<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/QI5PSp3T" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Cyber Empathy</title>
    <description>Meet the people who lead their work in cybersecurity and privacy with empathy and who go beyond technology to inspire lasting change. 

Learn how to use cybersecurity and privacy as a lens to understand and improve your online habits so you can make more mindful decisions about your digital life. 

Let&apos;s build bridges and genuine human connections and help those who need their guidance the most.</description>
    <copyright>2021 - 2024 - Cyber Empathy Podcast</copyright>
    <language>en</language>
    <pubDate>Tue, 2 Apr 2024 03:00:00 +0000</pubDate>
    <lastBuildDate>Tue, 2 Apr 2024 04:38:46 +0000</lastBuildDate>
    <image>
      <link>https://cyberempathy.org</link>
      <title>Cyber Empathy</title>
      <url>https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/d1156f52-262a-43e0-ace3-25b7887bef2f/3000x3000/cyber-empathy-cover-original-modified.jpg?aid=rss_feed</url>
    </image>
    <link>https://cyberempathy.org</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Meet the people who lead their work in cybersecurity and privacy with empathy and who go beyond technology to inspire lasting change. 

Learn how to use cybersecurity and privacy as a lens to understand and improve your online habits so you can make more mindful decisions about your digital life. 

Let&apos;s build bridges and genuine human connections and help those who need their guidance the most.</itunes:summary>
    <itunes:author>Andra Zaharia</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/d1156f52-262a-43e0-ace3-25b7887bef2f/3000x3000/cyber-empathy-cover-original-modified.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/QI5PSp3T</itunes:new-feed-url>
    <itunes:keywords>cybersecurity, empathy, information security, online privacy, online security</itunes:keywords>
    <itunes:owner>
      <itunes:name>Andra Zaharia</itunes:name>
      <itunes:email>andra@thecontenthabit.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Self-Improvement"/>
    </itunes:category>
    <itunes:category text="Society &amp; Culture">
      <itunes:category text="Documentary"/>
    </itunes:category>
    <item>
      <guid isPermaLink="false">0703606e-b46d-46fb-a139-8c91955d963e</guid>
      <title>Empathy over ego: why we&apos;re angry at the wrong people in cybersecurity</title>
      <description><![CDATA[<p>Whenever someone says humans are the weakest link in cybersecurity, besides educating through fear, they are crafting a narrative, creating a reality in people's heads, and making them feel helpless against cyber criminals. </p><p>My guest, <strong>Lianne Potter</strong>, feels utterly differently about how to educate people on cybersecurity. Instead of fear, she advocates for empowering them through trust, autonomy, and, above all things, reciprocity. </p><p><strong>Lianne is a Cyber Anthropologist</strong>, Head of Security Operations at Asda, a published author, host of the Compromising Positions podcast, keynote speaker, and multi-award-winning cybersecurity specialist. She recently won Computing.com's Security Specialist of the Year award, and, in 2021, she was named one of the Security Leaders of the Year and Woman of the Year in the Enterprise category.</p><p>This conversation is yet another opportunity to discover the dedication, kindness, and thoughtfulness that brought Lianne all these well-deserved achievements. </p><p>Throughout our conversation, she brought her brilliant and unique vision of cybersecurity. We discussed cybersecurity's own microculture in the tech space, its rituals and habits, and how cybersecurity specialists can transform how they educate the people they serve. </p><p>Lianne proposed brilliant ideas like ritualizing protection, empowering people through trust and autonomy instead of micromanaging and fear, cultivating the' hero mentality, and more.</p><p><strong>Episode highlights:</strong></p><ul><li>The moment Lianne fell in love with cybersecurity (6:40)</li><li>What makes cybersecurity's micro-culture so attractive (10:20)</li><li>The 3 main traits of cybersecurity (14:30)</li><li>Why reciprocity is crucial in cybersecurity (17:20)</li><li>Why trust and autonomy are the biggest gifts cybersecurity can offer (20:00)</li><li>Lianne’s experience with joining her first cybersecurity team (26:30)</li><li>The importance of how we communicate things (37:10)</li><li>Why educating through fear never works (42:00)</li></ul><p>Resources Mentioned:</p><ul><li>Lianne on <a href="https://www.linkedin.com/in/liannep/">LinkedIn</a></li><li>Lianne on <a href="https://twitter.com/Tech_Soapbox">Twitter</a> / X</li><li><a href="https://www.compromisingpositions.co.uk/">The Compromising Positions podcast</a></li><li>Lianne on <a href="https://www.cyberempathy.org/episodes/ethical-hackers-legacy-hacker-manifesto?rq=Tom%20Eston">Tom Eston</a>’s <a href="https://sharedsecurity.net/2022/04/25/rehumanizing-cybersecurity-with-lianne-potter/">Shared Security Podcast</a></li><li><a href="https://www.linkedin.com/posts/liannep_anthropology-behaviourchange-behaviouralscience-activity-7159108802019999744-YJWC/?utm_source=share&utm_medium=member_desktop">What is a Cyber Anthropologist? Lianne Potter on The Brainy Business Podcast</a></li><li><a href="https://www.linkedin.com/posts/liannep_ai-cybersecurity-data-activity-7160915090874003457-1O9A/">Wearables, Shareables, Unbearables - The IoT and AI Tech Nobody Asked For but Cybercriminals Love!</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 2 Apr 2024 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Whenever someone says humans are the weakest link in cybersecurity, besides educating through fear, they are crafting a narrative, creating a reality in people's heads, and making them feel helpless against cyber criminals. </p><p>My guest, <strong>Lianne Potter</strong>, feels utterly differently about how to educate people on cybersecurity. Instead of fear, she advocates for empowering them through trust, autonomy, and, above all things, reciprocity. </p><p><strong>Lianne is a Cyber Anthropologist</strong>, Head of Security Operations at Asda, a published author, host of the Compromising Positions podcast, keynote speaker, and multi-award-winning cybersecurity specialist. She recently won Computing.com's Security Specialist of the Year award, and, in 2021, she was named one of the Security Leaders of the Year and Woman of the Year in the Enterprise category.</p><p>This conversation is yet another opportunity to discover the dedication, kindness, and thoughtfulness that brought Lianne all these well-deserved achievements. </p><p>Throughout our conversation, she brought her brilliant and unique vision of cybersecurity. We discussed cybersecurity's own microculture in the tech space, its rituals and habits, and how cybersecurity specialists can transform how they educate the people they serve. </p><p>Lianne proposed brilliant ideas like ritualizing protection, empowering people through trust and autonomy instead of micromanaging and fear, cultivating the' hero mentality, and more.</p><p><strong>Episode highlights:</strong></p><ul><li>The moment Lianne fell in love with cybersecurity (6:40)</li><li>What makes cybersecurity's micro-culture so attractive (10:20)</li><li>The 3 main traits of cybersecurity (14:30)</li><li>Why reciprocity is crucial in cybersecurity (17:20)</li><li>Why trust and autonomy are the biggest gifts cybersecurity can offer (20:00)</li><li>Lianne’s experience with joining her first cybersecurity team (26:30)</li><li>The importance of how we communicate things (37:10)</li><li>Why educating through fear never works (42:00)</li></ul><p>Resources Mentioned:</p><ul><li>Lianne on <a href="https://www.linkedin.com/in/liannep/">LinkedIn</a></li><li>Lianne on <a href="https://twitter.com/Tech_Soapbox">Twitter</a> / X</li><li><a href="https://www.compromisingpositions.co.uk/">The Compromising Positions podcast</a></li><li>Lianne on <a href="https://www.cyberempathy.org/episodes/ethical-hackers-legacy-hacker-manifesto?rq=Tom%20Eston">Tom Eston</a>’s <a href="https://sharedsecurity.net/2022/04/25/rehumanizing-cybersecurity-with-lianne-potter/">Shared Security Podcast</a></li><li><a href="https://www.linkedin.com/posts/liannep_anthropology-behaviourchange-behaviouralscience-activity-7159108802019999744-YJWC/?utm_source=share&utm_medium=member_desktop">What is a Cyber Anthropologist? Lianne Potter on The Brainy Business Podcast</a></li><li><a href="https://www.linkedin.com/posts/liannep_ai-cybersecurity-data-activity-7160915090874003457-1O9A/">Wearables, Shareables, Unbearables - The IoT and AI Tech Nobody Asked For but Cybercriminals Love!</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="55921380" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/5d4d1fef-0b77-4229-be11-32fdeb1a27f1/audio/8ec74b07-b7f4-4159-b2dc-1ff3e68d9621/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Empathy over ego: why we&apos;re angry at the wrong people in cybersecurity</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/4a8e3f32-3910-4466-8240-da0de8b67bec/3000x3000/lianne-potter-cyber-empathy-episode.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:15</itunes:duration>
      <itunes:summary>My guest, Lianne Potter, feels utterly differently about how to educate people on cybersecurity. Instead of fear, she advocates for empowering them through trust, autonomy, and, above all things, reciprocity. 

One thing that I think you&apos;d be intrigued to discover in this episode is that we&apos;re actually mad at the wrong people; we&apos;re angry at the wrong people in cybersecurity, and you&apos;re going to see exactly what I mean by this towards the end of this episode</itunes:summary>
      <itunes:subtitle>My guest, Lianne Potter, feels utterly differently about how to educate people on cybersecurity. Instead of fear, she advocates for empowering them through trust, autonomy, and, above all things, reciprocity. 

One thing that I think you&apos;d be intrigued to discover in this episode is that we&apos;re actually mad at the wrong people; we&apos;re angry at the wrong people in cybersecurity, and you&apos;re going to see exactly what I mean by this towards the end of this episode</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">9a9274cd-fbe3-4f3c-9e38-20aceede7215</guid>
      <title>A hacker&apos;s guide to changing the world</title>
      <description><![CDATA[<p>Joshua Corman is a security strategist, philosopher, and co-founder of I am The Cavalry, a collective of professionals from technology, law, and public policy who work to mitigate the impact software-enabled and always-connected devices have on public safety and human life. </p><p>We had a deeply moving conversation about Joshua's influential work in cybersecurity, the birth of I Am The Cavalry, and his experiences navigating tough life transitions. </p><p>Using his masterful ability to capture thoughts, feelings, and experiences, Joshua brings to life the essence of building genuine connections, fostering trust, and caring deeply for others - and the role these play in using cybersecurity for a worthy goal.</p><p> </p><p>Episode Highlights:</p><ul><li>Joshua shares a valuable lesson a stranger taught him about empathy (3:10)</li><li>About the feeling that gave birth to I Am The Cavalry (8:00)</li><li>Why bother? Because we want to be safer sooner (15:40)</li><li>There's nothing more intoxicating than having an impact, material progress, and tangible wins (22:40)</li><li>What is the next wave of empathy in cybersecurity (28:20)</li><li>You don't need to be famous to make the world better (36:40)</li></ul><p>Resources Mentioned:</p><ul><li><a href="https://iamthecavalry.org/">I Am The Cavalry website</a></li><li><a href="https://twitter.com/iamthecavalry">I Am The Cavalry Twitter</a></li><li><a href="https://www.iamthecavalry.org/wp-content/uploads/2016/01/I-Am-The-Cavalry-Hippocratic-Oath-for-Connected-Medical-Devices.pdf">I Am The Cavalry - Hippocratic Oath for Connected Medical Devices</a></li><li><a href="https://youtu.be/rZ6xoAtdF3o?si=gNZKB2gh-YJV3aJ3">Swimming with sharks - security in the Internet of Things: Joshua Corman at TEDx Naperville</a></li><li><a href="https://www.linkedin.com/in/jackadaniel/">Jack Daniel's LinkedIn profile</a></li><li><a href="https://beauwoods.com">Beau Woods's website</a></li><li><a href="https://www.linkedin.com/in/claushoumann/">Claus Cramon Houmann's LinkedIn profile</a></li><li><a href="https://youtu.be/Xm5OgIE8cBU?si=sPQaq4IdEqGDPT58">Cyber Summit 2020: Opening Remarks from Josh Corman</a></li><li><a href="https://w-e-gragido.medium.com/10-years-after-my-thoughts-on-josh-cormans-bsides-las-vegas-2023-keynote-e1679e11b1a4">10 Years After…My Thoughts on Josh Corman's BSides Las Vegas 2023 Keynote</a></li><li><a href="https://youtu.be/_9Pop985sJQ?si=1TMNNc82y5DU33j_">Everclear - Heartspark Dollarsign</a></li><li><a href="https://bsideslv.org/">BSides Las Vegas</a></li><li><a href="https://www.shmoocon.org/">ShmooCon</a></li></ul><p>Connect with Joshua:</p><ul><li><a href="https://www.linkedin.com/in/joshcorman/">LinkedIn</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 19 Mar 2024 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Joshua Corman is a security strategist, philosopher, and co-founder of I am The Cavalry, a collective of professionals from technology, law, and public policy who work to mitigate the impact software-enabled and always-connected devices have on public safety and human life. </p><p>We had a deeply moving conversation about Joshua's influential work in cybersecurity, the birth of I Am The Cavalry, and his experiences navigating tough life transitions. </p><p>Using his masterful ability to capture thoughts, feelings, and experiences, Joshua brings to life the essence of building genuine connections, fostering trust, and caring deeply for others - and the role these play in using cybersecurity for a worthy goal.</p><p> </p><p>Episode Highlights:</p><ul><li>Joshua shares a valuable lesson a stranger taught him about empathy (3:10)</li><li>About the feeling that gave birth to I Am The Cavalry (8:00)</li><li>Why bother? Because we want to be safer sooner (15:40)</li><li>There's nothing more intoxicating than having an impact, material progress, and tangible wins (22:40)</li><li>What is the next wave of empathy in cybersecurity (28:20)</li><li>You don't need to be famous to make the world better (36:40)</li></ul><p>Resources Mentioned:</p><ul><li><a href="https://iamthecavalry.org/">I Am The Cavalry website</a></li><li><a href="https://twitter.com/iamthecavalry">I Am The Cavalry Twitter</a></li><li><a href="https://www.iamthecavalry.org/wp-content/uploads/2016/01/I-Am-The-Cavalry-Hippocratic-Oath-for-Connected-Medical-Devices.pdf">I Am The Cavalry - Hippocratic Oath for Connected Medical Devices</a></li><li><a href="https://youtu.be/rZ6xoAtdF3o?si=gNZKB2gh-YJV3aJ3">Swimming with sharks - security in the Internet of Things: Joshua Corman at TEDx Naperville</a></li><li><a href="https://www.linkedin.com/in/jackadaniel/">Jack Daniel's LinkedIn profile</a></li><li><a href="https://beauwoods.com">Beau Woods's website</a></li><li><a href="https://www.linkedin.com/in/claushoumann/">Claus Cramon Houmann's LinkedIn profile</a></li><li><a href="https://youtu.be/Xm5OgIE8cBU?si=sPQaq4IdEqGDPT58">Cyber Summit 2020: Opening Remarks from Josh Corman</a></li><li><a href="https://w-e-gragido.medium.com/10-years-after-my-thoughts-on-josh-cormans-bsides-las-vegas-2023-keynote-e1679e11b1a4">10 Years After…My Thoughts on Josh Corman's BSides Las Vegas 2023 Keynote</a></li><li><a href="https://youtu.be/_9Pop985sJQ?si=1TMNNc82y5DU33j_">Everclear - Heartspark Dollarsign</a></li><li><a href="https://bsideslv.org/">BSides Las Vegas</a></li><li><a href="https://www.shmoocon.org/">ShmooCon</a></li></ul><p>Connect with Joshua:</p><ul><li><a href="https://www.linkedin.com/in/joshcorman/">LinkedIn</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="42096544" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/dccb12c7-2bda-41b5-bbbe-f47eaaed2494/audio/345faee7-e622-4723-a024-23c91201c810/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>A hacker&apos;s guide to changing the world</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/3490a8df-9a4d-4016-ad89-b2b529764c05/3000x3000/joshua-corman-cyber-empathy-episode.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:51</itunes:duration>
      <itunes:summary>Of the massive number of brilliant and skillful ethical hackers working their eyes out to fight back against cybercrimes, only a few could remove the blinkers and realize the importance of fixing the areas where bits and bytes meet flesh and blood.  

