinney/">LinkedIn</a>); Chief Security Officer at <a href="https://www.smu.edu/">Southern Methodist University</a>; Founder of <a href="https://wellawaresecurity.com/">Well Aware Security</a>
</li>
</ul><p><br></p><p><strong>Books and References (Book links are 'Amazon Associate' links which help support the show):</strong></p><ul>
<li>Brian Brushwood's podcast, <a href="https://pod.link/1572307941">World's Greatest Con</a>
</li>
<li><a href="https://en.wikipedia.org/wiki/Banachek">Banachek Wikipedia entry</a></li>
<li><a href="https://en.wikipedia.org/wiki/Project_Alpha">Project Alpha Wikipedia entry</a></li>
<li><a href="https://en.wikipedia.org/wiki/James_Randi">James Randi Wikipedia entry</a></li>
<li><a href="https://www.mentalfloss.com/article/53424/houdinis-greatest-trick-debunking-medium-mina-crandon">Article about Houdini's efforts to debunk fake mediums</a></li>
<li><a href="https://en.wikipedia.org/wiki/The_Discoverie_of_Witchcraft">The Discoverie of Witchcraft Wikipedia entry</a></li>
<li><a href="https://wellcomecollection.org/articles/XO2LKRAAAENibaF7">The Psychology of the Ouija</a></li>
<li><a href="https://en.wikipedia.org/wiki/Barnum_effect">Barnum Effect Wikipedia entry</a></li>
<li><a href="https://www.youtube.com/watch?v=z1S5CRcqJQo">James Randi &amp; Project Alpha Video</a></li>
<li><a href="https://www.youtube.com/watch?v=b9n7i9_kAFw">Project Alpha lookback -- James Randi and Michael Edwards</a></li>
<li>
<a href="https://amzn.to/42XXYVy">Psychological Subtleties vol 1</a>, by Banachek</li>
<li>
<a href="https://amzn.to/3BTrC20">Behind the Scenes with the Mediums</a>, by David Abbott</li>
<li><a href="https://amzn.to/3ODGae5">The Discoverie of Witchcraft</a></li>
<li>
<a href="https://amzn.to/3IDffen">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a> by Perry Carpenter</li>
</ul><p><br></p><p>Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>4269</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d9cf2594-f8f0-11ed-809a-6f341f833cb8]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7236252792.mp3?updated=1740074283" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What Cybersecurity Pros can Learn from Star Wars</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/32/notes</link>
      <description>This week's episode is a late Star Wars ("May the 4th Be With You") celebration. We check out a couple interesting articles about security-related lessons embedded in the Star Wars movies, and Perry sits down with Adam Shostack, author of the new book, Threats: What Every Engineer Should Learn From Star Wars to discuss threat modeling principles using Star Wars related examples.

Guest: Adam Shostack (LinkedIn) (Twitter) (Website)

Books &amp; References (Books are Amazon Associate links)


Threats: What Every Engineer Should Learn From Star Wars, by Adam Shostack


Threat Modeling: Designing for Security, by Adam Shostack

Threat modeling videos from Adam

Threat modeling and security-related games by Adam

Adam's whitepapers


BlackPoint: Learn Their Lesson, They Did Not

Gary Hibbard LinkedIn post


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Perry's new show, Digital Folklore kicked-off Jan 16, 2023. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Voice Acting for this episode:

Darth Vader voice over artist: https://business.fiverr.com/freelancers/mistercorley


Darth Vader breathing sound: https://www.youtube.com/watch?v=MBi01iy2db8&amp;ab_channel=chefhawk



Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 May 2023 04:00:00 -0000</pubDate>
      <itunes:title>What Cybersecurity Pros can Learn from Star Wars</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week's episode is a late Star Wars ("May the 4th Be With You") celebration. We check out a couple interesting articles about security-related lessons embedded in the Star Wars movies, and Perry sits down with Adam Shostack, author of the new book, Threats: What Every Engineer Should Learn From Star Wars to discuss threat modeling principles using Star Wars related examples.

Guest: Adam Shostack (LinkedIn) (Twitter) (Website)

Books &amp; References (Books are Amazon Associate links)


Threats: What Every Engineer Should Learn From Star Wars, by Adam Shostack


Threat Modeling: Designing for Security, by Adam Shostack

Threat modeling videos from Adam

Threat modeling and security-related games by Adam

Adam's whitepapers


BlackPoint: Learn Their Lesson, They Did Not

Gary Hibbard LinkedIn post


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Perry's new show, Digital Folklore kicked-off Jan 16, 2023. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Voice Acting for this episode:

Darth Vader voice over artist: https://business.fiverr.com/freelancers/mistercorley


Darth Vader breathing sound: https://www.youtube.com/watch?v=MBi01iy2db8&amp;ab_channel=chefhawk



Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week's episode is a late Star Wars ("May the 4th Be With You") celebration. We check out a couple interesting articles about security-related lessons embedded in the Star Wars movies, and Perry sits down with Adam Shostack, author of the new book, <em>Threats: What Every Engineer Should Learn From Star Wars </em>to discuss <a href="https://www.computer.org/csdl/magazine/so/2020/06/09238654/1oa13lLEoq4">threat modeling</a> principles using Star Wars related examples.</p><p><br></p><p><strong>Guest</strong>: Adam Shostack (<a href="https://www.linkedin.com/in/shostack/">LinkedIn</a>) (<a href="https://twitter.com/adamshostack">Twitter</a>) (<a href="https://shostack.org/">Website</a>)</p><p><br></p><h3><strong>Books &amp; References (Books are Amazon Associate links)</strong></h3><ul>
<li>
<a href="https://amzn.to/3M9edsX">Threats: What Every Engineer Should Learn From Star Wars</a>, by Adam Shostack</li>
<li>
<a href="https://amzn.to/3pk6SxJ">Threat Modeling: Designing for Security</a>, by Adam Shostack</li>
<li>Threat modeling <a href="https://shostack.org/resources/videos">videos</a> from Adam</li>
<li>Threat modeling and security-related <a href="https://shostack.org/tm-games">games</a> by Adam</li>
<li>Adam's <a href="https://shostack.org/resources/whitepapers">whitepapers</a>
</li>
<li><a href="https://blackpointcyber.com/resources/blog/star-wars-cyber-security/">BlackPoint: Learn Their Lesson, They Did Not</a></li>
<li><a href="https://www.linkedin.com/posts/garyhibberd_starwars-cybersecurity-sme-activity-7028995627732627456-0Hob/">Gary Hibbard LinkedIn post</a></li>
</ul><p><br></p><p><strong>Perry's Books (Amazon Associate links)</strong></p><ul>
<li>
<a href="https://amzn.to/3MSIo8e">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/3opaCgQ">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Perry's new show, <em>Digital Folklore </em>kicked-off Jan 16, 2023. </strong>Check out the website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, check out our <a href="https://digitalfolklore.fm/shop">merch</a>, <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a></p><h3><br></h3><p><strong>Voice Acting for this episode</strong>:</p><ul>
<li>Darth Vader voice over artist: <a href="https://business.fiverr.com/freelancers/mistercorley">https://business.fiverr.com/freelancers/mistercorley</a>
</li>
<li>Darth Vader breathing sound: <a href="https://www.youtube.com/watch?v=MBi01iy2db8&amp;ab_channel=chefhawk">https://www.youtube.com/watch?v=MBi01iy2db8&amp;ab_channel=chefhawk</a>
</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>8Li cover art by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2880</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16d37780-dd2e-11ed-9a49-3377a147596d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3842665625.mp3?updated=1740074317" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Postcards from the Intersection of Cybersecurity and Folklore</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/31/notes</link>
      <description>Welcome to season 4, episode 1 of 8th Layer Insights!
On this episode, Perry speaks with Josiah Dykstra (Senior Fellow, Office of Innovation at the National Security Agency) about the new book he co-authored with Eugene Spafford and Leigh Metcalf. The book is titled Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, This topic coincides well with Perry's recent studies into folklore and urban legends for his other podcast, Digital Folklore.

Guests:

Josiah Dykstra (LinkedIn) (Twitter) (Website)

Chelsey Weber-Smith (LinkedIn) (Twitter) (Website)

Mason Amadeus (LinkedIn) (Twitter) (Website)


Books &amp; References (Books are Amazon Associate links)


American Hysteria Podcast episode, Urban Legends in the Internet Wilderness with the Digital Folklore Podcast



Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, by Eugene Spafford, Leigh Metcalf, and Josiah Dykstra


Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems, by Josiah Dykstra


Folklore 101: An Accessible Introduction to Folklore Studies, by Jeana Jorgensen 


Folklore Rules: A Fun, Quick, and Useful Introduction to the Field of Academic Folklore Studies, by Lynne S. McNeill


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Perry's new show, Digital Folklore kicked-off Jan 16, 2023. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Apr 2023 04:00:00 -0000</pubDate>
      <itunes:title>Postcards from the Intersection of Cybersecurity and Folklore</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome to season 4, episode 1 of 8th Layer Insights!
On this episode, Perry speaks with Josiah Dykstra (Senior Fellow, Office of Innovation at the National Security Agency) about the new book he co-authored with Eugene Spafford and Leigh Metcalf. The book is titled Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, This topic coincides well with Perry's recent studies into folklore and urban legends for his other podcast, Digital Folklore.

Guests:

Josiah Dykstra (LinkedIn) (Twitter) (Website)

Chelsey Weber-Smith (LinkedIn) (Twitter) (Website)

Mason Amadeus (LinkedIn) (Twitter) (Website)


Books &amp; References (Books are Amazon Associate links)


American Hysteria Podcast episode, Urban Legends in the Internet Wilderness with the Digital Folklore Podcast



Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, by Eugene Spafford, Leigh Metcalf, and Josiah Dykstra


Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems, by Josiah Dykstra


Folklore 101: An Accessible Introduction to Folklore Studies, by Jeana Jorgensen 


Folklore Rules: A Fun, Quick, and Useful Introduction to the Field of Academic Folklore Studies, by Lynne S. McNeill


Perry's Books (Amazon Associate links)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Perry's new show, Digital Folklore kicked-off Jan 16, 2023. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to season 4, episode 1 of 8th Layer Insights!</p><p>On this episode, Perry speaks with <a href="https://www.linkedin.com/in/josiah-dykstra/">Josiah Dykstra</a> (Senior Fellow, Office of Innovation at the <a href="https://www.nsa.gov/">National Security Agency</a>) about the new book he co-authored with Eugene Spafford and Leigh Metcalf. The book is titled <a href="https://amzn.to/3LlrLBf"><em>Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us</em></a><em>, </em>This topic coincides well with Perry's recent studies into folklore and urban legends for his other podcast, <a href="https://digitalfolklore.fm"><em>Digital Folklore</em></a>.</p><p><br></p><p><strong>Guests</strong>:</p><ul>
<li>Josiah Dykstra (<a href="https://www.linkedin.com/in/josiah-dykstra/">LinkedIn</a>) (<a href="https://twitter.com/JosiahDykstra">Twitter</a>) (<a href="https://josiahdykstra.com/">Website</a>)</li>
<li>Chelsey Weber-Smith (<a href="https://www.linkedin.com/in/chelsey-weber-smith-037277147/">LinkedIn</a>) (<a href="https://twitter.com/AmerHysteria">Twitter</a>) (<a href="https://www.chelseywebersmith.com/">Website</a>)</li>
<li>Mason Amadeus (<a href="https://www.linkedin.com/in/mason-amadeus-a853a7242/">LinkedIn</a>) (<a href="https://twitter.com/itsMasonAmadeus">Twitter</a>) (<a href="https://masonamadeus.com/">Website</a>)</li>
</ul><p><br></p><h3><strong>Books &amp; References (Books are Amazon Associate links)</strong></h3><ul>
<li>
<strong>American Hysteria Podcast episode</strong>, <a href="https://cms.megaphone.fm/organizations/cd9023bc-9a2c-11ea-bbcb-a7f75b26f845/podcasts/f5479b52-ac4f-11eb-98b2-3f5655e86aac/episodes/15eba7d4-dd2e-11ed-9a49-976d2e9c72b0/336d2429">Urban Legends in the Internet Wilderness with the Digital Folklore Podcast</a>
</li>
<li>
<a href="https://amzn.to/3LlrLBf"><em>Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us</em></a><em>,</em> by Eugene Spafford, Leigh Metcalf, and Josiah Dykstra</li>
<li>
<a href="https://amzn.to/3L94mCQ"><em>Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems,</em></a> by Josiah Dykstra</li>
<li>
<a href="https://amzn.to/40oSot0"><em>Folklore 101: An Accessible Introduction to Folklore Studies</em></a>, by Jeana Jorgensen </li>
<li>
<a href="https://amzn.to/40oSz7E"><em>Folklore Rules: A Fun, Quick, and Useful Introduction to the Field of Academic Folklore Studies</em></a>, by Lynne S. McNeill</li>
</ul><p><br></p><p><strong>Perry's Books (Amazon Associate links)</strong></p><ul>
<li>
<a href="https://amzn.to/3MSIo8e">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://amzn.to/3opaCgQ">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><br></h3><p><strong>Perry's new show, <em>Digital Folklore </em>kicked-off Jan 16, 2023. </strong>Check out the website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, check out our <a href="https://digitalfolklore.fm/shop">merch</a>, <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a></p><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>8Li cover art by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15eba7d4-dd2e-11ed-9a49-976d2e9c72b0]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6685115283.mp3?updated=1740074339" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Season 3 finale: What's the deal with Authentication, MFA, and Password Managers?</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/30/notes</link>
      <description>For the last episode of season 3, I thought we'd talk about something that's been in the news quite a lot recently: Authentication and Password Managers. As security professionals, we've decried the password for decades. Multifactor authentication (MFA) has started to gain popularity... but not without its own issues. Security leaders and tech teams may have once again hoped for a silver bullet, only to be disappointed to find out that crafty attackers can easily bypass MFA. We've also been touting the benefits of Password Managers for quite a while. After all, in a world where most of us have to manage upwards of 200 passwords in a year, who can keep up? No human can have great password hygiene across all those accounts. But password managers also face their own problems as illustrated by a recent high-profile incident.
Our guest today is Roger Grimes. He has a multi-decade cybersecurity career and is the author of 13 cybersecurity books, countless articles, and is a highly sought-after industry luminary. ... Oh -- and he has opinions. Listen in as Roger and I discuss the current state of authentication, MFA, password managers, and more.
Guests:
Roger Grimes (LinkedIn) (Twitter)

Want to submit a question to have answered in a future episode?
If you’ve got a question or comment that you’d like me to try to answer or respond to, leave a voice message at https://www.speakpipe.com/8Li. Frankly, that would make it more engaging than if I just read your questions. But, if you aren’t able to record a message or don’t want your voice on the show, then you can email me your questions at perry@8thLayerMedia.com. I’d love to hear from you and answer any questions you have about my thoughts on security topics, creativity, online culture, podcasting… or anything else you have on your mind.

Books &amp; References:


Password Managers Can Be Hacked Lots of Ways and Yes, You Should Still Use One, by Roger Grimes

Roger's Password Masterclass


Roger's Hacking MFA presentation



Hacking Multifactor Authentication, by Roger Grimes


Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto, by Roger Grimes


Ransomware Protection Playbook, by Roger Grimes


A Data-Driven Computer Defense: A Way to Improve Any Computer Defense, by Roger Grimes


Hacking the Hacker: Learn from the Experts Who Take Down Hackers, by Roger Grimes


LastPass Security Incident, December 22, 2022


LinkedIn 2FA Hacking demo by Kevin Mitnick


The Humane Interface: New Directions for Designing Interactive Systems, by Jef Raskin

Wired Magazine Article -- The Best Password Managers to Secure Your Digital Life


Perry's new show, Digital Folklore kicked-off Jan 16. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news
Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Jan 2023 05:00:00 -0000</pubDate>
      <itunes:title>Season 3 finale: What's the deal with Authentication, MFA, and Password Managers?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>For the last episode of season 3, I thought we'd talk about something that's been in the news quite a lot recently: Authentication and Password Managers. As security professionals, we've decried the password for decades. Multifactor authentication (MFA) has started to gain popularity... but not without its own issues. Security leaders and tech teams may have once again hoped for a silver bullet, only to be disappointed to find out that crafty attackers can easily bypass MFA. We've also been touting the benefits of Password Managers for quite a while. After all, in a world where most of us have to manage upwards of 200 passwords in a year, who can keep up? No human can have great password hygiene across all those accounts. But password managers also face their own problems as illustrated by a recent high-profile incident.
Our guest today is Roger Grimes. He has a multi-decade cybersecurity career and is the author of 13 cybersecurity books, countless articles, and is a highly sought-after industry luminary. ... Oh -- and he has opinions. Listen in as Roger and I discuss the current state of authentication, MFA, password managers, and more.
Guests:
Roger Grimes (LinkedIn) (Twitter)

Want to submit a question to have answered in a future episode?
If you’ve got a question or comment that you’d like me to try to answer or respond to, leave a voice message at https://www.speakpipe.com/8Li. Frankly, that would make it more engaging than if I just read your questions. But, if you aren’t able to record a message or don’t want your voice on the show, then you can email me your questions at perry@8thLayerMedia.com. I’d love to hear from you and answer any questions you have about my thoughts on security topics, creativity, online culture, podcasting… or anything else you have on your mind.

Books &amp; References:


Password Managers Can Be Hacked Lots of Ways and Yes, You Should Still Use One, by Roger Grimes

Roger's Password Masterclass


Roger's Hacking MFA presentation



Hacking Multifactor Authentication, by Roger Grimes


Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto, by Roger Grimes


Ransomware Protection Playbook, by Roger Grimes


A Data-Driven Computer Defense: A Way to Improve Any Computer Defense, by Roger Grimes


Hacking the Hacker: Learn from the Experts Who Take Down Hackers, by Roger Grimes


LastPass Security Incident, December 22, 2022


LinkedIn 2FA Hacking demo by Kevin Mitnick


The Humane Interface: New Directions for Designing Interactive Systems, by Jef Raskin

Wired Magazine Article -- The Best Password Managers to Secure Your Digital Life


Perry's new show, Digital Folklore kicked-off Jan 16. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news
Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>For the last episode of season 3, I thought we'd talk about something that's been in the news quite a lot recently: Authentication and Password Managers. As security professionals, we've decried the password for decades. Multifactor authentication (MFA) has started to gain popularity... but not without its own issues. Security leaders and tech teams may have once again hoped for a silver bullet, only to be disappointed to find out that crafty attackers can easily bypass MFA. We've also been touting the benefits of Password Managers for quite a while. After all, in a world where most of us have to manage upwards of 200 passwords in a year, who can keep up? No human can have great password hygiene across all those accounts. But password managers also face their own problems as illustrated by a recent <a href="https://drive.google.com/drive/folders/0AD8qMr84p4lLUk9PVA?usp=sharing_erl_m&amp;userstoinvite=perryc@knowbe4.com&amp;ts=63cabddb">high-profile incident</a>.</p><p>Our guest today is Roger Grimes. He has a multi-decade cybersecurity career and is the author of 13 cybersecurity books, countless articles, and is a highly sought-after industry luminary. ... Oh -- and he has opinions. Listen in as Roger and I discuss the current state of authentication, MFA, password managers, and more.</p><p><strong>Guests</strong>:</p><ul><li>Roger Grimes (<a href="https://www.linkedin.com/in/rogeragrimes/">LinkedIn</a>) (<a href="https://twitter.com/rogeragrimes">Twitter</a>)</li></ul><p><br></p><p><strong>Want to submit a question to have answered in a future episode?</strong></p><p>If you’ve got a question or comment that you’d like me to try to answer or respond to, leave a voice message at <a href="https://www.speakpipe.com/8Li">https://www.speakpipe.com/8Li</a>. Frankly, that would make it more engaging than if I just read your questions. But, if you aren’t able to record a message or don’t want your voice on the show, then you can email me your questions at <a href="mailto:perry@8thLayerMedia.com">perry@8thLayerMedia.com</a>. I’d love to hear from you and answer any questions you have about my thoughts on security topics, creativity, online culture, podcasting… or anything else you have on your mind.</p><p><br></p><h3><strong>Books &amp; References:</strong></h3><ul>
<li>
<a href="https://www.linkedin.com/pulse/password-managers-can-hacked-lots-ways-yes-you-should-roger-grimes">Password Managers Can Be Hacked Lots of Ways and Yes, You Should Still Use One</a>, by Roger Grimes</li>
<li>Roger's <a href="https://blog.knowbe4.com/roger-grimes-password-best-practices-master-class">Password Masterclass</a>
</li>
<li>Roger's <a href="https://www.youtube.com/watch?v=2T8wqkUbOtE&amp;ab_channel=ActualTechMedia-">Hacking MFA presentation</a>
</li>
<li>
<a href="https://a.co/d/gaoIMZk">Hacking Multifactor Authentication</a>, by Roger Grimes</li>
<li>
<a href="https://a.co/d/bP2q5Jp">Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto</a>, by Roger Grimes</li>
<li>
<a href="https://a.co/d/cc2g8rT">Ransomware Protection Playbook</a>, by Roger Grimes</li>
<li>
<a href="https://a.co/d/6ULuRCh">A Data-Driven Computer Defense: A Way to Improve Any Computer Defense</a>, by Roger Grimes</li>
<li>
<a href="https://a.co/d/6wCBOng">Hacking the Hacker: Learn from the Experts Who Take Down Hackers</a>, by Roger Grimes</li>
<li>
<a href="https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/">LastPass Security Incident</a>, December 22, 2022</li>
<li>
<a href="https://www.youtube.com/watch?v=xaOX8DS-Cto">LinkedIn 2FA Hacking demo</a> by Kevin Mitnick</li>
<li>
<a href="https://a.co/d/jb1imeM">The Humane Interface: New Directions for Designing Interactive Systems</a>, by Jef Raskin</li>
<li><a href="https://www.wired.com/story/best-password-managers/">Wired Magazine Article -- The Best Password Managers to Secure Your Digital Life</a></li>
</ul><p><br></p><p><strong>Perry's new show, <em>Digital Folklore </em>kicked-off Jan 16. </strong>Check out the website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, check out our <a href="https://digitalfolklore.fm/shop">merch</a>, <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a></p><h3><strong>Perry's Books</strong></h3><ul>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>4204</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b86def0-6ec6-11ed-b5a3-a79ed821be99]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7732596247.mp3?updated=1740074447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Quick announcement and sneak peek of my new show: Digital Folklore</title>
      <description>Hey all!
An announcement and something special!
First, the announcement:
Here's your chance to participate in the final episode of 8Li season 3. If you’ve got a question or comment that you’d like me to try to answer or respond to, leave a voice message at https://www.speakpipe.com/8Li. Frankly, that would make it more engaging than if I just read your questions. But, if you aren’t able to record a message or don’t want your voice on the show, then you can email me your questions at perry@8thLayerMedia.com. I’d love to hear from you and answer any questions you have about my thoughts on security topics, creativity, online culture, podcasting… or anything else you have on your mind.

Now for something special:
Here's a quick 10 minute sneak peek from episode 1 of my new show, Digital Folklore. Season 1 kicks off Jan 16.
This episode introduces us to two "monsters" who were birthed on the internet, but couldn't be contained there. Their names are Slenderman and Momo, and they are great examples of a few key folkloric concepts. So join us as we take a look at Slenderman and Momo and learn about ostension, monster theory, moral panics, and the defining traits that make something folklore as opposed to just a simple online expression of creativity.
Guests appearing on the full episode include:


Dr. Vivian Asimos, author of Digital Monsters and Digital Mythology and the Internet's Monster: The Slender Man



Ben Brock Johnson, Amory Sivertson, and Quincy Walters from WBUR's podcast, Endless Thread



Chelsey Weber-Smith, host of American Hysteria



Kathleen Hale, author of Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls



Season 1 begins Jan 16, 2023. Subscribe or follow so you don't miss out! You can sign-up for our newsletter and learn more about the show at https://digitalfolklore.fm.
Support the Digital Folklore Podcast on Patreon: https://patreon.com/digitalfolklore
Find us on the socials:

Twitter: @digiFolklorePod


Facebook: DigitalFolklorePod


Instagram: DigitalFolklorePod


TikTok: digitalfolklore



Thanks so much!
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Jan 2023 05:00:00 -0000</pubDate>
      <itunes:title>Quick announcement and sneak peek of my new show: Digital Folklore</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hey all!
An announcement and something special!
First, the announcement:
Here's your chance to participate in the final episode of 8Li season 3. If you’ve got a question or comment that you’d like me to try to answer or respond to, leave a voice message at https://www.speakpipe.com/8Li. Frankly, that would make it more engaging than if I just read your questions. But, if you aren’t able to record a message or don’t want your voice on the show, then you can email me your questions at perry@8thLayerMedia.com. I’d love to hear from you and answer any questions you have about my thoughts on security topics, creativity, online culture, podcasting… or anything else you have on your mind.

Now for something special:
Here's a quick 10 minute sneak peek from episode 1 of my new show, Digital Folklore. Season 1 kicks off Jan 16.
This episode introduces us to two "monsters" who were birthed on the internet, but couldn't be contained there. Their names are Slenderman and Momo, and they are great examples of a few key folkloric concepts. So join us as we take a look at Slenderman and Momo and learn about ostension, monster theory, moral panics, and the defining traits that make something folklore as opposed to just a simple online expression of creativity.
Guests appearing on the full episode include:


Dr. Vivian Asimos, author of Digital Monsters and Digital Mythology and the Internet's Monster: The Slender Man



Ben Brock Johnson, Amory Sivertson, and Quincy Walters from WBUR's podcast, Endless Thread



Chelsey Weber-Smith, host of American Hysteria



Kathleen Hale, author of Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls



Season 1 begins Jan 16, 2023. Subscribe or follow so you don't miss out! You can sign-up for our newsletter and learn more about the show at https://digitalfolklore.fm.
Support the Digital Folklore Podcast on Patreon: https://patreon.com/digitalfolklore
Find us on the socials:

Twitter: @digiFolklorePod


Facebook: DigitalFolklorePod


Instagram: DigitalFolklorePod


TikTok: digitalfolklore



Thanks so much!
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hey all!</p><p>An announcement and something special!</p><p><strong>First, the announcement:</strong></p><p>Here's your chance to participate in the final episode of 8Li season 3. If you’ve got a question or comment that you’d like me to try to answer or respond to, leave a voice message at <a href="https://www.speakpipe.com/8Li">https://www.speakpipe.com/8Li</a>. Frankly, that would make it more engaging than if I just read your questions. But, if you aren’t able to record a message or don’t want your voice on the show, then you can email me your questions at <a href="mailto:perry@8thLayerMedia.com">perry@8thLayerMedia.com</a>. I’d love to hear from you and answer any questions you have about my thoughts on security topics, creativity, online culture, podcasting… or anything else you have on your mind.</p><p><br></p><p><strong>Now for something special:</strong></p><p>Here's a quick 10 minute sneak peek from episode 1 of my new show, <a href="https://digitalfolklore.fm"><em>Digital Folklore</em></a>. Season 1 kicks off Jan 16.</p><p>This episode introduces us to two "monsters" who were birthed on the internet, but couldn't be contained there. Their names are Slenderman and Momo, and they are great examples of a few key folkloric concepts. So join us as we take a look at Slenderman and Momo and learn about ostension, monster theory, moral panics, and the defining traits that make something folklore as opposed to just a simple online expression of creativity.</p><p>Guests appearing on the full episode include:</p><ul>
<li>
<strong>Dr. Vivian Asimos,</strong> author of <a href="https://uk.bookshop.org/books/1605842352_digital-monsters/9781913568191"><em>Digital Monsters</em></a> and <a href="https://www.bloomsbury.com/uk/digital-mythology-and-the-internets-monster-9781350181441/"><em>Digital Mythology and the Internet's Monster: The Slender Man</em></a>
</li>
<li>
<strong>Ben Brock Johnson</strong>, <strong>Amory Sivertson</strong>, and<strong> Quincy Walters</strong> from WBUR's podcast, <a href="https://www.wbur.org/podcasts/endlessthread">Endless Thread</a>
</li>
<li>
<strong>Chelsey Weber-Smith</strong>, host of <a href="https://www.chelseywebersmith.com/americanhysteria"><em>American Hysteria</em></a>
</li>
<li>
<strong>Kathleen Hale</strong>, author of <a href="https://groveatlantic.com/book/slenderman/"><em>Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls</em></a>
</li>
</ul><p><br></p><p>Season 1 begins Jan 16, 2023. Subscribe or follow so you don't miss out! You can sign-up for our newsletter and learn more about the show at <a href="https://digitalfolklore.fm/">https://digitalfolklore.fm</a>.</p><p>Support the Digital Folklore Podcast on Patreon: <a href="https://patreon.com/digitalfolklore">https://patreon.com/digitalfolklore</a></p><p>Find us on the socials:</p><ul>
<li>Twitter: <a href="https://twitter.com/digiFolklorePod">@digiFolklorePod</a>
</li>
<li>Facebook: <a href="https://www.facebook.com/DigitalFolklorePod">DigitalFolklorePod</a>
</li>
<li>Instagram: <a href="https://www.instagram.com/digitalfolklorepod/">DigitalFolklorePod</a>
</li>
<li>TikTok: <a href="tiktok.com/@digitalfolklore">digitalfolklore</a>
</li>
</ul><p><br></p><p>Thanks so much!</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>860</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e29337c-8ec7-11ed-a6d1-bb16eab84628]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6473017433.mp3?updated=1740074449" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity, Creativity, Leadership: a Conversation with Chris Cochran and Ron Eddings</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/29/notes</link>
      <description>On this episode, Perry speaks with Chris Cochran and Ron Eddings. Chris and Ron started the Hacker Valley Studio Podcast back in June of 2019 with the goal of exploring the human condition to inspire peak performance in cybersecurity. The podcast is about Chris and Ron’s quest to find inspirational stories and knowledge to elevate themselves and their communities. That podcast eventually kicked off a journey that led them to create their own podcast network (Hacker Valley Media), foster communities, and they recently partnered with SANS to create the Difference Makers Awards.
Chris and Ron are passionate about cybersecurity, leadership, creativity, and podcasting — and so on today’s show, you’ll hear us touch on all of those topics and more.
Guests:

Chris Cochran (LinkedIn) (Twitter)

Ron Eddings (LinkedIn) (Twitter)

References:

Hacker Valley Media

Hacker Valley Studio podcast

Technically Divided

Difference Makers Awards

Hacker Valley Discord server


Perry's new show, Digital Folklore. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, and more. Coming January 16, 2023 everywhere you listen to podcasts. You can also check a 10 minute sneak peek of episode 1.
Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Dec 2022 05:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity, Creativity, Leadership: a Conversation with Chris Cochran and Ron Eddings</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, Perry speaks with Chris Cochran and Ron Eddings. Chris and Ron started the Hacker Valley Studio Podcast back in June of 2019 with the goal of exploring the human condition to inspire peak performance in cybersecurity. The podcast is about Chris and Ron’s quest to find inspirational stories and knowledge to elevate themselves and their communities. That podcast eventually kicked off a journey that led them to create their own podcast network (Hacker Valley Media), foster communities, and they recently partnered with SANS to create the Difference Makers Awards.
Chris and Ron are passionate about cybersecurity, leadership, creativity, and podcasting — and so on today’s show, you’ll hear us touch on all of those topics and more.
Guests:

Chris Cochran (LinkedIn) (Twitter)

Ron Eddings (LinkedIn) (Twitter)

References:

Hacker Valley Media

Hacker Valley Studio podcast

Technically Divided

Difference Makers Awards

Hacker Valley Discord server


Perry's new show, Digital Folklore. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, and more. Coming January 16, 2023 everywhere you listen to podcasts. You can also check a 10 minute sneak peek of episode 1.
Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer

Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry speaks with <a href="https://www.linkedin.com/in/chrishvm/">Chris Cochran</a> and <a href="https://www.linkedin.com/in/ronaldeddings/">Ron Eddings</a>. Chris and Ron started the Hacker Valley Studio Podcast back in June of 2019 with the goal of exploring the human condition to inspire peak performance in cybersecurity. The podcast is about Chris and Ron’s quest to find inspirational stories and knowledge to elevate themselves and their communities. That podcast eventually kicked off a journey that led them to create their own podcast network (<a href="https://hackervalley.com/">Hacker Valley Media</a>), foster communities, and they recently partnered with <a href="https://www.sans.org/">SANS</a> to create the <a href="https://www.sans.org/about/awards/difference-makers/"><em>Difference Makers Awards</em></a>.</p><p>Chris and Ron are passionate about cybersecurity, leadership, creativity, and podcasting — and so on today’s show, you’ll hear us touch on all of those topics and more.</p><p><strong>Guests</strong>:</p><ul>
<li>Chris Cochran (<a href="https://www.linkedin.com/in/chrishvm/">LinkedIn</a>) (<a href="https://twitter.com/chrishvm">Twitter</a>)</li>
<li>Ron Eddings (<a href="https://www.linkedin.com/in/ronaldeddings/">LinkedIn</a>) (<a href="https://twitter.com/ronaldeddings">Twitter</a>)</li>
</ul><h3><strong>References:</strong></h3><ul>
<li><a href="https://hackervalley.com/">Hacker Valley Media</a></li>
<li><a href="https://hackervalley.com/show/hackervalley/">Hacker Valley Studio podcast</a></li>
<li><a href="https://hackervalley.com/show/technically-divided/">Technically Divided</a></li>
<li><a href="https://www.sans.org/about/awards/difference-makers/">Difference Makers Awards</a></li>
<li><a href="https://discord.gg/dpY5SqvZ">Hacker Valley Discord server</a></li>
</ul><p><br></p><p><strong>Perry's new show, <em>Digital Folklore. </em></strong>Check out the website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, check out our <a href="https://digitalfolklore.fm/shop">merch</a>, and more. Coming January 16, 2023 <a href="https://megaphone.link/SBP8710116076">everywhere you listen to podcasts</a>. You can also check a <a href="https://megaphone.link/SBP4442765965">10 minute sneak peek of episode 1</a>.</p><h3><strong>Perry's Books</strong></h3><ul>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2709</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[57276016-56d9-11ed-b37d-1f43f357ce16]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3944951859.mp3?updated=1740074487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your Life, Their Profit: Buyer Awareness in the 21st Century</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/28/notes</link>
      <description>On this episode, Perry sits down with Marta L. Tellado, President and CEO at Consumer Reports, to discuss the digital moment we are in and what that means for consumers and the marketplace: the risks, dangers, traps… and also the places and paths that can lead to progress. They also discuss Marta's new book, Buyer Aware: Harnessing Our Consumer Power for a Safe, Fair, and Transparent Marketplace.