That&apos;s why the world needs more people like Joshua Corman, a true cybersecurity visionary, not because he predicted things like cyber terrorism but because he realized and preached the importance of authenticity, collective action, and human connection in driving positive change decades ago. </itunes:summary>
      <itunes:subtitle>Of the massive number of brilliant and skillful ethical hackers working their eyes out to fight back against cybercrimes, only a few could remove the blinkers and realize the importance of fixing the areas where bits and bytes meet flesh and blood.  

That&apos;s why the world needs more people like Joshua Corman, a true cybersecurity visionary, not because he predicted things like cyber terrorism but because he realized and preached the importance of authenticity, collective action, and human connection in driving positive change decades ago. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">dd095879-b774-4e31-b555-44094c56be54</guid>
      <title>Who says cybersecurity can’t be fun? How humor bands us together</title>
      <description><![CDATA[<p>Javvad is a brilliant Security Awareness Advocate, Speaker, sharp industry commentator, and one of the most prolific bloggers in the community. His natural talent for making the cybersecurity industry's most technical and complicated matters easy to understand is a gift and an inspiration.  </p><p>Join me as Javvad masterfully dissects the negativity and the rationalization bias, using brilliant analogies to explain the disconnect between cybersecurity specialists' expectations and people’s responses to digital challenges. </p><p>And, if you’re up for it, help us answer this question: how can we make cybersecurity fun for people?</p><p>PS: This is not my AI-generated voice, but rather my adapter-damaged one. I only noticed the terrible quality after the recording, so please bear with me - or just skip to Javvad's parts, which are flawless!</p><p><strong>Episode Highlights:</strong></p><ul><li>What we really need to be teaching people about cybersecurity (4:50)</li><li>How to deal with the curse of knowledge (10:10)</li><li>The best way to keep cybersecurity connected to people's realities (19:20)</li><li>How to rebrand the cybersecurity team - and why we need this (24:10)</li><li>The problem with rational thinking (28:30)</li><li>Why cybersecurity is evolving beyond tech-focused conversations (38:50)</li></ul><p><strong>Resources:</strong></p><ul><li>Book - Javvad Malik - <a href="https://www.amazon.com/50-Ways-Survive-Thrive-Cybersecurity-ebook/dp/B0BPMX2B96/ref=sr_1_1?crid=1PMHDJP9TCHHI&dib=eyJ2IjoiMSJ9.LQHJhz3xq-KamhXEhddlEA.EUaLEBPeNCvfA3K34dQe4657827-PvGVsC1sT3iTRag&dib_tag=se&keywords=50+ways+to+survive+and+thrive+in+cybersecurity&qid=1708730149&sprefix=50+ways+to+survive+and+thrive+in+cybersecurity%2Caps%2C261&sr=8-1">50 Ways To Survive & Thrive In Cybersecurity</a></li></ul><p><strong>Connect with Javvad:</strong></p><ul><li><a href="https://javvadmalik.com/">Website</a></li><li><a href="https://www.linkedin.com/in/javvad/">LinkedIn</a></li><li><a href="https://twitter.com/J4vv4D">Twitter</a></li></ul><p><strong>Let's connect!</strong></p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 5 Mar 2024 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Javvad is a brilliant Security Awareness Advocate, Speaker, sharp industry commentator, and one of the most prolific bloggers in the community. His natural talent for making the cybersecurity industry's most technical and complicated matters easy to understand is a gift and an inspiration.  </p><p>Join me as Javvad masterfully dissects the negativity and the rationalization bias, using brilliant analogies to explain the disconnect between cybersecurity specialists' expectations and people’s responses to digital challenges. </p><p>And, if you’re up for it, help us answer this question: how can we make cybersecurity fun for people?</p><p>PS: This is not my AI-generated voice, but rather my adapter-damaged one. I only noticed the terrible quality after the recording, so please bear with me - or just skip to Javvad's parts, which are flawless!</p><p><strong>Episode Highlights:</strong></p><ul><li>What we really need to be teaching people about cybersecurity (4:50)</li><li>How to deal with the curse of knowledge (10:10)</li><li>The best way to keep cybersecurity connected to people's realities (19:20)</li><li>How to rebrand the cybersecurity team - and why we need this (24:10)</li><li>The problem with rational thinking (28:30)</li><li>Why cybersecurity is evolving beyond tech-focused conversations (38:50)</li></ul><p><strong>Resources:</strong></p><ul><li>Book - Javvad Malik - <a href="https://www.amazon.com/50-Ways-Survive-Thrive-Cybersecurity-ebook/dp/B0BPMX2B96/ref=sr_1_1?crid=1PMHDJP9TCHHI&dib=eyJ2IjoiMSJ9.LQHJhz3xq-KamhXEhddlEA.EUaLEBPeNCvfA3K34dQe4657827-PvGVsC1sT3iTRag&dib_tag=se&keywords=50+ways+to+survive+and+thrive+in+cybersecurity&qid=1708730149&sprefix=50+ways+to+survive+and+thrive+in+cybersecurity%2Caps%2C261&sr=8-1">50 Ways To Survive & Thrive In Cybersecurity</a></li></ul><p><strong>Connect with Javvad:</strong></p><ul><li><a href="https://javvadmalik.com/">Website</a></li><li><a href="https://www.linkedin.com/in/javvad/">LinkedIn</a></li><li><a href="https://twitter.com/J4vv4D">Twitter</a></li></ul><p><strong>Let's connect!</strong></p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="46266521" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/b3c0a5e3-c6f0-46f1-b232-0da2c4af9166/audio/a14ee96c-f1d6-4f03-87dc-852278d4a7e7/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Who says cybersecurity can’t be fun? How humor bands us together</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/a016fc5d-60ca-44cb-9496-017eedf241a7/3000x3000/javvad-malik-cyber-empathy-episode.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:11</itunes:duration>
      <itunes:summary>Can the people around you tell the difference between phishing, vishing, and smishing? Probably not. And it doesn’t really matter - because that’s now what cybersecurity is about. 

As information security specialists, it’s up to us to teach people how to navigate the digital world safely, how to recognize suspicious activity, and deal with it. It’s not their job to understand how cookies collect their data or how security products work. 

There’s no one who can better explain this in a way that feels personal and true the way Javvad Malik does. I’m SO thrilled to have him on Cyber Empathy!</itunes:summary>
      <itunes:subtitle>Can the people around you tell the difference between phishing, vishing, and smishing? Probably not. And it doesn’t really matter - because that’s now what cybersecurity is about. 

As information security specialists, it’s up to us to teach people how to navigate the digital world safely, how to recognize suspicious activity, and deal with it. It’s not their job to understand how cookies collect their data or how security products work. 

There’s no one who can better explain this in a way that feels personal and true the way Javvad Malik does. I’m SO thrilled to have him on Cyber Empathy!</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">3e2c79ad-6b95-4597-b676-60c0aeee5061</guid>
      <title>A convincing case for optimism: why data privacy is coded into our culture</title>
      <description><![CDATA[<p>How many accounts on different websites do you have? </p><p>Sharing our personal information online as a condition to access content has become a reflex. We hit the "I've read and agree to the terms and conditions" button without thinking about it. In fact, only a handful would notice if anything else is written in that box. </p><p>Yet things are starting to change; those worried about data privacy aren't only hackers anymore. The wave of awareness that questions what companies do with the personal information we share with them has started spreading to every corner of the cybersphere.  </p><p>My guest, the brilliant and passionate Merry Marwig, is optimistic about the future of the data privacy landscape and believes it is already going through a positive transformation. </p><p>Merry is a Volunteer Advisor at The Plunk Foundation, a Privacy Consultant at DataGrail, and, as you'll see throughout our conversation, overly excited about data privacy tech. </p><p>Merry's thoughts on the evolution of data privacy programs stay firmly rooted in the reality of her research and data-driven approach, factors which also fuel the change seeping into people's perception over these issues, and the link between privacy and security. </p><p>With Merry’s help, you’ll also understand the emotional toll privacy harms have on you, me, and everyone else, and how ethical use of consumers' information can actually boost a company's growth, plus much more.</p><p><strong>Episode highlights:</strong></p><ul><li>How privacy and security are different, but related (1:20)</li><li>The emotional toll of privacy harms (6:50)</li><li>Understanding how our data gets resold online (15:10)</li><li>Why now is the right time to do the right thing about data privacy (17:20)</li><li>How younger generations see data privacy (24:40)</li><li>Why privacy is part of our culture (29:30)</li><li>How our understanding of privacy is deepening (38:50)</li><li>Why even marketers are moving to privacy (46:40)</li></ul><p><strong>Connect with Merry:</strong></p><ul><li><a href="https://www.linkedin.com/in/marwig/">LinkedIn</a></li></ul><p><strong>Let's connect!</strong></p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 20 Feb 2024 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>How many accounts on different websites do you have? </p><p>Sharing our personal information online as a condition to access content has become a reflex. We hit the "I've read and agree to the terms and conditions" button without thinking about it. In fact, only a handful would notice if anything else is written in that box. </p><p>Yet things are starting to change; those worried about data privacy aren't only hackers anymore. The wave of awareness that questions what companies do with the personal information we share with them has started spreading to every corner of the cybersphere.  </p><p>My guest, the brilliant and passionate Merry Marwig, is optimistic about the future of the data privacy landscape and believes it is already going through a positive transformation. </p><p>Merry is a Volunteer Advisor at The Plunk Foundation, a Privacy Consultant at DataGrail, and, as you'll see throughout our conversation, overly excited about data privacy tech. </p><p>Merry's thoughts on the evolution of data privacy programs stay firmly rooted in the reality of her research and data-driven approach, factors which also fuel the change seeping into people's perception over these issues, and the link between privacy and security. </p><p>With Merry’s help, you’ll also understand the emotional toll privacy harms have on you, me, and everyone else, and how ethical use of consumers' information can actually boost a company's growth, plus much more.</p><p><strong>Episode highlights:</strong></p><ul><li>How privacy and security are different, but related (1:20)</li><li>The emotional toll of privacy harms (6:50)</li><li>Understanding how our data gets resold online (15:10)</li><li>Why now is the right time to do the right thing about data privacy (17:20)</li><li>How younger generations see data privacy (24:40)</li><li>Why privacy is part of our culture (29:30)</li><li>How our understanding of privacy is deepening (38:50)</li><li>Why even marketers are moving to privacy (46:40)</li></ul><p><strong>Connect with Merry:</strong></p><ul><li><a href="https://www.linkedin.com/in/marwig/">LinkedIn</a></li></ul><p><strong>Let's connect!</strong></p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="49817921" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/e89039de-2664-4964-b061-3e16364e245a/audio/2bff6099-cb75-4cf7-940c-05c5e99248cd/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>A convincing case for optimism: why data privacy is coded into our culture</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/48239cb9-df55-4110-9619-580ce1b9f5fd/3000x3000/merry-marwig-cyber-empathy-episode.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:53</itunes:duration>
      <itunes:summary>Sharing our personal information online as a condition to access content has become a reflex. We hit the &quot;I&apos;ve read and agree to the terms and conditions&quot; button without thinking about it. In fact, only a handful would notice if anything else is written in that box. 

Yet things are starting to change; those worried about data privacy aren&apos;t only hackers anymore. The wave of awareness that questions what companies do with the personal information we share with them has started spreading to every corner of the cybersphere.  </itunes:summary>
      <itunes:subtitle>Sharing our personal information online as a condition to access content has become a reflex. We hit the &quot;I&apos;ve read and agree to the terms and conditions&quot; button without thinking about it. In fact, only a handful would notice if anything else is written in that box. 

Yet things are starting to change; those worried about data privacy aren&apos;t only hackers anymore. The wave of awareness that questions what companies do with the personal information we share with them has started spreading to every corner of the cybersphere.  </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">bc5705c1-83bb-4ee2-b70a-ede59c2b7539</guid>
      <title>The underrated role of self-awareness in cybersecurity with Alyssa Miller</title>
      <description><![CDATA[<p>If you boil cybersecurity down to its essence, you'll find a hacker doing their best to educate, communicate, and help people see the world the way they do: with curiosity and the innate desire to understand it and make it better. </p><p>Yet what's the community reaction when a message fails to land as expected? It’s (still too) often victim-blaming, a sarcastic remark, or a vague piece of advice to do more of… something.</p><p>To our guest, Alyssa Miller, it all comes down to self-awareness and understanding that, frequently, impact is more important than intent. Being more aware of <i>how</i> and <i>what</i> we communicate may seem like a simple adjustment, but it is definitely the cornerstone of a more transparent, more thoughtful, and empathetic communication style in cybersecurity.    </p><p>As SVP and CISO, Alyssa is responsible for aligning strategic security initiatives with business line objectives to protect customers' data and privacy. She is also a lifelong hacker, RSA and TEDx speaker, and the Author of "Cybersecurity Career Guide," a book she wrote to address the disconnect between the perceived scarcity of specialists in cybersecurity and all those pounding on the door trying to figure out how to get into the industry. </p><p>Throughout our conversation, you'll hear Alyssa's thoughts on the meaning of being a hacker, emotional intelligence, and self-awareness. She also talks about the importance of conferences in cybersecurity, why it is preferable to make friends instead of fans, her book, the lessons learned along the way, and much, <i>much</i> more. </p><p><strong>Listen to this episode to discover:</strong></p><ul><li>When Alyssa started to see the world from an empathetic point of view (4:40)</li><li>What changes she experienced and witnessed since the industry began discussing empathy (14:00)</li><li>What (ethical) hackers actually do (18:50)</li><li>Why it’s better to make friends than to make fans (24:20)</li><li>What is a hacker? (31:30)</li><li>How to get into cybersecurity (42:10)</li></ul><p><strong>Resources mentioned:</strong></p><ul><li>Book: Alyssa Miller - <a href="https://www.amazon.com/Cyber-Security-Career-Alyssa-Miller/dp/1617298204/ref=sr_1_3?crid=PE2T7B2XXPMC&keywords=alyssa+miller&qid=1706809647&sprefix=alyssa+miller%2Caps%2C187&sr=8-3">Cybersecurity Career Guide</a></li><li><a href="https://pentest-tools.com/blog/we-think-we-know-how-to-build-differentiating-skills-in-offsec">IppSec - We think we know how to build differentiating skills in offsec</a></li><li><a href="https://youtu.be/xJbxVLo6P5A?si=Qpyl6c21UFHkUfon">Solving the Tech Skills Gap at Your Local Coffee Shop | Alyssa Miller | TEDxLSSC</a></li></ul>
]]></description>
      <pubDate>Tue, 6 Feb 2024 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>If you boil cybersecurity down to its essence, you'll find a hacker doing their best to educate, communicate, and help people see the world the way they do: with curiosity and the innate desire to understand it and make it better. </p><p>Yet what's the community reaction when a message fails to land as expected? It’s (still too) often victim-blaming, a sarcastic remark, or a vague piece of advice to do more of… something.</p><p>To our guest, Alyssa Miller, it all comes down to self-awareness and understanding that, frequently, impact is more important than intent. Being more aware of <i>how</i> and <i>what</i> we communicate may seem like a simple adjustment, but it is definitely the cornerstone of a more transparent, more thoughtful, and empathetic communication style in cybersecurity.    </p><p>As SVP and CISO, Alyssa is responsible for aligning strategic security initiatives with business line objectives to protect customers' data and privacy. She is also a lifelong hacker, RSA and TEDx speaker, and the Author of "Cybersecurity Career Guide," a book she wrote to address the disconnect between the perceived scarcity of specialists in cybersecurity and all those pounding on the door trying to figure out how to get into the industry. </p><p>Throughout our conversation, you'll hear Alyssa's thoughts on the meaning of being a hacker, emotional intelligence, and self-awareness. She also talks about the importance of conferences in cybersecurity, why it is preferable to make friends instead of fans, her book, the lessons learned along the way, and much, <i>much</i> more. </p><p><strong>Listen to this episode to discover:</strong></p><ul><li>When Alyssa started to see the world from an empathetic point of view (4:40)</li><li>What changes she experienced and witnessed since the industry began discussing empathy (14:00)</li><li>What (ethical) hackers actually do (18:50)</li><li>Why it’s better to make friends than to make fans (24:20)</li><li>What is a hacker? (31:30)</li><li>How to get into cybersecurity (42:10)</li></ul><p><strong>Resources mentioned:</strong></p><ul><li>Book: Alyssa Miller - <a href="https://www.amazon.com/Cyber-Security-Career-Alyssa-Miller/dp/1617298204/ref=sr_1_3?crid=PE2T7B2XXPMC&keywords=alyssa+miller&qid=1706809647&sprefix=alyssa+miller%2Caps%2C187&sr=8-3">Cybersecurity Career Guide</a></li><li><a href="https://pentest-tools.com/blog/we-think-we-know-how-to-build-differentiating-skills-in-offsec">IppSec - We think we know how to build differentiating skills in offsec</a></li><li><a href="https://youtu.be/xJbxVLo6P5A?si=Qpyl6c21UFHkUfon">Solving the Tech Skills Gap at Your Local Coffee Shop | Alyssa Miller | TEDxLSSC</a></li></ul>
]]></content:encoded>
      <enclosure length="47557180" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/da0d3408-99f3-44fd-971a-51ad01e9ec10/audio/a613ea1b-6ead-4195-984b-4ea245ff5d74/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>The underrated role of self-awareness in cybersecurity with Alyssa Miller</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/b34f1752-3308-4358-93c4-b974be40fad2/3000x3000/alyssa-miller-cyber-empathy-episode-2.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:32</itunes:duration>
      <itunes:summary>If you boil cybersecurity down to its essence, you&apos;ll find a hacker doing their best to educate, communicate, and help people see the world the way they do: with curiosity and the innate desire to understand it and make it better. 

Yet what&apos;s the community reaction when a message fails to land as expected? It’s (still too) often victim-blaming, a sarcastic remark, or a vague piece of advice to do more of… something.</itunes:summary>
      <itunes:subtitle>If you boil cybersecurity down to its essence, you&apos;ll find a hacker doing their best to educate, communicate, and help people see the world the way they do: with curiosity and the innate desire to understand it and make it better. 

Yet what&apos;s the community reaction when a message fails to land as expected? It’s (still too) often victim-blaming, a sarcastic remark, or a vague piece of advice to do more of… something.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">e758dac9-b5cc-4465-8c6b-3f3f6ea7a2e5</guid>
      <title>Creating change through hacking, teaching, and leading</title>
      <description><![CDATA[<p>I’ve had dozens of conversations exploring the need for empathy and compassion in cybersecurity, from supporting victims of cybercrime to acknowledging the data we protect are not numbers on a screen but real people’s experiences. </p><p>Yet the transformation empathy is capable of goes way beyond cybersecurity. It seeps into the teams and companies we build, the relationships we influence through technology, it guides leadership, and so much more! </p><p>That’s why I’m delighted to open Season 5 of Cyber Empathy with a trailblazer in the community, known for his generosity, empathy, and honesty. </p><p><strong>Vivek Ramachandran, Founder of SquareX</strong>, joins me to discuss the importance of optimism, perseverance, compassion, and vulnerability and their instrumental role in every aspect of his life. </p><p>Discover how Vivek's commitment to accessible education and his genuine desire to help others have shaped his career and inspired the entire offensive security community (and continues to do so). </p><p>Listen as Vivek recounts personal stories, including the astonishing support he received when transitioning a personal project into a full-time venture, and the profound impact of his empathetic approach on individuals and teams across the world.</p><p>This conversation sets the tone for this new season in which we’ll dive even deeper into the layers of our humanity and how they shape technology and the way we show up for ourselves and others.</p><p><strong>Tune in to explore:</strong></p><ul><li>Why people tend to give back when the opportunity arises (11:10)</li><li>How to be kind, compassionate, and empathetic when it is challenging to be it (18:40)</li><li>How to carve time for yourself when building a company and doing deep research in cybersecurity (25:00)</li><li>How Vivek balances accountability, flexibility, and trust at SquareX (29:50)</li><li>The role empathy plays in Vivek’s SquareX and other tech companies (37:50)</li></ul><p>Connect with Vivek:</p><ul><li><a href="https://www.linkedin.com/in/vivekramachandran/">LinkedIn</a></li><li><a href="https://twitter.com/vivekramac">Twitter</a></li><li><a href="https://sqrx.com/">SquareX's website</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 23 Jan 2024 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>I’ve had dozens of conversations exploring the need for empathy and compassion in cybersecurity, from supporting victims of cybercrime to acknowledging the data we protect are not numbers on a screen but real people’s experiences. </p><p>Yet the transformation empathy is capable of goes way beyond cybersecurity. It seeps into the teams and companies we build, the relationships we influence through technology, it guides leadership, and so much more! </p><p>That’s why I’m delighted to open Season 5 of Cyber Empathy with a trailblazer in the community, known for his generosity, empathy, and honesty. </p><p><strong>Vivek Ramachandran, Founder of SquareX</strong>, joins me to discuss the importance of optimism, perseverance, compassion, and vulnerability and their instrumental role in every aspect of his life. </p><p>Discover how Vivek's commitment to accessible education and his genuine desire to help others have shaped his career and inspired the entire offensive security community (and continues to do so). </p><p>Listen as Vivek recounts personal stories, including the astonishing support he received when transitioning a personal project into a full-time venture, and the profound impact of his empathetic approach on individuals and teams across the world.</p><p>This conversation sets the tone for this new season in which we’ll dive even deeper into the layers of our humanity and how they shape technology and the way we show up for ourselves and others.</p><p><strong>Tune in to explore:</strong></p><ul><li>Why people tend to give back when the opportunity arises (11:10)</li><li>How to be kind, compassionate, and empathetic when it is challenging to be it (18:40)</li><li>How to carve time for yourself when building a company and doing deep research in cybersecurity (25:00)</li><li>How Vivek balances accountability, flexibility, and trust at SquareX (29:50)</li><li>The role empathy plays in Vivek’s SquareX and other tech companies (37:50)</li></ul><p>Connect with Vivek:</p><ul><li><a href="https://www.linkedin.com/in/vivekramachandran/">LinkedIn</a></li><li><a href="https://twitter.com/vivekramac">Twitter</a></li><li><a href="https://sqrx.com/">SquareX's website</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="46872983" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/26552d9d-3b2c-44af-ac43-8193c05909d4/audio/d369b453-254a-4b63-8091-2be7c15e0336/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Creating change through hacking, teaching, and leading</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/211cacd0-5a99-4ca0-bdbf-3498b73f2d4b/3000x3000/vivek-ramachandran-cyber-empathy-guest-cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:49</itunes:duration>
      <itunes:summary>Welcome to Season 5 of Cyber Empathy! Today, Vivek Ramachandran joins me to discuss the importance of empathy, compassion, and vulnerability and how instrumental they were in the relationships he built at the multiple companies he founded, his personal life, and with himself. As the Founder of SquareX, Pentester Academy (acquired), Defcon and Blackhat speaker, and book author, Vivek&apos;s experience spans geographies, evolutionary stages in cybersecurity, and an intense personal growth journey.</itunes:summary>
      <itunes:subtitle>Welcome to Season 5 of Cyber Empathy! Today, Vivek Ramachandran joins me to discuss the importance of empathy, compassion, and vulnerability and how instrumental they were in the relationships he built at the multiple companies he founded, his personal life, and with himself. As the Founder of SquareX, Pentester Academy (acquired), Defcon and Blackhat speaker, and book author, Vivek&apos;s experience spans geographies, evolutionary stages in cybersecurity, and an intense personal growth journey.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">f9b6a3a3-317b-4aa4-8d77-e2560502035c</guid>
      <title>Mission before money: refocusing cybersecurity on what matters</title>
      <description><![CDATA[<p>In an industry whose goal is to protect people, purely profit-driven marketing makes no sense - and certainly doesn’t work.</p><p>After over a decade of running digital marketing for high-growth B2B technology startups, my guest, Dani Woolf, realized marketing is wildly different in information security. </p><p>It took her four years after joining the cybersecurity industry in 2018 to create Audience 1st, a customer research agency built on four pillars: </p><ul><li>curiosity to truly understand audiences</li><li>empathy to listen first and identify cybersecurity buyers' pain points</li><li>dedication to provide insights that promote growth</li><li>and honest connection to establish authentic relationships with buyers.</li></ul><p>Dani Woolf continues to do meaningful work for people who care as the Creator and Host of the <a href="https://www.audience1st.fm/podcast/episodes">Audience 1st podcast</a> and the <a href="https://wtfdidijustread.com/">WTF Did I Just Read? Tech Sales and Marketing Edition Podcast</a>. </p><p>Throughout this conversation, Dani shares her thoughts on marketers' role in cybersecurity, her "mission before money” mindset, and why repetition and messaging consistency are crucial in this space. </p><p>You'll also hear why we need leaders who choose peaceful and kind ways of communicating and why Dani believes the creative tension between old-school and modern marketers in cybersecurity is a good thing. </p><p>Additionally, Dani explains how she uses honesty to get real, deep insights from tech and IT pros, why she doubles down on being pragmatic and practical, and more ways to create positive change.</p><p><strong>Listen to this episode to learn:</strong></p><ul><li>Why Dani advocates for slowing down and opening our hearts in cybersecurity (3:00)</li><li>How to avoid leaving people out through black-and-white approaches in communication (7:50)</li><li>Why having creative tension is a good thing (14:40)</li><li>How marketers can make a meaningful contribution to cybersecurity (18:30)</li><li>How to set expectations to have in-depth conversations with tech and security leaders (27:00)</li><li>Why it’s crucial to connecting with audiences beyond data (34:00)</li><li>Which benefits come from being pragmatic, practical, and prescriptive (41:20)</li></ul><p><strong>Resources from this episode:</strong></p><ul><li><a href="https://www.linkedin.com/posts/daniarad_infosecurity-cybersecurity-reddit-activity-7115402140050747394-IQS2/?utm_source=share&utm_medium=member_desktop">What vendor looks really good, but is it actually GREAT?</a></li><li>Jason Vana's <a href="https://www.linkedin.com/in/jasonvana/">LinkedIn profile</a></li><li><a href="https://www.everyonehatesmarketers.com/about">Everyone Hates Marketers</a></li><li><a href="https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/managing-high-functioning-anxiety">Behind the mask: Managing high-functioning anxiety</a></li><li><a href="https://www.linkedin.com/posts/daniarad_marketing-customerresearch-audience1st-activity-7108509423567851520-0E_k/?utm_source=share&utm_medium=member_desktop">Your audience insights = Your foundation</a></li><li><a href="https://www.linkedin.com/posts/daniarad_i-curated-over-50-cybersecurity-buyer-interviews-activity-7113534905908625408-Yh1J/?utm_source=share&utm_medium=member_desktop">The biggest problems in the cybersecurity industry</a></li><li><a href="https://www.linkedin.com/posts/daniarad_cybersecurity-empathy-podcasting-activity-7115810577431621632-I66A/?utm_source=share&utm_medium=member_desktop">Dani's post about her interview at Cyber Empathy</a></li><li><a href="https://www.linkedin.com/posts/daniarad_cybersecurity-marketing-customerresearch-activity-7120773610822057985-aQGM/?utm_source=share&utm_medium=member_desktop">Marketers can learn a great deal from security researchers</a></li><li><a href="https://www.linkedin.com/posts/daniarad_b2b-marketing-cybersecurity-activity-7128081386632052737-QlnU/?utm_source=share&utm_medium=member_desktop">Here's how I flipped from reactive to proactive as a marketer in my 14+ years in B2B</a></li><li><a href="https://www.linkedin.com/posts/daniarad_marketing-cybersecurity-customerresearch-activity-7130236282160504832-YHTV/?utm_source=share&utm_medium=member_desktop">How to build authentic relationships in cybersecurity to scale growth</a></li><li><a href="https://www.linkedin.com/posts/daniarad_cybersecurity-audienceresearch-vulnerabilitymanagement-activity-7135850279589072896-Ynlj/?utm_source=share&utm_medium=member_desktop"> Vulnerability management in cybersecurity</a></li><li>Peep Laja's <a href="https://peeplaja.com/">website</a></li><li><a href="https://jobs-to-be-done.com/jobs-to-be-done-a-framework-for-customer-needs-c883cbf61c90" target="_blank">the Jobs to be Done framework</a></li></ul><p>Connect with Dani:</p><ul><li><a href="https://www.audience1st.fm/">Website</a></li><li><a href="https://www.linkedin.com/in/daniarad/">LinkedIn</a></li><li><a href="https://twitter.com/thedaniwoolf">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 12 Dec 2023 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>In an industry whose goal is to protect people, purely profit-driven marketing makes no sense - and certainly doesn’t work.</p><p>After over a decade of running digital marketing for high-growth B2B technology startups, my guest, Dani Woolf, realized marketing is wildly different in information security. </p><p>It took her four years after joining the cybersecurity industry in 2018 to create Audience 1st, a customer research agency built on four pillars: </p><ul><li>curiosity to truly understand audiences</li><li>empathy to listen first and identify cybersecurity buyers' pain points</li><li>dedication to provide insights that promote growth</li><li>and honest connection to establish authentic relationships with buyers.</li></ul><p>Dani Woolf continues to do meaningful work for people who care as the Creator and Host of the <a href="https://www.audience1st.fm/podcast/episodes">Audience 1st podcast</a> and the <a href="https://wtfdidijustread.com/">WTF Did I Just Read? Tech Sales and Marketing Edition Podcast</a>. </p><p>Throughout this conversation, Dani shares her thoughts on marketers' role in cybersecurity, her "mission before money” mindset, and why repetition and messaging consistency are crucial in this space. </p><p>You'll also hear why we need leaders who choose peaceful and kind ways of communicating and why Dani believes the creative tension between old-school and modern marketers in cybersecurity is a good thing. </p><p>Additionally, Dani explains how she uses honesty to get real, deep insights from tech and IT pros, why she doubles down on being pragmatic and practical, and more ways to create positive change.</p><p><strong>Listen to this episode to learn:</strong></p><ul><li>Why Dani advocates for slowing down and opening our hearts in cybersecurity (3:00)</li><li>How to avoid leaving people out through black-and-white approaches in communication (7:50)</li><li>Why having creative tension is a good thing (14:40)</li><li>How marketers can make a meaningful contribution to cybersecurity (18:30)</li><li>How to set expectations to have in-depth conversations with tech and security leaders (27:00)</li><li>Why it’s crucial to connecting with audiences beyond data (34:00)</li><li>Which benefits come from being pragmatic, practical, and prescriptive (41:20)</li></ul><p><strong>Resources from this episode:</strong></p><ul><li><a href="https://www.linkedin.com/posts/daniarad_infosecurity-cybersecurity-reddit-activity-7115402140050747394-IQS2/?utm_source=share&utm_medium=member_desktop">What vendor looks really good, but is it actually GREAT?</a></li><li>Jason Vana's <a href="https://www.linkedin.com/in/jasonvana/">LinkedIn profile</a></li><li><a href="https://www.everyonehatesmarketers.com/about">Everyone Hates Marketers</a></li><li><a href="https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/managing-high-functioning-anxiety">Behind the mask: Managing high-functioning anxiety</a></li><li><a href="https://www.linkedin.com/posts/daniarad_marketing-customerresearch-audience1st-activity-7108509423567851520-0E_k/?utm_source=share&utm_medium=member_desktop">Your audience insights = Your foundation</a></li><li><a href="https://www.linkedin.com/posts/daniarad_i-curated-over-50-cybersecurity-buyer-interviews-activity-7113534905908625408-Yh1J/?utm_source=share&utm_medium=member_desktop">The biggest problems in the cybersecurity industry</a></li><li><a href="https://www.linkedin.com/posts/daniarad_cybersecurity-empathy-podcasting-activity-7115810577431621632-I66A/?utm_source=share&utm_medium=member_desktop">Dani's post about her interview at Cyber Empathy</a></li><li><a href="https://www.linkedin.com/posts/daniarad_cybersecurity-marketing-customerresearch-activity-7120773610822057985-aQGM/?utm_source=share&utm_medium=member_desktop">Marketers can learn a great deal from security researchers</a></li><li><a href="https://www.linkedin.com/posts/daniarad_b2b-marketing-cybersecurity-activity-7128081386632052737-QlnU/?utm_source=share&utm_medium=member_desktop">Here's how I flipped from reactive to proactive as a marketer in my 14+ years in B2B</a></li><li><a href="https://www.linkedin.com/posts/daniarad_marketing-cybersecurity-customerresearch-activity-7130236282160504832-YHTV/?utm_source=share&utm_medium=member_desktop">How to build authentic relationships in cybersecurity to scale growth</a></li><li><a href="https://www.linkedin.com/posts/daniarad_cybersecurity-audienceresearch-vulnerabilitymanagement-activity-7135850279589072896-Ynlj/?utm_source=share&utm_medium=member_desktop"> Vulnerability management in cybersecurity</a></li><li>Peep Laja's <a href="https://peeplaja.com/">website</a></li><li><a href="https://jobs-to-be-done.com/jobs-to-be-done-a-framework-for-customer-needs-c883cbf61c90" target="_blank">the Jobs to be Done framework</a></li></ul><p>Connect with Dani:</p><ul><li><a href="https://www.audience1st.fm/">Website</a></li><li><a href="https://www.linkedin.com/in/daniarad/">LinkedIn</a></li><li><a href="https://twitter.com/thedaniwoolf">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="47329390" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/29622df1-cbe1-4926-a484-62dacc1d378e/audio/f7555342-3cd9-4609-8c3f-2877c0590e0a/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Mission before money: refocusing cybersecurity on what matters</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/42745cd6-4bf6-4c02-a0af-43019f2a955c/3000x3000/dani-woolf-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:18</itunes:duration>
      <itunes:summary>After over a decade of running digital marketing for high-growth B2B technology startups, our guest, Dani Woolf, realized how marketing is managed in other vertical markets doesn&apos;t work in the cybersecurity space. 