Guest:
Marta L. Tellado (LinkedIn) (Twitter) (Website)

Books and References:

Fighting For a Fair Digital World. Consumer Reports resources to empower you to take action


Buyer Aware: Harnessing our consumer power for a safe, fair, and transparent marketplace, by Marta L. Tellado

Old Consumer reports commercials: Example 1, Example 2, Example 3.


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Dec 2022 05:00:00 -0000</pubDate>
      <itunes:title>Your Life, Their Profit: Buyer Awareness in the 21st Century</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, Perry sits down with Marta L. Tellado, President and CEO at Consumer Reports, to discuss the digital moment we are in and what that means for consumers and the marketplace: the risks, dangers, traps… and also the places and paths that can lead to progress. They also discuss Marta's new book, Buyer Aware: Harnessing Our Consumer Power for a Safe, Fair, and Transparent Marketplace.

Guest:
Marta L. Tellado (LinkedIn) (Twitter) (Website)

Books and References:

Fighting For a Fair Digital World. Consumer Reports resources to empower you to take action


Buyer Aware: Harnessing our consumer power for a safe, fair, and transparent marketplace, by Marta L. Tellado

Old Consumer reports commercials: Example 1, Example 2, Example 3.


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry sits down with <a href="https://www.linkedin.com/in/marta-l-tellado-0a13782a/">Marta L. Tellado</a>, President and CEO at <a href="https://wwww.cr.org/">Consumer Reports</a>, to discuss the digital moment we are in and what that means for consumers and the marketplace: the risks, dangers, traps… and also the places and paths that can lead to progress. They also discuss Marta's new book, <a href="https://buyeraware.consumerreports.org/"><em>Buyer Aware: Harnessing Our Consumer Power for a Safe, Fair, and Transparent Marketplace</em></a>.</p><p><br></p><p><strong>Guest:</strong></p><ul><li>Marta L. Tellado (<a href="https://www.linkedin.com/in/marta-l-tellado-0a13782a/">LinkedIn</a>) (<a href="https://twitter.com/MLTellado">Twitter</a>) (<a href="https://www.consumerreports.org/cro/about-us/our-people/our-leadership/marta-l-tellado/index.htm">Website</a>)</li></ul><p><br></p><p><strong>Books and References:</strong></p><ul>
<li><a href="https://buyeraware.consumerreports.org/take-action/action-opportunities/">Fighting For a Fair Digital World. Consumer Reports resources to empower you to take action</a></li>
<li>
<a href="https://buyeraware.consumerreports.org/">Buyer Aware: Harnessing our consumer power for a safe, fair, and transparent marketplace</a>, by Marta L. Tellado</li>
<li>Old Consumer reports commercials: Example 1, <a href="https://www.youtube.com/watch?v=LlzDzSREkbA">Example 2</a>, <a href="https://www.youtube.com/watch?v=8L-MX06Wz3g">Example 3</a>.</li>
</ul><p><br></p><p><strong>Perry's Books</strong></p><ul>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2964</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[57134bda-56d9-11ed-b37d-db085accddfb]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3623590977.mp3?updated=1740074528" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>[Holiday Replay] The Battle for Truth: Disinformation, Misinformation, &amp; Conspiracies</title>
      <description>Get ready for those 'fun' holiday dinner conversations with friends and family. You know the ones...
In the spirit of the holidays, I thought we'd revisit Season 1, Episode 2. This is an episode about the battle for truth. As disinformation, misinformation, malinformation, and conspiracy theories seem to be hitting epidemic levels, how can we help each other determine what is real and what is fake? How can we help people who are falling down conspiracy rabbit holes? And what roles do technology companies, governments, and ordinary citizens play?
Perry Carpenter speaks with acclaimed cybersecurity expert, Bruce Schneier, disinformation experts, Samantha North and Allie Wong, and conspiracy theory researcher, Mick West. In this episode, we also hear from Peter Leyden from Reinvent and Eli Periser, author of The Filter Bubble.
Learn more about our guests here:


Bruce Schneier - Internationally renowned security technologist, author, and speaker. You can find Bruce's website here.


Allie Wong - VP of Mis/dis/mal-information, Response and Resiliency, Limbik; Consultant, United Nations Institute for Disarmament Research. (LinkedIn)


Samantha North - Disinformation researcher and consultant. (LinkedIn) Co-Founder: North Cyber Research (website)


Mick West - Skeptical investigator and retired video game programmer. Creator of the websites Contrail Science (website) and Metabunk (website). Author of Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect (link). Personal website (link).

Special thanks to Reinvent for allowing use of audio.
References:

http://reinvent.net/events/event/how-we-can-pop-the-filter-bubble-with-eli-pariser/

https://reboot-foundation.org/study-social-media-poor-judgment/

https://reboot-foundation.org/is-there-a-fake-news-generation/

Recommended Books:


Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect by Mick West.


Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier.


The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think by Eli Pariser.


Thinking, Fast and Slow by Daniel Kahneman.


Why Are We Yelling?: The Art of Productive Disagreement by Buster Benson.


The Righteous Mind: Why Good People Are Divided by Politics and Religion by Jonathan Haidt.


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Nov 2022 05:00:00 -0000</pubDate>
      <itunes:title>[Holiday Replay] The Battle for Truth: Disinformation, Misinformation, &amp; Conspiracies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Get ready for those 'fun' holiday dinner conversations with friends and family. You know the ones...
In the spirit of the holidays, I thought we'd revisit Season 1, Episode 2. This is an episode about the battle for truth. As disinformation, misinformation, malinformation, and conspiracy theories seem to be hitting epidemic levels, how can we help each other determine what is real and what is fake? How can we help people who are falling down conspiracy rabbit holes? And what roles do technology companies, governments, and ordinary citizens play?
Perry Carpenter speaks with acclaimed cybersecurity expert, Bruce Schneier, disinformation experts, Samantha North and Allie Wong, and conspiracy theory researcher, Mick West. In this episode, we also hear from Peter Leyden from Reinvent and Eli Periser, author of The Filter Bubble.
Learn more about our guests here:


Bruce Schneier - Internationally renowned security technologist, author, and speaker. You can find Bruce's website here.


Allie Wong - VP of Mis/dis/mal-information, Response and Resiliency, Limbik; Consultant, United Nations Institute for Disarmament Research. (LinkedIn)


Samantha North - Disinformation researcher and consultant. (LinkedIn) Co-Founder: North Cyber Research (website)


Mick West - Skeptical investigator and retired video game programmer. Creator of the websites Contrail Science (website) and Metabunk (website). Author of Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect (link). Personal website (link).

Special thanks to Reinvent for allowing use of audio.
References:

http://reinvent.net/events/event/how-we-can-pop-the-filter-bubble-with-eli-pariser/

https://reboot-foundation.org/study-social-media-poor-judgment/

https://reboot-foundation.org/is-there-a-fake-news-generation/

Recommended Books:


Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect by Mick West.


Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier.


The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think by Eli Pariser.


Thinking, Fast and Slow by Daniel Kahneman.


Why Are We Yelling?: The Art of Productive Disagreement by Buster Benson.


The Righteous Mind: Why Good People Are Divided by Politics and Religion by Jonathan Haidt.


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Get ready for those 'fun' holiday dinner conversations with friends and family. You know the ones...</p><p>In the spirit of the holidays, I thought we'd revisit Season 1, Episode 2. This is an episode about the battle for truth. As disinformation, misinformation, malinformation, and conspiracy theories seem to be hitting epidemic levels, how can we help each other determine what is real and what is fake? How can we help people who are falling down conspiracy rabbit holes? And what roles do technology companies, governments, and ordinary citizens play?</p><p><a href="https://www.linkedin.com/in/perrycarpenter/">Perry Carpenter</a> speaks with acclaimed cybersecurity expert, <a href="https://www.schneier.com/">Bruce Schneier</a>, disinformation experts, <a href="https://www.linkedin.com/in/northsamantha/">Samantha North</a> and <a href="https://www.linkedin.com/in/allie-wong/">Allie Wong</a>, and conspiracy theory researcher, <a href="https://mickwest.com/">Mick West</a>. In this episode, we also hear from <a href="https://www.linkedin.com/in/peterleyden/">Peter Leyden</a> from <a href="http://reinvent.net/">Reinvent</a> and <a href="https://www.elipariser.org/">Eli Periser</a>, author of The Filter Bubble.</p><p><strong>Learn more about our guests here:</strong></p><ul>
<li>
<strong>Bruce Schneier</strong> - Internationally renowned security technologist, author, and speaker. You can find Bruce's website <a href="https://www.schneier.com/">here</a>.</li>
<li>
<strong>Allie Wong</strong> - VP of Mis/dis/mal-information, Response and Resiliency, Limbik; Consultant, United Nations Institute for Disarmament Research. (<a href="https://www.linkedin.com/in/allie-wong/">LinkedIn</a>)</li>
<li>
<strong>Samantha North</strong> - Disinformation researcher and consultant. (<a href="https://www.linkedin.com/in/northsamantha/">LinkedIn</a>) Co-Founder: North Cyber Research (<a href="https://samanthanorth.com/">website</a>)</li>
<li>
<strong>Mick West </strong>- Skeptical investigator and retired video game programmer. Creator of the websites Contrail Science (<a href="https://contrailscience.com/">website</a>) and Metabunk (<a href="https://metabunk.org/">website</a>). Author of Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect (<a href="https://www.amazon.com/Escaping-Rabbit-Hole-Conspiracy-Theories/dp/1510755772">link</a>). Personal website (<a href="https://mickwest.com/">link</a>).</li>
</ul><p><em>Special thanks to </em><a href="http://reinvent.net/"><em>Reinvent</em></a><em> for allowing use of audio.</em></p><p><strong>References:</strong></p><ul>
<li><a href="http://reinvent.net/events/event/how-we-can-pop-the-filter-bubble-with-eli-pariser/">http://reinvent.net/events/event/how-we-can-pop-the-filter-bubble-with-eli-pariser/</a></li>
<li><a href="https://reboot-foundation.org/study-social-media-poor-judgment/">https://reboot-foundation.org/study-social-media-poor-judgment/</a></li>
<li><a href="https://reboot-foundation.org/is-there-a-fake-news-generation/">https://reboot-foundation.org/is-there-a-fake-news-generation/</a></li>
</ul><p><strong>Recommended Books:</strong></p><ul>
<li>
<a href="https://www.amazon.com/Escaping-Rabbit-Hole-Conspiracy-Theories/dp/1510755772">Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect</a> by Mick West.</li>
<li>
<a href="https://www.amazon.com/Click-Here-Kill-Everybody-Hyper-connected/dp/0393357449/">Click Here to Kill Everybody: Security and Survival in a Hyper-connected World</a> by Bruce Schneier.</li>
<li>
<a href="https://www.amazon.com/Filter-Bubble-Personalized-Changing-Think/dp/0143121235">The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think</a> by Eli Pariser.</li>
<li>
<a href="https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555">Thinking, Fast and Slow</a> by Daniel Kahneman.</li>
<li>
<a href="https://www.amazon.com/Why-Are-We-Yelling-hardcover/dp/0525540105">Why Are We Yelling?: The Art of Productive Disagreement</a> by Buster Benson.</li>
<li>
<a href="https://www.amazon.com/Righteous-Mind-Divided-Politics-Religion/dp/0307455777">The Righteous Mind: Why Good People Are Divided by Politics and Religion</a> by Jonathan Haidt.</li>
</ul><p><br></p><p><strong>Perry's Books</strong></p><ul>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[497a341a-fd66-11ec-8c69-d3e743229a2b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5105014124.mp3?updated=1740074869" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spycraft: A Behind the Curtain Look into the Intelligence Community</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/27/notes</link>
      <description>There is something about a good spy story that seems to really resonate with people in the cybersecurity world. We love watching the moves and the counter moves, and the sneaking around, and the social engineering, and hacking, and all of the gadgets and toys, and car chases, and fights and double crosses and triple crosses. Yeah, you get the point. 
But how much of that is real and how much can be chalked up to an author's creative license? And what's life and work like for real people in the intelligence industry?
This episode features two guests: ex-CIA agent Peter Warmka and Andrew Hammond, historian and curator at the International Spy Museum.
Guests:

Peter Warmka (LinkedIn) (Twitter) (Website)

Andrew Hammond (LinkedIn) (Twitter) (Website)


Books and References:


Confessions of a CIA Spy: The Art of Human Hacking, by Peter Warmka


The CIA Guy &amp; CIA Spy Podcast, Peter Warmka and Robert Siciliano

Peter Warmka Videos

International Spy Museum website


SpyCast Podcast, hosted by Andrew Hammond

INTEL.gov


The Evolution of Espionage in America, INTEL.org


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Nov 2022 05:00:00 -0000</pubDate>
      <itunes:title>Spycraft: A Behind the Curtain Look into the Intelligence Community</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There is something about a good spy story that seems to really resonate with people in the cybersecurity world. We love watching the moves and the counter moves, and the sneaking around, and the social engineering, and hacking, and all of the gadgets and toys, and car chases, and fights and double crosses and triple crosses. Yeah, you get the point. 
But how much of that is real and how much can be chalked up to an author's creative license? And what's life and work like for real people in the intelligence industry?
This episode features two guests: ex-CIA agent Peter Warmka and Andrew Hammond, historian and curator at the International Spy Museum.
Guests:

Peter Warmka (LinkedIn) (Twitter) (Website)

Andrew Hammond (LinkedIn) (Twitter) (Website)


Books and References:


Confessions of a CIA Spy: The Art of Human Hacking, by Peter Warmka


The CIA Guy &amp; CIA Spy Podcast, Peter Warmka and Robert Siciliano

Peter Warmka Videos

International Spy Museum website


SpyCast Podcast, hosted by Andrew Hammond

INTEL.gov


The Evolution of Espionage in America, INTEL.org


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There is something about a good spy story that seems to really resonate with people in the cybersecurity world. We love watching the moves and the counter moves, and the sneaking around, and the social engineering, and hacking, and all of the gadgets and toys, and car chases, and fights and double crosses and triple crosses. Yeah, you get the point. </p><p>But how much of that is real and how much can be chalked up to an author's creative license? And what's life and work like for real people in the intelligence industry?</p><p>This episode features two guests: ex-CIA agent <a href="https://www.linkedin.com/in/peterwarmka/">Peter Warmka</a> and <a href="https://www.linkedin.com/in/andrew-hammond-09344936/">Andrew Hammond</a>, historian and curator at the <a href="https://www.spymuseum.org/">International Spy Museum</a>.</p><p><strong>Guests</strong>:</p><ul>
<li>Peter Warmka (<a href="https://www.linkedin.com/in/peterwarmka/">LinkedIn</a>) (<a href="https://mobile.twitter.com/the_cinstitute">Twitter</a>) (<a href="https://www.counterintelligence-institute.com/">Website</a>)</li>
<li>Andrew Hammond (<a href="https://www.linkedin.com/in/andrew-hammond-09344936/">LinkedIn</a>) (<a href="https://twitter.com/spyhistorian">Twitter</a>) (<a href="https://www.spymuseum.org/host-an-event/spy-speaker-series/andrew-hammond/">Website</a>)</li>
</ul><p><br></p><p><strong>Books and References:</strong></p><ul>
<li>
<a href="https://www.amazon.com/gp/product/B08QYZJ13K">Confessions of a CIA Spy: The Art of Human Hacking</a>, by Peter Warmka</li>
<li>
<a href="https://protectnowllc.podbean.com/">The CIA Guy &amp; CIA Spy Podcast</a>, Peter Warmka and Robert Siciliano</li>
<li><a href="https://www.counterintelligence-institute.com/videos">Peter Warmka Videos</a></li>
<li><a href="https://www.spymuseum.org/">International Spy Museum website</a></li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast">SpyCast Podcast</a>, hosted by Andrew Hammond</li>
<li><a href="https://www.intelligence.gov/evolution-of-espionage">INTEL.gov</a></li>
<li>
<a href="https://www.intelligence.gov/evolution-of-espionage">The Evolution of Espionage in America</a>, INTEL.org</li>
</ul><p><br></p><p><strong>Perry's Books</strong></p><ul>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2980</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[496a7ca0-fd66-11ec-8c69-4f9f3f4cec9b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9444237838.mp3?updated=1740074654" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>8th Layer Insights and the Quest for Security Culture</title>
      <description>For this week, we are revisiting a previous episode that first aired as Season 1 Episode 10. In this episode, we discuss the concept of security culture -- specifically, the difficulty that security leaders have in defining what a security culture actually is. Luckily, we can draw on learnings from organizational culture management and culture transformation experts.
Guests for this episode include, David Sturt, Executive Vice President of the O.C. Tanner Institute, author of Great Work: How to Make a Difference People Love and Appreciate: Celebrating People, Inspiring Greatness., Dr. Jessica Barker (co-CEO and Co-Founder, Socio-Technical Lead at Cygenta; author of Confident Cyber Security and co-author of Cybersecurity ABCs), Kai Roer, Chief Research Officer at KnowBe4, creator of the Security Culture Framework, author of Build a Security Culture, and Michael Leckie, founding partner at Silverback Partners, LLC and author of The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good.
Guests:

David Sturt

Dr. Jessica Barker

Kai Roer

Michael Leckie


References, Resources &amp; Books:


Security ABCs Part 1: Make Awareness Transformational, 8Li Season 1, Episode 9


4 Ways to Build a Thoughtful Security Culture, by Perry Carpenter


7 Tips for Building a Strong Security Culture, by Perry Carpenter


Appreciate: Celebrating People, Inspiring Greatness, by David Sturt


Build a Security Culture, by Kai Roer


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Jessica Barker


Culture Rules! The 10 Core Principles of Corporate Culture, by John R. Childress


Cybersecurity ABCs: Delivering awareness, behaviours and culture change, by Jessica Barker, Adrian Davis, and Bruce Hallas


Great Work: How to Make a Difference People Love, by David Sturt


The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good,, by Michael Leckie


The Importance Of A Strong Security Culture And How To Build One, by Perry Carpenter

Perry Carpenter's (ISC)2 Info Security Professional Journal 4 episode series on Security Awareness (Episode 1, Episode 2, Episode 3, Episode 4)


Security Culture and Credential Sharing, KnowBe4 Research


Security Culture Report 2021: A Global Security Culture Perspective During a Pandemic, KnowBe4 Research


Seven Dimensions of Security Culture, KnowBe4 Research


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Nov 2022 04:00:00 -0000</pubDate>
      <itunes:title>8th Layer Insights and the Quest for Security Culture</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>For this week, we are revisiting a previous episode that first aired as Season 1 Episode 10. In this episode, we discuss the concept of security culture -- specifically, the difficulty that security leaders have in defining what a security culture actually is. Luckily, we can draw on learnings from organizational culture management and culture transformation experts.
Guests for this episode include, David Sturt, Executive Vice President of the O.C. Tanner Institute, author of Great Work: How to Make a Difference People Love and Appreciate: Celebrating People, Inspiring Greatness., Dr. Jessica Barker (co-CEO and Co-Founder, Socio-Technical Lead at Cygenta; author of Confident Cyber Security and co-author of Cybersecurity ABCs), Kai Roer, Chief Research Officer at KnowBe4, creator of the Security Culture Framework, author of Build a Security Culture, and Michael Leckie, founding partner at Silverback Partners, LLC and author of The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good.
Guests:

David Sturt

Dr. Jessica Barker

Kai Roer

Michael Leckie


References, Resources &amp; Books:


Security ABCs Part 1: Make Awareness Transformational, 8Li Season 1, Episode 9


4 Ways to Build a Thoughtful Security Culture, by Perry Carpenter


7 Tips for Building a Strong Security Culture, by Perry Carpenter


Appreciate: Celebrating People, Inspiring Greatness, by David Sturt


Build a Security Culture, by Kai Roer


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Jessica Barker


Culture Rules! The 10 Core Principles of Corporate Culture, by John R. Childress


Cybersecurity ABCs: Delivering awareness, behaviours and culture change, by Jessica Barker, Adrian Davis, and Bruce Hallas


Great Work: How to Make a Difference People Love, by David Sturt


The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good,, by Michael Leckie


The Importance Of A Strong Security Culture And How To Build One, by Perry Carpenter

Perry Carpenter's (ISC)2 Info Security Professional Journal 4 episode series on Security Awareness (Episode 1, Episode 2, Episode 3, Episode 4)


Security Culture and Credential Sharing, KnowBe4 Research


Security Culture Report 2021: A Global Security Culture Perspective During a Pandemic, KnowBe4 Research


Seven Dimensions of Security Culture, KnowBe4 Research


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>For this week, we are revisiting a previous episode that first aired as Season 1 Episode 10. In this episode, we discuss the concept of <em>security culture -- </em>specifically, the difficulty that security leaders have in defining what a security culture actually is. Luckily, we can draw on learnings from organizational culture management and culture transformation experts.</p><p>Guests for this episode include, David Sturt, Executive Vice President of the <a href="https://www.octanner.com/company/institute.html">O.C. Tanner Institute</a>, author of <a href="https://www.amazon.com/Great-Work-Make-Difference-People/dp/0071818359/"><em>Great Work: How to Make a Difference People Love</em></a> and <a href="https://www.amazon.com/Appreciate-Celebrating-People-Inspiring-Greatness/dp/0996980806/"><em>Appreciate: Celebrating People, Inspiring Greatness</em></a>., Dr. Jessica Barker (co-CEO and Co-Founder, Socio-Technical Lead at <a href="https://www.cygenta.co.uk/">Cygenta</a>; author of <a href="https://www.confidentcyber.com/">Confident Cyber Security</a> and co-author of <a href="https://www.amazon.com/Cyber-Security-ABCs-Delivering-behaviours/dp/1780174241">Cybersecurity ABCs</a>), Kai Roer, Chief Research Officer at <a href="https://www.knowbe4.com/">KnowBe4</a>, creator of the Security Culture Framework, author of <a href="https://www.amazon.com/Build-Security-Culture-Governance-Publishing/dp/1849287163"><em>Build a Security Culture</em></a>, and Michael Leckie, founding partner at <a href="https://michaelleckie.com/about">Silverback Partners, LLC</a> and author of <a href="https://michaelleckie.com/book"><em>The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good</em></a>.</p><p>Guests:</p><ul>
<li><a href="https://www.linkedin.com/in/dsturt/">David Sturt</a></li>
<li><a href="https://www.linkedin.com/in/jessica-barker/">Dr. Jessica Barker</a></li>
<li><a href="https://www.linkedin.com/in/kairoer/">Kai Roer</a></li>
<li><a href="https://www.linkedin.com/in/mjleckie/">Michael Leckie</a></li>
</ul><p><br></p><p><strong>References, Resources &amp; Books:</strong></p><ul>
<li>
<a href="https://thecyberwire.com/podcasts/8th-layer-insights/9/notes">Security ABCs Part 1: Make Awareness Transformational</a>, 8Li Season 1, Episode 9</li>
<li>
<a href="https://www.securityinfowatch.com/cybersecurity/article/21238675/4-ways-to-build-a-thoughtful-security-culture">4 Ways to Build a Thoughtful Security Culture</a>, by Perry Carpenter</li>
<li>
<a href="https://searchsecurity.techtarget.com/post/7-tips-for-building-a-strong-security-culture">7 Tips for Building a Strong Security Culture</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Appreciate-Celebrating-People-Inspiring-Greatness/dp/0996980806/">Appreciate: Celebrating People, Inspiring Greatness</a>, by David Sturt</li>
<li>
<a href="https://www.amazon.com/Build-Security-Culture-Governance-Publishing/dp/1849287163">Build a Security Culture</a>, by Kai Roer</li>
<li>
<a href="https://www.confidentcyber.com/">Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career</a>, by Jessica Barker</li>
<li>
<a href="https://www.culturerulesbook.com/">Culture Rules! The 10 Core Principles of Corporate Culture</a>, by John R. Childress</li>
<li>
<a href="https://www.amazon.com/Cyber-Security-ABCs-Delivering-behaviours/dp/1780174241">Cybersecurity ABCs: Delivering awareness, behaviours and culture change</a>, by Jessica Barker, Adrian Davis, and Bruce Hallas</li>
<li>
<a href="https://www.amazon.com/Great-Work-Make-Difference-People/dp/0071818359/">Great Work: How to Make a Difference People Love</a>, by David Sturt</li>
<li>
<a href="https://michaelleckie.com/book">The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good</a>,, by Michael Leckie</li>
<li>
<a href="https://www.forbes.com/sites/forbesbusinesscouncil/2021/05/27/the-importance-of-a-strong-security-culture-and-how-to-build-one/?sh=78abe3226d49">The Importance Of A Strong Security Culture And How To Build One</a>, by Perry Carpenter</li>
<li>Perry Carpenter's (ISC)2 Info Security Professional Journal 4 episode series on Security Awareness (<a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/may-jun/ISC2_InfoSecurityProfessional_May-June_2020_R.ashx">Episode 1</a>, <a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/jul-aug/ISC2_InfoSecurityProfessional_Jul-Aug2020_r.ashx">Episode 2</a>, <a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/Sept-Oct/ISC2_InfoSecurityProfessional_Sept-Oct2020.ashx">Episode 3</a>, <a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/nov-dec/ISC2_InfoSecurityProfessional_Nov-Dec2020.ashx">Episode 4</a>)</li>
<li>
<a href="https://get.clt.re/credential-sharing-research/">Security Culture and Credential Sharing</a>, KnowBe4 Research</li>
<li>
<a href="https://www.knowbe4.com/organizational-cyber-security-culture-research-report">Security Culture Report 2021: A Global Security Culture Perspective During a Pandemic</a>, KnowBe4 Research</li>
<li>
<a href="https://get.clt.re/seven-dimensions-security-culture/">Seven Dimensions of Security Culture</a>, KnowBe4 Research</li>
</ul><p><br></p><p><strong>Perry's Books</strong></p><ul>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>4062</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[495a4718-fd66-11ec-8c69-1339f779001b]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1622470679.mp3?updated=1740074778" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social Engineering and Breaking into Stuff with Jenny Radcliffe</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/26/notes</link>
      <description>On this episode, Perry sits down with Jenny Radcliffe (a.k.a. The People Hacker). Jenny is a well-known speaker, podcaster, professional social engineer, and physical penetration tester… in other words, she’s a social engineer who specializes not only in tricking people into doing things they shouldn’t do… but she also specializes getting into places she shouldn’t be and finding things she shouldn’t be able to find. Her job is to embody the criminal mindset and use the skills of a criminal to find the vulnerabilities that a criminal would find.
In this interview, Jenny talks shop about her path to becoming a full time social engineer, the realities of penetration testing, inherent vulnerabilities in buildings and humans, and how to continuously improve at anything.
Guests:
Jenny Radcliffe (LinkedIn) (Twitter) (Website)

Books and References:

Bruce Schneier blog about the Security Mindset

Video -- Jenny Radcliffe: How I Fooled A £2mil Security System


Jenny's interview on the Jordan Harbinger Show

Jenny's interview on Darknet Diaries

Jenny's interview on the Security Mastermind's Podcast


The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick

Harvard Business Review article on the Principles of Persuasion

A blog series Perry did on Deception (Part 1), (Part 2).


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Oct 2022 04:00:00 -0000</pubDate>
      <itunes:title>Social Engineering and Breaking into Stuff with Jenny Radcliffe</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, Perry sits down with Jenny Radcliffe (a.k.a. The People Hacker). Jenny is a well-known speaker, podcaster, professional social engineer, and physical penetration tester… in other words, she’s a social engineer who specializes not only in tricking people into doing things they shouldn’t do… but she also specializes getting into places she shouldn’t be and finding things she shouldn’t be able to find. Her job is to embody the criminal mindset and use the skills of a criminal to find the vulnerabilities that a criminal would find.
In this interview, Jenny talks shop about her path to becoming a full time social engineer, the realities of penetration testing, inherent vulnerabilities in buildings and humans, and how to continuously improve at anything.
Guests:
Jenny Radcliffe (LinkedIn) (Twitter) (Website)

Books and References:

Bruce Schneier blog about the Security Mindset

Video -- Jenny Radcliffe: How I Fooled A £2mil Security System


Jenny's interview on the Jordan Harbinger Show

Jenny's interview on Darknet Diaries

Jenny's interview on the Security Mastermind's Podcast


The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick

Harvard Business Review article on the Principles of Persuasion

A blog series Perry did on Deception (Part 1), (Part 2).


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry sits down with Jenny Radcliffe (a.k.a. <em>The People Hacker</em>). Jenny is a well-known speaker, podcaster, professional social engineer, and physical penetration tester… in other words, she’s a social engineer who specializes not only in tricking people into doing things they shouldn’t do… but she also specializes getting into places she shouldn’t be and finding things she shouldn’t be able to find. Her job is to embody the criminal mindset and use the skills of a criminal to find the vulnerabilities that a criminal would find.</p><p>In this interview, Jenny talks shop about her path to becoming a full time social engineer, the realities of penetration testing, inherent vulnerabilities in buildings and humans, and how to continuously improve at anything.</p><p><strong>Guests</strong>:</p><ul><li>Jenny Radcliffe (<a href="https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/">LinkedIn</a>) (<a href="https://twitter.com/Jenny_Radcliffe">Twitter</a>) (<a href="https://humanfactorsecurity.co.uk/">Website</a>)</li></ul><p><br></p><p><strong>Books and References:</strong></p><ul>
<li>Bruce Schneier <a href="https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html">blog</a> about the Security Mindset</li>
<li>Video -- Jenny Radcliffe: <a href="https://www.youtube.com/watch?v=R3ycxy7DE98&amp;ab_channel=LADbibleTV">How I Fooled A £2mil Security System</a>
</li>
<li><a href="https://www.jordanharbinger.com/jenny-radcliffe-cat-burglar-for-hire/">Jenny's interview on the Jordan Harbinger Show</a></li>
<li><a href="https://darknetdiaries.com/episode/90/">Jenny's interview on Darknet Diaries</a></li>
<li><a href="https://www.podbean.com/media/share/dir-3t9ak-147d1954?utm_campaign=w_share_ep&amp;utm_medium=dlink&amp;utm_source=w_share">Jenny's interview on the Security Mastermind's Podcast</a></li>
<li>
<a href="https://www.amazon.com/Art-Deception-Controlling-Element-Security/dp/076454280X">The Art of Deception: Controlling the Human Element of Security</a> by Kevin Mitnick</li>
<li>Harvard Business Review <a href="https://hbr.org/2013/07/the-uses-and-abuses-of-influence%20">article</a> on the Principles of Persuasion</li>
<li>A blog series Perry did on Deception (<a href="https://www.infosecurity-magazine.com/blogs/deceptioneering-1-human/">Part 1</a>), (<a href="https://www.infosecurity-magazine.com/blogs/deceptioneering-2-principles/">Part 2</a>).</li>
</ul><p><br></p><p><strong>Perry's Books</strong></p><ul>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2061</itunes:duration>
      <guid isPermaLink="false"><![CDATA[494adf58-fd66-11ec-8c69-fbdc7ba6683a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5470881469.mp3?updated=1740074801" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Open Source Intelligence (OSINT): The Data We Leak</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/25/notes</link>
      <description>Over the past few years, there's been a lot of talk about the value of understanding Open Source Intelligence (OSINT). But, even with so much talk, relatively few cybersecurity professionals have had the time to take a deep dive into the topic. In this episode, Perry sits down with social engineer, OSINT investigator, and member of the OSINT Curious project, Christina Lekati to get an overview of the value of OSINT as well as some basic techniques. After that, we hear from Chris Kirsch (co-founder and CEO of runZero). Chris is a former black badge winner at DEF CON's social engineering competition and served as a judge in the most recent competition. He recently released an interesting report analyzing the top OSINT sources and vishing (voice phishing via phone) pretexts from that competition.