It took her four years since she joined the cybersecurity industry in 2018, to create Audience 1st, a modern customer research agency built on four pillars: curiosity to truly understand audiences, empathy to listen first and identify cybersecurity buyers&apos; pain points, provide insights that promote growth, and honest connection to establish authentic relationships with buyers. </itunes:summary>
      <itunes:subtitle>After over a decade of running digital marketing for high-growth B2B technology startups, our guest, Dani Woolf, realized how marketing is managed in other vertical markets doesn&apos;t work in the cybersecurity space. 

It took her four years since she joined the cybersecurity industry in 2018, to create Audience 1st, a modern customer research agency built on four pillars: curiosity to truly understand audiences, empathy to listen first and identify cybersecurity buyers&apos; pain points, provide insights that promote growth, and honest connection to establish authentic relationships with buyers. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">512720fa-c5e9-41d9-9fd0-37e9e05227e6</guid>
      <title>From code to compassion: how to use Nonviolent Communication to elevate cybersecurity</title>
      <description><![CDATA[<p>The blame game is a strong reflex in cybersecurity for many people. Pointing fingers at the human error that caused the breach, complaining about the CEO who didn't invest enough resources or training in cybersecurity, and taking it out on the CISO are all common occurrences. And they don’t help <i>anyone</i>. </p><p>Blaming harms everything that empathy in cybersecurity represents and works so hard to change in the industry: connection, trust, personal growth, and making meaningful progress.</p><p>But there’s hope! One of the most powerful solutions, actually born out of an empathetic approach to human connection: Nonviolent Communication. </p><p>Today’s guest, Octavian Istrate, explains how this technique can end the blame game, change perspectives, and get people to open up. </p><p>Octavian is a Certified Trainer with the US Center for Nonviolent Communication (CNVC) and a dedicated Association for Nonviolent Communication (ACNV) member. He discovered Nonviolent Communication in 2010, and 7 years into applying it to his personal life, he decided to share it with others through courses, workshops, and practice groups. In 2019, he became a Certified Trainer and turned his passion into a core part of his work. </p><p>In this episode, we explore how Nonviolent Communication contributes to developing empathy in cybersecurity, what makes it a powerful tool for personal growth, and how it helps build healthier relationships. </p><p>You'll hear Octavian's thoughts on emotional needs in the workplace, what drew him towards Nonviolent Communication, and how to use this approach to manage difficult situations. </p><p>Additionally, Octavian talks about the changes he experienced as someone coming from a technical background, empathy blockers, and how he ended up becoming a change strategist. We even go through a real-life exercise on how to apply Nonviolent Communication!</p><p>Listen to this episode to learn:</p><ul><li>How Nonviolent Communication can remove blame from cybersecurity conversations and behaviors (4:10)</li><li>What was going on in Octavian’s life when he learned about Nonviolent Communication (11:00)</li><li>How to separate observation from judgment (14:20)</li><li>What made Octavian decide to become a Nonviolent Communication trainer (28:00)</li><li>A real-life exercise on Nonviolent Communication (37:50)</li><li>How empathy blockers affect communication (48:20)</li></ul><p>Resources from this episode:</p><ul><li>Book: Marshall B. Rosenberg - <a href="https://www.amazon.com/Nonviolent-Communication-Language-Life-Changing-Relationships/dp/189200528X/ref=sr_1_1?crid=20D04QML0Y2PU&keywords=nonviolent+communication&qid=1700749823&sprefix=nonviolent%2Caps%2C279&sr=8-1">Nonviolent Communication: A Language of Life: Life-Changing Tools for Healthy Relationships (Nonviolent Communication Guides)</a></li><li>Center for Nonviolent Communication's <a href="https://www.cnvc.org/">website</a></li><li><a href="https://www.paperpinecone.com/blog/empathy-blockers-what-are-they-why-should-you-avoid-them-and-what-do-instead">Empathy Blockers</a></li></ul><p>Connect with Octavian:</p><ul><li><a href="https://octavianistrate.ro/despre/">Octavian’s website</a> (Romanian)</li><li><a href="https://change.ro/change-strategists/octavian-istrate/">Octavian as a change strategist</a> (Romanian)</li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 28 Nov 2023 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>The blame game is a strong reflex in cybersecurity for many people. Pointing fingers at the human error that caused the breach, complaining about the CEO who didn't invest enough resources or training in cybersecurity, and taking it out on the CISO are all common occurrences. And they don’t help <i>anyone</i>. </p><p>Blaming harms everything that empathy in cybersecurity represents and works so hard to change in the industry: connection, trust, personal growth, and making meaningful progress.</p><p>But there’s hope! One of the most powerful solutions, actually born out of an empathetic approach to human connection: Nonviolent Communication. </p><p>Today’s guest, Octavian Istrate, explains how this technique can end the blame game, change perspectives, and get people to open up. </p><p>Octavian is a Certified Trainer with the US Center for Nonviolent Communication (CNVC) and a dedicated Association for Nonviolent Communication (ACNV) member. He discovered Nonviolent Communication in 2010, and 7 years into applying it to his personal life, he decided to share it with others through courses, workshops, and practice groups. In 2019, he became a Certified Trainer and turned his passion into a core part of his work. </p><p>In this episode, we explore how Nonviolent Communication contributes to developing empathy in cybersecurity, what makes it a powerful tool for personal growth, and how it helps build healthier relationships. </p><p>You'll hear Octavian's thoughts on emotional needs in the workplace, what drew him towards Nonviolent Communication, and how to use this approach to manage difficult situations. </p><p>Additionally, Octavian talks about the changes he experienced as someone coming from a technical background, empathy blockers, and how he ended up becoming a change strategist. We even go through a real-life exercise on how to apply Nonviolent Communication!</p><p>Listen to this episode to learn:</p><ul><li>How Nonviolent Communication can remove blame from cybersecurity conversations and behaviors (4:10)</li><li>What was going on in Octavian’s life when he learned about Nonviolent Communication (11:00)</li><li>How to separate observation from judgment (14:20)</li><li>What made Octavian decide to become a Nonviolent Communication trainer (28:00)</li><li>A real-life exercise on Nonviolent Communication (37:50)</li><li>How empathy blockers affect communication (48:20)</li></ul><p>Resources from this episode:</p><ul><li>Book: Marshall B. Rosenberg - <a href="https://www.amazon.com/Nonviolent-Communication-Language-Life-Changing-Relationships/dp/189200528X/ref=sr_1_1?crid=20D04QML0Y2PU&keywords=nonviolent+communication&qid=1700749823&sprefix=nonviolent%2Caps%2C279&sr=8-1">Nonviolent Communication: A Language of Life: Life-Changing Tools for Healthy Relationships (Nonviolent Communication Guides)</a></li><li>Center for Nonviolent Communication's <a href="https://www.cnvc.org/">website</a></li><li><a href="https://www.paperpinecone.com/blog/empathy-blockers-what-are-they-why-should-you-avoid-them-and-what-do-instead">Empathy Blockers</a></li></ul><p>Connect with Octavian:</p><ul><li><a href="https://octavianistrate.ro/despre/">Octavian’s website</a> (Romanian)</li><li><a href="https://change.ro/change-strategists/octavian-istrate/">Octavian as a change strategist</a> (Romanian)</li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="53447063" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/40e4ff36-99ec-46ca-8263-286ec2f2e710/audio/46c7eff4-2c35-46a8-ac07-ca27ba594c37/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>From code to compassion: how to use Nonviolent Communication to elevate cybersecurity</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/4ee1d13e-3f9b-4d8d-9b17-e68c2d866c92/3000x3000/use-cyber-empathy-guest-cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:40</itunes:duration>
      <itunes:summary>Dive into a world where tech meets tenderness in this eye-opening episode! Join us as we explore the transformative power of Nonviolent Communication (NVC) in the often-rigid realm of cybersecurity. With expert insights from Octavian Istrate, a certified NVC trainer, we unravel how empathy can revolutionize your cyber conversations. Discover how to navigate the delicate balance between technical precision and compassionate communication. Whether you&apos;re decoding data or defusing digital disputes, this episode is a game-changer, offering tools to turn every tech talk into an opportunity for connection and understanding.</itunes:summary>
      <itunes:subtitle>Dive into a world where tech meets tenderness in this eye-opening episode! Join us as we explore the transformative power of Nonviolent Communication (NVC) in the often-rigid realm of cybersecurity. With expert insights from Octavian Istrate, a certified NVC trainer, we unravel how empathy can revolutionize your cyber conversations. Discover how to navigate the delicate balance between technical precision and compassionate communication. Whether you&apos;re decoding data or defusing digital disputes, this episode is a game-changer, offering tools to turn every tech talk into an opportunity for connection and understanding.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">4dcd1216-2e6a-4c82-88bc-57c2aa100c95</guid>
      <title>Cybersecurity craves human connection</title>
      <description><![CDATA[<p>Cybersecurity has a human heartbeat. </p><p>The variety of backgrounds that people in this space have enriches an industry that is day by day more interested in its human side. Different experiences bring new perspectives and ways of doing things to a community that craves human connection. </p><p>Our guest, the extraordinary <strong>Maril Vernon</strong>, is the perfect example. Coming from the social media marketing space, Maril took the cybersecurity industry by storm, becoming the 2023 Cybersecurity Woman Hacker of the Year, claiming the 2023 CyberJustu Pentest Ninja Award, and being recognized as one of the Top 10 Women Influencing Cyber by CyberSHEcurity. </p><p>Maril is the Senior Application Security Architect at Aquia Inc., Contributing Writer at CSO Online, COO at Teach Kids Tech, Co-host and Co-founder of The Cyber Queens Podcast, Purple Team Program Manager, and a 24/7 advocate for amplifying female and LGBTQ diversity in cybersecurity. </p><p>Throughout our conversation, Maril shares her thoughts on creating space for recognizing emotions in the workplace, how she sees and experiences empathy in cybersecurity, and the positive impact of her social media marketing background on her development as a hacker. Maril also talks about remote work cultures and human connection, generational differences, self-care, her commitment to increasing equality and diversity in cybersecurity, and more. </p><p><strong>Listen to this episode to learn:</strong></p><ul><li>How Maril sees the importance of empathy in cybersecurity (3:10)</li><li>Why there’s rising interest in the human side of cybersecurity (7:50)</li><li>How inclusive the industry really is (18:00)</li><li>Why Maril decided to start The Cyber Queens Podcast (26:00)</li><li>How different backgrounds enrich the cybersecurity industry (34:50)</li><li>How radical acceptance can be a life-changing hack (41:50)</li></ul><p>Resources from this episode:</p><ul><li><a href="https://www.cyberqueenspodcast.com">The Cyber Queens Podcast</a></li><li><a href="https://www.cyberqueenspodcast.com/about/#maril">Maril's Bio</a></li><li><a href="https://youtu.be/YZ-It9cbVm4?si=ug9sz5RvO2uYzto6">Hacker Valley Media - Unleashing the Power of Cybersecurity Purple Teams with Maril Vernon</a></li><li><a href="https://thecyberguild.org/resources/read-about-maril-vernon/">The Cyber Guild - Spotlight on Maril Vernon</a></li><li><a href="https://twitter.com/shewhohacks/status/1694450571036569818">Maril on Twitter - What Makes Hacking Ethical or Unethical?</a></li><li><a href="https://www.linkedin.com/in/phillipwylie/">Phillip Wiley</a></li><li><a href="https://cyberempathy.org/episodes/approachability-in-cybersecurity">Tracy Z. Maleeff (InfosecSherpa) on CyberEmpathy</a></li><li><a href="https://twitter.com/hacks4pancakes">Lesley Carhart (hacks4pancakes)</a></li></ul><p>Connect with Maril:</p><ul><li><a href="https://www.linkedin.com/in/marilvernon/">LinkedIn</a></li><li><a href="https://twitter.com/shewhohacks">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 21 Nov 2023 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Cybersecurity has a human heartbeat. </p><p>The variety of backgrounds that people in this space have enriches an industry that is day by day more interested in its human side. Different experiences bring new perspectives and ways of doing things to a community that craves human connection. </p><p>Our guest, the extraordinary <strong>Maril Vernon</strong>, is the perfect example. Coming from the social media marketing space, Maril took the cybersecurity industry by storm, becoming the 2023 Cybersecurity Woman Hacker of the Year, claiming the 2023 CyberJustu Pentest Ninja Award, and being recognized as one of the Top 10 Women Influencing Cyber by CyberSHEcurity. </p><p>Maril is the Senior Application Security Architect at Aquia Inc., Contributing Writer at CSO Online, COO at Teach Kids Tech, Co-host and Co-founder of The Cyber Queens Podcast, Purple Team Program Manager, and a 24/7 advocate for amplifying female and LGBTQ diversity in cybersecurity. </p><p>Throughout our conversation, Maril shares her thoughts on creating space for recognizing emotions in the workplace, how she sees and experiences empathy in cybersecurity, and the positive impact of her social media marketing background on her development as a hacker. Maril also talks about remote work cultures and human connection, generational differences, self-care, her commitment to increasing equality and diversity in cybersecurity, and more. </p><p><strong>Listen to this episode to learn:</strong></p><ul><li>How Maril sees the importance of empathy in cybersecurity (3:10)</li><li>Why there’s rising interest in the human side of cybersecurity (7:50)</li><li>How inclusive the industry really is (18:00)</li><li>Why Maril decided to start The Cyber Queens Podcast (26:00)</li><li>How different backgrounds enrich the cybersecurity industry (34:50)</li><li>How radical acceptance can be a life-changing hack (41:50)</li></ul><p>Resources from this episode:</p><ul><li><a href="https://www.cyberqueenspodcast.com">The Cyber Queens Podcast</a></li><li><a href="https://www.cyberqueenspodcast.com/about/#maril">Maril's Bio</a></li><li><a href="https://youtu.be/YZ-It9cbVm4?si=ug9sz5RvO2uYzto6">Hacker Valley Media - Unleashing the Power of Cybersecurity Purple Teams with Maril Vernon</a></li><li><a href="https://thecyberguild.org/resources/read-about-maril-vernon/">The Cyber Guild - Spotlight on Maril Vernon</a></li><li><a href="https://twitter.com/shewhohacks/status/1694450571036569818">Maril on Twitter - What Makes Hacking Ethical or Unethical?</a></li><li><a href="https://www.linkedin.com/in/phillipwylie/">Phillip Wiley</a></li><li><a href="https://cyberempathy.org/episodes/approachability-in-cybersecurity">Tracy Z. Maleeff (InfosecSherpa) on CyberEmpathy</a></li><li><a href="https://twitter.com/hacks4pancakes">Lesley Carhart (hacks4pancakes)</a></li></ul><p>Connect with Maril:</p><ul><li><a href="https://www.linkedin.com/in/marilvernon/">LinkedIn</a></li><li><a href="https://twitter.com/shewhohacks">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="48275651" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/221de029-d6ff-45df-8c49-609d94855047/audio/32c3e881-5ac1-4f57-ba18-d91da260161e/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Cybersecurity craves human connection</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/d740ae7d-c488-4f40-8ec4-a20f0fbb9e7a/3000x3000/maril-vernon-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:17</itunes:duration>
      <itunes:summary>Put your finger on the human pulse of cybersecurity with Maril Vernon, a standout star shaking up the scene. Tune in as she unpacks the power of empathy, true diversity, and her unique journey from social media marketing to top-tier hacking. Discover why human connection is vital for making it in this space - and changing it for the better!</itunes:summary>
      <itunes:subtitle>Put your finger on the human pulse of cybersecurity with Maril Vernon, a standout star shaking up the scene. Tune in as she unpacks the power of empathy, true diversity, and her unique journey from social media marketing to top-tier hacking. Discover why human connection is vital for making it in this space - and changing it for the better!</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">634a9b79-14db-41a7-becf-070c8ebc25c2</guid>
      <title>Neurohacking: blending science, security, and sound</title>
      <description><![CDATA[<p>A̶l̶m̶o̶s̶t̶ every route in cybersecurity lands on empathy. Despite its ultimate goal of protecting data, information security remains a people-focused discipline, with paths that lead to it as varied as they come. </p><p>Yet the magic happens when hackers with the most unconventional backgrounds use their hacking skills to break down things and reconnect them in surprising ways. My guest, <strong>Pete Herzog</strong>, a humble giant in the cybersecurity space, is the perfect example of this. </p><p>Pete is the Co-founder and Managing Director of ISECOM and the Co-founder of Urvin AI, Mewt, and Invisibles. On top of his immense contribution to cybersecurity, his diverse range of interests also materialized in a collection of fascinating neurohacking tools.</p><p>Join us for an exploration of the hacker mindset at the intersection of hacking, neuroscience, and music!</p><p>Pete's unconventional route to cybersecurity has a lot to teach us, as does his innate ability to combine multiple disciplines in remarkable ways. I talked to Pete about Hacker Highschool, the project he started to bring cybersecurity education to teenagers, the spark that lit the creation of neurohacking music and Invisibles, the Open Source Security Testing Methodology Manual (OSSTMM), his thoughts on trust, empathy in cybersecurity, and much more. </p><p><strong>Tune into this episode to get:</strong></p><ul><li>A glimpse into Pete's background and how his passion project - neurohacking music - started (4:00)</li><li>Insight into Pete's "unconventional" background and how it molded his approach to cybersecurity (16:30)</li><li>Why our difficult experiences are what (should) make us empathetic (23:30)</li><li>Why Hackers Highschool is such an important project for this community (26:00)</li><li>Pete’s thoughts on "zero trust" and the creation of the OSSTMM (31:10)</li></ul><p>Resources from this episode:</p><ul><li><a href="https://www.linkedin.com/posts/peteherzog_lets-talk-about-how-too-many-people-still-activity-7029376542015168513-B8jp/?utm_source=share&utm_medium=member_desktop">Pete's post on what's cybersecurity about</a></li><li><a href="https://twitter.com/peteherzog/status/1523362930929987587">Pete's tweet on being nice in cybersecurity</a></li><li><a href="https://hackerhighschool.org/">Hacker Highschool</a></li><li><a href="https://www.invisibles.cat/">Invisibles' website</a></li><li><a href="https://twitter.com/GenXBanshee/status/1586241707653632000">@GenXBanshee tweet on Pete's Invisibles neuro hacking music</a></li><li><a href="https://en.wikipedia.org/wiki/Neurohacking">Neurohacking</a></li><li><a href="https://www.xavidelaiglesia.com">Xavi De La Iglesia</a></li><li><a href="https://simple.wikipedia.org/wiki/Binaural_beats">Binaural Beats</a></li><li><a href="https://en.wikipedia.org/wiki/Transcranial_direct-current_stimulation">Transcranial direct-current stimulation</a></li><li><a href="https://www.isecom.org/OSSTMM.3.pdf">OSSTMM (The Open Source Security Testing Methodology Manual)</a></li><li><a href="https://www.2600.com/">2600.com</a></li></ul><p>Connect with Pete:</p><ul><li><a href="https://www.isecom.org/">Website</a></li><li><a href="https://www.linkedin.com/in/peteherzog/">LinkedIn</a></li><li><a href="https://twitter.com/peteherzog?lang=es">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 14 Nov 2023 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>A̶l̶m̶o̶s̶t̶ every route in cybersecurity lands on empathy. Despite its ultimate goal of protecting data, information security remains a people-focused discipline, with paths that lead to it as varied as they come. </p><p>Yet the magic happens when hackers with the most unconventional backgrounds use their hacking skills to break down things and reconnect them in surprising ways. My guest, <strong>Pete Herzog</strong>, a humble giant in the cybersecurity space, is the perfect example of this. </p><p>Pete is the Co-founder and Managing Director of ISECOM and the Co-founder of Urvin AI, Mewt, and Invisibles. On top of his immense contribution to cybersecurity, his diverse range of interests also materialized in a collection of fascinating neurohacking tools.</p><p>Join us for an exploration of the hacker mindset at the intersection of hacking, neuroscience, and music!</p><p>Pete's unconventional route to cybersecurity has a lot to teach us, as does his innate ability to combine multiple disciplines in remarkable ways. I talked to Pete about Hacker Highschool, the project he started to bring cybersecurity education to teenagers, the spark that lit the creation of neurohacking music and Invisibles, the Open Source Security Testing Methodology Manual (OSSTMM), his thoughts on trust, empathy in cybersecurity, and much more. </p><p><strong>Tune into this episode to get:</strong></p><ul><li>A glimpse into Pete's background and how his passion project - neurohacking music - started (4:00)</li><li>Insight into Pete's "unconventional" background and how it molded his approach to cybersecurity (16:30)</li><li>Why our difficult experiences are what (should) make us empathetic (23:30)</li><li>Why Hackers Highschool is such an important project for this community (26:00)</li><li>Pete’s thoughts on "zero trust" and the creation of the OSSTMM (31:10)</li></ul><p>Resources from this episode:</p><ul><li><a href="https://www.linkedin.com/posts/peteherzog_lets-talk-about-how-too-many-people-still-activity-7029376542015168513-B8jp/?utm_source=share&utm_medium=member_desktop">Pete's post on what's cybersecurity about</a></li><li><a href="https://twitter.com/peteherzog/status/1523362930929987587">Pete's tweet on being nice in cybersecurity</a></li><li><a href="https://hackerhighschool.org/">Hacker Highschool</a></li><li><a href="https://www.invisibles.cat/">Invisibles' website</a></li><li><a href="https://twitter.com/GenXBanshee/status/1586241707653632000">@GenXBanshee tweet on Pete's Invisibles neuro hacking music</a></li><li><a href="https://en.wikipedia.org/wiki/Neurohacking">Neurohacking</a></li><li><a href="https://www.xavidelaiglesia.com">Xavi De La Iglesia</a></li><li><a href="https://simple.wikipedia.org/wiki/Binaural_beats">Binaural Beats</a></li><li><a href="https://en.wikipedia.org/wiki/Transcranial_direct-current_stimulation">Transcranial direct-current stimulation</a></li><li><a href="https://www.isecom.org/OSSTMM.3.pdf">OSSTMM (The Open Source Security Testing Methodology Manual)</a></li><li><a href="https://www.2600.com/">2600.com</a></li></ul><p>Connect with Pete:</p><ul><li><a href="https://www.isecom.org/">Website</a></li><li><a href="https://www.linkedin.com/in/peteherzog/">LinkedIn</a></li><li><a href="https://twitter.com/peteherzog?lang=es">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="35631549" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/2b6888be-7c6b-4c50-8bb5-a748d299aa81/audio/43055472-45fa-43c1-8430-da9661ba5982/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Neurohacking: blending science, security, and sound</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/c1839926-e9c2-41d6-a117-3c9ee018bc40/3000x3000/pete-herzog-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:06</itunes:duration>
      <itunes:summary>Dive into the empathetic side of cybersecurity with Pete Herzog, a uniquely talented hacker and deep thinker. Co-founder of ISECOM and innovator behind Urvin AI, Mewt, and Invisibles, Pete shares his unique journey from cybersecurity to neurohacking tools. Discover how his work in projects like Hacker Highschool and the development of the OSSTMM blends empathy with technical acumen. Join us for an insightful exploration of Pete&apos;s unconventional approach to cybersecurity, where hacking meets neuroscience and music.</itunes:summary>
      <itunes:subtitle>Dive into the empathetic side of cybersecurity with Pete Herzog, a uniquely talented hacker and deep thinker. Co-founder of ISECOM and innovator behind Urvin AI, Mewt, and Invisibles, Pete shares his unique journey from cybersecurity to neurohacking tools. Discover how his work in projects like Hacker Highschool and the development of the OSSTMM blends empathy with technical acumen. Join us for an insightful exploration of Pete&apos;s unconventional approach to cybersecurity, where hacking meets neuroscience and music.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">e2d74694-dae3-4f4e-98d5-39b408fee688</guid>
      <title>Cybertrauma: the invisible scars of constant connectivity</title>