Guests:

Christina Lekati (LinkedIn) (Twitter)

Chris Kirsch (LinkedIn) (Twitter)


Books and References:


Top OSINT sources and vishing pretexts from DEF CON’s social engineering competition, research by Chris Kirsch referenced in this episode

YouTube video by Christina Lekati: Protecting High-Value Individuals: An OSINT Workflow


YouTube video: DEF CON 27 Recon Village presentation by Chris Kirsch: Using OSINT for Competitive Intelligence


YouTube Playlist from the 2022 SANS OSINT Summit


YouTube video by The Cyber Mentor: Learn OSINT in 4.5 Hours


The OSINT Curious project

DEFCON Social Engineering Community


15 top open-source intelligence tools, CSO Online


Top 25 OSINT Tools for Penetration Testing, SecurityTrails

WebMii.com

Hunter.io

Wigle.net

Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html



Threat Modeling: Designing for Security by Adam Shostack

What is Threat Modeling: https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/


12 Methods of threat Modeling: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/



The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Oct 2022 04:00:00 -0000</pubDate>
      <itunes:title>Open Source Intelligence (OSINT): The Data We Leak</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Over the past few years, there's been a lot of talk about the value of understanding Open Source Intelligence (OSINT). But, even with so much talk, relatively few cybersecurity professionals have had the time to take a deep dive into the topic. In this episode, Perry sits down with social engineer, OSINT investigator, and member of the OSINT Curious project, Christina Lekati to get an overview of the value of OSINT as well as some basic techniques. After that, we hear from Chris Kirsch (co-founder and CEO of runZero). Chris is a former black badge winner at DEF CON's social engineering competition and served as a judge in the most recent competition. He recently released an interesting report analyzing the top OSINT sources and vishing (voice phishing via phone) pretexts from that competition.

Guests:

Christina Lekati (LinkedIn) (Twitter)

Chris Kirsch (LinkedIn) (Twitter)


Books and References:


Top OSINT sources and vishing pretexts from DEF CON’s social engineering competition, research by Chris Kirsch referenced in this episode

YouTube video by Christina Lekati: Protecting High-Value Individuals: An OSINT Workflow


YouTube video: DEF CON 27 Recon Village presentation by Chris Kirsch: Using OSINT for Competitive Intelligence


YouTube Playlist from the 2022 SANS OSINT Summit


YouTube video by The Cyber Mentor: Learn OSINT in 4.5 Hours


The OSINT Curious project

DEFCON Social Engineering Community


15 top open-source intelligence tools, CSO Online


Top 25 OSINT Tools for Penetration Testing, SecurityTrails

WebMii.com

Hunter.io

Wigle.net

Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html



Threat Modeling: Designing for Security by Adam Shostack

What is Threat Modeling: https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/


12 Methods of threat Modeling: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/



The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds


Perry's Books


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Over the past few years, there's been a lot of talk about the value of understanding Open Source Intelligence (OSINT). But, even with so much talk, relatively few cybersecurity professionals have had the time to take a deep dive into the topic. In this episode, Perry sits down with social engineer, OSINT investigator, and member of the <a href="https://osintcurio.us/">OSINT Curious project</a>, Christina Lekati to get an overview of the value of OSINT as well as some basic techniques. After that, we hear from Chris Kirsch (co-founder and CEO of <a href="https://www.runzero.com/">runZero</a>). Chris is a former black badge winner at DEF CON's social engineering competition and served as a judge in the most recent competition. He recently released an interesting <a href="https://medium.com/@chris.kirsch/top-osint-sources-and-vishing-pretexts-from-def-cons-social-engineering-competition-8e08de4c8ea8">report</a> analyzing the top OSINT sources and vishing (voice phishing via phone) pretexts from that competition.</p><p><br></p><p><strong>Guests</strong>:</p><ul>
<li>Christina Lekati (<a href="https://www.linkedin.com/in/christina-lekati-social-engineering/">LinkedIn</a>) (<a href="https://twitter.com/ChristinaLekati">Twitter</a>)</li>
<li>Chris Kirsch (<a href="https://www.linkedin.com/in/ckirsch/">LinkedIn</a>) (<a href="https://twitter.com/chris_kirsch">Twitter</a>)</li>
</ul><p><br></p><p><strong>Books and References:</strong></p><ul>
<li>
<a href="https://medium.com/@chris.kirsch/top-osint-sources-and-vishing-pretexts-from-def-cons-social-engineering-competition-8e08de4c8ea8">Top OSINT sources and vishing pretexts from DEF CON’s social engineering competition</a>, research by Chris Kirsch referenced in this episode</li>
<li>YouTube video by Christina Lekati: <a href="https://www.youtube.com/watch?v=rE4mORq9T5s&amp;ab_channel=SANSCyberDefense">Protecting High-Value Individuals: An OSINT Workflow</a>
</li>
<li>YouTube video: DEF CON 27 Recon Village presentation by Chris Kirsch: <a href="https://www.youtube.com/watch?v=86QU_6cmc18&amp;ab_channel=ChristianKirsch">Using OSINT for Competitive Intelligence</a>
</li>
<li>YouTube Playlist from the <a href="https://www.youtube.com/watch?v=fbyFp1u2lQY&amp;list=PLs4eo9Tja8biLhHrp8W-N9LheHjUkaSDr&amp;ab_channel=SANSCyberDefense">2022 SANS OSINT Summit</a>
</li>
<li>YouTube video by The Cyber Mentor: <a href="https://www.youtube.com/watch?v=qwA6MmbeGNo&amp;ab_channel=TheCyberMentor">Learn OSINT in 4.5 Hours</a>
</li>
<li><a href="https://osintcurio.us/aboutus/">The OSINT Curious project</a></li>
<li><a href="https://www.se.community/">DEFCON Social Engineering Community</a></li>
<li>
<a href="https://www.csoonline.com/article/3445357/what-is-osint-top-open-source-intelligence-tools.html">15 top open-source intelligence tools</a>, CSO Online</li>
<li>
<a href="https://securitytrails.com/blog/osint-tools">Top 25 OSINT Tools for Penetration Testing</a>, SecurityTrails</li>
<li><a href="WebMii.com">WebMii.com</a></li>
<li><a href="Hunter.io">Hunter.io</a></li>
<li><a href="Wigle.net">Wigle.net</a></li>
<li>Lockheed Martin Cyber Kill-Chain: <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html</a>
</li>
<li>
<a href="https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998">Threat Modeling: Designing for Security</a> by Adam Shostack</li>
<li>What is Threat Modeling: <a href="https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/">https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/</a>
</li>
<li>12 Methods of threat Modeling: <a href="https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/">https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/</a>
</li>
<li>
<a href="https://www.amazon.com/Art-Attack-Attacker-Security-Professionals/dp/1119805465">The Art of Attack: Attacker Mindset for Security Professionals</a> by Maxie Reynolds</li>
</ul><p><br></p><p><strong>Perry's Books</strong></p><ul>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2728</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[493b4f8e-fd66-11ec-8c69-1be5d0ca37ae]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9591072910.mp3?updated=1740074913" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Secrets to Consistently Creating Great Content </title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/24/notes</link>
      <description>In this episode, Perry talks about the value of storytelling and provides 7 tips for anyone who faces the fear associated with staring at a blank screen, wondering how they can begin to create fresh content. This is adapted from a presentation Perry recently gave at the 2022 SANS Security Awareness Summit.
Books &amp; Resources:

Overview of "The Iron Triangle"

Visual Summary of Perry's SANS Security Awareness Summit presentation

YouTube Video: You are not a storyteller - Stefan Sagmeister @ FITC


Security is Alive: 8th Layer Insights, Season 2, episode 6


Creativity for Non Creatives: 8th Layer Insights, Season 2, episode 10


Igniting and Sustaining Creativity: 8th Layer Insights, Season 2, episode 1


Unleashing Trojan Horses for the Mind: 8th Layer Insights, Season 1, episode 1


Steal Like an Artist: 10 Things Nobody Told You About Being Creative, by Austin Kleon


Show Your Work: 10 Ways to Share Your Creativity and Get Discovered,, by Austin Kleon

MasterClass -- Margaret Atwood Teaches Creative Writing

"Everything is Alive" Podcast


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Sep 2022 04:00:00 -0000</pubDate>
      <itunes:title>The Secrets to Consistently Creating Great Content </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Perry talks about the value of storytelling and provides 7 tips for anyone who faces the fear associated with staring at a blank screen, wondering how they can begin to create fresh content. This is adapted from a presentation Perry recently gave at the 2022 SANS Security Awareness Summit.
Books &amp; Resources:

Overview of "The Iron Triangle"

Visual Summary of Perry's SANS Security Awareness Summit presentation

YouTube Video: You are not a storyteller - Stefan Sagmeister @ FITC


Security is Alive: 8th Layer Insights, Season 2, episode 6


Creativity for Non Creatives: 8th Layer Insights, Season 2, episode 10


Igniting and Sustaining Creativity: 8th Layer Insights, Season 2, episode 1


Unleashing Trojan Horses for the Mind: 8th Layer Insights, Season 1, episode 1


Steal Like an Artist: 10 Things Nobody Told You About Being Creative, by Austin Kleon


Show Your Work: 10 Ways to Share Your Creativity and Get Discovered,, by Austin Kleon

MasterClass -- Margaret Atwood Teaches Creative Writing

"Everything is Alive" Podcast


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Perry talks about the value of storytelling and provides 7 tips for anyone who faces the fear associated with staring at a blank screen, wondering how they can begin to create fresh content. This is adapted from a presentation Perry recently gave at the <a href="https://www.sans.org/security-awareness-training/career-development/summits/">2022 SANS Security Awareness Summit</a>.</p><p><strong>Books &amp; Resources:</strong></p><ul>
<li><a href="https://www.projectsmart.co.uk/best-practice/project-management-scope-triangle.php">Overview of "The Iron Triangle"</a></li>
<li><a href="https://images.contentstack.io/v3/assets/blt36c2e63521272fdc/blt706961b254553283/62ec44372a66d4760f00f90e/14_SansAwareness_PerryCarpenter.jpg">Visual Summary of Perry's SANS Security Awareness Summit presentation</a></li>
<li><a href="https://www.youtube.com/watch?v=UlkIVIau1Nk">YouTube Video: You are not a storyteller - Stefan Sagmeister @ FITC</a></li>
<li>
<a href="https://thecyberwire.com/podcasts/8th-layer-insights/16/notes">Security is Alive</a>: 8th Layer Insights, Season 2, episode 6</li>
<li>
<a href="https://thecyberwire.com/podcasts/8th-layer-insights/20/notes">Creativity for Non Creatives</a>: 8th Layer Insights, Season 2, episode 10</li>
<li>
<a href="https://thecyberwire.com/podcasts/8th-layer-insights/11/notes">Igniting and Sustaining Creativity</a>: 8th Layer Insights, Season 2, episode 1</li>
<li>
<a href="https://thecyberwire.com/podcasts/8th-layer-insights/1/notes">Unleashing Trojan Horses for the Mind</a>: 8th Layer Insights, Season 1, episode 1</li>
<li>
<a href="https://austinkleon.com/steal/"><em>Steal Like an Artist: 10 Things Nobody Told You About Being Creative</em></a><em>,</em> by Austin Kleon</li>
<li>
<a href="https://austinkleon.com/show-your-work/"><em>Show Your Work: 10 Ways to Share Your Creativity and Get Discovered</em>,</a>, by Austin Kleon</li>
<li><a href="https://www.masterclass.com/classes/margaret-atwood-teaches-creative-writing">MasterClass -- Margaret Atwood Teaches Creative Writing</a></li>
<li><a href="https://www.everythingisalive.com/">"Everything is Alive" Podcast</a></li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2604</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[492bcb86-fd66-11ec-8c69-971079f469f1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8263941457.mp3?updated=1740074927" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>If It's Smart, It's Vulnerable: a Conversation with Mikko Hyppönen</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/23/notes</link>
      <description>In this episode, Perry sits down with Mikko Hyppönen for a wide ranging discussion about the history, current state, and future of cybersecurity. We also discuss Mikko's new book, the title of which is derived from Hyppönen's Law: If It's Smart, It's Vulnerable.
Guest:
Mikko Hyppönen (LinkedIn) (Twitter) (Web)

Books &amp; Resources:


If It's Smart, It's Vulnerable, by Mikko Hyppönen

Mikko's TED Talks


Daemon, by Daniel Suarez


Internet of Things and data placement, by Dell Technologies


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Sep 2022 04:00:00 -0000</pubDate>
      <itunes:title>If It's Smart, It's Vulnerable: a Conversation with Mikko Hyppönen</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Perry sits down with Mikko Hyppönen for a wide ranging discussion about the history, current state, and future of cybersecurity. We also discuss Mikko's new book, the title of which is derived from Hyppönen's Law: If It's Smart, It's Vulnerable.
Guest:
Mikko Hyppönen (LinkedIn) (Twitter) (Web)

Books &amp; Resources:


If It's Smart, It's Vulnerable, by Mikko Hyppönen

Mikko's TED Talks


Daemon, by Daniel Suarez


Internet of Things and data placement, by Dell Technologies


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Perry sits down with Mikko Hyppönen for a wide ranging discussion about the history, current state, and future of cybersecurity. We also discuss Mikko's new book, the title of which is derived from Hyppönen's Law: <em>If It's Smart, It's Vulnerable</em>.</p><p><strong>Guest:</strong></p><ol><li>Mikko Hyppönen (<a href="https://www.linkedin.com/in/hypponen/">LinkedIn</a>) (<a href="https://twitter.com/mikko">Twitter</a>) (<a href="https://mikko.com/">Web</a>)</li></ol><p><br></p><p><strong>Books &amp; Resources:</strong></p><ul>
<li>
<a href="https://www.wiley.com/en-us/If+It's+Smart,+It's+Vulnerable-p-9781119895206">If It's Smart, It's Vulnerable</a>, by Mikko Hyppönen</li>
<li><a href="https://www.ted.com/speakers/mikko_hypponen">Mikko's TED Talks</a></li>
<li>
<a href="https://www.penguinrandomhouse.com/books/304687/daemon-by-daniel-suarez/">Daemon</a>, by Daniel Suarez</li>
<li>
<a href="https://infohub.delltechnologies.com/l/edge-to-core-and-the-internet-of-things-2/internet-of-things-and-data-placement#:~:text=A%20forecast%20by%20International%20Data,to%20a%20New%20IDC%20Forecast.">Internet of Things and data placement</a>, by Dell Technologies</li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2842</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[491c48be-fd66-11ec-8c69-b3b4b42f5f6e]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3734885850.mp3?updated=1740075188" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Finding Your Path: Mid-Career Moves into Cybersecurity</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/22/notes</link>
      <description>This is a follow-up to Season 2, episode 4 –Bridging the Cyber Skills Gap. Many listeners contacted me saying that they loved the episode, but wished that I’d put more focus on people trying to find a career in cybersecurity later in life. So, consider this episode a Bridging the Cyber Skills Gap Part 2.
We’ll hear the stories of several people who’ve come to cybersecurity a bit later in life. This episode features interviews with Alethe Denis, Tracy Z. Maleeff (a.k.a. InfoSec Sherpa), Phillip Wylie, Lisa Plaggemier, Naomi Buckwalter, and Alyssa Miller.
Guests:

Alethe Denis (LinkedIn) (Twitter) (LinkTree)

Tracy Z. Maleeff (a.k.a. InfoSec Sherpa) (LinkedIn) (Twitter)

Phillip Wylie (LinkedIn) (Twitter) (Medium)

Lisa Plaggemier (LinkedIn) (Twitter)

Naomi Buckwalter (LinkedIn)

Alyssa Miller (LinkedIn) (Twitter) (Website)


Books &amp; Resources:


The Cybersecurity Career Guide, by Alyssa Miller


The Pentester BluePrint: Starting a Career as an Ethical Hacker, by Phillip Wylie

The Hacker Factory Podcast | With Phillip Wylie


Building the Next Generation of Cybersecurity Professionals, LinkedIn Learning course from Naomi Buckwalter

8Li: Fun and Games: Lock Picking, Capture the Flag Contests, Simulations, and More


How to Break Into Cybersecurity, article by Katlyn Gallo


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Aug 2022 04:00:00 -0000</pubDate>
      <itunes:title>Finding Your Path: Mid-Career Moves into Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This is a follow-up to Season 2, episode 4 –Bridging the Cyber Skills Gap. Many listeners contacted me saying that they loved the episode, but wished that I’d put more focus on people trying to find a career in cybersecurity later in life. So, consider this episode a Bridging the Cyber Skills Gap Part 2.
We’ll hear the stories of several people who’ve come to cybersecurity a bit later in life. This episode features interviews with Alethe Denis, Tracy Z. Maleeff (a.k.a. InfoSec Sherpa), Phillip Wylie, Lisa Plaggemier, Naomi Buckwalter, and Alyssa Miller.
Guests:

Alethe Denis (LinkedIn) (Twitter) (LinkTree)

Tracy Z. Maleeff (a.k.a. InfoSec Sherpa) (LinkedIn) (Twitter)

Phillip Wylie (LinkedIn) (Twitter) (Medium)

Lisa Plaggemier (LinkedIn) (Twitter)

Naomi Buckwalter (LinkedIn)

Alyssa Miller (LinkedIn) (Twitter) (Website)


Books &amp; Resources:


The Cybersecurity Career Guide, by Alyssa Miller


The Pentester BluePrint: Starting a Career as an Ethical Hacker, by Phillip Wylie

The Hacker Factory Podcast | With Phillip Wylie


Building the Next Generation of Cybersecurity Professionals, LinkedIn Learning course from Naomi Buckwalter

8Li: Fun and Games: Lock Picking, Capture the Flag Contests, Simulations, and More


How to Break Into Cybersecurity, article by Katlyn Gallo


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This is a follow-up to Season 2, episode 4 –<a href="https://thecyberwire.com/podcasts/8th-layer-insights/14/notes">Bridging the Cyber Skills Gap</a>. Many listeners contacted me saying that they loved the episode, but wished that I’d put more focus on people trying to find a career in cybersecurity later in life. So, consider this episode a <em>Bridging the Cyber Skills Gap Part 2</em>.</p><p>We’ll hear the stories of several people who’ve come to cybersecurity a bit later in life. This episode features interviews with Alethe Denis, Tracy Z. Maleeff (a.k.a. InfoSec Sherpa), Phillip Wylie, Lisa Plaggemier, Naomi Buckwalter, and Alyssa Miller.</p><p><strong>Guests:</strong></p><ol>
<li>Alethe Denis (<a href="https://www.linkedin.com/in/alethe/">LinkedIn</a>) (<a href="https://twitter.com/AletheDenis">Twitter</a>) (<a href="https://linktr.ee/AletheDenis">LinkTree</a>)</li>
<li>Tracy Z. Maleeff (a.k.a. InfoSec Sherpa) (<a href="https://www.linkedin.com/in/tzmaleeff/">LinkedIn</a>) (<a href="https://twitter.com/InfoSecSherpa">Twitter</a>)</li>
<li>Phillip Wylie (<a href="https://www.linkedin.com/in/phillipwylie/">LinkedIn</a>) (<a href="https://twitter.com/PhillipWylie">Twitter</a>) (<a href="https://phillip-wylie.medium.com/">Medium</a>)</li>
<li>Lisa Plaggemier (<a href="https://www.linkedin.com/in/lisaplaggemier/">LinkedIn</a>) (<a href="https://twitter.com/LisaPlaggemier">Twitter</a>)</li>
<li>Naomi Buckwalter (<a href="https://www.linkedin.com/in/naomi-buckwalter/">LinkedIn</a>)</li>
<li>Alyssa Miller (<a href="https://www.linkedin.com/in/alyssam-infosec/">LinkedIn</a>) (<a href="https://twitter.com/AlyssaM_InfoSec">Twitter</a>) (<a href="https://alyssasec.com/">Website</a>)</li>
</ol><p><br></p><p><strong>Books &amp; Resources:</strong></p><ul>
<li>
<a href="https://www.amazon.com/Cyber-Security-Career-Alyssa-Miller/dp/1617298204">The Cybersecurity Career Guide</a>, by Alyssa Miller</li>
<li>
<a href="https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307">The Pentester BluePrint: Starting a Career as an Ethical Hacker</a>, by Phillip Wylie</li>
<li><a href="https://www.itspmagazine.com/the-hacker-factory-podcast">The Hacker Factory Podcast | With Phillip Wylie</a></li>
<li>
<a href="https://www.linkedin.com/learning/building-the-next-generation-of-cybersecurity-professionals/training-today-for-tomorrow-s-solutions">Building the Next Generation of Cybersecurity Professionals</a>, LinkedIn Learning course from Naomi Buckwalter</li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/18/notes">8Li: Fun and Games: Lock Picking, Capture the Flag Contests, Simulations, and More</a></li>
<li>
<a href="https://builtin.com/cybersecurity/cybersecurity-career">How to Break Into Cybersecurity</a>, article by Katlyn Gallo</li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2610</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[490cfaa8-fd66-11ec-8c69-e3098d7363b1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1190232047.mp3?updated=1740075260" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Mindfulness</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/21/notes</link>
      <description>You've probably been hearing the term 'mindfulness' a lot these days. And for good reason. We humans seem to be busier and more stressed out than ever before, and mindfulness practices seem to offer positive benefit. But how does mindfulness intersect with cybersecurity? What practices can we learn and promote to decrease human risk in our organizations and live safer digital lives?
In this episode, we explore the topic of cyber mindfulness. And to do so, we'll be hearing from Anna Collard, Michael Davis, and Yvonne and Jasmine Eskenzi.

Guests:

Anna Collard (LinkedIn) (Twitter) (Company Site)

Michael Davis (LinkedIn) (Company Site)

Yvonne Eskenzi (LinkedIn) (Twitter) (Company Site)

Jasmine Eskenzi (LinkedIn) (Twitter) (Company Site)


Books &amp; Resources:

The Zensory App

Research Paper: The current state of mind: A systematic review of the relationship between mindfulness and mind-wandering


Research Paper: Training to Mitigate Phishing Attacks Using Mindfulness Techniques


Research Paper: Understand the mistakes that compromise your company's security


University of Dayton's Cyber Mindful program overview

The Human Firewall: 3 Mindfulness Techniques Your Team Can Use to Prevent Phishing


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Aug 2022 04:00:00 -0000</pubDate>
      <itunes:title>Cyber Mindfulness</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>You've probably been hearing the term 'mindfulness' a lot these days. And for good reason. We humans seem to be busier and more stressed out than ever before, and mindfulness practices seem to offer positive benefit. But how does mindfulness intersect with cybersecurity? What practices can we learn and promote to decrease human risk in our organizations and live safer digital lives?
In this episode, we explore the topic of cyber mindfulness. And to do so, we'll be hearing from Anna Collard, Michael Davis, and Yvonne and Jasmine Eskenzi.

Guests:

Anna Collard (LinkedIn) (Twitter) (Company Site)

Michael Davis (LinkedIn) (Company Site)

Yvonne Eskenzi (LinkedIn) (Twitter) (Company Site)

Jasmine Eskenzi (LinkedIn) (Twitter) (Company Site)


Books &amp; Resources:

The Zensory App

Research Paper: The current state of mind: A systematic review of the relationship between mindfulness and mind-wandering


Research Paper: Training to Mitigate Phishing Attacks Using Mindfulness Techniques


Research Paper: Understand the mistakes that compromise your company's security


University of Dayton's Cyber Mindful program overview

The Human Firewall: 3 Mindfulness Techniques Your Team Can Use to Prevent Phishing


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>You've probably been hearing the term 'mindfulness' a lot these days. And for good reason. We humans seem to be busier and more stressed out than ever before, and mindfulness practices seem to offer positive benefit. But how does mindfulness intersect with cybersecurity? What practices can we learn and promote to decrease human risk in our organizations and live safer digital lives?</p><p>In this episode, we explore the topic of cyber mindfulness. And to do so, we'll be hearing from Anna Collard, Michael Davis, and Yvonne and Jasmine Eskenzi.</p><p><br></p><p><strong>Guests:</strong></p><ol>
<li>Anna Collard (<a href="https://www.linkedin.com/in/anna-collard-%F0%9F%8C%BB-606817/">LinkedIn</a>) (<a href="https://twitter.com/AnnaCollard3">Twitter</a>) (<a href="https://www.knowbe4.com/">Company Site</a>)</li>
<li>Michael Davis (<a href="https://www.linkedin.com/in/mereksecurity/">LinkedIn</a>) (<a href="https://merek.io/">Company Site</a>)</li>
<li>Yvonne Eskenzi (<a href="https://www.linkedin.com/in/yvonne-eskenzi-602a521/">LinkedIn</a>) (<a href="https://twitter.com/YvonneEskenzi">Twitter</a>) (<a href="https://thezensory.com/">Company Site</a>)</li>
<li>Jasmine Eskenzi (<a href="https://www.linkedin.com/in/jasmine-eskenzi-947336107/">LinkedIn</a>) (<a href="https://twitter.com/jazesk">Twitter</a>) (<a href="https://thezensory.com/">Company Site</a>)</li>
</ol><p><br></p><p><strong>Books &amp; Resources:</strong></p><ul>
<li><a href="https://thezensory.com/">The Zensory App</a></li>
<li>Research Paper: <a href="https://psycnet.apa.org/record/2022-10055-001">The current state of mind: A systematic review of the relationship between mindfulness and mind-wandering</a>
</li>
<li>Research Paper: <a href="https://www.researchgate.net/publication/319171337_Training_to_Mitigate_Phishing_Attacks_Using_Mindfulness_Techniques">Training to Mitigate Phishing Attacks Using Mindfulness Techniques</a>
</li>
<li>Research Paper: <a href="https://www.tessian.com/research/the-psychology-of-human-error/">Understand the mistakes that compromise your company's security</a>
</li>
<li><a href="https://udayton.edu/blogs/cybersecurity/2018/2018-02-28-social_engineering_threats_skill.php">University of Dayton's Cyber Mindful program overview</a></li>
<li><a href="https://ampcreative.com/the-human-firewall-3-mindfulness-techniques-your-team-can-use-to-prevent-phishing/">The Human Firewall: 3 Mindfulness Techniques Your Team Can Use to Prevent Phishing</a></li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2719</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[48fbca1c-fd66-11ec-8c69-ebc4cd4b9426]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6200498291.mp3?updated=1740075429" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lockpicking, Physical Penetration Testing, and More with Deviant Ollam</title>
      <description>On this bonus episode, Perry sits down with physical penetration tester, lock picking guru, and Board Member of The Open Organization of Lockpickers (TOOOL), Deviant Ollam. They discuss lockpicking, physical penetration testing, locksport, and the ethics of teaching these skills.
Guest:
Deviant Ollam (Twitter) (YouTube) (Website)

Books &amp; Resources:

8th Layer Insights S2E8: Fun and Games: Lock Picking, Capture the Flag Contests, Simulations, and More


Lockpicking Resources from Deviant Ollam


Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks, by Deviant Ollam. (Amazon affiliate link)


Practical Lock Picking: A Physical Penetration Tester's Training Guide, by Deviant Ollam. (Amazon affiliate link)

TOOOL US -- The Open Organization of Lockpickers

TOOOL US instructional videos on YouTube

The Official TOOOL Slides

The Lockpicking Lawyer on YouTube


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Jun 2022 04:30:00 -0000</pubDate>
      <itunes:title>Lockpicking, Physical Penetration Testing, and More with Deviant Ollam</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this bonus episode, Perry sits down with physical penetration tester, lock picking guru, and Board Member of The Open Organization of Lockpickers (TOOOL), Deviant Ollam. They discuss lockpicking, physical penetration testing, locksport, and the ethics of teaching these skills.
Guest:
Deviant Ollam (Twitter) (YouTube) (Website)

Books &amp; Resources:

8th Layer Insights S2E8: Fun and Games: Lock Picking, Capture the Flag Contests, Simulations, and More


Lockpicking Resources from Deviant Ollam


Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks, by Deviant Ollam. (Amazon affiliate link)


Practical Lock Picking: A Physical Penetration Tester's Training Guide, by Deviant Ollam. (Amazon affiliate link)

TOOOL US -- The Open Organization of Lockpickers

TOOOL US instructional videos on YouTube

The Official TOOOL Slides

The Lockpicking Lawyer on YouTube


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this bonus episode, Perry sits down with physical penetration tester, lock picking guru, and Board Member of The Open Organization of Lockpickers (TOOOL), Deviant Ollam. They discuss lockpicking, physical penetration testing, locksport, and the ethics of teaching these skills.</p><p><strong>Guest:</strong></p><ul><li>Deviant Ollam (<a href="https://twitter.com/deviantollam">Twitter</a>) (<a href="https://www.youtube.com/user/DeviantOllam">YouTube</a>) (<a href="https://deviating.net/">Website</a>)</li></ul><p><br></p><p><strong>Books &amp; Resources:</strong></p><ul>
<li>8th Layer Insights S2E8: <a href="https://thecyberwire.com/podcasts/8th-layer-insights/18/notes">Fun and Games: Lock Picking, Capture the Flag Contests, Simulations, and More</a>
</li>
<li><a href="https://deviating.net/lockpicking/">Lockpicking Resources from Deviant Ollam</a></li>
<li>
<a href="https://amzn.to/3blqgTG">Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks</a>, by Deviant Ollam. (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3tSErWW">Practical Lock Picking: A Physical Penetration Tester's Training Guide</a>, by Deviant Ollam. (Amazon affiliate link)</li>
<li><a href="https://toool.us/">TOOOL US -- The Open Organization of Lockpickers</a></li>
<li><a href="https://www.youtube.com/c/TOOOL-US">TOOOL US instructional videos on YouTube</a></li>
<li><a href="https://toool.us/resources.html">The Official TOOOL Slides</a></li>
<li><a href="https://www.youtube.com/c/lockpickinglawyer">The Lockpicking Lawyer on YouTube</a></li>
<li>
<a href="https://amzn.to/37hNEzO">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3r0sDR2">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>Email: perry [at] 8thLayerMedia [dot] com</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1598</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22fc09c2-f1df-11ec-a9ac-5b7069f26715]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6508181166.mp3?updated=1740075317" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Lazarus Heist: Investigative Journalism, Podcasting, and North Korean Hacking (with Geoff White)</title>
      <description>On this bonus episode, Perry sits down with investigative journalist, speaker, podcaster, and author, Geoff White to talk about his path into investigative journalism, podcasting, and his new book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War."

Guest:
Geoff White (LinkedIn) (Twitter) (Website)

Books &amp; Podcasts:

Lazarus Heist Book

Lazarus Heist Podcast

Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Jun 2022 05:30:00 -0000</pubDate>
      <itunes:title>The Lazarus Heist: Investigative Journalism, Podcasting, and North Korean Hacking (with Geoff White)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this bonus episode, Perry sits down with investigative journalist, speaker, podcaster, and author, Geoff White to talk about his path into investigative journalism, podcasting, and his new book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War."

Guest:
Geoff White (LinkedIn) (Twitter) (Website)

Books &amp; Podcasts:

Lazarus Heist Book

Lazarus Heist Podcast

Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram

Email: perry [at] 8thLayerMedia [dot] com


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this bonus episode, Perry sits down with investigative journalist, speaker, podcaster, and author, Geoff White to talk about his path into investigative journalism, podcasting, and his new book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War."</p><p><br></p><p><strong>Guest:</strong></p><ul><li>Geoff White (<a href="https://www.linkedin.com/in/geoffwhite247/">LinkedIn</a>) (<a href="https://twitter.com/geoffwhite247">Twitter</a>) (<a href="https://geoffwhite.tech/">Website</a>)</li></ul><p><br></p><p><strong>Books &amp; Podcasts:</strong></p><ul>
<li><a href="https://www.penguin.co.uk/books/447/447163/the-lazarus-heist/9780241554258.html">Lazarus Heist Book</a></li>
<li><a href="https://www.bbc.co.uk/programmes/w13xtvg9/episodes/downloads">Lazarus Heist Podcast</a></li>
<li><a href="https://press.uchicago.edu/ucp/books/book/distributed/C/bo70560367.html">Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global</a></li>
<li>
<a href="https://amzn.to/37hNEzO">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3r0sDR2">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)</li>
</ul><p><br></p><h3><strong>Production Credits:</strong></h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>Email: perry [at] 8thLayerMedia [dot] com</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2693</itunes:duration>
      <guid isPermaLink="false"><![CDATA[d8e6595e-d565-11ec-9a19-5f437b10a7ab]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7388131120.mp3?updated=1740075368" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An Announcement, a Request, and How You Can Win Some $$$</title>
      <description>Please take the listener survey---&gt;&gt;&gt; https://www.surveymonkey.com/r/8LI_Survey &lt;&lt;&lt;---
One of the things that defines 8th Layer Insights is the amount of writing, editing, and production that’s involved. Each episode generally takes about 30 hours of work to complete. And, since this is a personal project, that equates to quite a few late nights and weekends. It can be exhausting… but it’s totally worth it. 
YOU make it worth it.
One of my main goals is ensuring that I’m doing everything possible to make this show sustainable AND continuing to improve and to never sacrifice quality. So – with that being said – I’ll let you in on how I’m planning to do it. Just a couple weeks ago, I created a company called 8th Layer Media and have brought on a brilliant partner – his name is Mason Amadeus. Mason will serve as a co-Creative Director and Production Manager. (like Carl, but more competent). 
Don’t worry – Carl will still be around in season 3 and beyond. It’s hard to unseat Carl. But Mason will play a big part in increasing my capacity.
Here’s where you can help: we need your input on what’s working with the show and what can be improved. We want your honest, unfiltered feedback so that we can make a show that isn’t just good – it’s great… consistently great. We also want to get information on how you first found out about 8th Layer Insights, what topics you want the show to explore and more.
We even want to know if you have better ideas for the name of the show. …Seriously, if you submit an alternate show name, and we decide to adopt that name, you’ll win a $300 Amazon gift card. There will be other prizes as well.
If you’re ready to help shape the future of 8th Layer Insights, take the survey: https://www.surveymonkey.com/r/8LI_Survey
Survey closes Friday, June 3, 2022.

Perry's Books:


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Wondering who Mason is? Here are a few links:

Twitter (@itsMasonAmadeus)

Website (https://masonamadeus.com/)

Podcast (PodCube)


Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerMedia [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 May 2022 04:00:00 -0000</pubDate>
      <itunes:title>An Announcement, a Request, and How You Can Win Some $$$</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please take the listener survey---&gt;&gt;&gt; https://www.surveymonkey.com/r/8LI_Survey &lt;&lt;&lt;---
One of the things that defines 8th Layer Insights is the amount of writing, editing, and production that’s involved. Each episode generally takes about 30 hours of work to complete. And, since this is a personal project, that equates to quite a few late nights and weekends. It can be exhausting… but it’s totally worth it. 
YOU make it worth it.
One of my main goals is ensuring that I’m doing everything possible to make this show sustainable AND continuing to improve and to never sacrifice quality. So – with that being said – I’ll let you in on how I’m planning to do it. Just a couple weeks ago, I created a company called 8th Layer Media and have brought on a brilliant partner – his name is Mason Amadeus. Mason will serve as a co-Creative Director and Production Manager. (like Carl, but more competent). 
Don’t worry – Carl will still be around in season 3 and beyond. It’s hard to unseat Carl. But Mason will play a big part in increasing my capacity.
Here’s where you can help: we need your input on what’s working with the show and what can be improved. We want your honest, unfiltered feedback so that we can make a show that isn’t just good – it’s great… consistently great. We also want to get information on how you first found out about 8th Layer Insights, what topics you want the show to explore and more.
We even want to know if you have better ideas for the name of the show. …Seriously, if you submit an alternate show name, and we decide to adopt that name, you’ll win a $300 Amazon gift card. There will be other prizes as well.
If you’re ready to help shape the future of 8th Layer Insights, take the survey: https://www.surveymonkey.com/r/8LI_Survey
Survey closes Friday, June 3, 2022.

Perry's Books:


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Wondering who Mason is? Here are a few links:

Twitter (@itsMasonAmadeus)

Website (https://masonamadeus.com/)

Podcast (PodCube)


Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerMedia [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Please take the listener survey---&gt;&gt;&gt;</strong> <a href="https://bit.ly/8Li_Survey">https://www.surveymonkey.com/r/8LI_Survey</a> <strong>&lt;&lt;&lt;---</strong></p><p>One of the things that defines 8th Layer Insights is the amount of writing, editing, and production that’s involved. Each episode generally takes about 30 hours of work to complete. And, since this is a personal project, that equates to quite a few late nights and weekends. It can be exhausting… but it’s totally worth it. </p><p>YOU make it worth it.</p><p>One of my main goals is ensuring that I’m doing everything possible to make this show sustainable AND continuing to improve and to never sacrifice quality. So – with that being said – I’ll let you in on how I’m planning to do it. Just a couple weeks ago, I created a company called 8th Layer Media and have brought on a brilliant partner – his name is Mason Amadeus. Mason will serve as a co-Creative Director and Production Manager. (like Carl, but more competent). </p><p>Don’t worry – Carl will still be around in season 3 and beyond. It’s hard to unseat Carl. But Mason will play a big part in increasing my capacity.</p><p><strong>Here’s where you can help</strong>: we need your input on what’s working with the show and what can be improved. We want your honest, unfiltered feedback so that we can make a show that isn’t just good – it’s great… consistently great. We also want to get information on how you first found out about 8th Layer Insights, what topics you want the show to explore and more.</p><p>We even want to know if you have better ideas for the name of the show. …Seriously, if you submit an alternate show name, and we decide to adopt that name, you’ll win a <strong>$300 Amazon gift card</strong>. There will be other prizes as well.</p><p><strong>If you’re ready to help shape the future of 8th Layer Insights, take the survey: </strong><a href="https://bit.ly/8Li_Survey">https://www.surveymonkey.com/r/8LI_Survey</a></p><p><strong>Survey closes Friday, June 3, 2022.</strong></p><p><br></p><p><strong>Perry's Books:</strong></p><ul>
<li>
<a href="https://amzn.to/37hNEzO">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3r0sDR2">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)</li>
</ul><p><br></p><p><strong>Wondering who Mason is? Here are a few links:</strong></p><ul>
<li>Twitter (<a href="https://twitter.com/itsMasonAmadeus">@itsMasonAmadeus</a>)</li>
<li>Website (<a href="https://masonamadeus.com/">https://masonamadeus.com/</a>)</li>
<li>Podcast (<a href="https://podcasts.apple.com/podcast/id1589888955">PodCube</a>)</li>
</ul><p><br></p><h3><strong>Want to get in touch with Perry? Here's how:</strong></h3><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerMedia</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8f48114-d565-11ec-9a19-ab63566f2874]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW6345266162.mp3?updated=1740075350" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An Interview with a Password</title>
      <description>If you could interview a password, what questions would you ask?
Today, May 5th, 2022 is World Password Day. World Password Day was first established in 2013 and is celebrated each year on the 1st Thursday in May. To celebrate, I thought it would be fun to share an excerpt of a previous episode ("Security is Alive") where I interviewed multiple security-related objects. This clip is my interview with Dave the Password.
Stick around after the interview for a few password-related tips and best practices!
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 May 2022 20:30:00 -0000</pubDate>
      <itunes:title>An Interview with a Password</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>If you could interview a password, what questions would you ask?
Today, May 5th, 2022 is World Password Day. World Password Day was first established in 2013 and is celebrated each year on the 1st Thursday in May. To celebrate, I thought it would be fun to share an excerpt of a previous episode ("Security is Alive") where I interviewed multiple security-related objects. This clip is my interview with Dave the Password.
Stick around after the interview for a few password-related tips and best practices!
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>If you could interview a password, what questions would you ask?</p><p>Today, May 5th, 2022 is World Password Day. World Password Day was first established in 2013 and is celebrated each year on the 1st Thursday in May. To celebrate, I thought it would be fun to share an excerpt of a previous episode ("<a href="https://thecyberwire.com/podcasts/8th-layer-insights/16/notes">Security is Alive</a>") where I interviewed multiple security-related objects. This clip is my interview with Dave the Password.</p><p>Stick around after the interview for a few password-related tips and best practices!</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce22089e-ccad-11ec-bf5e-e716d4984ac1]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9382584600.mp3?updated=1651783517" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Creativity for Non-Creatives</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/20/notes</link>
      <description>Creativity can be a scary topic for technologists. Most of us haven't been trained in the art and science of creativity and so they either feel out of their depth when called on to create content. But it doesn't have to be that way. In this episode, Perry sits down with New York Times bestselling author, Michelle Richmond, Audible bestselling author Rob Dircks, and two critically acclaimed cybersecurity podcasters, Ran Levi (creator and host of the Malicious Life podcast) and David Spark (creator and host of the CISO Series podcast) to discuss creativity, how to create relatable content, and how to communicate technology-related content in clear and compelling ways.
Guests:

Ran Levi (LinkedIn) (Website)

David Spark (LinkedIn) (Website)

Michelle Richmond (LinkedIn) (Website) (Amazon Page)

Rob Dircks (LinkedIn) (Website) (Amazon Page)


Books and Resources:

8Li Season 1, Episode 1: Unleashing Trojan Horses for the Mind

8Li Season 2, Episode 1: Igniting and Sustaining Creativity

8Li Season 2, Episode 2: You're Listening to "The Dark Stream"

8Li Season 2, Episode 3: Technology &amp; the Law of Unintended Consequences

8Li Season 2, Episode 6: Security is Alive


"Malicious Life" Podcast, Ran Levi


"CISO Series" Podcast, David Spark


How do you explain virtualization to your mom? -- David Spark video

"Everything is Alive" Podcast

"Writing Excuses" Podcast


The Wonder Test: A Novel, by Michelle Richmond (Amazon affiliate link)


The Marriage Pact: A Novel, by Michelle Richmond (Amazon affiliate link)


Where the Hell is Tesla? A Novel, by Rob Dircks (Amazon affiliate link)


You're Going to Mars (An Audible Original), by Rob Dircks (Amazon affiliate link)


Story: Substance, Structure, Style and the Principles of Screenwriting, by Robert McKee (Amazon affiliate link)


HBR Guide to Persuasive Presentations (HBR Guide Series), by Nancy Duarte (Amazon affiliate link)


Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life, by Roy Sutherland (Amazon affiliate link)


How Creativity Rules the World: The Art and Business of Turning Your Ideas into Gold, by Maria Brito (Amazon affiliate link)


On Writing: A Memoir of the Craft, by Stephen King (Amazon affiliate link)


You Are an Artist: Assignments to Spark Creation, by Sarah Urist Green


Ticktime Pomodoro Timer (Amazon affiliate link)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerMedia [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 May 2022 04:00:00 -0000</pubDate>
      <itunes:title>Creativity for Non-Creatives</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Creativity can be a scary topic for technologists. Most of us haven't been trained in the art and science of creativity and so they either feel out of their depth when called on to create content. But it doesn't have to be that way. In this episode, Perry sits down with New York Times bestselling author, Michelle Richmond, Audible bestselling author Rob Dircks, and two critically acclaimed cybersecurity podcasters, Ran Levi (creator and host of the Malicious Life podcast) and David Spark (creator and host of the CISO Series podcast) to discuss creativity, how to create relatable content, and how to communicate technology-related content in clear and compelling ways.
Guests:

Ran Levi (LinkedIn) (Website)

David Spark (LinkedIn) (Website)

Michelle Richmond (LinkedIn) (Website) (Amazon Page)

Rob Dircks (LinkedIn) (Website) (Amazon Page)


Books and Resources:

8Li Season 1, Episode 1: Unleashing Trojan Horses for the Mind

8Li Season 2, Episode 1: Igniting and Sustaining Creativity

8Li Season 2, Episode 2: You're Listening to "The Dark Stream"

8Li Season 2, Episode 3: Technology &amp; the Law of Unintended Consequences

8Li Season 2, Episode 6: Security is Alive


"Malicious Life" Podcast, Ran Levi


"CISO Series" Podcast, David Spark


How do you explain virtualization to your mom? -- David Spark video

"Everything is Alive" Podcast

"Writing Excuses" Podcast


The Wonder Test: A Novel, by Michelle Richmond (Amazon affiliate link)


The Marriage Pact: A Novel, by Michelle Richmond (Amazon affiliate link)


Where the Hell is Tesla? A Novel, by Rob Dircks (Amazon affiliate link)


You're Going to Mars (An Audible Original), by Rob Dircks (Amazon affiliate link)


Story: Substance, Structure, Style and the Principles of Screenwriting, by Robert McKee (Amazon affiliate link)


HBR Guide to Persuasive Presentations (HBR Guide Series), by Nancy Duarte (Amazon affiliate link)


Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life, by Roy Sutherland (Amazon affiliate link)


How Creativity Rules the World: The Art and Business of Turning Your Ideas into Gold, by Maria Brito (Amazon affiliate link)


On Writing: A Memoir of the Craft, by Stephen King (Amazon affiliate link)


You Are an Artist: Assignments to Spark Creation, by Sarah Urist Green


Ticktime Pomodoro Timer (Amazon affiliate link)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerMedia [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Creativity can be a scary topic for technologists. Most of us haven't been trained in the art and science of creativity and so they either feel out of their depth when called on to create content. But it doesn't have to be that way. In this episode, Perry sits down with New York Times bestselling author, Michelle Richmond, Audible bestselling author Rob Dircks, and two critically acclaimed cybersecurity podcasters, Ran Levi (creator and host of the Malicious Life podcast) and David Spark (creator and host of the CISO Series podcast) to discuss creativity, how to create relatable content, and how to communicate technology-related content in clear and compelling ways.</p><p><strong>Guests:</strong></p><ul>
<li>Ran Levi (<a href="https://www.linkedin.com/in/ranlevi">LinkedIn</a>) (<a href="https://malicious.life/">Website</a>)</li>
<li>David Spark (<a href="https://www.linkedin.com/in/davidspark/">LinkedIn</a>) (<a href="https://cisoseries.com/series">Website</a>)</li>
<li>Michelle Richmond (<a href="https://www.linkedin.com/in/michellerichmond1/">LinkedIn</a>) (<a href="http://michellerichmond.com/">Website</a>) (<a href="https://amzn.to/373JPOJ">Amazon Page</a>)</li>
<li>Rob Dircks (<a href="https://www.linkedin.com/in/robdircks/">LinkedIn</a>) (<a href="https://robdircks.com/">Website</a>) (<a href="https://amzn.to/3F1nsWK">Amazon Page</a>)</li>
</ul><p><br></p><p><strong>Books and Resources</strong>:</p><ul>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/1/notes">8Li Season 1, Episode 1: Unleashing Trojan Horses for the Mind</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/11/notes">8Li Season 2, Episode 1: Igniting and Sustaining Creativity</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/12/notes">8Li Season 2, Episode 2: You're Listening to "The Dark Stream"</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/13/notes">8Li Season 2, Episode 3: Technology &amp; the Law of Unintended Consequences</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/16/notes">8Li Season 2, Episode 6: Security is Alive</a></li>
<li>
<a href="https://malicious.life/">"Malicious Life" Podcast</a>, Ran Levi</li>
<li>
<a href="https://cisoseries.com/">"CISO Series" Podcast</a>, David Spark</li>
<li>
<a href="https://www.youtube.com/watch?v=o8JXiCYNuDo">How do you explain virtualization to your mom?</a> -- David Spark video</li>
<li><a href="https://www.everythingisalive.com/">"Everything is Alive" Podcast</a></li>
<li><a href="https://writingexcuses.com/">"Writing Excuses" Podcast</a></li>
<li>
<a href="https://amzn.to/3F3DRKe">The Wonder Test: A Novel</a>, by Michelle Richmond (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3vyiQUW">The Marriage Pact: A Novel</a>, by Michelle Richmond (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3kA1tg0">Where the Hell is Tesla? A Novel</a>, by Rob Dircks (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3vYrQSo">You're Going to Mars (An Audible Original)</a>, by Rob Dircks (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/37ZznID">Story: Substance, Structure, Style and the Principles of Screenwriting</a>, by Robert McKee (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/39k0sX9">HBR Guide to Persuasive Presentations (HBR Guide Series)</a>, by Nancy Duarte (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3s4AjCb">Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life</a>, by Roy Sutherland (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/373gLad">How Creativity Rules the World: The Art and Business of Turning Your Ideas into Gold</a>, by Maria Brito (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3s4yJ3d">On Writing: A Memoir of the Craft</a>, by Stephen King (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3F3t6rm">You Are an Artist: Assignments to Spark Creation</a>, by Sarah Urist Green</li>
<li>
<a href="https://amzn.to/38GpXBB">Ticktime Pomodoro Timer </a>(Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/37hNEzO">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3r0sDR2">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)</li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p><br></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerMedia</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>4242</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f76712f0-6388-11ec-b100-37f6e0d2c0e2]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9107245142.mp3?updated=1740075502" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Next Evolution of Security Awareness</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/19/notes</link>
      <description>"Security Awareness" is a slippery topic for a lot of people. It's a well known phrase -- and, let's face it, it's a phrase that can be very misleading. In this episode, Perry sits down with Dr. Jessica Barker (author and co-CEO at Cygenta), Cassie Clark (Security Awareness Lead Engineer at Brex), John Scott (Head of Security Education at Bank of England), and Lance Spitzner (Director, SANS Institute: Founder, Honeynet Project) to discuss what is currently being done well and, more importantly, where it needs to grow over the next few years. Spoiler alert: it's all about managing human risk.
Guests:

Dr. Jessica Barker (LinkedIn) (Twitter)

Cassie Clark (LinkedIn) (Twitter)

John Scott (LinkedIn) (Twitter)

Lance Spitzner (LinkedIn) (Twitter)


Books and Resources:

8Li S1 E9: Security ABCs Part 1: Make Awareness Transformational

8Li S1 E10: Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture


Cybersecurity ABCs: Delivering awareness, behaviours and culture change by Jessica Barker, Adrian Davis, Bruce Hallas, &amp; Ciarán Mc Mahon


A Data-Driven Computer Defense: A Way to Improve Any Computer Defense by Roger A. Grimes


Security Awareness Program Builder: Practical guidelines for building your Information Security Awareness Program &amp; prep guide for the Security Awareness and Culture Professional (SACP)™ by Mark Majewski


People-Centric Security: Transforming Your Enterprise Security Culture by Lance Hayden


Start with Why: How Great Leaders Inspire Everyone to Take Action by Simon Sinek (Amazon affiliate link)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Apr 2022 04:00:00 -0000</pubDate>
      <itunes:title>The Next Evolution of Security Awareness</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>"Security Awareness" is a slippery topic for a lot of people. It's a well known phrase -- and, let's face it, it's a phrase that can be very misleading. In this episode, Perry sits down with Dr. Jessica Barker (author and co-CEO at Cygenta), Cassie Clark (Security Awareness Lead Engineer at Brex), John Scott (Head of Security Education at Bank of England), and Lance Spitzner (Director, SANS Institute: Founder, Honeynet Project) to discuss what is currently being done well and, more importantly, where it needs to grow over the next few years. Spoiler alert: it's all about managing human risk.
Guests:

Dr. Jessica Barker (LinkedIn) (Twitter)

Cassie Clark (LinkedIn) (Twitter)

John Scott (LinkedIn) (Twitter)

Lance Spitzner (LinkedIn) (Twitter)


Books and Resources:

8Li S1 E9: Security ABCs Part 1: Make Awareness Transformational

8Li S1 E10: Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture


Cybersecurity ABCs: Delivering awareness, behaviours and culture change by Jessica Barker, Adrian Davis, Bruce Hallas, &amp; Ciarán Mc Mahon


A Data-Driven Computer Defense: A Way to Improve Any Computer Defense by Roger A. Grimes


Security Awareness Program Builder: Practical guidelines for building your Information Security Awareness Program &amp; prep guide for the Security Awareness and Culture Professional (SACP)™ by Mark Majewski


People-Centric Security: Transforming Your Enterprise Security Culture by Lance Hayden


Start with Why: How Great Leaders Inspire Everyone to Take Action by Simon Sinek (Amazon affiliate link)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>"Security Awareness" is a slippery topic for a lot of people. It's a well known phrase -- and, let's face it, it's a phrase that can be very misleading. In this episode, Perry sits down with Dr. Jessica Barker (author and co-CEO at Cygenta), Cassie Clark (Security Awareness Lead Engineer at Brex), John Scott (Head of Security Education at Bank of England), and Lance Spitzner (Director, SANS Institute: Founder, Honeynet Project) to discuss what is currently being done well and, more importantly, where it needs to grow over the next few years. Spoiler alert: it's all about managing human risk.</p><p><strong>Guests</strong>:</p><ul>
<li>Dr. Jessica Barker (<a href="https://www.linkedin.com/in/jessica-barker/">LinkedIn</a>) (<a href="https://twitter.com/drjessicabarker">Twitter</a>)</li>
<li>Cassie Clark (<a href="https://www.linkedin.com/in/cassieclark/">LinkedIn</a>) (<a href="https://twitter.com/cassomatic">Twitter</a>)</li>
<li>John Scott (<a href="https://www.linkedin.com/in/johnfscott/">LinkedIn</a>) (<a href="https://twitter.com/wildpark">Twitter</a>)</li>
<li>Lance Spitzner (<a href="https://www.linkedin.com/in/lancespitzner/">LinkedIn</a>) (<a href="https://twitter.com/lspitzner">Twitter</a>)</li>
</ul><p><br></p><p><strong>Books and Resources</strong>:</p><ul>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/9/notes">8Li S1 E9: Security ABCs Part 1: Make Awareness Transformational</a></li>
<li><a href="https://thecyberwire.com/podcasts/8th-layer-insights/10/notes">8Li S1 E10: Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture</a></li>
<li>
<a href="https://amzn.to/37iTGjK">Cybersecurity ABCs: Delivering awareness, behaviours and culture change</a> by Jessica Barker, Adrian Davis, Bruce Hallas, &amp; Ciarán Mc Mahon</li>
<li>
<a href="https://amzn.to/3KQsPKv">A Data-Driven Computer Defense: A Way to Improve Any Computer Defense</a> by Roger A. Grimes</li>
<li>
<a href="https://amzn.to/37j7E5i">Security Awareness Program Builder: Practical guidelines for building your Information Security Awareness Program &amp; prep guide for the Security Awareness and Culture Professional (SACP)™</a> by Mark Majewski</li>
<li>
<a href="https://amzn.to/3uJ72il">People-Centric Security: Transforming Your Enterprise Security Culture</a> by Lance Hayden</li>
<li>
<a href="https://amzn.to/3EesL4E">Start with Why: How Great Leaders Inspire Everyone to Take Action</a> by Simon Sinek (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/37hNEzO">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter (Amazon affiliate link)</li>
<li>
<a href="https://amzn.to/3r0sDR2">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer (Amazon affiliate link)</li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p><br></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerInsights</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2900</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f744a10c-6388-11ec-b100-d7b34c4725a7]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9932545690.mp3?updated=1740075525" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Why Are We So Bad At Risk?</title>
      <description>Risk is a funny thing – our minds are constantly looking for risk, scanning our environments and our available choices. And sometimes we do a great job at anticipating and avoiding risky situations. But that doesn’t mean that we are universally good at dealing with risk. In fact, we can be downright appalling at considering and avoiding risk.
In this episode, we explore the concept of risk, why we're so bad at understanding it, and the steps we can take to improve. Perry speaks with four risk experts who will help us understand the ups and downs of how we evaluate risk. We’ll touch on everything from Black Swans to Grey Rhinos to risk frameworks, risk equations, inbuilt risk in the design of computing interfaces, and more. Featuring Michele Wucker (author of The Grey Rhino and You Are What You Risk), Christian Hunt (Founder of Human Risk), Dr. Arun Vishwanath (Founder and Chief Technology Officer of Avant Research Group), and Matt Stamper (Chief Information Security Officer and Executive Advisor at EVOTEK and co-author of the CISO Desk Reference Guides vol1 &amp; vol2).
Original release date: Aug 31, 2021.
Guests:

Michele Wucker

Christian Hunt

Arun Vishwanath

Matt Stamper


Resources &amp; Books:

Black Swan Theory

Grey Rhino Events


Various Risk Equations



Risk Perception Equation, Freakonomics


20 Cognitive Biases That Affect Risk Decision Making, SafetyRisk.net


Factor Analysis of Information Risk (FAIR) Framework


The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore, by Michele Wucker (Amazon Affiliate Link)


You Are What You Risk: The New Art and Science of Navigating an Uncertain World, by Michele Wucker (Amazon Affiliate Link)


Why are Humans Bad at Calculating Risk?, Cogency


Why You're Probably Not So Great at Risk Assessment, NY Times


Why the Human Brain is a Poor Judge of Risk, Wired


Humans are Terrible at Assessing Risk, by Kimberly Forsythe


Why We're Awful at Assessing Risk, USA Today


CISO Desk Reference Guides vol1 &amp; vol2, by Bill Bonney, Gary Hayslip, Matt Stamper (Amazon Affiliate Link)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon Affiliate Link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon Affiliate Link)


Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>Why Are We So Bad At Risk?</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Risk is a funny thing – our minds are constantly looking for risk, scanning our environments and our available choices. And sometimes we do a great job at anticipating and avoiding risky situations. But that doesn’t mean that we are universally good at dealing with risk. In fact, we can be downright appalling at considering and avoiding risk.
In this episode, we explore the concept of risk, why we're so bad at understanding it, and the steps we can take to improve. Perry speaks with four risk experts who will help us understand the ups and downs of how we evaluate risk. We’ll touch on everything from Black Swans to Grey Rhinos to risk frameworks, risk equations, inbuilt risk in the design of computing interfaces, and more. Featuring Michele Wucker (author of The Grey Rhino and You Are What You Risk), Christian Hunt (Founder of Human Risk), Dr. Arun Vishwanath (Founder and Chief Technology Officer of Avant Research Group), and Matt Stamper (Chief Information Security Officer and Executive Advisor at EVOTEK and co-author of the CISO Desk Reference Guides vol1 &amp; vol2).
Original release date: Aug 31, 2021.
Guests:

Michele Wucker

Christian Hunt

Arun Vishwanath

Matt Stamper


Resources &amp; Books:

Black Swan Theory

Grey Rhino Events


Various Risk Equations



Risk Perception Equation, Freakonomics


20 Cognitive Biases That Affect Risk Decision Making, SafetyRisk.net


Factor Analysis of Information Risk (FAIR) Framework


The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore, by Michele Wucker (Amazon Affiliate Link)


You Are What You Risk: The New Art and Science of Navigating an Uncertain World, by Michele Wucker (Amazon Affiliate Link)


Why are Humans Bad at Calculating Risk?, Cogency


Why You're Probably Not So Great at Risk Assessment, NY Times


Why the Human Brain is a Poor Judge of Risk, Wired


Humans are Terrible at Assessing Risk, by Kimberly Forsythe


Why We're Awful at Assessing Risk, USA Today


CISO Desk Reference Guides vol1 &amp; vol2, by Bill Bonney, Gary Hayslip, Matt Stamper (Amazon Affiliate Link)


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon Affiliate Link)


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer (Amazon Affiliate Link)


Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Risk is a funny thing – our minds are constantly looking for risk, scanning our environments and our available choices. And sometimes we do a great job at anticipating and avoiding risky situations. But that doesn’t mean that we are universally good at dealing with risk. In fact, we can be downright appalling at considering and avoiding risk.</p><p>In this episode, we explore the concept of risk, why we're so bad at understanding it, and the steps we can take to improve. Perry speaks with four risk experts who will help us understand the ups and downs of how we evaluate risk. We’ll touch on everything from Black Swans to Grey Rhinos to risk frameworks, risk equations, inbuilt risk in the design of computing interfaces, and more. Featuring Michele Wucker (author of <a href="https://www.amazon.com/Gray-Rhino-Recognize-Obvious-Dangers/dp/125005382X">The Grey Rhino</a> and <a href="https://www.amazon.com/You-Are-What-Risk-Navigating/dp/164313678X">You Are What You Risk</a>), Christian Hunt (Founder of <a href="https://www.human-risk.com/">Human Risk</a>), Dr. Arun Vishwanath (Founder and Chief Technology Officer of <a href="https://www.avantresearchgroup.com/">Avant Research Group</a>), and Matt Stamper (Chief Information Security Officer and Executive Advisor at <a href="https://www.evotek.com/">EVOTEK</a> and co-author of the <a href="https://cisodrg.com/">CISO Desk Reference Guides</a> <a href="https://www.amazon.com/CISO-Desk-Reference-Guide-Practical/dp/0997744154">vol1</a> &amp; <a href="https://www.amazon.com/CISO-Desk-Reference-Guide-Practical/dp/0997744146/">vol2</a>).</p><p><u>Original release date: Aug 31, 2021.</u></p><p><strong>Guests:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/wucker/">Michele Wucker</a></li>
<li><a href="https://www.linkedin.com/in/humanrisk/">Christian Hunt</a></li>
<li><a href="https://www.linkedin.com/in/arun-vishwanath-31a52912/">Arun Vishwanath</a></li>
<li><a href="https://www.linkedin.com/in/stamper/">Matt Stamper</a></li>
</ul><p><br></p><p><strong>Resources &amp; Books:</strong></p><ul>
<li><a href="https://en.wikipedia.org/wiki/Black_swan_theory">Black Swan Theory</a></li>
<li><a href="https://www.oilspillresponse.com/news--media/insights/preparing-for-a-grey-rhino-event/">Grey Rhino Events</a></li>
<li>
<a href="https://securityintelligence.com/simplifying-risk-management/">Various</a> <a href="http://www.icharter.org/articles/risk_equation.html">Risk</a> <a href="https://www.redrisks.com/what-is-risk-and-the-risk-equation/">Equations</a>
</li>
<li>
<a href="https://freakonomics.com/2011/11/29/risk-hazard-outrage-a-conversation-with-risk-consultant-peter-sandman/#:~:text=To%20accomplish%20all%20this%2C%20Sandman,%3A%20Risk%20%3D%20Hazard%20%2B%20Outrage.">Risk Perception Equation</a>, Freakonomics</li>
<li>
<a href="https://safetyrisk.net/20-cognitive-biases-that-affect-risk-decision-making/#comments">20 Cognitive Biases That Affect Risk Decision Making</a>, SafetyRisk.net</li>
<li>
<a href="https://en.wikipedia.org/wiki/Factor_analysis_of_information_risk">Factor Analysis of Information Risk</a> (<a href="https://www.fairinstitute.org/what-is-fair">FAIR</a>) Framework</li>
<li>
<a href="https://amzn.to/36Xcl4t">The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore</a>, by Michele Wucker (Amazon Affiliate Link)</li>
<li>
<a href="https://amzn.to/3j8fjWc">You Are What You Risk: The New Art and Science of Navigating an Uncertain World</a>, by Michele Wucker (Amazon Affiliate Link)</li>
<li>
<a href="https://www.cogencyteam.com/news/2018/02/why-are-humans-bad-at-calculating-risk/">Why are Humans Bad at Calculating Risk?</a>, Cogency</li>
<li>
<a href="https://www.nytimes.com/2020/06/30/smarter-living/why-youre-probably-not-so-great-at-risk-assessment.html">Why You're Probably Not So Great at Risk Assessment</a>, NY Times</li>
<li>
<a href="https://www.wired.com/2007/03/security-matters0322/">Why the Human Brain is a Poor Judge of Risk</a>, Wired</li>
<li>
<a href="https://medium.com/disrupt-or-be-disrupted/humans-are-terrible-at-assessing-risk-a84992ca3e16">Humans are Terrible at Assessing Risk</a>, by Kimberly Forsythe</li>
<li>
<a href="https://www.usatoday.com/story/money/personalfinance/2014/03/17/why-were-awful-at-assessing-risk/6530753/">Why We're Awful at Assessing Risk</a>, USA Today</li>
<li>
<a href="https://cisodrg.com/">CISO Desk Reference Guides</a> <a href="https://amzn.to/3u5A3Eo">vol1</a> &amp; <a href="https://amzn.to/36UxIDF">vol2</a>, by Bill Bonney, Gary Hayslip, Matt Stamper (Amazon Affiliate Link)</li>
<li>
<a href="https://amzn.to/37hNEzO">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter (Amazon Affiliate Link)</li>
<li>
<a href="https://amzn.to/3r0sDR2">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer (Amazon Affiliate Link)</li>
</ul><p><br></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3107</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9858a6a2-b180-11ec-b02a-b352279f1223]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5401323157.mp3?updated=1649083808" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fun and Games: Lock Picking, Capture the Flag Contests, Simulations, and More</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/18/notes</link>
      <description>What images come to mind when you see or hear the word 'Cybersecurity?' That word probably evokes mental images of people hunched over keyboards launching cyberattacks at each other. Or maybe you picture someone picking a lock or stealing a badge to slip into a building. In other words, most people picture the battle... or what some might think of as "the fun parts." But, here's the thing. Not everyone gets to participate in these aspects of cybersecurity and, in many cases, finding safe and legal ways to practice these skills can be challenging. So where can curious minds turn?
That's where gamification can really help. There are a ton of really fun and engaging ways to learn these skills without fear of being arrested or breaking something. These are also great ways to level-up cybersecurity skills and help bring new people into the field. In this episode, we explore the "fun and games" of cybersecurity: lock picking, (CTFs) capture the flag competitions, simulations, and even pickpocketing and magical (sleight of hand and misdirection) thinking.
Perry's guests are Alethe Denis (social engineer and DefCon 2019 Social Engineering CTF winner), Deviant Ollam (penetration tester, lock picking guru, and Board Member of The Open Organization of Lockpickers), Chris Kirsch (Co-Founder and CEO of Rumble, DefCon 2017 Social Engineering CTF winner) , and Gerald Auger (Founder of Simply Cyber, Director of Cybersecurity Education &amp; Cybersecurity Program Manager at ThreatGEN).
Guests:

Alethe Denis (LinkedIn) (Twitter) (Website)

Deviant Ollam (Twitter) (YouTube) (Website)

Chris Kirsch (LinkedIn) (Twitter)

Gerald Auger (LinkedIn) (Twitter) (YouTube)


Resources &amp; Books:

What is Gamification?