      <description><![CDATA[<p>Among the undeniable advantages of the hyperconnected world we learned to live in, some adverse effects lurk behind the algorithm's rewards. They’re damaging our personal and professional relationships and younger generations' sense of reciprocity, attention span, and ability to assess danger. </p><p>Our world is already a mesh between digital and analog experiences, rapidly leaning into making virtual interactions the norm. </p><p>So what can we expect to happen to us, biological beings, in non-biological settings?</p><p>In this episode,<strong> Catherine Knibbs</strong> joins us to talk about cybertrauma, how it feels, how it works, and how we can deal with it. </p><p>As a Cybertrauma Clinician and Researcher, international educator, Consultant, TEDx Speaker, and the Author of "Cybertrauma: The Darker Side of the Internet for Children and Young People," Catherine’s experience pierces deep into the invisible effects of the cyber territory on our bodies, emotions, and minds.  </p><p>Throughout our conversation, she invites us to rethink our relationship with technology, the impact of social media on the development of children, and how our phones' omnipresence affects our relationship with our kids, significant others, and colleagues. </p><p>Catherine also shares why she started studying this issue and explains the importance of self-care and creating healthy boundaries with social media. </p><p>We also discuss cyberbullying, the effects traumatic content has on our minds and bodies, smartphone addiction, and more. </p><p><strong>In this episode, you will learn:</strong></p><ul><li>What cybertrauma really is (3:40)</li><li>How the body absorbs and responds to cybertrauma (11:00)</li><li>The devastating effects of the constant presence of cell phones (18:20)</li><li>Why we feel compelled to jump onto social media (24:00)</li><li>The effects of virtual reality environments on our brains (28:20)</li><li>What led Catherine to dedicate herself to studying cybertrauma (32:10)</li><li>What we can do to help ourselves adapt to these challenges (40:00)</li></ul><p><strong>Resources mentioned:</strong></p><ul><li><a href="https://youtu.be/lRX_DWo3KPs?si=NFqfBaLuKVfpq1Hy">Bodies, Brains, and Technology - The Real Social Dilemma | Catherine Knibbs | TEDxDoncaster</a></li><li>Book: Catherine Knibbs - <a href="https://www.amazon.com/CYBERTRAUMA-DARKER-INTERNET-CHILDREN-PEOPLE-ebook/dp/B01BREKEQW/ref=sr_1_1?crid=3DSJXZ77RKZ7R&keywords=Cybertrauma&qid=1695980270&sprefix=cybertrauma%2Caps%2C193&sr=8-1">CYBERTRAUMA: THE DARKER SIDE OF THE INTERNET FOR CHILDREN AND YOUNG PEOPLE</a></li><li>Dr. Gabor Maté's <a href="https://drgabormate.com/">website</a></li><li><a href="https://www.thesocialdilemma.com/">The Social Dilemma</a></li><li><a href="https://en.wikipedia.org/wiki/Polyvagal_theory">The Polyvagal Theory</a></li><li><a href="https://en.wikipedia.org/wiki/Transactional_analysis">Transactional analysis</a></li><li><a href="https://en.wikipedia.org/wiki/Epigenetics">Epigenetics</a></li><li><a href="https://www.youtube.com/watch?v=1Evwgu369Jw">Breneé Brown about Empathy</a></li><li><a href="https://en.wikipedia.org/wiki/Alexithymia">Alexithymia</a></li><li><a href="https://my.clevelandclinic.org/health/symptoms/21773-heart-rate-variability-hrv">Cleveland Clinic - Heart Rate Variability (HRV)</a></li><li><a href="https://www.youtube.com/watch?v=MVYrJJNdrEg">Mark Zuckerberg: First Interview in the Metaverse | Lex Fridman Podcast #398</a></li><li>Book: Daniel J. Siegel, M.D. and Tina Payne Bryson, Ph.D.<i> </i>- <a href="https://drdansiegel.com/book/the-power-of-showing-up/">The Power of Showing Up</a></li></ul><p>Connect with Catherine:</p><ul><li><a href="https://www.childrenandtech.co.uk/">Website</a></li><li><a href="https://www.linkedin.com/in/catherine-knibbs-frsa-human-behaviour-technologist-2ba67b52/">LinkedIn</a></li><li><a href="https://twitter.com/nibzy">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 7 Nov 2023 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Among the undeniable advantages of the hyperconnected world we learned to live in, some adverse effects lurk behind the algorithm's rewards. They’re damaging our personal and professional relationships and younger generations' sense of reciprocity, attention span, and ability to assess danger. </p><p>Our world is already a mesh between digital and analog experiences, rapidly leaning into making virtual interactions the norm. </p><p>So what can we expect to happen to us, biological beings, in non-biological settings?</p><p>In this episode,<strong> Catherine Knibbs</strong> joins us to talk about cybertrauma, how it feels, how it works, and how we can deal with it. </p><p>As a Cybertrauma Clinician and Researcher, international educator, Consultant, TEDx Speaker, and the Author of "Cybertrauma: The Darker Side of the Internet for Children and Young People," Catherine’s experience pierces deep into the invisible effects of the cyber territory on our bodies, emotions, and minds.  </p><p>Throughout our conversation, she invites us to rethink our relationship with technology, the impact of social media on the development of children, and how our phones' omnipresence affects our relationship with our kids, significant others, and colleagues. </p><p>Catherine also shares why she started studying this issue and explains the importance of self-care and creating healthy boundaries with social media. </p><p>We also discuss cyberbullying, the effects traumatic content has on our minds and bodies, smartphone addiction, and more. </p><p><strong>In this episode, you will learn:</strong></p><ul><li>What cybertrauma really is (3:40)</li><li>How the body absorbs and responds to cybertrauma (11:00)</li><li>The devastating effects of the constant presence of cell phones (18:20)</li><li>Why we feel compelled to jump onto social media (24:00)</li><li>The effects of virtual reality environments on our brains (28:20)</li><li>What led Catherine to dedicate herself to studying cybertrauma (32:10)</li><li>What we can do to help ourselves adapt to these challenges (40:00)</li></ul><p><strong>Resources mentioned:</strong></p><ul><li><a href="https://youtu.be/lRX_DWo3KPs?si=NFqfBaLuKVfpq1Hy">Bodies, Brains, and Technology - The Real Social Dilemma | Catherine Knibbs | TEDxDoncaster</a></li><li>Book: Catherine Knibbs - <a href="https://www.amazon.com/CYBERTRAUMA-DARKER-INTERNET-CHILDREN-PEOPLE-ebook/dp/B01BREKEQW/ref=sr_1_1?crid=3DSJXZ77RKZ7R&keywords=Cybertrauma&qid=1695980270&sprefix=cybertrauma%2Caps%2C193&sr=8-1">CYBERTRAUMA: THE DARKER SIDE OF THE INTERNET FOR CHILDREN AND YOUNG PEOPLE</a></li><li>Dr. Gabor Maté's <a href="https://drgabormate.com/">website</a></li><li><a href="https://www.thesocialdilemma.com/">The Social Dilemma</a></li><li><a href="https://en.wikipedia.org/wiki/Polyvagal_theory">The Polyvagal Theory</a></li><li><a href="https://en.wikipedia.org/wiki/Transactional_analysis">Transactional analysis</a></li><li><a href="https://en.wikipedia.org/wiki/Epigenetics">Epigenetics</a></li><li><a href="https://www.youtube.com/watch?v=1Evwgu369Jw">Breneé Brown about Empathy</a></li><li><a href="https://en.wikipedia.org/wiki/Alexithymia">Alexithymia</a></li><li><a href="https://my.clevelandclinic.org/health/symptoms/21773-heart-rate-variability-hrv">Cleveland Clinic - Heart Rate Variability (HRV)</a></li><li><a href="https://www.youtube.com/watch?v=MVYrJJNdrEg">Mark Zuckerberg: First Interview in the Metaverse | Lex Fridman Podcast #398</a></li><li>Book: Daniel J. Siegel, M.D. and Tina Payne Bryson, Ph.D.<i> </i>- <a href="https://drdansiegel.com/book/the-power-of-showing-up/">The Power of Showing Up</a></li></ul><p>Connect with Catherine:</p><ul><li><a href="https://www.childrenandtech.co.uk/">Website</a></li><li><a href="https://www.linkedin.com/in/catherine-knibbs-frsa-human-behaviour-technologist-2ba67b52/">LinkedIn</a></li><li><a href="https://twitter.com/nibzy">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="48954002" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/faf56962-f19f-4ed7-9c5d-8150de661239/audio/b6715147-e995-4cd0-aa7f-5c74ffcab532/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Cybertrauma: the invisible scars of constant connectivity</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/4d1010e8-6948-403c-950e-ad7005272e2c/3000x3000/catherine-knibbs-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:59</itunes:duration>
      <itunes:summary>In this episode, Catherine Knibbs joins us to talk about cybertrauma, how it feels, how it works, and what we can do to deal with it. Catherine is a Cybertrauma Clinician and Researcher, international educator, Consultant, TEDx Speaker, and the Author of &quot;Cybertrauma: The Darker Side of the Internet for Children and Young People.&quot; </itunes:summary>
      <itunes:subtitle>In this episode, Catherine Knibbs joins us to talk about cybertrauma, how it feels, how it works, and what we can do to deal with it. Catherine is a Cybertrauma Clinician and Researcher, international educator, Consultant, TEDx Speaker, and the Author of &quot;Cybertrauma: The Darker Side of the Internet for Children and Young People.&quot; </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">7c046093-eb2a-4d13-8520-60c8d8a31c9b</guid>
      <title>Where passion meets purpose: exploring security as a universal value</title>
      <description><![CDATA[<p>The world has seen many transformations in the workspace during the last few years; some of them stuck, some didn't. Workers prioritizing personal relationships over economic benefits, for instance, is not considered a fad anymore; it is the norm.  </p><p>The relationship people developed with their jobs has radically changed, and empathy played a major role in that transformation. Slowly but surely, we are witnessing how cybersecurity detaches from the old and cold "it's just business" approach. </p><p>Today, Molly McLain Sterling joins us to share her thoughts on empathy and the role of connection in cybersecurity, while exploring communication techniques in cybersecurity, leadership, and more. </p><p>Molly is the Director of Global Security Culture at Medtronic, CISO Advisor, Top Rated SANS Speaker, Security Evangelist, and Behavioral Science Human Risk Management Leader. </p><p>Molly has a Bachelor's degree in Fine Arts (B.F.A in Music Theater), which is a testament to how fertile the cybersecurity space is. People with virtually any background can repurpose their skills and flourish in cybersecurity. </p><p>Throughout this episode, you'll hear about Molly's journey into cybersecurity and the acting techniques she adapted to her leadership role to improve her communication skills. Molly also talks about how she transformed Security Awareness into Security Empowerment and grew it into a security culture that now supports over 100000 people in 150 countries. This also led to discuss how scalable empathy really is, the power of delivering a consistent message, bringing leadership's attention to the importance of cybersecurity, and more examples from Molly’s fantastic work. </p><p>Tune into this episode to learn:</p><ul><li>Why building a security culture is a job we can do alone (3:30)</li><li>What you need to bring people together around a topic that’s not their primary job (12:10)</li><li>How to scale the use of empathy within an organization (16:50)</li><li>Acting tips and advice for improving how you communicate (23:40)</li><li>How to get leadership to take an interest in cybersecurity (32:40)</li></ul><p>Connect with Molly:</p><ul><li><a href="https://www.linkedin.com/in/mollymclain/">LinkedIn</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 31 Oct 2023 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>The world has seen many transformations in the workspace during the last few years; some of them stuck, some didn't. Workers prioritizing personal relationships over economic benefits, for instance, is not considered a fad anymore; it is the norm.  </p><p>The relationship people developed with their jobs has radically changed, and empathy played a major role in that transformation. Slowly but surely, we are witnessing how cybersecurity detaches from the old and cold "it's just business" approach. </p><p>Today, Molly McLain Sterling joins us to share her thoughts on empathy and the role of connection in cybersecurity, while exploring communication techniques in cybersecurity, leadership, and more. </p><p>Molly is the Director of Global Security Culture at Medtronic, CISO Advisor, Top Rated SANS Speaker, Security Evangelist, and Behavioral Science Human Risk Management Leader. </p><p>Molly has a Bachelor's degree in Fine Arts (B.F.A in Music Theater), which is a testament to how fertile the cybersecurity space is. People with virtually any background can repurpose their skills and flourish in cybersecurity. </p><p>Throughout this episode, you'll hear about Molly's journey into cybersecurity and the acting techniques she adapted to her leadership role to improve her communication skills. Molly also talks about how she transformed Security Awareness into Security Empowerment and grew it into a security culture that now supports over 100000 people in 150 countries. This also led to discuss how scalable empathy really is, the power of delivering a consistent message, bringing leadership's attention to the importance of cybersecurity, and more examples from Molly’s fantastic work. </p><p>Tune into this episode to learn:</p><ul><li>Why building a security culture is a job we can do alone (3:30)</li><li>What you need to bring people together around a topic that’s not their primary job (12:10)</li><li>How to scale the use of empathy within an organization (16:50)</li><li>Acting tips and advice for improving how you communicate (23:40)</li><li>How to get leadership to take an interest in cybersecurity (32:40)</li></ul><p>Connect with Molly:</p><ul><li><a href="https://www.linkedin.com/in/mollymclain/">LinkedIn</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="38392591" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/739a011d-6bb5-4c17-952c-1646af3e3428/audio/b61f9efd-4149-4a12-9b02-e51675e167f5/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Where passion meets purpose: exploring security as a universal value</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/0b726836-5ebe-42fd-84f8-5a88db4c746b/3000x3000/molly-mclain-sterling-cyber-empathy-podcast-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:59</itunes:duration>
      <itunes:summary>In this lively and insightful episode, you get to meet Molly McLain Sterling, the Director of Global Security Culture at Medtronic, CISO Advisor, Top Rated SANS Speaker, Security Evangelist, and Behavioral Science Human Risk Management Leader. 