Lockpicking Resources from Deviant Ollam


Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks, by Deviant Ollam


Practical Lock Picking: A Physical Penetration Tester's Training Guide, by Deviant Ollam

TOOOL US -- The Open Organization of Lockpickers

TOOOL US instructional videos on YouTube

The Official TOOOL Slides

The Lockpicking Lawyer on YouTube


Bump Keys in the News - San Francisco #3 -- YouTube clip

TraceLabs OSINT Capture the Flags

50 CTF (Capture the Flag) &amp; Pentesting Websites to Practice Your Hacking &amp; Cybersecurity Skills in 2021


Hands-on Hacking Demo | CTF - Capture the Flag in 15 Minutes!, YouTube video by ITProTV


Capture the Flag? Change Your Life, YouTube video by John Hammond


Don’t Wait for the Perfect Time for a Tabletop Exercise, National Law Review

ThreatGEN's Red &amp; Blue Game

Gerald Auger's Simply Cyber Discord Server

Chris Krisch's pickpocketing talk at Layer8 Security Conference


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Mar 2022 04:00:00 -0000</pubDate>
      <itunes:title>Fun and Games: Lock Picking, Capture the Flag Contests, Simulations, and More</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>What images come to mind when you see or hear the word 'Cybersecurity?' That word probably evokes mental images of people hunched over keyboards launching cyberattacks at each other. Or maybe you picture someone picking a lock or stealing a badge to slip into a building. In other words, most people picture the battle... or what some might think of as "the fun parts." But, here's the thing. Not everyone gets to participate in these aspects of cybersecurity and, in many cases, finding safe and legal ways to practice these skills can be challenging. So where can curious minds turn?
That's where gamification can really help. There are a ton of really fun and engaging ways to learn these skills without fear of being arrested or breaking something. These are also great ways to level-up cybersecurity skills and help bring new people into the field. In this episode, we explore the "fun and games" of cybersecurity: lock picking, (CTFs) capture the flag competitions, simulations, and even pickpocketing and magical (sleight of hand and misdirection) thinking.
Perry's guests are Alethe Denis (social engineer and DefCon 2019 Social Engineering CTF winner), Deviant Ollam (penetration tester, lock picking guru, and Board Member of The Open Organization of Lockpickers), Chris Kirsch (Co-Founder and CEO of Rumble, DefCon 2017 Social Engineering CTF winner) , and Gerald Auger (Founder of Simply Cyber, Director of Cybersecurity Education &amp; Cybersecurity Program Manager at ThreatGEN).
Guests:

Alethe Denis (LinkedIn) (Twitter) (Website)

Deviant Ollam (Twitter) (YouTube) (Website)

Chris Kirsch (LinkedIn) (Twitter)

Gerald Auger (LinkedIn) (Twitter) (YouTube)


Resources &amp; Books:

What is Gamification?

Lockpicking Resources from Deviant Ollam


Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks, by Deviant Ollam


Practical Lock Picking: A Physical Penetration Tester's Training Guide, by Deviant Ollam

TOOOL US -- The Open Organization of Lockpickers

TOOOL US instructional videos on YouTube

The Official TOOOL Slides

The Lockpicking Lawyer on YouTube


Bump Keys in the News - San Francisco #3 -- YouTube clip

TraceLabs OSINT Capture the Flags

50 CTF (Capture the Flag) &amp; Pentesting Websites to Practice Your Hacking &amp; Cybersecurity Skills in 2021


Hands-on Hacking Demo | CTF - Capture the Flag in 15 Minutes!, YouTube video by ITProTV


Capture the Flag? Change Your Life, YouTube video by John Hammond


Don’t Wait for the Perfect Time for a Tabletop Exercise, National Law Review

ThreatGEN's Red &amp; Blue Game

Gerald Auger's Simply Cyber Discord Server

Chris Krisch's pickpocketing talk at Layer8 Security Conference


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What images come to mind when you see or hear the word 'Cybersecurity?' That word probably evokes mental images of people hunched over keyboards launching cyberattacks at each other. Or maybe you picture someone picking a lock or stealing a badge to slip into a building. In other words, most people picture the battle... or what some might think of as "the fun parts." But, here's the thing. Not everyone gets to participate in these aspects of cybersecurity and, in many cases, finding safe and legal ways to practice these skills can be challenging. So where can curious minds turn?</p><p>That's where gamification can really help. There are a ton of really fun and engaging ways to learn these skills without fear of being arrested or breaking something. These are also great ways to level-up cybersecurity skills and help bring new people into the field. In this episode, we explore the "fun and games" of cybersecurity: lock picking, (CTFs) capture the flag competitions, simulations, and even pickpocketing and magical (sleight of hand and misdirection) thinking.</p><p>Perry's guests are Alethe Denis (social engineer and DefCon 2019 Social Engineering CTF winner), Deviant Ollam (penetration tester, lock picking guru, and Board Member of The Open Organization of Lockpickers), Chris Kirsch (Co-Founder and CEO of Rumble, DefCon 2017 Social Engineering CTF winner) , and Gerald Auger (Founder of Simply Cyber, Director of Cybersecurity Education &amp; Cybersecurity Program Manager at ThreatGEN).</p><p><strong>Guests:</strong></p><ul>
<li>Alethe Denis (<a href="https://www.linkedin.com/in/alethe/">LinkedIn</a>) (<a href="https://twitter.com/AletheDenis">Twitter</a>) (<a href="https://alethedenis.com/">Website</a>)</li>
<li>Deviant Ollam (<a href="https://twitter.com/deviantollam">Twitter</a>) (<a href="https://www.youtube.com/user/DeviantOllam">YouTube</a>) (<a href="https://deviating.net/">Website</a>)</li>
<li>Chris Kirsch (<a href="https://www.linkedin.com/in/ckirsch/">LinkedIn</a>) (<a href="https://twitter.com/chris_kirsch">Twitter</a>)</li>
<li>Gerald Auger (<a href="https://www.linkedin.com/in/geraldauger/">LinkedIn</a>) (<a href="https://twitter.com/Gerald_Auger">Twitter</a>) (<a href="https://www.youtube.com/c/GeraldAuger">YouTube</a>)</li>
</ul><p><br></p><p><strong>Resources &amp; Books:</strong></p><ul>
<li><a href="https://www.gamify.com/what-is-gamification">What is Gamification?</a></li>
<li><a href="https://deviating.net/lockpicking/">Lockpicking Resources from Deviant Ollam</a></li>
<li>
<a href="https://www.amazon.com/Keys-Kingdom-Impressioning-Privilege-Escalation/dp/1597499838/">Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks</a>, by Deviant Ollam</li>
<li>
<a href="https://www.amazon.com/Practical-Lock-Picking-Physical-Penetration/dp/1597499897/">Practical Lock Picking: A Physical Penetration Tester's Training Guide</a>, by Deviant Ollam</li>
<li><a href="https://toool.us/">TOOOL US -- The Open Organization of Lockpickers</a></li>
<li><a href="https://www.youtube.com/c/TOOOL-US">TOOOL US instructional videos on YouTube</a></li>
<li><a href="https://toool.us/resources.html">The Official TOOOL Slides</a></li>
<li><a href="https://www.youtube.com/c/lockpickinglawyer">The Lockpicking Lawyer on YouTube</a></li>
<li>
<a href="https://www.youtube.com/watch?v=NnrWqjgjFL0">Bump Keys in the News - San Francisco #3 </a>-- YouTube clip</li>
<li><a href="https://www.tracelabs.org/initiatives/search-party">TraceLabs OSINT Capture the Flags</a></li>
<li><a href="https://www.securitynewspaper.com/2021/03/12/50-ctfcapture-the-flag-pentesting-websites-to-practice-your-hacking-cybersecurity-skills-in-2021/">50 CTF (Capture the Flag) &amp; Pentesting Websites to Practice Your Hacking &amp; Cybersecurity Skills in 2021</a></li>
<li>
<a href="https://www.youtube.com/watch?v=5gLA6fMqtZY">Hands-on Hacking Demo | CTF - Capture the Flag in 15 Minutes!</a>, YouTube video by ITProTV</li>
<li>
<a href="https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw">Capture the Flag? Change Your Life</a>, YouTube video by John Hammond</li>
<li>
<a href="https://www.natlawreview.com/article/don-t-wait-perfect-time-tabletop-exercise">Don’t Wait for the Perfect Time for a Tabletop Exercise</a>, National Law Review</li>
<li><a href="https://threatgen.com/">ThreatGEN's Red &amp; Blue Game</a></li>
<li><a href="https://SimplyCyber.io/discord">Gerald Auger's Simply Cyber Discord Server</a></li>
<li><a href="https://www.youtube.com/watch?v=OvET4r4uARQ&amp;ab_channel=Layer8Conference">Chris Krisch's pickpocketing talk at Layer8 Security Conference</a></li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p><br></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerInsights</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3622</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7223234-6388-11ec-b100-77ea60fb732a]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8669868911.mp3?updated=1647828759" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>World's Greatest Con – A Conversation with Brian Brushwood</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/17/notes</link>
      <description>If you love learning about cons, scams, and tricks, then this is the episode for you. Listen as Perry sits down with Brian Brushwood, someone who has made understanding and teaching scams and tricks his life's work. Brian is the creator of Scam School, Scam Nation, Hacking the System, Modern Rogue, and more. For the past 20 years, he's toured around the world teaching and demonstrating everything from side show stunts, to sleight-of-hand magic, to the intricacies of con artistry.
Brian’s new podcast, World’s Greatest Con is a deep-dive into the stories and tactics behind the most intricate and interesting cons imaginable. In season 1, he told the story of Operation Mincemeat, a WWII plot devised by Ian Fleming (creator of James Bond) to trick none other than Adolf Hitler. Season 2 covers five different cons all related to the game show industry… it’s both entertaining and riveting in some very unexpected ways.
A big thank you to my friends over at the PodCube podcast for creating a custom skit for this episode. If you are a fan of sketch comedy, be sure to check out their show! (PodCube: The Future, is Yesterday™).
Guest: Brian Brushwood (Website) (Twitter)
Books and Resources

Brian's Website

World's Greatest Con podcast site


Scam School YouTube Channel


Modern Rogue YouTube Channel

Brian Brushwood Mistreats His Tongue

Brian doing psychic surgery on Penn &amp; Teller: Fool Us

Brian doing the "hidden ghost" trick

Brian's Entire Bizarre Magic Stage Show

How to make a fake tongue (without using a deer tongue)


Operation Mincemeat -- Wikipedia


13 Unbelievably Fascinating Game Show Cheating Scandals That'll Shock Both Devoted And Casual Fans -- Buzzfeed


Project Alpha -- Wikipedia


Going Mental: A Conversation with Banachek -- 8th Layer Insights S1E7

PodCube Podcast


Thinking, Fast and Slow by Daniel Kahneman 


Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:

The opening skit featured the voice talents of Rich Daigle (a.k.a. Mouth Almighty), Hannah Trusty, Adriana Beals, and Rob McCollum.

Writing support for this episode's opening section from Terry Hicks

Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.

Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.

8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/



Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>World's Greatest Con – A Conversation with Brian Brushwood</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>If you love learning about cons, scams, and tricks, then this is the episode for you. Listen as Perry sits down with Brian Brushwood, someone who has made understanding and teaching scams and tricks his life's work. Brian is the creator of Scam School, Scam Nation, Hacking the System, Modern Rogue, and more. For the past 20 years, he's toured around the world teaching and demonstrating everything from side show stunts, to sleight-of-hand magic, to the intricacies of con artistry.
Brian’s new podcast, World’s Greatest Con is a deep-dive into the stories and tactics behind the most intricate and interesting cons imaginable. In season 1, he told the story of Operation Mincemeat, a WWII plot devised by Ian Fleming (creator of James Bond) to trick none other than Adolf Hitler. Season 2 covers five different cons all related to the game show industry… it’s both entertaining and riveting in some very unexpected ways.
A big thank you to my friends over at the PodCube podcast for creating a custom skit for this episode. If you are a fan of sketch comedy, be sure to check out their show! (PodCube: The Future, is Yesterday™).
Guest: Brian Brushwood (Website) (Twitter)
Books and Resources

Brian's Website

World's Greatest Con podcast site


Scam School YouTube Channel


Modern Rogue YouTube Channel

Brian Brushwood Mistreats His Tongue

Brian doing psychic surgery on Penn &amp; Teller: Fool Us

Brian doing the "hidden ghost" trick

Brian's Entire Bizarre Magic Stage Show

How to make a fake tongue (without using a deer tongue)


Operation Mincemeat -- Wikipedia


13 Unbelievably Fascinating Game Show Cheating Scandals That'll Shock Both Devoted And Casual Fans -- Buzzfeed


Project Alpha -- Wikipedia


Going Mental: A Conversation with Banachek -- 8th Layer Insights S1E7

PodCube Podcast


Thinking, Fast and Slow by Daniel Kahneman 


Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:

The opening skit featured the voice talents of Rich Daigle (a.k.a. Mouth Almighty), Hannah Trusty, Adriana Beals, and Rob McCollum.

Writing support for this episode's opening section from Terry Hicks

Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.

Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.

8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/



Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>If you love learning about cons, scams, and tricks, then this is the episode for you. Listen as Perry sits down with Brian Brushwood, someone who has made understanding and teaching scams and tricks his life's work. Brian is the creator of Scam School, Scam Nation, Hacking the System, Modern Rogue, and more. For the past 20 years, he's toured around the world teaching and demonstrating everything from side show stunts, to sleight-of-hand magic, to the intricacies of con artistry.</p><p>Brian’s new podcast, <em>World’s Greatest Con</em> is a deep-dive into the stories and tactics behind the most intricate and interesting cons imaginable. In season 1, he told the story of Operation Mincemeat, a WWII plot devised by Ian Fleming (creator of James Bond) to trick none other than Adolf Hitler. Season 2 covers five different cons all related to the game show industry… it’s both entertaining and riveting in some very unexpected ways.</p><p>A big thank you to my friends over at the <a href="https://apple.co/3HVFhpU">PodCube</a> podcast for creating a custom skit for this episode. If you are a fan of sketch comedy, be sure to check out their show! (PodCube: The Future, is Yesterday™).</p><p><strong>Guest:</strong> Brian Brushwood (<a href="http://shwood.com/">Website</a>) (<a href="https://twitter.com/shwood">Twitter</a>)</p><p><strong>Books and Resources</strong></p><ul>
<li><a href="http://shwood.com/">Brian's Website</a></li>
<li><a href="https://worldsgreatestcon.fireside.fm/">World's Greatest Con podcast site</a></li>
<li>
<a href="https://www.youtube.com/user/scamschool">Scam School</a> YouTube Channel</li>
<li>
<a href="https://www.youtube.com/modernrogue">Modern Rogue</a> YouTube Channel</li>
<li><a href="https://www.youtube.com/watch?v=rUp_XP-xl4E">Brian Brushwood Mistreats His Tongue</a></li>
<li><a href="https://www.youtube.com/watch?v=FJEYtEo7c-c">Brian doing psychic surgery on Penn &amp; Teller: Fool Us</a></li>
<li><a href="https://youtu.be/l41d-DJ03R8?t=3331">Brian doing the "hidden ghost" trick</a></li>
<li><a href="https://www.youtube.com/watch?v=l41d-DJ03R8">Brian's Entire Bizarre Magic Stage Show</a></li>
<li><a href="https://www.youtube.com/watch?v=LZy2YRQ8kGA">How to make a fake tongue (without using a deer tongue)</a></li>
<li>
<a href="https://en.wikipedia.org/wiki/Operation_Mincemeat">Operation Mincemeat</a> -- Wikipedia</li>
<li>
<a href="https://www.buzzfeed.com/marycolussi/game-show-cheating-scandals">13 Unbelievably Fascinating Game Show Cheating Scandals That'll Shock Both Devoted And Casual Fans</a> -- Buzzfeed</li>
<li>
<a href="https://en.wikipedia.org/wiki/Project_Alpha">Project Alpha</a> -- Wikipedia</li>
<li>
<a href="https://thecyberwire.com/podcasts/8th-layer-insights/7/notes">Going Mental: A Conversation with Banachek</a> -- 8th Layer Insights S1E7</li>
<li><a href="https://apple.co/3HVFhpU">PodCube Podcast</a></li>
<li>
<a href="https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555">Thinking, Fast and Slow</a> by Daniel Kahneman </li>
<li>
<a href="https://www.amazon.com/Influence-New-Expanded-Psychology-Persuasion/dp/0062937650">Influence, New and Expanded: The Psychology of Persuasion</a> by Robert Cialdini</li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><ul>
<li>The opening skit featured the voice talents of Rich Daigle (a.k.a. Mouth Almighty), Hannah Trusty, Adriana Beals, and Rob McCollum.</li>
<li>Writing support for this episode's opening section from Terry Hicks</li>
<li>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</li>
<li>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</li>
<li>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a>
</li>
</ul><p><br></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerInsights</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3891</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6ffd36a-6388-11ec-b100-5bad12aad965]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7424338773.mp3?updated=1766599519" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security is Alive</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/16/notes</link>
      <description>Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.
On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.
Guests: 

Samantha – Facial Recognition Software

Dave – Password

Devon – Secure Email Gateway

Barb – Phishing Email


Books and Resources:

MasterClass -- Margaret Atwood Teaches Creative Writing

"Everything is Alive" Podcast

Krebs on Security - Password Do’s and Don’ts

What makes a good password? 9 rules to protect you from cyberattacks

World Password Day: Roger Grimes on passwords

Q&amp;A With Data-Driven Evangelist Roger Grimes on the Great Password Debate

How does facial recognition work? 

Facial recognition: top 7 trends (tech, vendors, use cases)

NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification

How Accurate are Facial Recognition Systems – and Why Does It Matter?

Social Engineering Red Flags

Email Security Gap Analysis Shows 10.5% Miss Rate

What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?

The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry

On Writing: A Memoir of the Craft by Stephen King


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; SmartSound
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Feb 2022 05:00:00 -0000</pubDate>
      <itunes:title>Security is Alive</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.
On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.
Guests: 

Samantha – Facial Recognition Software

Dave – Password

Devon – Secure Email Gateway

Barb – Phishing Email


Books and Resources:

MasterClass -- Margaret Atwood Teaches Creative Writing

"Everything is Alive" Podcast

Krebs on Security - Password Do’s and Don’ts

What makes a good password? 9 rules to protect you from cyberattacks

World Password Day: Roger Grimes on passwords

Q&amp;A With Data-Driven Evangelist Roger Grimes on the Great Password Debate

How does facial recognition work? 

Facial recognition: top 7 trends (tech, vendors, use cases)

NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification

How Accurate are Facial Recognition Systems – and Why Does It Matter?

Social Engineering Red Flags

Email Security Gap Analysis Shows 10.5% Miss Rate

What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?

The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry

On Writing: A Memoir of the Craft by Stephen King


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; SmartSound
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.</p><p>On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.</p><p><strong>Guests: </strong></p><ul>
<li>Samantha – Facial Recognition Software</li>
<li>Dave – Password</li>
<li>Devon – Secure Email Gateway</li>
<li>Barb – Phishing Email</li>
</ul><p><br></p><p><strong>Books and Resources</strong>:</p><ul>
<li><a href="https://www.masterclass.com/classes/margaret-atwood-teaches-creative-writing">MasterClass -- Margaret Atwood Teaches Creative Writing</a></li>
<li><a href="https://www.everythingisalive.com/">"Everything is Alive" Podcast</a></li>
<li><a href="https://krebsonsecurity.com/password-dos-and-donts/">Krebs on Security - Password Do’s and Don’ts</a></li>
<li><a href="https://www.cnet.com/tech/mobile/9-rules-for-strong-passwords-how-to-create-and-remember-your-login-credentials/">What makes a good password? 9 rules to protect you from cyberattacks</a></li>
<li><a href="https://cybersecurity-magazine.com/interviewroger-grimes-on-passwords/">World Password Day: Roger Grimes on passwords</a></li>
<li><a href="https://blog.knowbe4.com/qa-with-data-driven-evangelist-roger-grimes-on-the-great-password-debate">Q&amp;A With Data-Driven Evangelist Roger Grimes on the Great Password Debate</a></li>
<li><a href="https://www.youtube.com/watch?v=YX8BzK_LU0E">How does facial recognition work? </a></li>
<li><a href="https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/biometrics/facial-recognition">Facial recognition: top 7 trends (tech, vendors, use cases)</a></li>
<li><a href="https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.IR.8238.pdf">NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification</a></li>
<li><a href="https://www.csis.org/blogs/technology-policy-blog/how-accurate-are-facial-recognition-systems-%E2%80%93-and-why-does-it-matter">How Accurate are Facial Recognition Systems – and Why Does It Matter?</a></li>
<li><a href="https://www.knowbe4.com/hubfs/Social-Engineering-Red-Flags.pdf">Social Engineering Red Flags</a></li>
<li><a href="https://blog.knowbe4.com/email-security-gap-analysis-shows-10-miss-rate">Email Security Gap Analysis Shows 10.5% Miss Rate</a></li>
<li><a href="https://expertinsights.com/insights/what-are-email-security-gateways-how-do-they-work-and-what-can-they-offer-your-organization/">What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?</a></li>
<li><a href="https://www.amazon.com/Creative-Writing-Coursebook-Authors-Exercises/dp/1509868275/ref=sr_1_22?crid=118QDCAN4MB4K&amp;keywords=creative+writing+books&amp;qid=1645433478">The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry</a></li>
<li><a href="https://www.amazon.com/Writing-Memoir-Craft-Stephen-King/dp/1982159375">On Writing: A Memoir of the Craft by Stephen King</a></li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland</p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.smartsound.com/">SmartSound</a></p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerInsights</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2821</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6dd36fc-6388-11ec-b100-631bfa4082b4]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5463776461.mp3?updated=1645484630" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Fool The White House -- A conversation with James Linton (aka The Email Prankster)</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/15/notes</link>
      <description>On this episode, Perry sits down with James Linton (formerly known as The Email Prankster). In 2017, James went on a virtual joyride exploiting the ways that people interact with emails. One of the most interesting things about James' story is that his exploits didn't rely on any type of highly technical method(s); they were simple display name deceptions. But that didn't stop him from fooling CEOs from some of the worlds largest banks, celebrities, and high ranking staff members in the White House.
James' success using these simple methods serves as a warning for us all. We don't fall for scams because they are technically sophisticated or because we are stupid. We fall for scams because we are human.
Guest: James Linton (LinkedIn) (Website)
Books and Resources:

Anatomy Of An Email Impersonation Spree: Who Got Pranked And Why

An email prankster is hitting the CEOs of the world's biggest banks

How to Prank the Rich and Powerful Without Really Trying

Morgan Stanley CEO James Gorman falls for email prank

This Man Pranked Eric Trump And Harvey Weinstein — Now He Just Wants A Job

Media Coverage YouTube Playlist

James Linton -- Wikipedia Entry


The Journal of Best Practices: A Memoir of Marriage, Asperger Syndrome, and One Man's Quest to Be a Better Husband by David Finch

Perry -- Interview on Springbrook's Converge Autism Radio

Perry -- Security Weekly Interview

Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Feb 2022 05:00:00 -0000</pubDate>
      <itunes:title>How to Fool The White House-- A conversation with James Linton (aka The Email Prankster)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, Perry sits down with James Linton (formerly known as The Email Prankster). In 2017, James went on a virtual joyride exploiting the ways that people interact with emails. One of the most interesting things about James' story is that his exploits didn't rely on any type of highly technical method(s); they were simple display name deceptions. But that didn't stop him from fooling CEOs from some of the worlds largest banks, celebrities, and high ranking staff members in the White House.
James' success using these simple methods serves as a warning for us all. We don't fall for scams because they are technically sophisticated or because we are stupid. We fall for scams because we are human.
Guest: James Linton (LinkedIn) (Website)
Books and Resources:

Anatomy Of An Email Impersonation Spree: Who Got Pranked And Why

An email prankster is hitting the CEOs of the world's biggest banks

How to Prank the Rich and Powerful Without Really Trying

Morgan Stanley CEO James Gorman falls for email prank

This Man Pranked Eric Trump And Harvey Weinstein — Now He Just Wants A Job

Media Coverage YouTube Playlist

James Linton -- Wikipedia Entry


The Journal of Best Practices: A Memoir of Marriage, Asperger Syndrome, and One Man's Quest to Be a Better Husband by David Finch

Perry -- Interview on Springbrook's Converge Autism Radio

Perry -- Security Weekly Interview

Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer


Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry sits down with James Linton (formerly known as The Email Prankster). In 2017, James went on a virtual joyride exploiting the ways that people interact with emails. One of the most interesting things about James' story is that his exploits didn't rely on any type of highly technical method(s); they were simple display name deceptions. But that didn't stop him from fooling CEOs from some of the worlds largest banks, celebrities, and high ranking staff members in the White House.</p><p>James' success using these simple methods serves as a warning for us all. We don't fall for scams because they are technically sophisticated or because we are stupid. We fall for scams because we are human.</p><p><strong>Guest: </strong>James Linton (<a href="https://www.linkedin.com/in/james-linton-social-engineer-and-hacker/">LinkedIn</a>) (<a href="https://thewhole.io/">Website</a>)</p><p><strong>Books and Resources</strong>:</p><ul>
<li><a href="https://cybersecurityventures.com/anatomy-of-an-email-impersonation-spree-who-got-pranked-and-why/">Anatomy Of An Email Impersonation Spree: Who Got Pranked And Why</a></li>
<li><a href="https://www.businessinsider.com/an-email-prankster-is-hitting-the-ceos-of-the-worlds-biggest-banks-2017-6">An email prankster is hitting the CEOs of the world's biggest banks</a></li>
<li><a href="https://theoutline.com/post/2059/how-to-prank-the-rich-and-powerful-without-really-trying?zd=1&amp;zi=qbqck7z7">How to Prank the Rich and Powerful Without Really Trying</a></li>
<li><a href="https://nypost.com/2017/06/14/morgan-stanley-ceo-james-gorman-falls-for-email-prank/">Morgan Stanley CEO James Gorman falls for email prank</a></li>
<li><a href="https://www.buzzfeednews.com/article/ryanmac/the-email-prankster-sinon-reborn-is-calling-it-quits">This Man Pranked Eric Trump And Harvey Weinstein — Now He Just Wants A Job</a></li>
<li><a href="https://www.youtube.com/playlist?list=PL8vvdB2fAQx-ojvpsyxeVUa-0WTvmjqYH">Media Coverage YouTube Playlist</a></li>
<li><a href="https://en.wikipedia.org/wiki/James_Linton_(hacker)">James Linton -- Wikipedia Entry</a></li>
<li>
<a href="https://www.amazon.com/Journal-Best-Practices-Marriage-Asperger/dp/1439189714">The Journal of Best Practices: A Memoir of Marriage, Asperger Syndrome, and One Man's Quest to Be a Better Husband</a> by David Finch</li>
<li><a href="https://podcastaddict.com/episode/97669095">Perry -- Interview on Springbrook's Converge Autism Radio</a></li>
<li><a href="https://www.youtube.com/watch?v=2te_r4I5jgo&amp;ab_channel=SecurityWeekly">Perry -- Security Weekly Interview</a></li>
<li><a href="https://www.youtube.com/watch?v=5IraysvK38A&amp;ab_channel=DEFCONConference">Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village</a></li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Security-Culture-Playbook-Executive-Developing/dp/1119875234">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p><br></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerInsights</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3840</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6ba7dce-6388-11ec-b100-77755c33deca]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2364091669.mp3?updated=1644187285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bridging the Cyber Skills Gap</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/14/notes</link>
      <description>If you've been following the cybersecurity industry for the past few years, you've likely heard about the "cyber skills gap." In this episode, Perry sits down with Heath Adams (TCM Security), Professor Karla Carter (Bellevue University), Sam Curry (Cybereason), and Lola Obamehinti (eBay) to explore what the skills gap is and how to begin to close the gap. We touch on subjects such as where traditional degrees, online training, certifications, mentorship, and networking fit in, as well as the value of diversity. And we offer thoughts for employers, current industry professionals, and job seekers.
Guests:

Heath Adams (LinkedIn)

Karla Carter (LinkedIn)

Sam Curry (LinkedIn)

Lola Obamehinti (LinkedIn)


Books and Resources:


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Dr. Jessica Barker


Cybersecurity Domain Map ver 3.0 by Henry Jiang


Cybersecurity Employment in 2022: Solving the Skills Gap, by Jenn Fulmer


Cybersecurity: The Starting Line, by 4n6Lady


The 8 CISSP domains explained, by Luke Irwin


Examination of Personality Characteristics Among Cybersecurity and Information Technology Professionals, by Sarah E. Freed (utc.edu)

GenCyber Camps: Inspiring the Next Generation of Cyber Stars

NSA National Centers for Academic Excellence in Cybersecurity


Navigating the Cybersecurity Career Path by Hellen E. Patton


Over 200,000 Girl Scouts Have Earned Cybersecurity Badges by Ashley Savageau


Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World, by Marcus J. Carey &amp; Jennifer Jin


The Value of Certifications, by Javvad Malik


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter

Word Notes Podcast definition of Cybersecurity Skills Gap


Production Credits:
Additional voice talent provided by Rich Daigle.
Additional research by Nyla Gennaoui.
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
*** Use of The Twilight Zone theme music in this episode is considered 'Fair Use' under copyright law due to its 'transformative' nature as a parody.

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Jan 2022 05:00:00 -0000</pubDate>
      <itunes:title>Bridging the Cyber Skills Gap</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>If you've been following the cybersecurity industry for the past few years, you've likely heard about the "cyber skills gap." In this episode, Perry sits down with Heath Adams (TCM Security), Professor Karla Carter (Bellevue University), Sam Curry (Cybereason), and Lola Obamehinti (eBay) to explore what the skills gap is and how to begin to close the gap. We touch on subjects such as where traditional degrees, online training, certifications, mentorship, and networking fit in, as well as the value of diversity. And we offer thoughts for employers, current industry professionals, and job seekers.
Guests:

Heath Adams (LinkedIn)

Karla Carter (LinkedIn)

Sam Curry (LinkedIn)

Lola Obamehinti (LinkedIn)


Books and Resources:


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Dr. Jessica Barker


Cybersecurity Domain Map ver 3.0 by Henry Jiang


Cybersecurity Employment in 2022: Solving the Skills Gap, by Jenn Fulmer


Cybersecurity: The Starting Line, by 4n6Lady


The 8 CISSP domains explained, by Luke Irwin


Examination of Personality Characteristics Among Cybersecurity and Information Technology Professionals, by Sarah E. Freed (utc.edu)

GenCyber Camps: Inspiring the Next Generation of Cyber Stars

NSA National Centers for Academic Excellence in Cybersecurity


Navigating the Cybersecurity Career Path by Hellen E. Patton


Over 200,000 Girl Scouts Have Earned Cybersecurity Badges by Ashley Savageau


Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World, by Marcus J. Carey &amp; Jennifer Jin


The Value of Certifications, by Javvad Malik


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter

Word Notes Podcast definition of Cybersecurity Skills Gap


Production Credits:
Additional voice talent provided by Rich Daigle.
Additional research by Nyla Gennaoui.
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
*** Use of The Twilight Zone theme music in this episode is considered 'Fair Use' under copyright law due to its 'transformative' nature as a parody.