Discover how her journey through different realms led her to seamlessly blend her love for theater with her belief that security is a universal value everyone deserves, turning this into a program that supports over 100,000 people in 150 countries.</itunes:summary>
      <itunes:subtitle>In this lively and insightful episode, you get to meet Molly McLain Sterling, the Director of Global Security Culture at Medtronic, CISO Advisor, Top Rated SANS Speaker, Security Evangelist, and Behavioral Science Human Risk Management Leader. 

Discover how her journey through different realms led her to seamlessly blend her love for theater with her belief that security is a universal value everyone deserves, turning this into a program that supports over 100,000 people in 150 countries.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">476d4a67-d11e-41b3-bcf9-47569ac532e8</guid>
      <title>Why being kind is the harder thing to do</title>
      <description><![CDATA[<p>In today's episode, I'm joined by one of the first people who raised the empathy flag in cybersecurity and inspired the creation of this podcast, Jayson E. Street. Despite National Geographic describing him as a "World Class Hacker," he sees himself simply as a Hacker, a Helper, and a Human. </p><p>Discover the transformative power of conscious kindness as he bares his soul in a deeply personal and heart-stirring conversation. Navigating the intricate dance of human imperfections, Jayson shares moving tales of sacrifice, flawed humanity, and the hidden emotional labor behind genuine acts of goodness. </p><p>This isn't about feel-good stories or being the hero; it's about choosing to be kind even when the world doesn't seem to reward it.</p><p>Come along to discover Jayson's candid journey, from roadside moments of compassion to profound responsibilities, and uncover the true essence of self-improvement and the impact of small gestures. Let his vulnerability inspire you to embrace your own complexities and fuel a more compassionate way of being in the world. </p><p>This episode might move you to act, think, and love with greater intention.</p><p><strong>Listen to this episode to learn:</strong></p><ul><li>What makes Jason keep fighting alongside the good guys in cybersecurity (5:00)</li><li>Why Jason decided to plunge into cybersecurity and never look back (9:40)</li><li>How to bridge the gap between security specialists and the people they serve (16:00)</li><li>Why it’s essential to address the emotional side of cybersecurity work (23:10)</li><li>How our polarized society negative impacts the cybersecurity space (32:20)</li><li>Why being kind and doing the right thing are conscious choices (39:00)</li></ul><p><strong>Resources mentioned:</strong></p><ul><li><a href="https://youtu.be/NLXqnCzFwY8">A high-functioning sociopath's guide to empathy</a></li><li><a href="https://seths.blog/2023/07/without-the-bad-parts/">Seth's Blog</a></li><li><a href="https://youtu.be/02Vf3NjTPsI">Penetration tester Jayson E. Street helps banks by hacking them</a></li><li><a href="https://youtu.be/PDNrSuTS3L8">Breakthrough S02E02 Cyber Terror</a></li><li>Book: Jayson E. Street - <a href="https://f0rb1dd3n.com">Dissecting the hack: The F0rb1dd3n Network</a></li><li><a href="https://hackeradventures.world">Hacker Adventures World</a></li><li><a href="https://def.camp/">DefCamp</a> the hacking conference</li></ul><p><strong>Connect with Jayson:</strong></p><ul><li><a href="https://jaysonestreet.com/">Website</a></li><li><a href="https://jaysonestreet.com/media.php">Jayson's Media</a></li><li><a href="https://www.linkedin.com/in/jstreet/">LinkedIn</a></li><li><a href="https://twitter.com/jaysonstreet">Twitter</a></li><li><a href="https://www.truesec.com/">Truesec</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 24 Oct 2023 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>In today's episode, I'm joined by one of the first people who raised the empathy flag in cybersecurity and inspired the creation of this podcast, Jayson E. Street. Despite National Geographic describing him as a "World Class Hacker," he sees himself simply as a Hacker, a Helper, and a Human. </p><p>Discover the transformative power of conscious kindness as he bares his soul in a deeply personal and heart-stirring conversation. Navigating the intricate dance of human imperfections, Jayson shares moving tales of sacrifice, flawed humanity, and the hidden emotional labor behind genuine acts of goodness. </p><p>This isn't about feel-good stories or being the hero; it's about choosing to be kind even when the world doesn't seem to reward it.</p><p>Come along to discover Jayson's candid journey, from roadside moments of compassion to profound responsibilities, and uncover the true essence of self-improvement and the impact of small gestures. Let his vulnerability inspire you to embrace your own complexities and fuel a more compassionate way of being in the world. </p><p>This episode might move you to act, think, and love with greater intention.</p><p><strong>Listen to this episode to learn:</strong></p><ul><li>What makes Jason keep fighting alongside the good guys in cybersecurity (5:00)</li><li>Why Jason decided to plunge into cybersecurity and never look back (9:40)</li><li>How to bridge the gap between security specialists and the people they serve (16:00)</li><li>Why it’s essential to address the emotional side of cybersecurity work (23:10)</li><li>How our polarized society negative impacts the cybersecurity space (32:20)</li><li>Why being kind and doing the right thing are conscious choices (39:00)</li></ul><p><strong>Resources mentioned:</strong></p><ul><li><a href="https://youtu.be/NLXqnCzFwY8">A high-functioning sociopath's guide to empathy</a></li><li><a href="https://seths.blog/2023/07/without-the-bad-parts/">Seth's Blog</a></li><li><a href="https://youtu.be/02Vf3NjTPsI">Penetration tester Jayson E. Street helps banks by hacking them</a></li><li><a href="https://youtu.be/PDNrSuTS3L8">Breakthrough S02E02 Cyber Terror</a></li><li>Book: Jayson E. Street - <a href="https://f0rb1dd3n.com">Dissecting the hack: The F0rb1dd3n Network</a></li><li><a href="https://hackeradventures.world">Hacker Adventures World</a></li><li><a href="https://def.camp/">DefCamp</a> the hacking conference</li></ul><p><strong>Connect with Jayson:</strong></p><ul><li><a href="https://jaysonestreet.com/">Website</a></li><li><a href="https://jaysonestreet.com/media.php">Jayson's Media</a></li><li><a href="https://www.linkedin.com/in/jstreet/">LinkedIn</a></li><li><a href="https://twitter.com/jaysonstreet">Twitter</a></li><li><a href="https://www.truesec.com/">Truesec</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="48425631" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/ab178134-628f-4997-b3c5-be257e0766c7/audio/9a231308-be18-41f5-a4fa-4f51e8d16b2f/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Why being kind is the harder thing to do</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/5a950387-aee1-47cf-8371-b14288adc373/3000x3000/jayson-e-street-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:26</itunes:duration>
      <itunes:summary>This raw and heart-stirring conversation with Jayson E. Street left an indelible mark on me. Join us as we explore the profound strength behind genuine acts of kindness and the connection between cybersecurity and life&apos;s larger lessons. Be inspired to act with deeper intention.</itunes:summary>
      <itunes:subtitle>This raw and heart-stirring conversation with Jayson E. Street left an indelible mark on me. Join us as we explore the profound strength behind genuine acts of kindness and the connection between cybersecurity and life&apos;s larger lessons. Be inspired to act with deeper intention.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">92cd12e3-6015-4f46-a2c6-ae982527913a</guid>
      <title>Why cybersecurity thrives on authenticity, confidence, deep empathy</title>
      <description><![CDATA[<p>The "good vs. evil" battle is an integral part of cybersecurity's origin story. While it’s motivating and energizing, it also comes with language derived from military vocabulary, that brings a certain level of hostility and aggression. </p><p>That’s why, often, the language we use in cybersecurity alienates the very people we’re trying to help. </p><p>In this episode, the kind and compassionate Dr. Jessica Barker joins me for a conversation about the most underrated skill in cybersecurity: empathy. We also touch on using psychology and data to improve cybersecurity awareness and culture, optimism as a confidence builder, and more.</p><p>We had a fantastic conversation about the evolution of cybersecurity culture and Jessica's massively influential work on revamping cybersecurity vocabulary, whose impact reaches far beyond industry confines. Blending introspection and actionable insight, we also discuss imposter syndrome, balancing constant evolution with self-compassion, and other essential topics we deeply care about. </p><p>Listen to this episode to discover:</p><ul><li>Why the world is actually way better than we perceive it (4:50)</li><li>Why cybersecurity is about protecting people (14:00)</li><li>The origins of Jessica's social approach to cybersecurity (19:40)</li><li>How to strive for improvement without damaging our health (29:20)</li><li>Dr. Jessica's tips for fighting imposter syndrome (35:50)</li><li>Why empathy is the most underrated skill in cybersecurity (45:30)</li></ul>
]]></description>
      <pubDate>Tue, 17 Oct 2023 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>The "good vs. evil" battle is an integral part of cybersecurity's origin story. While it’s motivating and energizing, it also comes with language derived from military vocabulary, that brings a certain level of hostility and aggression. </p><p>That’s why, often, the language we use in cybersecurity alienates the very people we’re trying to help. </p><p>In this episode, the kind and compassionate Dr. Jessica Barker joins me for a conversation about the most underrated skill in cybersecurity: empathy. We also touch on using psychology and data to improve cybersecurity awareness and culture, optimism as a confidence builder, and more.</p><p>We had a fantastic conversation about the evolution of cybersecurity culture and Jessica's massively influential work on revamping cybersecurity vocabulary, whose impact reaches far beyond industry confines. Blending introspection and actionable insight, we also discuss imposter syndrome, balancing constant evolution with self-compassion, and other essential topics we deeply care about. </p><p>Listen to this episode to discover:</p><ul><li>Why the world is actually way better than we perceive it (4:50)</li><li>Why cybersecurity is about protecting people (14:00)</li><li>The origins of Jessica's social approach to cybersecurity (19:40)</li><li>How to strive for improvement without damaging our health (29:20)</li><li>Dr. Jessica's tips for fighting imposter syndrome (35:50)</li><li>Why empathy is the most underrated skill in cybersecurity (45:30)</li></ul>
]]></content:encoded>
      <enclosure length="47862639" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/93c9177c-6f81-4e0c-ab2a-790c109c84d5/audio/9ccf445b-0243-4639-b18f-0f72d7b29987/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Why cybersecurity thrives on authenticity, confidence, deep empathy</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/1ad12e3f-8e56-49ae-910b-3f3552078128/3000x3000/jessica-baker-cyber-empathy-podcast-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:51</itunes:duration>
      <itunes:summary>In this engaging episode, Dr. Jessica Baker and I dive deep into the nuances of personal growth, the value of time, the true essence of confidence, and the underrated significance of empathy in cybersecurity. Join us for a deep dive into the transformative power of books (for both authors and readers) and the ripple effect of positive actions in a space often driven by a combative mentality.</itunes:summary>
      <itunes:subtitle>In this engaging episode, Dr. Jessica Baker and I dive deep into the nuances of personal growth, the value of time, the true essence of confidence, and the underrated significance of empathy in cybersecurity. Join us for a deep dive into the transformative power of books (for both authors and readers) and the ripple effect of positive actions in a space often driven by a combative mentality.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">d5855923-779d-4074-a8de-6f7f738161d9</guid>
      <title>The 7 habits of highly empathetic people</title>
      <description><![CDATA[<p>“Knowing and <i>not</i> doing is the same as <i>not knowing</i>.”</p><p>Join Sebastian Avarvarei and myself as we dive deep into the layers of self-development, cybersecurity, and the crucial blend of technical acumen with soft skills.</p><p>Sebastian, with his rich experience in security, sheds light on his evolution from proficient technical leader to becoming a deeply compassionate leader in the cybersecurity industry. </p><p>I can’t wait for you to discover his unique approach to leadership, the influence "The 7 Habits of Highly Effective People" had on his managerial style, and the power of practice in transforming knowledge into actionable wisdom.</p><p>From overcoming the fear of public speaking to leading with the heart, and the role of empathy in cybersecurity, this conversation overflows with inspiration for professional growth and personal development. We’ll also touch on the importance of being kind to ourselves, of acknowledging that it’s okay <i>not</i> to be okay, why practicing appreciative listening can be life-changing, and so much more. </p><p>Whether you're a seasoned expert or a newbie in cybersecurity, there's a nugget of wisdom for you in this conversation.</p><p>In this episode, you will learn:</p><ul><li>How Sebastian discovered the power of speaking from the heart (6:40)</li><li>How Stephen Covey's book influenced Sebastian (11:10)</li><li>Be ready to learn at any moment (24:50)</li><li>Why we must be kind to ourselves (34:00)</li><li>The importance of time management in empathetic leadership (37:20)</li><li>The clarifying question that creates alignment (46:40)</li></ul><p>Resources Mentioned: </p><ul><li>Book: Stephen Covey - <a href="https://www.goodreads.com/book/show/36072.The_7_Habits_of_Highly_Effective_People">The 7 Habits of Highly Effective People</a></li><li>Sebastian Avarvei at DefCamp 2022 - <a href="https://www.youtube.com/watch?v=zY0qzpfVweo">What if I told you that Security is here to help? </a></li><li>DefCamp <a href="https://def.camp/">website</a></li><li>Book: Ryan Holiday - <a href="https://www.goodreads.com/book/show/27036528-ego-is-the-enemy">Ego is the Enemy</a></li><li>Book: Douglas Stone, Sheila Heen - <a href="https://www.goodreads.com/book/show/18114120-thanks-for-the-feedback">Thanks for the Feedback</a>: The Science and Art of Receiving Feedback Well</li><li>The <a href="https://cyberempathy.org/manifesto">Cyber Empathy Manifesto</a></li><li>Cyber Empathy. Episode #1 - <a href="https://cyberempathy.org/episodes/why-cyber-empathy-podcast">Why I chose an empathetic approach to cybersecurity</a></li><li><a href="https://twitter.com/sebastian_paul/status/1648390500666187779">About Sebastian's happy place</a></li><li><a href="https://en.wikipedia.org/wiki/Appreciative_listening">Appreciative Listening on Wikipedia</a></li><li><a href="https://en.wikipedia.org/wiki/Situational_leadership_theory">Situational Leadership Theory</a> on Wikipedia</li></ul><p>Connect with Sebastian:</p><ul><li><a href="https://www.linkedin.com/in/sebastianavarvarei/">LinkedIn</a></li><li><a href="https://twitter.com/sebastian_paul">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 10 Oct 2023 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>“Knowing and <i>not</i> doing is the same as <i>not knowing</i>.”