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>If you've been following the cybersecurity industry for the past few years, you've likely heard about the "cyber skills gap." In this episode, Perry sits down with Heath Adams (<a href="https://tcm-sec.com">TCM Security</a>), Professor Karla Carter (<a href="https://www.bellevue.edu/degrees/center-for-cybersecurity-education/cce">Bellevue University</a>), Sam Curry (<a href="https://www.cybereason.com/">Cybereason</a>), and Lola Obamehinti (<a href="https://www.ebayinc.com/">eBay</a>) to explore what the skills gap is and how to begin to close the gap. We touch on subjects such as where traditional degrees, online training, certifications, mentorship, and networking fit in, as well as the value of diversity. And we offer thoughts for employers, current industry professionals, and job seekers.</p><p><strong>Guests</strong>:</p><ul>
<li>Heath Adams (<a href="https://www.linkedin.com/in/heathadams/">LinkedIn</a>)</li>
<li>Karla Carter (<a href="https://www.linkedin.com/in/karlacarterlnkne/">LinkedIn</a>)</li>
<li>Sam Curry (<a href="https://www.linkedin.com/in/currysam/">LinkedIn</a>)</li>
<li>Lola Obamehinti (<a href="https://www.linkedin.com/in/lolaobamehinti/">LinkedIn</a>)</li>
</ul><p><br></p><p><strong>Books and Resources</strong>:</p><ul>
<li>
<a href="https://www.amazon.com/Confident-Cyber-Security-Started-Futureproof/dp/1789663407">Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career</a>, by Dr. Jessica Barker</li>
<li>
<a href="https://www.linkedin.com/pulse/cybersecurity-domain-map-ver-30-henry-jiang/">Cybersecurity Domain Map ver 3.0</a> by Henry Jiang</li>
<li>
<a href="https://www.esecurityplanet.com/trends/solving-cybersecurity-skills-gap/">Cybersecurity Employment in 2022: Solving the Skills Gap</a>, by Jenn Fulmer</li>
<li>
<a href="https://4n6lady.medium.com/cybersecurity-the-starting-line-8b9ee97f73c1">Cybersecurity: The Starting Line</a>, by 4n6Lady</li>
<li>
<a href="https://www.itgovernance.co.uk/blog/the-8-cissp-domains-explained">The 8 CISSP domains explained</a>, by Luke Irwin</li>
<li>
<a href="https://scholar.utc.edu/theses/127/">Examination of Personality Characteristics Among Cybersecurity and Information Technology Professionals</a>, by Sarah E. Freed (utc.edu)</li>
<li><a href="https://www.gen-cyber.com/about/">GenCyber Camps: Inspiring the Next Generation of Cyber Stars</a></li>
<li><a href="https://www.nsa.gov/Academics/Centers-of-Academic-Excellence/">NSA National Centers for Academic Excellence in Cybersecurity</a></li>
<li>
<a href="https://www.amazon.com/Navigating-Cybersecurity-Career-Path-Insider/dp/1119833426">Navigating the Cybersecurity Career Path</a> by Hellen E. Patton</li>
<li>
<a href="https://staysafeonline.org/blog/cybersecurity-badges/">Over 200,000 Girl Scouts Have Earned Cybersecurity Badges</a> by Ashley Savageau</li>
<li>
<a href="https://www.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376">Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World</a>, by Marcus J. Carey &amp; Jennifer Jin</li>
<li>
<a href="https://javvadmalik.com/2021/12/17/the-value-of-certifications/">The Value of Certifications</a>, by Javvad Malik</li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li><a href="https://thecyberwire.com/podcasts/word-notes/71/notes">Word Notes Podcast definition of Cybersecurity Skills Gap</a></li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Additional voice talent provided by Rich Daigle.</p><p>Additional research by Nyla Gennaoui.</p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p>*** Use of The Twilight Zone theme music in this episode is considered 'Fair Use' under copyright law due to its 'transformative' nature as a parody.</p><p><br></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerInsights</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2878</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f697b60e-6388-11ec-b100-7ff09f4dfb4d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1673119291.mp3?updated=1643049228" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Technology &amp; the Law of Unintended Consequences </title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/13/notes</link>
      <description>Let's face it. Most of us have a love/hate relationship with technology and technological advances. We dream about the new thing... but when it arrives, we are usually a little disappointed. Many of us also lament the constant erosion of privacy, the changes in social norms, and more. And, little-by-little, we allow those aspects of new technology to make us numb. We accept the cognitive dissonance of not totally being happy with the trade-offs; yet we still make the trade.
In this episode, we explore a few of the positives and some of the unintended consequences associated with recent technological advancements. We'll hear from Dr. Lydia, Kostopoulos, Dr. Charles Chaffin, Andra Zaharia, and Aaron Barr.

Guests:

Dr. Lydia Kostopoulos (LinkedIn) (Website)

Dr. Charles Chaffin (LinkedIn) (Website)

Andra Zaharia (LinkedIn) (Website)

Aaron Barr (LinkedIn) (Website)


Books and Resources:


Everything is Alive by PRX and Radiotopia

IEEE Article: Decoupling Human Characteristics from Algorithmic Capabilities by Dr. Lydia Kostopoulos


Numb: How the Information Age Dulls Our Senses and How We Can Get them Back by Dr. Charles Chaffin


The Numb Podcast by Dr. Charles Chaffin


The Cyber Empathy Podcast by Andra Zaharia

Reminder: Your 'smart AI' often involves a low-paid contractor surveilling you

How creepy is your smart speaker?

Newton's Laws of Motion

Unintended Consequences

Elon Musk's warning regarding AI

Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors


Production Credits:
Additional voice talent provided by Kristina Leigh.
Additional research by Nyla Gennaoui.
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Jan 2022 05:00:00 -0000</pubDate>
      <itunes:title>Technology &amp; the Law of Unintended Consequences </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Let's face it. Most of us have a love/hate relationship with technology and technological advances. We dream about the new thing... but when it arrives, we are usually a little disappointed. Many of us also lament the constant erosion of privacy, the changes in social norms, and more. And, little-by-little, we allow those aspects of new technology to make us numb. We accept the cognitive dissonance of not totally being happy with the trade-offs; yet we still make the trade.
In this episode, we explore a few of the positives and some of the unintended consequences associated with recent technological advancements. We'll hear from Dr. Lydia, Kostopoulos, Dr. Charles Chaffin, Andra Zaharia, and Aaron Barr.

Guests:

Dr. Lydia Kostopoulos (LinkedIn) (Website)

Dr. Charles Chaffin (LinkedIn) (Website)

Andra Zaharia (LinkedIn) (Website)

Aaron Barr (LinkedIn) (Website)


Books and Resources:


Everything is Alive by PRX and Radiotopia

IEEE Article: Decoupling Human Characteristics from Algorithmic Capabilities by Dr. Lydia Kostopoulos


Numb: How the Information Age Dulls Our Senses and How We Can Get them Back by Dr. Charles Chaffin


The Numb Podcast by Dr. Charles Chaffin


The Cyber Empathy Podcast by Andra Zaharia

Reminder: Your 'smart AI' often involves a low-paid contractor surveilling you

How creepy is your smart speaker?

Newton's Laws of Motion

Unintended Consequences

Elon Musk's warning regarding AI

Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors


Production Credits:
Additional voice talent provided by Kristina Leigh.
Additional research by Nyla Gennaoui.
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

Want to get in touch with Perry? Here's how:

LinkedIn

Twitter

Instagram


Email: hello [at] 8thLayerInsights [dot] com



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Let's face it. Most of us have a love/hate relationship with technology and technological advances. We dream about the new thing... but when it arrives, we are usually a little disappointed. Many of us also lament the constant erosion of privacy, the changes in social norms, and more. And, little-by-little, we allow those aspects of new technology to make us numb. We accept the cognitive dissonance of not totally being happy with the trade-offs; yet we still make the trade.</p><p>In this episode, we explore a few of the positives and some of the unintended consequences associated with recent technological advancements. We'll hear from Dr. Lydia, Kostopoulos, Dr. Charles Chaffin, Andra Zaharia, and Aaron Barr.</p><p><br></p><p><strong>Guests</strong>:</p><ul>
<li>Dr. Lydia Kostopoulos (<a href="https://www.linkedin.com/in/lydiak/">LinkedIn</a>) (<a href="https://www.lkcyber.com/">Website</a>)</li>
<li>Dr. Charles Chaffin (<a href="https://www.linkedin.com/in/dr-charles-chaffin-74932418/">LinkedIn</a>) (<a href="https://charleschaffin.com/">Website</a>)</li>
<li>Andra Zaharia (<a href="https://www.linkedin.com/in/andrazaharia/">LinkedIn</a>) (<a href="https://andrazaharia.com/">Website</a>)</li>
<li>Aaron Barr (<a href="https://www.linkedin.com/in/aaronbarr3/">LinkedIn</a>) (<a href="https://www.piiqmedia.com/">Website</a>)</li>
</ul><p><br></p><p><strong>Books and Resources</strong>:</p><ul>
<li>
<a href="https://www.radiotopia.fm/podcasts/everything-is-alive">Everything is Alive</a> by PRX and Radiotopia</li>
<li>IEEE Article: <a href="https://lkcyber.medium.com/decoupling-human-characteristics-from-algorithmic-capabilities-9c49b314b0a5">Decoupling Human Characteristics from Algorithmic Capabilities</a> by Dr. Lydia Kostopoulos</li>
<li>
<a href="https://www.amazon.com/Numb-Information-Dulls-Senses-them/dp/1119774357">Numb: How the Information Age Dulls Our Senses and How We Can Get them Back</a> by Dr. Charles Chaffin</li>
<li>
<a href="https://charleschaffin.com/podcast/">The Numb Podcast</a> by Dr. Charles Chaffin</li>
<li>
<a href="https://cyberempathy.org/">The Cyber Empathy Podcast</a> by Andra Zaharia</li>
<li><a href="https://mashable.com/article/amazon-echo-humans-listening-recordings-smart-tech">Reminder: Your 'smart AI' often involves a low-paid contractor surveilling you</a></li>
<li><a href="https://www.economist.com/leaders/2019/05/11/how-creepy-is-your-smart-speaker">How creepy is your smart speaker?</a></li>
<li><a href="https://www.britannica.com/science/Newtons-laws-of-motion">Newton's Laws of Motion</a></li>
<li><a href="https://en.wikipedia.org/wiki/Unintended_consequences">Unintended Consequences</a></li>
<li><a href="https://youtu.be/B-Osn1gMNtw">Elon Musk's warning regarding AI</a></li>
<li><a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a></li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Additional voice talent provided by Kristina Leigh.</p><p>Additional research by Nyla Gennaoui.</p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p><br></p><p><strong>Want to get in touch with Perry? Here's how:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li>
<strong>Email</strong>: <strong>hello</strong> [at] <strong>8thLayerInsights</strong> [dot] <strong>com</strong>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3064</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f674e93a-6388-11ec-b100-874256fec6f9]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4126743604.mp3?updated=1642636321" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>You're Listening to "The Dark Stream"</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/12/notes</link>
      <description>And now for something completely different. This episode is a show within a show.
Get ready to step into The Dark Stream: it's a parody of one of those old late night paranormal, conspiracy, or confession call-in radio shows from the 1980's and 90's. And, yes, it's over-the-top and cheesy.
In this episode, you'll hear some re-edited and never before aired sections from Perry's previous interviews with Rachel Tobac, Maxie Reynolds, and Chris Hadnagy.
Guests:


Rachael Tobac: (LinkedIn), CEO of SocialProof Security



Maxie Reynolds (LinkedIn), Founder of Subsea Cloud



Chris Hadnagy: (LinkedIn); CEO of Social Engineer, LLC; Founder of Innocent Lives Foundation; Founder of Social-Engineer.org



Recommended Books and Resources:

CNN coverage of Rachel Tobac using social engineering to ruin Donie O'Sullivan's day


Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You by Chris Hadnagy


The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Production Credits:
Additional voice talent provided by Rich Daigle (a.k.a. Mouth Almighty) and Sarah McQuiggan
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Dec 2021 05:00:00 -0000</pubDate>
      <itunes:title>You're Listening to "The Dark Stream"</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>And now for something completely different. This episode is a show within a show.
Get ready to step into The Dark Stream: it's a parody of one of those old late night paranormal, conspiracy, or confession call-in radio shows from the 1980's and 90's. And, yes, it's over-the-top and cheesy.
In this episode, you'll hear some re-edited and never before aired sections from Perry's previous interviews with Rachel Tobac, Maxie Reynolds, and Chris Hadnagy.
Guests:


Rachael Tobac: (LinkedIn), CEO of SocialProof Security



Maxie Reynolds (LinkedIn), Founder of Subsea Cloud



Chris Hadnagy: (LinkedIn); CEO of Social Engineer, LLC; Founder of Innocent Lives Foundation; Founder of Social-Engineer.org



Recommended Books and Resources:

CNN coverage of Rachel Tobac using social engineering to ruin Donie O'Sullivan's day


Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You by Chris Hadnagy


The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Production Credits:
Additional voice talent provided by Rich Daigle (a.k.a. Mouth Almighty) and Sarah McQuiggan
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>And now for something completely different. This episode is a show within a show.</p><p>Get ready to step into <em>The Dark Stream</em>: it's a parody of one of those old late night paranormal, conspiracy, or confession call-in radio shows from the 1980's and 90's. And, yes, it's over-the-top and cheesy.</p><p>In this episode, you'll hear some re-edited and never before aired sections from Perry's previous interviews with Rachel Tobac, Maxie Reynolds, and Chris Hadnagy.</p><p><strong>Guests</strong>:</p><ul>
<li>
<strong>Rachael Tobac</strong>: (<a href="https://www.linkedin.com/in/racheltobac/">LinkedIn</a>), CEO of <a href="https://www.socialproofsecurity.com/">SocialProof Security</a>
</li>
<li>
<strong>Maxie Reynolds</strong> (<a href="https://www.linkedin.com/in/maxiereynolds/">LinkedIn</a>), Founder of <a href="https://www.subseacloud.com/">Subsea Cloud</a>
</li>
<li>
<strong>Chris Hadnagy</strong>: (<a href="https://www.linkedin.com/in/christopherhadnagy/">LinkedIn</a>); CEO of <a href="https://www.social-engineer.com/">Social Engineer, LLC</a>; Founder of <a href="https://www.innocentlivesfoundation.org/">Innocent Lives Foundation</a>; Founder of <a href="https://www.social-engineer.org/">Social-Engineer.org</a>
</li>
</ul><p><br></p><p><strong>Recommended Books and Resources:</strong></p><ul>
<li><a href="https://www.youtube.com/watch?v=LYilP-1TwMg&amp;ab_channel=CNN">CNN coverage of Rachel Tobac using social engineering to ruin Donie O'Sullivan's day</a></li>
<li>
<a href="https://www.amazon.com/Human-Hacking-Friends-Influence-People/dp/0063001780/">Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You</a> by Chris Hadnagy</li>
<li>
<a href="https://www.amazon.com/Art-Attack-Attacker-Security-Professionals/dp/1119805465">The Art of Attack: Attacker Mindset for Security Professionals</a> by Maxie Reynolds</li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a> by Perry Carpenter</li>
</ul><p><br></p><p><strong>Production Credits:</strong></p><p>Additional voice talent provided by Rich Daigle (a.k.a. Mouth Almighty) and Sarah McQuiggan</p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.miarune.com/">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2657</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[094d98c8-5de8-11ec-a5a5-fb4b8f292adf]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9924212553.mp3?updated=1640653718" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Igniting and Sustaining Creativity</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/11/notes</link>
      <description>This episode is all about creativity: what it is, what it looks like, and what to do when you get stuck. Perry speaks with four experts who have made creating new and interesting things their life's work. Featuring Jack Rhysider (Creator/host of Darknet Diaries), Faith McQuinn (creator of Boom, Margaritas &amp; Doughnuts, and Apollyon), Tom Buck (YouTuber and content creator), and Sam Qurashi (Exploring the Psychology of Everything).
Guests:

Jack Rhysider

Faith McQuinn

Tom Buck

Sam Qurashi


Resources &amp; Books:

The No. 1 Habit of Highly Creative People

Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life

Seven Techniques For Getting Creatively Unstuck

The Unusual Habits Of 8 Famous Creative Minds

The World's Most Creative People Have This Thing in Common

You Are an Artist: Assignments to Spark Creation

Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors


Additional research by Nyla Gennaoui.
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Dec 2021 05:00:00 -0000</pubDate>
      <itunes:title>Igniting and Sustaining Creativity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This episode is all about creativity: what it is, what it looks like, and what to do when you get stuck. Perry speaks with four experts who have made creating new and interesting things their life's work. Featuring Jack Rhysider (Creator/host of Darknet Diaries), Faith McQuinn (creator of Boom, Margaritas &amp; Doughnuts, and Apollyon), Tom Buck (YouTuber and content creator), and Sam Qurashi (Exploring the Psychology of Everything).
Guests:

Jack Rhysider

Faith McQuinn

Tom Buck

Sam Qurashi


Resources &amp; Books:

The No. 1 Habit of Highly Creative People

Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life

Seven Techniques For Getting Creatively Unstuck

The Unusual Habits Of 8 Famous Creative Minds

The World's Most Creative People Have This Thing in Common

You Are an Artist: Assignments to Spark Creation

Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors


Additional research by Nyla Gennaoui.
Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This episode is all about creativity: what it is, what it looks like, and what to do when you get stuck. Perry speaks with four experts who have made creating new and interesting things their life's work. Featuring Jack Rhysider (Creator/host of <a href="https://darknetdiaries.com/">Darknet Diaries</a>), Faith McQuinn (creator of <a href="https://www.observerpictures.com/Boom.html">Boom</a>, <a href="http://www.observerpictures.com/MD.html">Margaritas &amp; Doughnuts</a>, and <a href="http://www.observerpictures.com/Apollyon.html">Apollyon</a>), Tom Buck (<a href="https://himynameistom.com/">YouTuber and content creator</a>), and Sam Qurashi (Exploring the <a href="https://www.instagram.com/samqurashi">Psychology of Everything</a>).</p><p><strong>Guests:</strong></p><ul>
<li><a href="https://darknetdiaries.com/">Jack Rhysider</a></li>
<li><a href="https://www.observerpictures.com/">Faith McQuinn</a></li>
<li><a href="https://himynameistom.com/">Tom Buck</a></li>
<li><a href="https://www.instagram.com/samqurashi">Sam Qurashi</a></li>
</ul><p><br></p><p><strong>Resources &amp; Books:</strong></p><ul>
<li><a href="https://zenhabits.net/creative-habit/">The No. 1 Habit of Highly Creative People</a></li>
<li><a href="https://www.amazon.com/Alchemy-Curious-Science-Creating-Business/dp/006238841X">Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life</a></li>
<li><a href="https://www.forbes.com/sites/robertbtucker/2017/03/21/seven-techniques-for-getting-creatively-unstuck">Seven Techniques For Getting Creatively Unstuck</a></li>
<li><a href="https://www.fastcompany.com/3032240/the-unusual-habits-of-8-famous-creative-minds">The Unusual Habits Of 8 Famous Creative Minds</a></li>
<li><a href="https://www.fastcompany.com/90676271/the-worlds-most-creative-people-have-this-one-thing-in-common">The World's Most Creative People Have This Thing in Common</a></li>
<li><a href="https://www.amazon.com/You-Are-Artist-Assignments-Creation/dp/0143134094">You Are an Artist: Assignments to Spark Creation</a></li>
<li><a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a></li>
</ul><p><br></p><p>Additional research by Nyla Gennaoui.</p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a> and Mia Rune @ <a href="https://www.MiaRune.com">https://www.MiaRune.com</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce508b1c-56ae-11ec-8e94-03c5a8816c32]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW8243526047.mp3?updated=1639419756" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/10/notes</link>
      <description>This is the second of a two part series covering Cybersecurity’s ABCs: Security Awareness, Behavior, and Culture. This episode discusses the difficulty that security leaders have in defining what a security culture actually is. Luckily, we can draw on learnings from organizational culture management and culture transformation experts.
Guests for this episode include, David Sturt, Executive Vice President of the O.C. Tanner Institute, author of Great Work: How to Make a Difference People Love and Appreciate: Celebrating People, Inspiring Greatness., Dr. Jessica Barker (co-CEO and Co-Founder, Socio-Technical Lead at Cygenta; author of Confident Cyber Security and co-author of Cybersecurity ABCs), Kai Roer, Chief Research Officer at KnowBe4, creator of the Security Culture Framework, author of Build a Security Culture, and Michael Leckie, founding partner at Silverback Partners, LLC and author of The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good.
Guests:

David Sturt

Dr. Jessica Barker

Kai Roer

Michael Leckie


References, Resources &amp; Books:


4 Ways to Build a Thoughtful Security Culture, by Perry Carpenter


7 Tips for Building a Strong Security Culture, by Perry Carpenter


Appreciate: Celebrating People, Inspiring Greatness, by David Sturt


Build a Security Culture, by Kai Roer


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Jessica Barker


Culture Rules! The 10 Core Principles of Corporate Culture, by John R. Childress


Cybersecurity ABCs: Delivering awareness, behaviours and culture change, by Jessica Barker, Adrian Davis, and Bruce Hallas


Great Work: How to Make a Difference People Love, by David Sturt


The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good,, by Michael Leckie


The Importance Of A Strong Security Culture And How To Build One, by Perry Carpenter

Perry Carpenter's (ISC)2 Info Security Professional Journal 4 episode series on Security Awareness (Episode 1, Episode 2, Episode 3, Episode 4)


Security Culture and Credential Sharing, KnowBe4 Research


Security Culture Report 2021: A Global Security Culture Perspective During a Pandemic, KnowBe4 Research


Seven Dimensions of Security Culture, KnowBe4 Research


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Sep 2021 04:00:00 -0000</pubDate>
      <itunes:title>Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This is the second of a two part series covering Cybersecurity’s ABCs: Security Awareness, Behavior, and Culture. This episode discusses the difficulty that security leaders have in defining what a security culture actually is. Luckily, we can draw on learnings from organizational culture management and culture transformation experts.
Guests for this episode include, David Sturt, Executive Vice President of the O.C. Tanner Institute, author of Great Work: How to Make a Difference People Love and Appreciate: Celebrating People, Inspiring Greatness., Dr. Jessica Barker (co-CEO and Co-Founder, Socio-Technical Lead at Cygenta; author of Confident Cyber Security and co-author of Cybersecurity ABCs), Kai Roer, Chief Research Officer at KnowBe4, creator of the Security Culture Framework, author of Build a Security Culture, and Michael Leckie, founding partner at Silverback Partners, LLC and author of The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good.
Guests:

David Sturt

Dr. Jessica Barker

Kai Roer

Michael Leckie


References, Resources &amp; Books:


4 Ways to Build a Thoughtful Security Culture, by Perry Carpenter


7 Tips for Building a Strong Security Culture, by Perry Carpenter


Appreciate: Celebrating People, Inspiring Greatness, by David Sturt


Build a Security Culture, by Kai Roer


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Jessica Barker


Culture Rules! The 10 Core Principles of Corporate Culture, by John R. Childress


Cybersecurity ABCs: Delivering awareness, behaviours and culture change, by Jessica Barker, Adrian Davis, and Bruce Hallas


Great Work: How to Make a Difference People Love, by David Sturt


The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good,, by Michael Leckie


The Importance Of A Strong Security Culture And How To Build One, by Perry Carpenter

Perry Carpenter's (ISC)2 Info Security Professional Journal 4 episode series on Security Awareness (Episode 1, Episode 2, Episode 3, Episode 4)


Security Culture and Credential Sharing, KnowBe4 Research


Security Culture Report 2021: A Global Security Culture Perspective During a Pandemic, KnowBe4 Research


Seven Dimensions of Security Culture, KnowBe4 Research


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This is the second of a two part series covering Cybersecurity’s ABCs: Security Awareness, Behavior, and Culture. This episode discusses the difficulty that security leaders have in defining what a security culture actually is. Luckily, we can draw on learnings from organizational culture management and culture transformation experts.</p><p>Guests for this episode include, David Sturt, Executive Vice President of the <a href="https://www.octanner.com/company/institute.html">O.C. Tanner Institute</a>, author of <a href="https://www.amazon.com/Great-Work-Make-Difference-People/dp/0071818359/"><em>Great Work: How to Make a Difference People Love</em></a> and <a href="https://www.amazon.com/Appreciate-Celebrating-People-Inspiring-Greatness/dp/0996980806/"><em>Appreciate: Celebrating People, Inspiring Greatness</em></a>., Dr. Jessica Barker (co-CEO and Co-Founder, Socio-Technical Lead at <a href="https://www.cygenta.co.uk/">Cygenta</a>; author of <a href="https://www.confidentcyber.com/">Confident Cyber Security</a> and co-author of <a href="https://www.amazon.com/Cyber-Security-ABCs-Delivering-behaviours/dp/1780174241">Cybersecurity ABCs</a>), Kai Roer, Chief Research Officer at <a href="https://www.knowbe4.com/">KnowBe4</a>, creator of the Security Culture Framework, author of <a href="https://www.amazon.com/Build-Security-Culture-Governance-Publishing/dp/1849287163"><em>Build a Security Culture</em></a>, and Michael Leckie, founding partner at <a href="https://michaelleckie.com/about">Silverback Partners, LLC</a> and author of <a href="https://michaelleckie.com/book"><em>The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good</em></a>.</p><p>Guests:</p><ul>
<li><a href="https://www.linkedin.com/in/dsturt/">David Sturt</a></li>
<li><a href="https://www.linkedin.com/in/jessica-barker/">Dr. Jessica Barker</a></li>
<li><a href="https://www.linkedin.com/in/kairoer/">Kai Roer</a></li>
<li><a href="https://www.linkedin.com/in/mjleckie/">Michael Leckie</a></li>
</ul><p><br></p><p>References, Resources &amp; Books:</p><ul>
<li>
<a href="https://www.securityinfowatch.com/cybersecurity/article/21238675/4-ways-to-build-a-thoughtful-security-culture">4 Ways to Build a Thoughtful Security Culture</a>, by Perry Carpenter</li>
<li>
<a href="https://searchsecurity.techtarget.com/post/7-tips-for-building-a-strong-security-culture">7 Tips for Building a Strong Security Culture</a>, by Perry Carpenter</li>
<li>
<a href="https://www.amazon.com/Appreciate-Celebrating-People-Inspiring-Greatness/dp/0996980806/">Appreciate: Celebrating People, Inspiring Greatness</a>, by David Sturt</li>
<li>
<a href="https://www.amazon.com/Build-Security-Culture-Governance-Publishing/dp/1849287163">Build a Security Culture</a>, by Kai Roer</li>
<li>
<a href="https://www.confidentcyber.com/">Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career</a>, by Jessica Barker</li>
<li>
<a href="https://www.culturerulesbook.com/">Culture Rules! The 10 Core Principles of Corporate Culture</a>, by John R. Childress</li>
<li>
<a href="https://www.amazon.com/Cyber-Security-ABCs-Delivering-behaviours/dp/1780174241">Cybersecurity ABCs: Delivering awareness, behaviours and culture change</a>, by Jessica Barker, Adrian Davis, and Bruce Hallas</li>
<li>
<a href="https://www.amazon.com/Great-Work-Make-Difference-People/dp/0071818359/">Great Work: How to Make a Difference People Love</a>, by David Sturt</li>
<li>
<a href="https://michaelleckie.com/book">The Heart of Transformation: Build the Human Capabilities that Change Organizations for Good</a>,, by Michael Leckie</li>
<li>
<a href="https://www.forbes.com/sites/forbesbusinesscouncil/2021/05/27/the-importance-of-a-strong-security-culture-and-how-to-build-one/?sh=78abe3226d49">The Importance Of A Strong Security Culture And How To Build One</a>, by Perry Carpenter</li>
<li>Perry Carpenter's (ISC)2 Info Security Professional Journal 4 episode series on Security Awareness (<a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/may-jun/ISC2_InfoSecurityProfessional_May-June_2020_R.ashx">Episode 1</a>, <a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/jul-aug/ISC2_InfoSecurityProfessional_Jul-Aug2020_r.ashx">Episode 2</a>, <a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/Sept-Oct/ISC2_InfoSecurityProfessional_Sept-Oct2020.ashx">Episode 3</a>, <a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/nov-dec/ISC2_InfoSecurityProfessional_Nov-Dec2020.ashx">Episode 4</a>)</li>
<li>
<a href="https://get.clt.re/credential-sharing-research/">Security Culture and Credential Sharing</a>, KnowBe4 Research</li>
<li>
<a href="https://www.knowbe4.com/organizational-cyber-security-culture-research-report">Security Culture Report 2021: A Global Security Culture Perspective During a Pandemic</a>, KnowBe4 Research</li>
<li>
<a href="https://get.clt.re/seven-dimensions-security-culture/">Seven Dimensions of Security Culture</a>, KnowBe4 Research</li>
<li>
<a href="https://amzn.to/2Rp90U5">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
</ul><p><br></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2aa3ae9a-af60-11eb-aad2-0f0e88243553]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW9822551403.mp3?updated=1632771609" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security ABCs Part 1: Make Awareness Transformational</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/9/notes</link>
      <description>This is the first of a two part series covering Cybersecurity’s ABCs: Security Awareness, Behavior, and Culture. We touched on facets of Awareness in Episode 1 and Behavior in Episode 3. These two episodes cover the cybersecurity ABCs in a very pragmatic way, with this episode covering Awareness and Behavior and Episode 10 providing a deep dive into Culture.
Guests for this episode include, Dr. Jessica Barker (co-CEO and Co-Founder, Socio-Technical Lead at Cygenta; author of Confident Cyber Security and co-author of Cybersecurity ABCs), Chrysa Freeman (Senior Program Manager for Security Awareness at Code42), Ian Murphy (Founder, CyberOff), and Lauren Zink (Senior Security Awareness Specialist at Boeing; author of LinkedIn Learning courses: Creating a Security Awareness Program and Building a Security Awareness Program: Phishing Simulations).

Guests:

Dr. Jessica Barker

Chrysa Freeman

Ian Murphy

Lauren Zink


References, Resources &amp; Books:


5 Things You May Not Know About Security Awareness Training, by Perry Carpenter


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Jessica Barker


Cybersecurity ABCs: Delivering awareness, behaviours and culture change, by Jessica Barker, Adrian Davis, and Bruce Hallas


The Dilemma: Should you phish test during the COVID-19 pandemic?, by Perry Carpenter


Down the Rabbit Hole: Why People Question the Value of Security Awareness, by Perry Carpenter


Do You Care More about What Your People Know, or What they Do? Coming to grips with the knowledge-intention-behavior gap, by Perry Carpenter


The Fundamental Importance of Choice and Variety in Security Awareness Program Content, by Perry Carpenter

G.I. Joe Public Service Announcements compilation

Perry Carpenter's (ISC)2 Info Security Professional Journal 4 episode series on Security Awareness (Episode 1, Episode 2, Episode 3, Episode 4)


People-Centric Security: Transforming Your Enterprise Security Culture, by Lance Hayden


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter

Video: Simulated Phishing Campaign Notification for Your Users


Video: Coronavirus Phishing Post-Click User Education



Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future, by George Finney


What Reese’s Peanut Butter Cups can Teach Us about the Technology vs. Training Debate, by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Sep 2021 04:00:00 -0000</pubDate>
      <itunes:title>Security ABCs Part 1: Make Awareness Transformational</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This is the first of a two part series covering Cybersecurity’s ABCs: Security Awareness, Behavior, and Culture. We touched on facets of Awareness in Episode 1 and Behavior in Episode 3. These two episodes cover the cybersecurity ABCs in a very pragmatic way, with this episode covering Awareness and Behavior and Episode 10 providing a deep dive into Culture.
Guests for this episode include, Dr. Jessica Barker (co-CEO and Co-Founder, Socio-Technical Lead at Cygenta; author of Confident Cyber Security and co-author of Cybersecurity ABCs), Chrysa Freeman (Senior Program Manager for Security Awareness at Code42), Ian Murphy (Founder, CyberOff), and Lauren Zink (Senior Security Awareness Specialist at Boeing; author of LinkedIn Learning courses: Creating a Security Awareness Program and Building a Security Awareness Program: Phishing Simulations).

Guests:

Dr. Jessica Barker

Chrysa Freeman

Ian Murphy

Lauren Zink


References, Resources &amp; Books:


5 Things You May Not Know About Security Awareness Training, by Perry Carpenter


Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Jessica Barker


Cybersecurity ABCs: Delivering awareness, behaviours and culture change, by Jessica Barker, Adrian Davis, and Bruce Hallas


The Dilemma: Should you phish test during the COVID-19 pandemic?, by Perry Carpenter


Down the Rabbit Hole: Why People Question the Value of Security Awareness, by Perry Carpenter


Do You Care More about What Your People Know, or What they Do? Coming to grips with the knowledge-intention-behavior gap, by Perry Carpenter


The Fundamental Importance of Choice and Variety in Security Awareness Program Content, by Perry Carpenter

G.I. Joe Public Service Announcements compilation

Perry Carpenter's (ISC)2 Info Security Professional Journal 4 episode series on Security Awareness (Episode 1, Episode 2, Episode 3, Episode 4)


People-Centric Security: Transforming Your Enterprise Security Culture, by Lance Hayden


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter

Video: Simulated Phishing Campaign Notification for Your Users


Video: Coronavirus Phishing Post-Click User Education



Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future, by George Finney


What Reese’s Peanut Butter Cups can Teach Us about the Technology vs. Training Debate, by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This is the first of a two part series covering Cybersecurity’s ABCs: Security Awareness, Behavior, and Culture. We touched on facets of Awareness in Episode 1 and Behavior in Episode 3. These two episodes cover the cybersecurity ABCs in a very pragmatic way, with this episode covering Awareness and Behavior and Episode 10 providing a deep dive into Culture.</p><p>Guests for this episode include, Dr. Jessica Barker (co-CEO and Co-Founder, Socio-Technical Lead at <a href="https://www.cygenta.co.uk/">Cygenta</a>; author of <a href="https://www.confidentcyber.com/"><em>Confident Cyber Security</em></a> and co-author of <a href="https://www.amazon.com/Cyber-Security-ABCs-Delivering-behaviours/dp/1780174241"><em>Cybersecurity ABCs</em></a>), Chrysa Freeman (Senior Program Manager for Security Awareness at <a href="https://www.code42.com/">Code42</a>), Ian Murphy (Founder, <a href="https://www.cyberoff.co.uk/">CyberOff</a>), and Lauren Zink (Senior Security Awareness Specialist at <a href="https://www.boeing.com/">Boeing</a>; author of LinkedIn Learning courses: <a href="https://www.linkedin.com/learning/creating-a-security-awareness-program/">Creating a Security Awareness Program</a> and <a href="https://www.linkedin.com/learning/building-a-security-awareness-program-phishing-simulations">Building a Security Awareness Program: Phishing Simulations</a>).</p><p><br></p><p><strong>Guests:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/jessica-barker/">Dr. Jessica Barker</a></li>
<li><a href="(https://www.linkedin.com/in/chrysa-freeman/">Chrysa Freeman</a></li>
<li><a href="https://www.linkedin.com/in/ianmurphy/">Ian Murphy</a></li>
<li><a href="https://www.linkedin.com/in/laurenazink/">Lauren Zink</a></li>
</ul><p><br></p><p><strong>References, Resources &amp; Books:</strong></p><ul>
<li>
<a href="https://www.linkedin.com/pulse/5-things-you-may-know-security-awareness-training-perry-carpenter/">5 Things You May Not Know About Security Awareness Training</a>, by Perry Carpenter</li>
<li>
<a href="https://www.confidentcyber.com/"><em>Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career</em></a>, by Jessica Barker</li>
<li>
<a href="https://www.amazon.com/Cyber-Security-ABCs-Delivering-behaviours/dp/1780174241"><em>Cybersecurity ABCs: Delivering awareness, behaviours and culture change</em></a><em>,</em> by Jessica Barker, Adrian Davis, and Bruce Hallas</li>
<li>
<a href="https://blog.knowbe4.com/the-dilemma-should-you-phish-test-during-the-covid-19-pandemic">The Dilemma: Should you phish test during the COVID-19 pandemic?</a>, by Perry Carpenter</li>
<li>
<a href="https://www.linkedin.com/pulse/down-rabbit-hole-why-people-question-value-security-perry-carpenter/">Down the Rabbit Hole: Why People Question the Value of Security Awareness</a>, by Perry Carpenter</li>
<li>
<a href="https://www.linkedin.com/pulse/do-you-care-more-what-your-people-know-coming-grips-gap-carpenter/">Do You Care More about What Your People Know, or What they Do? Coming to grips with the knowledge-intention-behavior gap,</a> by Perry Carpenter</li>
<li>
<a href="https://www.linkedin.com/pulse/fundamental-importance-choice-variety-security-perry-carpenter/">The Fundamental Importance of Choice and Variety in Security Awareness Program Content</a>, by Perry Carpenter</li>
<li><a href="https://www.youtube.com/watch?v=dzyh_nEuh3M">G.I. Joe Public Service Announcements compilation</a></li>
<li>Perry Carpenter's (ISC)2 Info Security Professional Journal 4 episode series on Security Awareness (<a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/may-jun/ISC2_InfoSecurityProfessional_May-June_2020_R.ashx">Episode 1</a>, <a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/jul-aug/ISC2_InfoSecurityProfessional_Jul-Aug2020_r.ashx">Episode 2</a>, <a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/Sept-Oct/ISC2_InfoSecurityProfessional_Sept-Oct2020.ashx">Episode 3</a>, <a href="https://www.isc2.org/-/media/ISC2/Member-Resources/Infosecurity-Professional-Magazine/2020/nov-dec/ISC2_InfoSecurityProfessional_Nov-Dec2020.ashx">Episode 4</a>)</li>
<li>
<a href="https://www.amazon.com/People-Centric-Security-Transforming-Enterprise-Culture/dp/0071846778"><em>People-Centric Security: Transforming Your Enterprise Security Culture</em></a>, by Lance Hayden</li>
<li>
<a href="https://amzn.to/2Rp90U5"><em>Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</em></a>, by Perry Carpenter</li>
<li>Video: <a href="https://www.youtube.com/watch?v=GmnSZ9Zv6aQ">Simulated Phishing Campaign Notification for Your Users</a>
</li>
<li>Video: <a href="https://www.youtube.com/watch?v=kNH7mwdxabQ">Coronavirus Phishing Post-Click User Education</a>
</li>
<li>
<a href="https://amzn.to/3ykhhIN">Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future</a>, by George Finney</li>
<li>
<a href="https://www.linkedin.com/pulse/what-reeses-peanut-butter-cups-can-teach-us-vs-debate-perry-carpenter/">What Reese’s Peanut Butter Cups can Teach Us about the Technology vs. Training Debate</a>, by Perry Carpenter</li>
</ul><p><br></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a9e1098-af60-11eb-aad2-876068e424c4]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW1470297238.mp3?updated=1631483988" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Risk Episode: Black Swans, Grey Rhinos, Angels &amp; Demons</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/8/notes</link>
      <description>Risk is a funny thing – our minds are constantly looking for risk, scanning our environments and our available choices. And sometimes we do a great job at anticipating and avoiding risky situations. But that doesn’t mean that we are universally good at dealing with risk. In fact, we can be downright appalling at considering and avoiding risk.
In this episode, we explore the concept of risk, why we're so bad at understanding it, and the steps we can take to improve. Perry speaks with four risk experts who will help us understand the ups and downs of how we evaluate risk. We’ll touch on everything from Black Swans to Grey Rhinos to risk frameworks, risk equations, inbuilt risk in the design of computing interfaces, and more. Featuring Michele Wucker (author of The Grey Rhino and You Are What You Risk), Christian Hunt (Founder of Human Risk), Dr. Arun Vishwanath (Founder and Chief Technology Officer of Avant Research Group), and Matt Stamper (Chief Information Security Officer and Executive Advisor at EVOTEK and co-author of the CISO Desk Reference Guides vol1 &amp; vol2).
Guests:

Michele Wucker

Christian Hunt

Arun Vishwanath

Matt Stamper


Resources &amp; Books:

Black Swan Theory

Grey Rhino Events


Various Risk Equations



Risk Perception Equation, Freakonomics


20 Cognitive Biases That Affect Risk Decision Making, SafetyRisk.net


Factor Analysis of Information Risk (FAIR) Framework


The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore, by Michele Wucker


You Are What You Risk: The New Art and Science of Navigating an Uncertain World, by Michele Wucker


Why are Humans Bad at Calculating Risk?, Cogency


Why You're Probably Not So Great at Risk Assessment, NY Times


Why the Human Brain is a Poor Judge of Risk, Wired


Humans are Terrible at Assessing Risk, by Kimberly Forsythe


Why We're Awful at Assessing Risk, USA Today


CISO Desk Reference Guides vol1 &amp; vol2, by Bill Bonney, Gary Hayslip, Matt Stamper


Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Aug 2021 04:00:00 -0000</pubDate>
      <itunes:title>The Risk Episode: Black Swans, Grey Rhinos, Angels &amp; Demons</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Risk is a funny thing – our minds are constantly looking for risk, scanning our environments and our available choices. And sometimes we do a great job at anticipating and avoiding risky situations. But that doesn’t mean that we are universally good at dealing with risk. In fact, we can be downright appalling at considering and avoiding risk.
In this episode, we explore the concept of risk, why we're so bad at understanding it, and the steps we can take to improve. Perry speaks with four risk experts who will help us understand the ups and downs of how we evaluate risk. We’ll touch on everything from Black Swans to Grey Rhinos to risk frameworks, risk equations, inbuilt risk in the design of computing interfaces, and more. Featuring Michele Wucker (author of The Grey Rhino and You Are What You Risk), Christian Hunt (Founder of Human Risk), Dr. Arun Vishwanath (Founder and Chief Technology Officer of Avant Research Group), and Matt Stamper (Chief Information Security Officer and Executive Advisor at EVOTEK and co-author of the CISO Desk Reference Guides vol1 &amp; vol2).
Guests:

Michele Wucker

Christian Hunt

Arun Vishwanath

Matt Stamper


Resources &amp; Books:

Black Swan Theory

Grey Rhino Events


Various Risk Equations



Risk Perception Equation, Freakonomics


20 Cognitive Biases That Affect Risk Decision Making, SafetyRisk.net


Factor Analysis of Information Risk (FAIR) Framework


The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore, by Michele Wucker


You Are What You Risk: The New Art and Science of Navigating an Uncertain World, by Michele Wucker


Why are Humans Bad at Calculating Risk?, Cogency


Why You're Probably Not So Great at Risk Assessment, NY Times


Why the Human Brain is a Poor Judge of Risk, Wired


Humans are Terrible at Assessing Risk, by Kimberly Forsythe


Why We're Awful at Assessing Risk, USA Today


CISO Desk Reference Guides vol1 &amp; vol2, by Bill Bonney, Gary Hayslip, Matt Stamper


Music and Sound Effects by Blue Dot Sessions, Envato Elements, &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Risk is a funny thing – our minds are constantly looking for risk, scanning our environments and our available choices. And sometimes we do a great job at anticipating and avoiding risky situations. But that doesn’t mean that we are universally good at dealing with risk. In fact, we can be downright appalling at considering and avoiding risk.</p><p>In this episode, we explore the concept of risk, why we're so bad at understanding it, and the steps we can take to improve. Perry speaks with four risk experts who will help us understand the ups and downs of how we evaluate risk. We’ll touch on everything from Black Swans to Grey Rhinos to risk frameworks, risk equations, inbuilt risk in the design of computing interfaces, and more. Featuring Michele Wucker (author of <a href="https://www.amazon.com/Gray-Rhino-Recognize-Obvious-Dangers/dp/125005382X">The Grey Rhino</a> and <a href="https://www.amazon.com/You-Are-What-Risk-Navigating/dp/164313678X">You Are What You Risk</a>), Christian Hunt (Founder of <a href="https://www.human-risk.com/">Human Risk</a>), Dr. Arun Vishwanath (Founder and Chief Technology Officer of <a href="https://www.avantresearchgroup.com/">Avant Research Group</a>), and Matt Stamper (Chief Information Security Officer and Executive Advisor at <a href="https://www.evotek.com/">EVOTEK</a> and co-author of the <a href="https://cisodrg.com/">CISO Desk Reference Guides</a> <a href="https://www.amazon.com/CISO-Desk-Reference-Guide-Practical/dp/0997744154">vol1</a> &amp; <a href="https://www.amazon.com/CISO-Desk-Reference-Guide-Practical/dp/0997744146/">vol2</a>).</p><p><strong>Guests:</strong></p><ul>
<li><a href="https://www.linkedin.com/in/wucker/">Michele Wucker</a></li>
<li><a href="https://www.linkedin.com/in/humanrisk/">Christian Hunt</a></li>
<li><a href="https://www.linkedin.com/in/arun-vishwanath-31a52912/">Arun Vishwanath</a></li>
<li><a href="https://www.linkedin.com/in/stamper/">Matt Stamper</a></li>
</ul><p><br></p><p><strong>Resources &amp; Books:</strong></p><ul>
<li><a href="https://en.wikipedia.org/wiki/Black_swan_theory">Black Swan Theory</a></li>
<li><a href="https://www.oilspillresponse.com/news--media/insights/preparing-for-a-grey-rhino-event/">Grey Rhino Events</a></li>
<li>
<a href="https://securityintelligence.com/simplifying-risk-management/">Various</a> <a href="http://www.icharter.org/articles/risk_equation.html">Risk</a> <a href="https://www.redrisks.com/what-is-risk-and-the-risk-equation/">Equations</a>
</li>
<li>
<a href="https://freakonomics.com/2011/11/29/risk-hazard-outrage-a-conversation-with-risk-consultant-peter-sandman/#:~:text=To%20accomplish%20all%20this%2C%20Sandman,%3A%20Risk%20%3D%20Hazard%20%2B%20Outrage.">Risk Perception Equation</a>, Freakonomics</li>
<li>
<a href="https://safetyrisk.net/20-cognitive-biases-that-affect-risk-decision-making/#comments">20 Cognitive Biases That Affect Risk Decision Making</a>, SafetyRisk.net</li>
<li>
<a href="https://en.wikipedia.org/wiki/Factor_analysis_of_information_risk">Factor Analysis of Information Risk</a> (<a href="https://www.fairinstitute.org/what-is-fair">FAIR</a>) Framework</li>
<li>
<a href="https://www.amazon.com/Gray-Rhino-Recognize-Obvious-Dangers/dp/125005382X">The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore</a>, by Michele Wucker</li>
<li>
<a href="https://www.amazon.com/You-Are-What-Risk-Navigating/dp/164313678X/">You Are What You Risk: The New Art and Science of Navigating an Uncertain World</a>, by Michele Wucker</li>
<li>
<a href="https://www.cogencyteam.com/news/2018/02/why-are-humans-bad-at-calculating-risk/">Why are Humans Bad at Calculating Risk?</a>, Cogency</li>
<li>
<a href="https://www.nytimes.com/2020/06/30/smarter-living/why-youre-probably-not-so-great-at-risk-assessment.html">Why You're Probably Not So Great at Risk Assessment</a>, NY Times</li>
<li>
<a href="https://www.wired.com/2007/03/security-matters0322/">Why the Human Brain is a Poor Judge of Risk</a>, Wired</li>
<li>
<a href="https://medium.com/disrupt-or-be-disrupted/humans-are-terrible-at-assessing-risk-a84992ca3e16">Humans are Terrible at Assessing Risk</a>, by Kimberly Forsythe</li>
<li>
<a href="https://www.usatoday.com/story/money/personalfinance/2014/03/17/why-were-awful-at-assessing-risk/6530753/">Why We're Awful at Assessing Risk</a>, USA Today</li>
<li>
<a href="https://cisodrg.com/">CISO Desk Reference Guides</a> <a href="https://www.amazon.com/CISO-Desk-Reference-Guide-Practical/dp/0997744154">vol1</a> &amp; <a href="https://www.amazon.com/CISO-Desk-Reference-Guide-Practical/dp/0997744146/">vol2</a>, by Bill Bonney, Gary Hayslip, Matt Stamper</li>
</ul><p><br></p><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, &amp; <a href="https://www.storyblocks.com/">Storyblocks</a>.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3040</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a98721e-af60-11eb-aad2-3be337213d97]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2138839903.mp3?updated=1630329421" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Going Mental: A Conversation with Banachek</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/7/notes</link>
      <description>In this episode, Perry Carpenter sits down with renowned mentalist and skeptic, Banachek. Banachek (Steve Shaw) grew up with a fascination in magic and a frustration with psychic frauds. As a teenager, he contacted magician and skeptic, James “The Amazing” Randi and ended up working with Randi on a special initiative known as Project Alpha, which set out to expose a general lack of objectivity in parapsychology research. Banachek served as the director for the James Randi Educational Foundation’s “One Million Dollar Paranormal Challenge” for 15 years and is now the President of the James Randi Educational Foundation. 
Perry and Banachek discuss Project Alpha, the ways of fake psychics and fraudulent faith healers, and issues associated with confirmation bias and framing effects. They also discuss Banachek’s new live mentalism show in Las Vegas, which incorporates theatrical mindreading and other mentalism effects along with a storyline that explores Banachek’s life, antics, and passion for critical thinking.

Guest: 

Banachek (Website) (twitter): Mentalist (Performing in Las Vegas add 'social' for 30% off tickets), Skeptic, President of the James Randi Educational Foundation


This episode also featured a quick comment from: George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security



Books and References:

Banachek Wikipedia entry

Project Alpha Wikipedia entry

James Randi Wikipedia entry

Article about Houdini's efforts to debunk fake mediums

The Discoverie of Witchcraft Wikipedia entry

The Psychology of the Ouija

Barnum Effect Wikipedia entry

James Randi &amp; Project Alpha Video

Project Alpha lookback -- James Randi and Michael Edwards


Psychological Subtleties vol 1, by Banachek


Behind the Scenes with the Mediums, by David Abbott

The Discoverie of Witchcraft


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Aug 2021 04:00:00 -0000</pubDate>
      <itunes:title>Going Mental: A Conversation with Banachek</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Perry Carpenter sits down with renowned mentalist and skeptic, Banachek. Banachek (Steve Shaw) grew up with a fascination in magic and a frustration with psychic frauds. As a teenager, he contacted magician and skeptic, James “The Amazing” Randi and ended up working with Randi on a special initiative known as Project Alpha, which set out to expose a general lack of objectivity in parapsychology research. Banachek served as the director for the James Randi Educational Foundation’s “One Million Dollar Paranormal Challenge” for 15 years and is now the President of the James Randi Educational Foundation. 
Perry and Banachek discuss Project Alpha, the ways of fake psychics and fraudulent faith healers, and issues associated with confirmation bias and framing effects. They also discuss Banachek’s new live mentalism show in Las Vegas, which incorporates theatrical mindreading and other mentalism effects along with a storyline that explores Banachek’s life, antics, and passion for critical thinking.

Guest: 

Banachek (Website) (twitter): Mentalist (Performing in Las Vegas add 'social' for 30% off tickets), Skeptic, President of the James Randi Educational Foundation


This episode also featured a quick comment from: George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security



Books and References:

Banachek Wikipedia entry

Project Alpha Wikipedia entry

James Randi Wikipedia entry

Article about Houdini's efforts to debunk fake mediums

The Discoverie of Witchcraft Wikipedia entry

The Psychology of the Ouija

Barnum Effect Wikipedia entry

James Randi &amp; Project Alpha Video

Project Alpha lookback -- James Randi and Michael Edwards


Psychological Subtleties vol 1, by Banachek


Behind the Scenes with the Mediums, by David Abbott

The Discoverie of Witchcraft


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Perry Carpenter sits down with renowned mentalist and skeptic, Banachek. Banachek (Steve Shaw) grew up with a fascination in magic and a frustration with psychic frauds. As a teenager, he contacted magician and skeptic, James “The Amazing” Randi and ended up working with Randi on a special initiative known as Project Alpha, which set out to expose a general lack of objectivity in parapsychology research. Banachek served as the director for the James Randi Educational Foundation’s “One Million Dollar Paranormal Challenge” for 15 years and is now the President of the James Randi Educational Foundation. </p><p>Perry and Banachek discuss Project Alpha, the ways of fake psychics and fraudulent faith healers, and issues associated with confirmation bias and framing effects. They also discuss Banachek’s new live mentalism show in Las Vegas, which incorporates theatrical mindreading and other mentalism effects along with a storyline that explores Banachek’s life, antics, and passion for critical thinking.</p><p><br></p><p><strong>Guest: </strong></p><ul>
<li>Banachek (<a href="https://banachek.com/">Website</a>) (<a href="https://twitter.com/Banachek">twitter</a>): Mentalist (<a href="https://tinyurl.com/ticketsBanachek">Performing in Las Vegas</a> add 'social' for 30% off tickets), Skeptic, President of the <a href="https://web.randi.org/">James Randi Educational Foundation</a>
</li>
<li>This episode also featured a quick comment from: <strong>George Finney</strong>: (<a href="https://www.linkedin.com/in/georgefinney/">LinkedIn</a>); Chief Security Officer at <a href="https://www.smu.edu/">Southern Methodist University</a>; Founder of <a href="https://wellawaresecurity.com/">Well Aware Security</a>
</li>
</ul><p><br></p><p><strong>Books and References:</strong></p><ul>
<li><a href="https://en.wikipedia.org/wiki/Banachek">Banachek Wikipedia entry</a></li>
<li><a href="https://en.wikipedia.org/wiki/Project_Alpha">Project Alpha Wikipedia entry</a></li>
<li><a href="https://en.wikipedia.org/wiki/James_Randi">James Randi Wikipedia entry</a></li>
<li><a href="https://www.mentalfloss.com/article/53424/houdinis-greatest-trick-debunking-medium-mina-crandon">Article about Houdini's efforts to debunk fake mediums</a></li>
<li><a href="https://en.wikipedia.org/wiki/The_Discoverie_of_Witchcraft">The Discoverie of Witchcraft Wikipedia entry</a></li>
<li><a href="https://wellcomecollection.org/articles/XO2LKRAAAENibaF7">The Psychology of the Ouija</a></li>
<li><a href="https://en.wikipedia.org/wiki/Barnum_effect">Barnum Effect Wikipedia entry</a></li>
<li><a href="https://www.youtube.com/watch?v=z1S5CRcqJQo">James Randi &amp; Project Alpha Video</a></li>
<li><a href="https://www.youtube.com/watch?v=b9n7i9_kAFw">Project Alpha lookback -- James Randi and Michael Edwards</a></li>
<li>
<a href="https://www.amazon.com/Psychological-Subtleties-Vol-1-Banachek/dp/B003B0WWSO">Psychological Subtleties vol 1</a>, by Banachek</li>
<li>
<a href="https://www.amazon.com/Behind-Scenes-Mediums-David-Abbott/dp/B01M0GCKWT">Behind the Scenes with the Mediums</a>, by David Abbott</li>
<li><a href="https://www.amazon.com/Discoverie-Witchcraft-Classic-Reprint/dp/1330251407">The Discoverie of Witchcraft</a></li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a> by Perry Carpenter</li>
</ul><p><br></p><p>Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>4165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a92e8da-af60-11eb-aad2-2fde28da5d88]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5049859695.mp3?updated=1629133366" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Embrace an Attacker Mindset to Improve Security</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/6/notes</link>
      <description>Have you ever taken time to view the world through the eyes of an attacker? Doing so is an interesting and useful exercise. Understanding the mind of an attacker is fundamental to securing your organization or aspects of your personal life. After all, if you aren't doing the job of viewing things from an attacker's perspective, that means that only the attackers are. The idea is to understand the mindset, motivations, and capabilities of a possible threat actor so that you aren’t simply oblivious to your vulnerabilities. 
This episode is a deep dive into attacker mindsets, we’ll hear from four experts who really know what it is to view the world through the eyes of an attacker. Featuring Chris Kirsch (DEF CON Social Engineering CTF Black Badge winner and co-founder of Rumble, Inc.), David Kennedy (Founder of Binary Defense and TrustedSec), Maxie Reynolds (Author of The Art of Attack: Attacker Mindset for Security Professionals, and Technical Team Leader, Social-Engineer, LLC), and Ted Harrington (Author of Hackable: How to Do Application Security Right, and Executive Partner at Independent Security Evaluators).
Guests:

Maxie Reynolds (https://www.linkedin.com/in/maxiereynolds/)

David Kennedy (https://www.linkedin.com/in/davidkennedy4/)

Chris Kirsch (https://www.linkedin.com/in/ckirsch/)

Ted Harrington (https://www.linkedin.com/in/securityted/)


Books and References:

Bruce Schneier blog about the Security Mindset: https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html


Origin of "Devil's Advocate": https://allthatsinteresting.com/devils-advocate-origin


Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html


What is Threat Modeling: https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/


12 Methods of threat Modeling: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/



The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds


Hackable: How to Do Application Security Right by Ted Harrington


The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick


Threat Modeling: Designing for Security by Adam Shostack


Threat Modeling: A Practical Guide for Development Teams by Izar Tarandach and Matthew J. Coles


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Aug 2021 04:00:00 -0000</pubDate>
      <itunes:title>Embrace an Attacker Mindset to Improve Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Have you ever taken time to view the world through the eyes of an attacker? Doing so is an interesting and useful exercise. Understanding the mind of an attacker is fundamental to securing your organization or aspects of your personal life. After all, if you aren't doing the job of viewing things from an attacker's perspective, that means that only the attackers are. The idea is to understand the mindset, motivations, and capabilities of a possible threat actor so that you aren’t simply oblivious to your vulnerabilities. 
This episode is a deep dive into attacker mindsets, we’ll hear from four experts who really know what it is to view the world through the eyes of an attacker. Featuring Chris Kirsch (DEF CON Social Engineering CTF Black Badge winner and co-founder of Rumble, Inc.), David Kennedy (Founder of Binary Defense and TrustedSec), Maxie Reynolds (Author of The Art of Attack: Attacker Mindset for Security Professionals, and Technical Team Leader, Social-Engineer, LLC), and Ted Harrington (Author of Hackable: How to Do Application Security Right, and Executive Partner at Independent Security Evaluators).
Guests:

Maxie Reynolds (https://www.linkedin.com/in/maxiereynolds/)

David Kennedy (https://www.linkedin.com/in/davidkennedy4/)

Chris Kirsch (https://www.linkedin.com/in/ckirsch/)

Ted Harrington (https://www.linkedin.com/in/securityted/)


Books and References:

Bruce Schneier blog about the Security Mindset: https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html


Origin of "Devil's Advocate": https://allthatsinteresting.com/devils-advocate-origin


Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html


What is Threat Modeling: https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/


12 Methods of threat Modeling: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/



The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds


Hackable: How to Do Application Security Right by Ted Harrington


The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick


Threat Modeling: Designing for Security by Adam Shostack


Threat Modeling: A Practical Guide for Development Teams by Izar Tarandach and Matthew J. Coles


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Have you ever taken time to view the world through the eyes of an attacker? Doing so is an interesting and useful exercise. Understanding the mind of an attacker is fundamental to securing your organization or aspects of your personal life. After all, if you aren't doing the job of viewing things from an attacker's perspective, that means that only the attackers are. The idea is to understand the mindset, motivations, and capabilities of a possible threat actor so that you aren’t simply oblivious to your vulnerabilities. </p><p>This episode is a deep dive into attacker mindsets, we’ll hear from four experts who really know what it is to view the world through the eyes of an attacker. Featuring Chris Kirsch (DEF CON Social Engineering CTF Black Badge winner and co-founder of Rumble, Inc.), David Kennedy (Founder of Binary Defense and TrustedSec), Maxie Reynolds (Author of <a href="https://www.amazon.com/Art-Attack-Attacker-Security-Professionals/dp/1119805465"><em>The Art of Attack: Attacker Mindset for Security Professionals</em></a>, and Technical Team Leader, Social-Engineer, LLC), and Ted Harrington (Author of <a href="https://www.amazon.com/Hackable-How-Application-Security-Right/dp/1544517661">Hackable: How to Do Application Security Right</a>, and Executive Partner at Independent Security Evaluators).</p><p><strong>Guests:</strong></p><ul>
<li>Maxie Reynolds (<a href="https://www.linkedin.com/in/maxiereynolds/">https://www.linkedin.com/in/maxiereynolds/</a>)</li>
<li>David Kennedy (<a href="https://www.linkedin.com/in/davidkennedy4/">https://www.linkedin.com/in/davidkennedy4/</a>)</li>
<li>Chris Kirsch (<a href="https://www.linkedin.com/in/ckirsch/">https://www.linkedin.com/in/ckirsch/</a>)</li>
<li>Ted Harrington (<a href="https://www.linkedin.com/in/securityted/">https://www.linkedin.com/in/securityted/</a>)</li>
</ul><p><br></p><p><strong>Books and References:</strong></p><ul>
<li>Bruce Schneier blog about the Security Mindset: <a href="https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html">https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html</a>
</li>
<li>Origin of "Devil's Advocate": <a href="https://allthatsinteresting.com/devils-advocate-origin">https://allthatsinteresting.com/devils-advocate-origin</a>
</li>
<li>Lockheed Martin Cyber Kill-Chain: <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html</a>
</li>
<li>What is Threat Modeling: <a href="https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/">https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/</a>
</li>
<li>12 Methods of threat Modeling: <a href="https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/">https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/</a>
</li>
<li>
<a href="https://www.amazon.com/Art-Attack-Attacker-Security-Professionals/dp/1119805465">The Art of Attack: Attacker Mindset for Security Professionals</a> by Maxie Reynolds</li>
<li>
<a href="https://www.amazon.com/Hackable-How-Application-Security-Right/dp/1544517661">Hackable: How to Do Application Security Right</a> by Ted Harrington</li>
<li>
<a href="https://www.amazon.com/Art-Deception-Controlling-Element-Security/dp/076454280X">The Art of Deception: Controlling the Human Element of Security</a> by Kevin Mitnick</li>
<li>
<a href="https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998">Threat Modeling: Designing for Security</a> by Adam Shostack</li>
<li>
<a href="https://www.amazon.com/Threat-Modeling-Identification-Avoidance-Secure/dp/1492056553">Threat Modeling: A Practical Guide for Development Teams</a> by Izar Tarandach and Matthew J. Coles</li>
<li>
<a href="https://www.amazon.com/Transformational-Security-Awareness-Neuroscientists-Storytellers/dp/1119566347">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a> by Perry Carpenter</li>
</ul><p><br></p><p>Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3719</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a8d3d22-af60-11eb-aad2-df6083ce6e59]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3740685088.mp3?updated=1627975040" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Going Meta: A Conversation and AMA with Bruce Schneier</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/5/notes</link>
      <description>In this episode, Perry Carpenter interviews cybersecurity guru Bruce Schneier. Perry and Bruce explore how cybersecurity is about so much more than technology — It’s about people, so we benefit by taking a multidisciplinary approach. 
In preparing for this interview, Perry solicited his LinkedIn network to see what questions people had for Bruce. This is a wide ranging conversation covering everything from Bruce’s thoughts on cybersecurity’s “first principles” to the impact that the pandemic had on society to need for regulation to help raise the overall standards for security and privacy.
Guest: Bruce Schneier (https://www.schneier.com/blog/about/) (https://twitter.com/schneierblog)

Bruce's personal website 'about me' page: https://www.schneier.com/blog/about/


Wikipedia article about Bruce Schneier: https://en.wikipedia.org/wiki/Bruce_Schneier


Another background article about Bruce: https://www.cybersecurityeducationguides.org/bruce-schneier-legendary-cryptographer/


More Background on Bruce: http://academickids.com/encyclopedia/index.php/Bruce_Schneier


Bruce's Solitaire encryption algorithm: https://www.schneier.com/academic/solitaire/


More info on the Solitaire algorithm: https://www.schneier.com/blog/archives/2019/10/more_cryptanaly.html


Proximity Blindness: https://dannyozment.com/cant-see-the-forest-for-the-trees-the-dangers-of-proximity-blindness-2/


The story of the Blind Men and an Elephant: https://en.wikipedia.org/wiki/Blind_men_and_an_elephant


Cryptography After the Aliens Land: https://www.schneier.com/essays/archives/2018/09/cryptography_after_t.html


Secrets and Lies book preface with "If you think" quote: https://www.schneier.com/books/secrets-and-lies-pref/


"if you think cryptography" quote: https://news.ycombinator.com/item?id=19589899



Recommended Books (Amazon affiliate links):


Applied Cryptography: Protocols, Algorithms and Source Code in C, by Bruce Schneier


Beyond Fear: Thinking Sensibly About Security in an Uncertain World, by Bruce Schneier


Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, by Bruce Schneier


Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto, by Roger Grimes


Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, by Bruce Schneier


Liars and Outliers: Enabling the Trust that Society Needs to Thrive, by Bruce Schneier


Secrets and Lies: Digital Security in a Networked World, by Bruce Schneier


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jul 2021 04:00:00 -0000</pubDate>
      <itunes:title>Going Meta: A Conversation and AMA with Bruce Schneier</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Perry Carpenter interviews cybersecurity guru Bruce Schneier. Perry and Bruce explore how cybersecurity is about so much more than technology — It’s about people, so we benefit by taking a multidisciplinary approach. 
In preparing for this interview, Perry solicited his LinkedIn network to see what questions people had for Bruce. This is a wide ranging conversation covering everything from Bruce’s thoughts on cybersecurity’s “first principles” to the impact that the pandemic had on society to need for regulation to help raise the overall standards for security and privacy.
Guest: Bruce Schneier (https://www.schneier.com/blog/about/) (https://twitter.com/schneierblog)

Bruce's personal website 'about me' page: https://www.schneier.com/blog/about/


Wikipedia article about Bruce Schneier: https://en.wikipedia.org/wiki/Bruce_Schneier


Another background article about Bruce: https://www.cybersecurityeducationguides.org/bruce-schneier-legendary-cryptographer/


More Background on Bruce: http://academickids.com/encyclopedia/index.php/Bruce_Schneier


Bruce's Solitaire encryption algorithm: https://www.schneier.com/academic/solitaire/


More info on the Solitaire algorithm: https://www.schneier.com/blog/archives/2019/10/more_cryptanaly.html


Proximity Blindness: https://dannyozment.com/cant-see-the-forest-for-the-trees-the-dangers-of-proximity-blindness-2/


The story of the Blind Men and an Elephant: https://en.wikipedia.org/wiki/Blind_men_and_an_elephant


Cryptography After the Aliens Land: https://www.schneier.com/essays/archives/2018/09/cryptography_after_t.html


Secrets and Lies book preface with "If you think" quote: https://www.schneier.com/books/secrets-and-lies-pref/


"if you think cryptography" quote: https://news.ycombinator.com/item?id=19589899



Recommended Books (Amazon affiliate links):


Applied Cryptography: Protocols, Algorithms and Source Code in C, by Bruce Schneier


Beyond Fear: Thinking Sensibly About Security in an Uncertain World, by Bruce Schneier


Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, by Bruce Schneier


Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto, by Roger Grimes


Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, by Bruce Schneier


Liars and Outliers: Enabling the Trust that Society Needs to Thrive, by Bruce Schneier


Secrets and Lies: Digital Security in a Networked World, by Bruce Schneier


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Perry Carpenter interviews cybersecurity guru Bruce Schneier. Perry and Bruce explore how cybersecurity is about so much more than technology — It’s about people, so we benefit by taking a multidisciplinary approach. </p><p>In preparing for this interview, Perry solicited his LinkedIn network to see what questions people had for Bruce. This is a wide ranging conversation covering everything from Bruce’s thoughts on cybersecurity’s “first principles” to the impact that the pandemic had on society to need for regulation to help raise the overall standards for security and privacy.</p><p><strong>Guest: Bruce Schneier (</strong><a href="https://www.schneier.com/blog/about/"><strong>https://www.schneier.com/blog/about/</strong></a><strong>) (</strong><a href="https://twitter.com/schneierblog"><strong>https://twitter.com/schneierblog</strong></a><strong>)</strong></p><ul>
<li>Bruce's personal website 'about me' page: <a href="https://www.schneier.com/blog/about/">https://www.schneier.com/blog/about/</a>
</li>
<li>Wikipedia article about Bruce Schneier: <a href="https://en.wikipedia.org/wiki/Bruce_Schneier">https://en.wikipedia.org/wiki/Bruce_Schneier</a>
</li>
<li>Another background article about Bruce: <a href="https://www.cybersecurityeducationguides.org/bruce-schneier-legendary-cryptographer/">https://www.cybersecurityeducationguides.org/bruce-schneier-legendary-cryptographer/</a>
</li>
<li>More Background on Bruce: <a href="http://academickids.com/encyclopedia/index.php/Bruce_Schneier">http://academickids.com/encyclopedia/index.php/Bruce_Schneier</a>
</li>
<li>Bruce's Solitaire encryption algorithm: <a href="https://www.schneier.com/academic/solitaire/">https://www.schneier.com/academic/solitaire/</a>
</li>
<li>More info on the Solitaire algorithm: <a href="https://www.schneier.com/blog/archives/2019/10/more_cryptanaly.html">https://www.schneier.com/blog/archives/2019/10/more_cryptanaly.html</a>
</li>
<li>Proximity Blindness: <a href="https://dannyozment.com/cant-see-the-forest-for-the-trees-the-dangers-of-proximity-blindness-2/">https://dannyozment.com/cant-see-the-forest-for-the-trees-the-dangers-of-proximity-blindness-2/</a>
</li>
<li>The story of the Blind Men and an Elephant: <a href="https://en.wikipedia.org/wiki/Blind_men_and_an_elephant">https://en.wikipedia.org/wiki/Blind_men_and_an_elephant</a>
</li>
<li>Cryptography After the Aliens Land: <a href="https://www.schneier.com/essays/archives/2018/09/cryptography_after_t.html">https://www.schneier.com/essays/archives/2018/09/cryptography_after_t.html</a>
</li>
<li>Secrets and Lies book preface with "If you think" quote: <a href="https://www.schneier.com/books/secrets-and-lies-pref/">https://www.schneier.com/books/secrets-and-lies-pref/</a>
</li>
<li>"if you think cryptography" quote: <a href="https://news.ycombinator.com/item?id=19589899">https://news.ycombinator.com/item?id=19589899</a>
</li>
</ul><p><br></p><p><strong>Recommended Books (Amazon affiliate links):</strong></p><ul>
<li>
<a href="https://amzn.to/3wMxANw">Applied Cryptography: Protocols, Algorithms and Source Code in C</a>, by Bruce Schneier</li>
<li>
<a href="https://amzn.to/3ilo8vg">Beyond Fear: Thinking Sensibly About Security in an Uncertain World</a>, by Bruce Schneier</li>
<li>
<a href="https://amzn.to/3hJD2MC">Click Here to Kill Everybody: Security and Survival in a Hyper-connected World</a>, by Bruce Schneier</li>
<li>
<a href="https://amzn.to/3zc8k4W">Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto</a>, by Roger Grimes</li>
<li>
<a href="https://amzn.to/3iCLexJ">Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World</a>, by Bruce Schneier</li>
<li>
<a href="https://amzn.to/3exBwLB">Liars and Outliers: Enabling the Trust that Society Needs to Thrive</a>, by Bruce Schneier</li>
<li>
<a href="https://amzn.to/3xRTZdt">Secrets and Lies: Digital Security in a Networked World</a>, by Bruce Schneier</li>
<li>
<a href="https://amzn.to/2Rp90U5">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a> by Perry Carpenter</li>
</ul><p><br></p><p>Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3138</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a87b24e-af60-11eb-aad2-cb7e2dd5b336]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW3032324414.mp3?updated=1626703066" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deceptionology 101: Introduction to the Dark Arts</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/4/notes</link>
      <description>Have you ever noticed how fundamental deception is to the human condition? Deception and forms of social engineering have been with us since the beginning of recorded history. And yet, it seems like we are just as vulnerable to it as ever. But now the stakes are higher because technology allows social engineers to deceive at scale.
This episode explores the psychology of deception, provides a foundation for understanding social engineering, offers a few mental models for exploration and exploitation, and discusses how we can prepare our mental defenses.
Guests:


Rachael Tobac: (LinkedIn), CEO of SocialProof Security



Chris Hadnagy: (LinkedIn); CEO of Social Engineer, LLC; Founder of Innocent Lives Foundation; Founder of Social-Engineer.org



Lisa Forte: (LinkedIn); Partner at Red Goat Cyber Security; Co-Founder Cyber Volunteers 19



George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security



Notes &amp; Resources:

CSO Online article on Social Engineering

OODA Loop

Understanding Framing Effects

More examples of Framing Effects

Harvard Business Review article on the Principles of Persuasion

A blog series I did on Deception (Part 1), (Part 2).

PsychologyToday article on Social Engineering


Recommended Books (Amazon affiliate links):


The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick


Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You by Chris Hadnagy


Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini


Pre-Suasion: A Revolutionary Way to Influence and Persuade by Robert Cialdini


Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray


Social Engineering: The Science of Human Hacking by Chris Hadnagy


Thinking, Fast and Slow by Daniel Kahneman.


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future by George Finney


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Jul 2021 04:00:00 -0000</pubDate>
      <itunes:title>Deceptionology 101: Introduction to the Dark Arts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Have you ever noticed how fundamental deception is to the human condition? Deception and forms of social engineering have been with us since the beginning of recorded history. And yet, it seems like we are just as vulnerable to it as ever. But now the stakes are higher because technology allows social engineers to deceive at scale.
This episode explores the psychology of deception, provides a foundation for understanding social engineering, offers a few mental models for exploration and exploitation, and discusses how we can prepare our mental defenses.
Guests:


Rachael Tobac: (LinkedIn), CEO of SocialProof Security



Chris Hadnagy: (LinkedIn); CEO of Social Engineer, LLC; Founder of Innocent Lives Foundation; Founder of Social-Engineer.org



Lisa Forte: (LinkedIn); Partner at Red Goat Cyber Security; Co-Founder Cyber Volunteers 19



George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security



Notes &amp; Resources:

CSO Online article on Social Engineering

OODA Loop

Understanding Framing Effects

More examples of Framing Effects

Harvard Business Review article on the Principles of Persuasion

A blog series I did on Deception (Part 1), (Part 2).

PsychologyToday article on Social Engineering


Recommended Books (Amazon affiliate links):


The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick


Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You by Chris Hadnagy


Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini


Pre-Suasion: A Revolutionary Way to Influence and Persuade by Robert Cialdini


Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray


Social Engineering: The Science of Human Hacking by Chris Hadnagy


Thinking, Fast and Slow by Daniel Kahneman.


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future by George Finney


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Have you ever noticed how fundamental deception is to the human condition? Deception and forms of social engineering have been with us since the beginning of recorded history. And yet, it seems like we are just as vulnerable to it as ever. But now the stakes are higher because technology allows social engineers to deceive at scale.</p><p>This episode explores the psychology of deception, provides a foundation for understanding social engineering, offers a few mental models for exploration and exploitation, and discusses how we can prepare our mental defenses.</p><p><strong>Guests:</strong></p><ul>
<li>
<strong>Rachael Tobac: </strong>(<a href="https://www.linkedin.com/in/racheltobac/">LinkedIn</a>), CEO of <a href="https://www.socialproofsecurity.com/">SocialProof Security</a>
</li>
<li>
<strong>Chris Hadnagy: </strong>(<a href="https://www.linkedin.com/in/christopherhadnagy/">LinkedIn</a>); CEO of <a href="https://www.social-engineer.com/">Social Engineer, LLC</a>; Founder of <a href="https://www.innocentlivesfoundation.org/">Innocent Lives Foundation</a>; Founder of <a href="https://www.social-engineer.org/">Social-Engineer.org</a>
</li>
<li>
<strong>Lisa Forte: </strong>(<a href="https://www.linkedin.com/in/lisa-forte/">LinkedIn</a>);<strong> </strong>Partner at <a href="https://red-goat.com/">Red Goat Cyber Security</a>; Co-Founder <a href="https://cyberv19.org.uk/">Cyber Volunteers 19</a>
</li>
<li>
<strong>George Finney: </strong>(<a href="https://www.linkedin.com/in/georgefinney/">LinkedIn</a>);<strong> </strong>Chief Security Officer at <a href="https://www.smu.edu/">Southern Methodist University</a>; Founder of <a href="https://wellawaresecurity.com/">Well Aware Security</a>
</li>
</ul><p><br></p><p><strong>Notes &amp; Resources:</strong></p><ul>
<li>CSO Online <a href="https://www.csoonline.com/article/2124681/what-is-social-engineering.html">article</a> on Social Engineering</li>
<li><a href="https://en.wikipedia.org/wiki/OODA_loop">OODA Loop</a></li>
<li><a href="https://thedecisionlab.com/biases/framing-effect/">Understanding Framing Effects</a></li>
<li>More <a href="https://boycewire.com/framing-effect-definition-and-examples/">examples</a> of Framing Effects</li>
<li>Harvard Business Review <a href="https://hbr.org/2013/07/the-uses-and-abuses-of-influence%20">article</a> on the Principles of Persuasion</li>
<li>A blog series I did on Deception (<a href="https://www.infosecurity-magazine.com/blogs/deceptioneering-1-human/">Part 1</a>), (<a href="https://www.infosecurity-magazine.com/blogs/deceptioneering-2-principles/">Part 2</a>).</li>
<li>PsychologyToday <a href="%20https://www.psychologytoday.com/us/blog/human-hacking/202102/social-engineering-and-psychology">article</a> on Social Engineering</li>
</ul><p><br></p><p><strong>Recommended Books (Amazon affiliate links):</strong></p><ul>
<li>
<a href="https://amzn.to/3qLgnm7">The Art of Deception: Controlling the Human Element of Security</a> by Kevin Mitnick</li>
<li>
<a href="https://amzn.to/3AqOggf">Ghost in the Wires: My Adventures as the World's Most Wanted Hacker</a> by Kevin Mitnick</li>
<li>
<a href="https://amzn.to/3htV0S9">Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You </a>by Chris Hadnagy</li>
<li>
<a href="https://amzn.to/3ye0yH0">Influence, New and Expanded: The Psychology of Persuasion</a> by Robert Cialdini</li>
<li>
<a href="https://amzn.to/3hvwpfI">Pre-Suasion: A Revolutionary Way to Influence and Persuade</a> by Robert Cialdini</li>
<li>
<a href="https://amzn.to/3huYXFZ">Practical Social Engineering: A Primer for the Ethical Hacker</a> by Joe Gray</li>
<li>
<a href="https://amzn.to/3xi1t9c">Social Engineering: The Science of Human Hacking</a> by Chris Hadnagy</li>
<li>
<a href="https://amzn.to/3geCNHo">Thinking, Fast and Slow</a> by Daniel Kahneman.</li>
<li>
<a href="https://amzn.to/2Rp90U5">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a> by Perry Carpenter</li>
<li>
<a href="https://amzn.to/3ykhhIN">Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future</a> by George Finney</li>
</ul><p><br></p><p>Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a821eec-af60-11eb-aad2-d72df902a056]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW4961073551.mp3?updated=1625322162" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>This is BS!</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/3/notes</link>
      <description>Ever wrestled with the fact that people often make horrible security decisions even though their employers have security awareness programs in place? It's often because we assume that being aware of something should naturally result in better behavior. Well... that's not the case. This episode takes a deep dive into the knowledge-intention-behavior gap where we are confronted with three realities of security awareness. And those realities lead us to the realization that we need to focus on behavior.
Guests for this episode are all leaders in the fields of Behavioral Science. They are, BJ Fogg, Ph.D., author of Tiny Habits: the Small Changes that Change Everything, Matt Wallaert, author of Start at the End: How to Build Products That Create Change, and Alexandra Alhadeff, co-author of Deep Thought: A Cybersecurity Story.
Guests:


BJ Fogg, Ph.D.. -- Behavior Scientist &amp; Innovator at Stanford University. (Personal website) Author of Tiny Habits: The Small Changes That Change Everything. (Amazon link)


Matt Wallaert -- Head of Behavioral Science at frog (a Capgemini company). Author of Start at the End: How to Build Products That Create Change (Amazon link)


Alexandra Alhadeff -- Behavioral Scientist &amp; Product Manager at The Fabulous. (Personal website)


Notes &amp; Resources:

BJ Fogg testimony to the 2006 US Federal Trade Commission about the dangers of persuasive technology.

Fogg Behavior Model


About Nudge Theory



Multiple examples of Nudging


Great catalog of Dark Patterns


Ideas42 cybersecurity-related behavioral science research.


Deep Thought: A Cybersecurity Story, by Ideas42.


Recommended Books (Amazon affiliate links):


Tiny Habits: The Small Changes That Change Everything, by BJ Fogg, Ph.D.


Start at the End: How to Build Products That Create Change, by Matt Wallaert


Nudge: Improving Decisions About Health, Wealth, and Happiness, by Richard Thaler and Cass Sunstein


Inside the Nudge Unit: How Small Changes Can Make a Big Difference, by David Halpern


Evil by Design: Interaction Design to Lead Us into Temptation by Chris Nodder


Thinking, Fast and Slow by Daniel Kahneman.


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter.


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>This is BS!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ever wrestled with the fact that people often make horrible security decisions even though their employers have security awareness programs in place? It's often because we assume that being aware of something should naturally result in better behavior. Well... that's not the case. This episode takes a deep dive into the knowledge-intention-behavior gap where we are confronted with three realities of security awareness. And those realities lead us to the realization that we need to focus on behavior.
Guests for this episode are all leaders in the fields of Behavioral Science. They are, BJ Fogg, Ph.D., author of Tiny Habits: the Small Changes that Change Everything, Matt Wallaert, author of Start at the End: How to Build Products That Create Change, and Alexandra Alhadeff, co-author of Deep Thought: A Cybersecurity Story.
Guests:


BJ Fogg, Ph.D.. -- Behavior Scientist &amp; Innovator at Stanford University. (Personal website) Author of Tiny Habits: The Small Changes That Change Everything. (Amazon link)


Matt Wallaert -- Head of Behavioral Science at frog (a Capgemini company). Author of Start at the End: How to Build Products That Create Change (Amazon link)


Alexandra Alhadeff -- Behavioral Scientist &amp; Product Manager at The Fabulous. (Personal website)


Notes &amp; Resources:

BJ Fogg testimony to the 2006 US Federal Trade Commission about the dangers of persuasive technology.

Fogg Behavior Model


About Nudge Theory



Multiple examples of Nudging


Great catalog of Dark Patterns


Ideas42 cybersecurity-related behavioral science research.


Deep Thought: A Cybersecurity Story, by Ideas42.


Recommended Books (Amazon affiliate links):


Tiny Habits: The Small Changes That Change Everything, by BJ Fogg, Ph.D.


Start at the End: How to Build Products That Create Change, by Matt Wallaert


Nudge: Improving Decisions About Health, Wealth, and Happiness, by Richard Thaler and Cass Sunstein


Inside the Nudge Unit: How Small Changes Can Make a Big Difference, by David Halpern


Evil by Design: Interaction Design to Lead Us into Temptation by Chris Nodder


Thinking, Fast and Slow by Daniel Kahneman.


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter.


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ever wrestled with the fact that people often make horrible security decisions even though their employers have security awareness programs in place? It's often because we assume that being aware of something should naturally result in better behavior. Well... that's not the case. This episode takes a deep dive into the <em>knowledge-intention-behavior gap </em>where we are confronted with <em>three realities of security awareness.</em> And those realities lead us to the realization that we need to focus on behavior.</p><p>Guests for this episode are all leaders in the fields of Behavioral Science. They are, BJ Fogg, Ph.D., author of <em>Tiny Habits: the Small Changes that Change Everything</em>, Matt Wallaert, author of <em>Start at the End: How to Build Products That Create Change, and </em>Alexandra Alhadeff, co-author of <em>Deep Thought: A Cybersecurity Story.</em></p><p><strong>Guests:</strong></p><ul>
<li>
<strong>BJ Fogg, Ph.D.</strong>. -- Behavior Scientist &amp; Innovator at Stanford University. (<a href="https://www.bjfogg.com/">Personal website</a>) Author of <em>Tiny Habits: The Small Changes That Change Everything</em>. (<a href="https://amzn.to/3xhiOyU">Amazon link</a>)</li>
<li>
<strong>Matt Wallaert</strong> -- Head of Behavioral Science at frog (a Capgemini company). Author of <em>Start at the End: How to Build Products That Create Change</em> (<a href="https://amzn.to/3zjay3d">Amazon link</a>)</li>
<li>
<strong>Alexandra Alhadeff</strong> -- Behavioral Scientist &amp; Product Manager at The Fabulous. (<a href="https://alexalhadeff.com/">Personal website</a>)</li>
</ul><p><br></p><p><strong>Notes &amp; Resources:</strong></p><ul>
<li>BJ Fogg <a href="https://vimeo.com/117427520">testimony</a> to the 2006 US Federal Trade Commission about the dangers of persuasive technology.</li>
<li>Fogg <a href="https://behaviormodel.org/">Behavior Model</a>
</li>
<li>About <a href="https://en.wikipedia.org/wiki/Nudge_theory">Nudge Theory</a>
</li>
<li>
<a href="Multiple">Multiple</a> <a href="https://www.skipprichard.com/10-examples-of-nudge-theory/">examples</a> of <a href="https://medium.com/swlh/the-7-most-creative-examples-of-habit-changing-nudges-7873ca1fff4a">Nudging</a>
</li>
<li>Great catalog of <a href="https://www.darkpatterns.org/">Dark Patterns</a>
</li>
<li>Ideas42 cybersecurity-related behavioral science <a href="https://www.ideas42.org/project/human-behavior-cybersecurity/">research</a>.</li>
<li>
<a href="https://www.ideas42.org/wp-content/uploads/2016/08/Deep-Thought-A-Cybersecurity-Story.pdf"><em>Deep Thought: A Cybersecurity Story</em></a><em>, </em>by Ideas42.</li>
</ul><p><br></p><p><strong>Recommended Books (Amazon affiliate links):</strong></p><ul>
<li>
<a href="https://amzn.to/3xhiOyU">Tiny Habits: The Small Changes That Change Everything</a>, by BJ Fogg, Ph.D.</li>
<li>
<a href="https://amzn.to/3zjay3d">Start at the End: How to Build Products That Create Change</a>, by Matt Wallaert</li>
<li>
<a href="https://amzn.to/3iW2z6d">Nudge: Improving Decisions About Health, Wealth, and Happiness</a>, by Richard Thaler and Cass Sunstein</li>
<li>
<a href="https://amzn.to/2UcCbe4">Inside the Nudge Unit: How Small Changes Can Make a Big Difference</a>, by David Halpern</li>
<li>
<a href="https://amzn.to/2SMrheE">Evil by Design: Interaction Design to Lead Us into Temptation</a> by Chris Nodder</li>
<li>
<a href="https://amzn.to/3geCNHo">Thinking, Fast and Slow</a> by Daniel Kahneman.</li>
<li>
<a href="https://amzn.to/2Rp90U5">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a> by Perry Carpenter.</li>
</ul><p><br></p><p>Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>4003</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a7c80ea-af60-11eb-aad2-7b10e2d5da74]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2875565159.mp3?updated=1624280153" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Battle for Truth: Disinformation, Misinformation, &amp; Conspiracies </title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/2/notes</link>
      <description>This is an episode about the battle for truth. As disinformation, misinformation, malinformation, and conspiracy theories seem to be hitting epidemic levels, how can we help each other determine what is real and what is fake? How can we help people who are falling down conspiracy rabbit holes? And what roles do technology companies, governments, and ordinary citizens play?
Perry Carpenter speaks with acclaimed cybersecurity expert, Bruce Schneier, disinformation experts, Samantha North and Allie Wong, and conspiracy theory researcher, Mick West. In this episode, we also hear from Peter Leyden from Reinvent and Eli Periser, author of The Filter Bubble.
Learn more about our guests here:


Bruce Schneier - Internationally renowned security technologist, author, and speaker. You can find Bruce's website here.


Allie Wong - VP of Mis/dis/mal-information, Response and Resiliency, Limbik; Consultant, United Nations Institute for Disarmament Research. (LinkedIn)


Samantha North - Disinformation researcher and consultant. (LinkedIn) Co-Founder: North Cyber Research (website)


Mick West - Skeptical investigator and retired video game programmer. Creator of the websites Contrail Science (website) and Metabunk (website). Author of Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect (link). Personal website (link).

Special thanks to Reinvent for allowing use of audio.
References:

http://reinvent.net/events/event/how-we-can-pop-the-filter-bubble-with-eli-pariser/

https://reboot-foundation.org/study-social-media-poor-judgment/

https://reboot-foundation.org/is-there-a-fake-news-generation/

Recommended Books (Amazon affiliate links):


Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect by Mick West.


Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier.


The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think by Eli Pariser.


Thinking, Fast and Slow by Daniel Kahneman.


Why Are We Yelling?: The Art of Productive Disagreement by Buster Benson.


The Righteous Mind: Why Good People Are Divided by Politics and Religion by Jonathan Haidt.


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter.

Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>The Battle for Truth: Disinformation, Misinformation, &amp; Conspiracies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This is an episode about the battle for truth. As disinformation, misinformation, malinformation, and conspiracy theories seem to be hitting epidemic levels, how can we help each other determine what is real and what is fake? How can we help people who are falling down conspiracy rabbit holes? And what roles do technology companies, governments, and ordinary citizens play?
Perry Carpenter speaks with acclaimed cybersecurity expert, Bruce Schneier, disinformation experts, Samantha North and Allie Wong, and conspiracy theory researcher, Mick West. In this episode, we also hear from Peter Leyden from Reinvent and Eli Periser, author of The Filter Bubble.
Learn more about our guests here:


Bruce Schneier - Internationally renowned security technologist, author, and speaker. You can find Bruce's website here.


Allie Wong - VP of Mis/dis/mal-information, Response and Resiliency, Limbik; Consultant, United Nations Institute for Disarmament Research. (LinkedIn)


Samantha North - Disinformation researcher and consultant. (LinkedIn) Co-Founder: North Cyber Research (website)


Mick West - Skeptical investigator and retired video game programmer. Creator of the websites Contrail Science (website) and Metabunk (website). Author of Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect (link). Personal website (link).

Special thanks to Reinvent for allowing use of audio.
References:

http://reinvent.net/events/event/how-we-can-pop-the-filter-bubble-with-eli-pariser/

https://reboot-foundation.org/study-social-media-poor-judgment/

https://reboot-foundation.org/is-there-a-fake-news-generation/

Recommended Books (Amazon affiliate links):


Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect by Mick West.


Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier.


The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think by Eli Pariser.


Thinking, Fast and Slow by Daniel Kahneman.


Why Are We Yelling?: The Art of Productive Disagreement by Buster Benson.


The Righteous Mind: Why Good People Are Divided by Politics and Religion by Jonathan Haidt.


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter.

Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This is an episode about the battle for truth. As disinformation, misinformation, malinformation, and conspiracy theories seem to be hitting epidemic levels, how can we help each other determine what is real and what is fake? How can we help people who are falling down conspiracy rabbit holes? And what roles do technology companies, governments, and ordinary citizens play?</p><p><a href="https://www.linkedin.com/in/perrycarpenter/">Perry Carpenter</a> speaks with acclaimed cybersecurity expert, <a href="https://www.schneier.com/">Bruce Schneier</a>, disinformation experts, <a href="https://www.linkedin.com/in/northsamantha/">Samantha North</a> and <a href="https://www.linkedin.com/in/allie-wong/">Allie Wong</a>, and conspiracy theory researcher, <a href="https://mickwest.com/">Mick West</a>. In this episode, we also hear from <a href="https://www.linkedin.com/in/peterleyden/">Peter Leyden</a> from <a href="http://reinvent.net/">Reinvent</a> and <a href="https://www.elipariser.org/">Eli Periser</a>, author of The Filter Bubble.</p><p><strong>Learn more about our guests here:</strong></p><ul>
<li>
<strong>Bruce Schneier</strong> - Internationally renowned security technologist, author, and speaker. You can find Bruce's website <a href="https://www.schneier.com/">here</a>.</li>
<li>
<strong>Allie Wong</strong> - VP of Mis/dis/mal-information, Response and Resiliency, Limbik; Consultant, United Nations Institute for Disarmament Research. (<a href="https://www.linkedin.com/in/allie-wong/">LinkedIn</a>)</li>
<li>
<strong>Samantha North</strong> - Disinformation researcher and consultant. (<a href="https://www.linkedin.com/in/northsamantha/">LinkedIn</a>) Co-Founder: North Cyber Research (<a href="https://samanthanorth.com/">website</a>)</li>
<li>
<strong>Mick West </strong>- Skeptical investigator and retired video game programmer. Creator of the websites Contrail Science (<a href="https://contrailscience.com/">website</a>) and Metabunk (<a href="https://metabunk.org/">website</a>). Author of Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect (<a href="https://amzn.to/3uZB9Py">link</a>). Personal website (<a href="https://mickwest.com/">link</a>).</li>
</ul><p><em>Special thanks to </em><a href="http://reinvent.net/"><em>Reinvent</em></a><em> for allowing use of audio.</em></p><p><strong>References:</strong></p><ul>
<li><a href="http://reinvent.net/events/event/how-we-can-pop-the-filter-bubble-with-eli-pariser/">http://reinvent.net/events/event/how-we-can-pop-the-filter-bubble-with-eli-pariser/</a></li>
<li><a href="https://reboot-foundation.org/study-social-media-poor-judgment/">https://reboot-foundation.org/study-social-media-poor-judgment/</a></li>
<li><a href="https://reboot-foundation.org/is-there-a-fake-news-generation/">https://reboot-foundation.org/is-there-a-fake-news-generation/</a></li>
</ul><p><strong>Recommended Books (Amazon affiliate links):</strong></p><ul>
<li>
<a href="https://amzn.to/2RufbGE">Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect</a> by Mick West.</li>
<li>
<a href="https://amzn.to/2ScIw8D">Click Here to Kill Everybody: Security and Survival in a Hyper-connected World</a> by Bruce Schneier.</li>
<li>
<a href="https://amzn.to/3yWZEQm">The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think</a> by Eli Pariser.</li>
<li>
<a href="https://amzn.to/3geCNHo">Thinking, Fast and Slow</a> by Daniel Kahneman.</li>
<li>
<a href="https://amzn.to/3vVI4dN">Why Are We Yelling?: The Art of Productive Disagreement</a> by Buster Benson.</li>
<li>
<a href="https://amzn.to/3ikZY5M">The Righteous Mind: Why Good People Are Divided by Politics and Religion</a> by Jonathan Haidt.</li>
<li>
<a href="https://amzn.to/2Rp90U5">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a> by Perry Carpenter.</li>
</ul><p>Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3712</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a76bb24-af60-11eb-aad2-9f66346ce749]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW7990867824.mp3?updated=1623171185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unleashing Trojan Horses for the Mind</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/1/notes</link>
      <description>This episode explores the concept of “Trojan Horses for the Mind.” There are four Trojan Horses. They are: emotion, sound, visuals, and words/story. Using these Trojan Horses will help us increase the signal to noise ratio in our communications, bypass mental defenses, and embed messages within the minds of our audiences.
To explore the concepts related to this, Perry speaks with voice actor, writer, and producer, Rob McCollum; author, marketer, and storytelling expert Joe Lazauskas; and executive storyteller coach and trainer, Stephanie Paul.
Learn more about our guests here:


Rob McCollum -- Voice actor, script writer, director, producer (LinkedIn). Rob's IMDB page.


Joe Lazauskas -- Head of Marketing at Contently. Author of, The Storytelling Edge. LinkedIn. Amazon affiliate link to book.


Stephanie Paul -- Executive Storyteller, Coach, Speaker, and Trainer (LinkedIn). Stephanie's website.


Resources:
Special offer: Stephanie Paul is offering a $5.00 discount off her book, The WhyGuide to Storytelling. Just visit here and use the coupon code HACK4U at checkout.
For more about the Trojan Horses for the Mind, check out Perry’s book, Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors.
Amazon affiliate links to books mentioned:

The Storytelling Edge

Save the Cat!

Transformational Security Awareness


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>Unleashing Trojan Horses for the Mind</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This episode explores the concept of “Trojan Horses for the Mind.” There are four Trojan Horses. They are: emotion, sound, visuals, and words/story. Using these Trojan Horses will help us increase the signal to noise ratio in our communications, bypass mental defenses, and embed messages within the minds of our audiences.
To explore the concepts related to this, Perry speaks with voice actor, writer, and producer, Rob McCollum; author, marketer, and storytelling expert Joe Lazauskas; and executive storyteller coach and trainer, Stephanie Paul.
Learn more about our guests here:


Rob McCollum -- Voice actor, script writer, director, producer (LinkedIn). Rob's IMDB page.


Joe Lazauskas -- Head of Marketing at Contently. Author of, The Storytelling Edge. LinkedIn. Amazon affiliate link to book.


Stephanie Paul -- Executive Storyteller, Coach, Speaker, and Trainer (LinkedIn). Stephanie's website.


Resources:
Special offer: Stephanie Paul is offering a $5.00 discount off her book, The WhyGuide to Storytelling. Just visit here and use the coupon code HACK4U at checkout.
For more about the Trojan Horses for the Mind, check out Perry’s book, Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors.
Amazon affiliate links to books mentioned:

The Storytelling Edge

Save the Cat!

Transformational Security Awareness


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This episode explores the concept of “Trojan Horses for the Mind.” There are four Trojan Horses. They are: emotion, sound, visuals, and words/story. Using these Trojan Horses will help us increase the signal to noise ratio in our communications, bypass mental defenses, and embed messages within the minds of our audiences.</p><p>To explore the concepts related to this, Perry speaks with voice actor, writer, and producer, Rob McCollum; author, marketer, and storytelling expert Joe Lazauskas; and executive storyteller coach and trainer, Stephanie Paul.</p><p>Learn more about our guests here:</p><ul>
<li>
<strong>Rob McCollum</strong> -- Voice actor, script writer, director, producer (<a href="https://www.linkedin.com/in/robert-mccollum-23b1a86/">LinkedIn</a>). Rob's <a href="https://www.imdb.com/name/nm0566147/">IMDB</a> page.</li>
<li>
<strong>Joe Lazauskas</strong> -- Head of Marketing at Contently. Author of, <em>The Storytelling Edge</em>. <a href="https://www.linkedin.com/in/joe-lazauskas-8b442026/">LinkedIn</a>. Amazon affiliate <a href="https://amzn.to/3uAhzK1">link to book</a>.</li>
<li>
<strong>Stephanie Paul</strong> -- Executive Storyteller, Coach, Speaker, and Trainer (<a href="https://www.linkedin.com/in/stephaniepaulinc/">LinkedIn</a>). Stephanie's <a href="https://stephaniepaulinc.com/">website</a>.</li>
</ul><p><br></p><p>Resources:</p><p><strong>Special offer</strong>: Stephanie Paul is offering a $5.00 discount off her book, <em>The WhyGuide to Storytelling. </em>Just visit <a href="https://executivestoryteller.com/index.php/product/the-whyguide-to-story-hacking-book/">here</a> and use the coupon code HACK4U at checkout.</p><p>For more about the Trojan Horses for the Mind, check out Perry’s book, <em>Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors.</em></p><p>Amazon affiliate links to books mentioned:</p><ul>
<li><a href="https://amzn.to/3eYbySk"><em>The Storytelling Edge</em></a></li>
<li><a href="https://amzn.to/3uYAOgJ"><em>Save the Cat!</em></a></li>
<li><a href="https://amzn.to/2QyiwnC"><em>Transformational Security Awareness</em></a></li>
</ul><p><br></p><p>Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.</p><p>Artwork by Chris Machowski.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3038</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39049eb4-add4-11eb-ba76-6bf961020e2d]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW5087986084.mp3?updated=1623104265" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Introducing 8th Layer Insights</title>
      <description>Coming May 25, 2021. Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. This podcast is a multidisciplinary exploration into how the complexities of human nature affect security, risk, and life. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 May 2021 19:11:00 -0000</pubDate>
      <itunes:title>Trailer</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <itunes:author>Perry Carpenter | N2K Networks</itunes:author>
      <itunes:subtitle>Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS.</itunes:subtitle>
      <itunes:summary>Coming May 25, 2021. Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. This podcast is a multidisciplinary exploration into how the complexities of human nature affect security, risk, and life. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Coming May 25, 2021</strong>. Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. This podcast is a multidisciplinary exploration into how the complexities of human nature affect security, risk, and life. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>274</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[25f831fc-ac5b-11eb-bee3-f33451375145]]></guid>
      <enclosure url="https://pdst.fm/e/traffic.megaphone.fm/CYBW2308346826.mp3" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