</p><p>Join Sebastian Avarvarei and myself as we dive deep into the layers of self-development, cybersecurity, and the crucial blend of technical acumen with soft skills.</p><p>Sebastian, with his rich experience in security, sheds light on his evolution from proficient technical leader to becoming a deeply compassionate leader in the cybersecurity industry. </p><p>I can’t wait for you to discover his unique approach to leadership, the influence "The 7 Habits of Highly Effective People" had on his managerial style, and the power of practice in transforming knowledge into actionable wisdom.</p><p>From overcoming the fear of public speaking to leading with the heart, and the role of empathy in cybersecurity, this conversation overflows with inspiration for professional growth and personal development. We’ll also touch on the importance of being kind to ourselves, of acknowledging that it’s okay <i>not</i> to be okay, why practicing appreciative listening can be life-changing, and so much more. </p><p>Whether you're a seasoned expert or a newbie in cybersecurity, there's a nugget of wisdom for you in this conversation.</p><p>In this episode, you will learn:</p><ul><li>How Sebastian discovered the power of speaking from the heart (6:40)</li><li>How Stephen Covey's book influenced Sebastian (11:10)</li><li>Be ready to learn at any moment (24:50)</li><li>Why we must be kind to ourselves (34:00)</li><li>The importance of time management in empathetic leadership (37:20)</li><li>The clarifying question that creates alignment (46:40)</li></ul><p>Resources Mentioned: </p><ul><li>Book: Stephen Covey - <a href="https://www.goodreads.com/book/show/36072.The_7_Habits_of_Highly_Effective_People">The 7 Habits of Highly Effective People</a></li><li>Sebastian Avarvei at DefCamp 2022 - <a href="https://www.youtube.com/watch?v=zY0qzpfVweo">What if I told you that Security is here to help? </a></li><li>DefCamp <a href="https://def.camp/">website</a></li><li>Book: Ryan Holiday - <a href="https://www.goodreads.com/book/show/27036528-ego-is-the-enemy">Ego is the Enemy</a></li><li>Book: Douglas Stone, Sheila Heen - <a href="https://www.goodreads.com/book/show/18114120-thanks-for-the-feedback">Thanks for the Feedback</a>: The Science and Art of Receiving Feedback Well</li><li>The <a href="https://cyberempathy.org/manifesto">Cyber Empathy Manifesto</a></li><li>Cyber Empathy. Episode #1 - <a href="https://cyberempathy.org/episodes/why-cyber-empathy-podcast">Why I chose an empathetic approach to cybersecurity</a></li><li><a href="https://twitter.com/sebastian_paul/status/1648390500666187779">About Sebastian's happy place</a></li><li><a href="https://en.wikipedia.org/wiki/Appreciative_listening">Appreciative Listening on Wikipedia</a></li><li><a href="https://en.wikipedia.org/wiki/Situational_leadership_theory">Situational Leadership Theory</a> on Wikipedia</li></ul><p>Connect with Sebastian:</p><ul><li><a href="https://www.linkedin.com/in/sebastianavarvarei/">LinkedIn</a></li><li><a href="https://twitter.com/sebastian_paul">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="53212588" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/d8b378e0-b007-42d6-a9b4-bb8b9886f60f/audio/70feafcb-c432-495f-a237-fd873308ebcd/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>The 7 habits of highly empathetic people</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/49fbda86-013d-4faf-926c-60c6b10c740e/3000x3000/sebastian-avarvei-cyber-empathy-guest-1.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:25</itunes:duration>
      <itunes:summary>Dive into a riveting chat with Sebastian Avarvarei, who transitioned from tech pro to a heart-led cybersecurity leader. Unpack leadership gems, the magic of &quot;The 7 Habits of Highly Effective People&quot;, and the secret spice to turning knowledge into action.</itunes:summary>
      <itunes:subtitle>Dive into a riveting chat with Sebastian Avarvarei, who transitioned from tech pro to a heart-led cybersecurity leader. Unpack leadership gems, the magic of &quot;The 7 Habits of Highly Effective People&quot;, and the secret spice to turning knowledge into action.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">22a075bd-c515-4a27-89d7-fb8741a25030</guid>
      <title>Facing fear and finding joy - how I put empathy to work</title>
      <description><![CDATA[<p><i>"To see others more clearly, set aside your opinions, advice, and judgment, and put their truth above your own." Greg McKeown</i></p><p>In this episode, as an opener for Cyber Empathy's fourth season, I'll take you through some updates on the show and my personal life and share the topics we will be exploring this season. I’ll share how my loved ones’ unconditional love supported me through the taxing situations I had to deal with in the last year, and how our community granted me the honor of two awards at the 2023 European Cyber Security Blogger Awards, making Cyber Empathy the Most Educational Podcast, and the Best New Cybersecurity Podcast!</p><p>Today's episode is also a reminder of why Dave and I embarked on this podcasting adventure that brought us nothing but joy; you'll hear about the most significant lessons podcasting taught us, my favorite reads for this year, and more. </p><p>In this episode, you will learn:</p><ul><li>A bit about how challenging last year was for me (2:20)</li><li>Not everything has to be as hard as we think (6:10)</li><li>A refresher on why this podcast exists and how I hope to serve you (9:40)</li><li>The key topics we’ll dig into in season 4 (13:20)</li></ul><p>Resources:</p><ul><li><a href="https://cyberempathy.org/episodes/the-art-of-listening">The art of listening</a> - Cyber Empathy season 2, episode 9 </li><li>Book: Greg McKeown - <a href="https://www.goodreads.com/book/show/54895700-effortless?ac=1&from_search=true&qid=UWr7kzBRjT&rank=2">Effortless: Make It Easier to Do What Matters Most</a></li><li>Book: Cixin Liu - <a href="https://www.goodreads.com/book/show/34569357-remembrance-of-earth-s-past">Remembrance of Earth's Past: The Three-Body Trilogy</a></li><li><a href="https://davesmyth.com/commonplace">Dave’s latest work</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 3 Oct 2023 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p><i>"To see others more clearly, set aside your opinions, advice, and judgment, and put their truth above your own." Greg McKeown</i></p><p>In this episode, as an opener for Cyber Empathy's fourth season, I'll take you through some updates on the show and my personal life and share the topics we will be exploring this season. I’ll share how my loved ones’ unconditional love supported me through the taxing situations I had to deal with in the last year, and how our community granted me the honor of two awards at the 2023 European Cyber Security Blogger Awards, making Cyber Empathy the Most Educational Podcast, and the Best New Cybersecurity Podcast!</p><p>Today's episode is also a reminder of why Dave and I embarked on this podcasting adventure that brought us nothing but joy; you'll hear about the most significant lessons podcasting taught us, my favorite reads for this year, and more. </p><p>In this episode, you will learn:</p><ul><li>A bit about how challenging last year was for me (2:20)</li><li>Not everything has to be as hard as we think (6:10)</li><li>A refresher on why this podcast exists and how I hope to serve you (9:40)</li><li>The key topics we’ll dig into in season 4 (13:20)</li></ul><p>Resources:</p><ul><li><a href="https://cyberempathy.org/episodes/the-art-of-listening">The art of listening</a> - Cyber Empathy season 2, episode 9 </li><li>Book: Greg McKeown - <a href="https://www.goodreads.com/book/show/54895700-effortless?ac=1&from_search=true&qid=UWr7kzBRjT&rank=2">Effortless: Make It Easier to Do What Matters Most</a></li><li>Book: Cixin Liu - <a href="https://www.goodreads.com/book/show/34569357-remembrance-of-earth-s-past">Remembrance of Earth's Past: The Three-Body Trilogy</a></li><li><a href="https://davesmyth.com/commonplace">Dave’s latest work</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="16610638" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/389a1474-8ea5-4f7e-b4a9-6c14a6828189/audio/7743930c-de26-45b2-96f7-0aff49f9bbc3/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Facing fear and finding joy - how I put empathy to work</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/fa6312a0-e7e4-414c-9813-e249c1dc32ba/3000x3000/cyber-empathy-host-andra-zaharia.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:18</itunes:duration>
      <itunes:summary>In this episode, as an opener for Cyber Empathy&apos;s fourth season, I&apos;ll take you through some updates on the show and my personal life, share the topics we will be exploring this season, thank my loved ones for their unconditional love throughout the taxing situations I had to deal with in the last year, and our community for their support that granted us the honor of two awards at the 2023 European Cyber Security Blogger Awards, the Most Educational Podcast award, and the Best New Cybersecurity Podcast award. </itunes:summary>
      <itunes:subtitle>In this episode, as an opener for Cyber Empathy&apos;s fourth season, I&apos;ll take you through some updates on the show and my personal life, share the topics we will be exploring this season, thank my loved ones for their unconditional love throughout the taxing situations I had to deal with in the last year, and our community for their support that granted us the honor of two awards at the 2023 European Cyber Security Blogger Awards, the Most Educational Podcast award, and the Best New Cybersecurity Podcast award. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">982ef030-86cc-4a67-95d8-ea9ebd9a6342</guid>
      <title>Ethical hackers and the legacy of the Hacker Manifesto</title>
      <description><![CDATA[<p>Thinking of The Hacker Manifesto solely as a rant against corporations, the government, and all authorities is reductive. The volume also appeals to curiosity and a constructive rebellious spirit, which form the basis of hacker culture.</p><p>Curiosity fuels hackers to break things down and figure out how they work so they can improve them. It also drives them to ask questions that are different, unexpected, and that lead to paths less traveled.</p><p>In today's episode, we go down one of those paths with experienced leader, team manager, and security professional, <strong>Tom Eston</strong>. In his over 20 years of cybersecurity work, Tom has successfully led ethical hacking teams and improved industry-standard testing methodologies. He has also been creating podcasts since long before they were cool, and now you can listen to him on the <strong>Shared Security Podcast</strong>, which he co-founded and co-hosts.</p><p>Throughout our conversation, Tom looks at the 1986 Hacker Manifesto from an unexpected angle, shares his thoughts on the potential of the massive amount of information available for aspiring ethical hackers, and shares examples of how to guide young white hat hackers and help them calibrate their moral compass. </p><p>We also talk about the time Tom faced an ethical dilemma as a leader and his experiences being on the receiving end of empathy in cybersecurity.</p><p><strong>In this episode, you will learn:</strong></p><ul><li>What drives people to invest their mental and emotional energy in cybersecurity (4:40)</li><li>How to deal with burnout as a cybersecurity fiend (8:20)</li><li>Why we live in the golden age of training and how to take advantage of it (14:10)</li><li>A practical example of how to deal with ethical dilemmas in cybersecurity (21:40)</li><li>How young hackers can learn to balance the power they have to manipulate systems with being on the right side of history (30:00)</li><li>The importance of "knowing your audience" when reporting cybersecurity issues (39:50)</li><li>How The Hacker Manifesto holds up today and what could make it even more useful for ethical hackers (45:43)</li></ul><p>Resources:</p><ul><li>Visit Tom’s blog <a href="https://www.spylogic.net/2018/02/introducing-the-shared-security-weekly-blaze-podcast/" target="_blank">Spylogic</a></li><li>The <a href="https://sharedsecurity.net/" target="_blank">Shared Security podcast</a></li><li>The Shared Security podcast - <a href="https://www.youtube.com/watch?v=7O7E0rQnWEk">Exploring the Role of Empathy in Cybersecurity with Andra Zaharia</a></li><li>The Shared Security podcast - <a href="https://sharedsecurity.net/2023/05/08/juice-jacking-debunked-photographer-vs-ai-dataset-google-authenticator-risks/">Juice jacking debunked, photographer vs. AI dataset, Google authenticator risks</a></li><li><a href="http://phrack.org/issues/7/3.html">The Hacker Manifesto</a></li></ul><p>Connect with Tom:</p><ul><li><a href="https://www.linkedin.com/in/tomeston/">LinkedIn</a></li><li><a href="https://twitter.com/agent0x0">Twitter</a></li><li><a href="https://infosec.exchange/@agent0x0">Infosec Exchange</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 23 May 2023 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Thinking of The Hacker Manifesto solely as a rant against corporations, the government, and all authorities is reductive. The volume also appeals to curiosity and a constructive rebellious spirit, which form the basis of hacker culture.</p><p>Curiosity fuels hackers to break things down and figure out how they work so they can improve them. It also drives them to ask questions that are different, unexpected, and that lead to paths less traveled.</p><p>In today's episode, we go down one of those paths with experienced leader, team manager, and security professional, <strong>Tom Eston</strong>. In his over 20 years of cybersecurity work, Tom has successfully led ethical hacking teams and improved industry-standard testing methodologies. He has also been creating podcasts since long before they were cool, and now you can listen to him on the <strong>Shared Security Podcast</strong>, which he co-founded and co-hosts.</p><p>Throughout our conversation, Tom looks at the 1986 Hacker Manifesto from an unexpected angle, shares his thoughts on the potential of the massive amount of information available for aspiring ethical hackers, and shares examples of how to guide young white hat hackers and help them calibrate their moral compass. </p><p>We also talk about the time Tom faced an ethical dilemma as a leader and his experiences being on the receiving end of empathy in cybersecurity.</p><p><strong>In this episode, you will learn:</strong></p><ul><li>What drives people to invest their mental and emotional energy in cybersecurity (4:40)</li><li>How to deal with burnout as a cybersecurity fiend (8:20)</li><li>Why we live in the golden age of training and how to take advantage of it (14:10)</li><li>A practical example of how to deal with ethical dilemmas in cybersecurity (21:40)</li><li>How young hackers can learn to balance the power they have to manipulate systems with being on the right side of history (30:00)</li><li>The importance of "knowing your audience" when reporting cybersecurity issues (39:50)</li><li>How The Hacker Manifesto holds up today and what could make it even more useful for ethical hackers (45:43)</li></ul><p>Resources:</p><ul><li>Visit Tom’s blog <a href="https://www.spylogic.net/2018/02/introducing-the-shared-security-weekly-blaze-podcast/" target="_blank">Spylogic</a></li><li>The <a href="https://sharedsecurity.net/" target="_blank">Shared Security podcast</a></li><li>The Shared Security podcast - <a href="https://www.youtube.com/watch?v=7O7E0rQnWEk">Exploring the Role of Empathy in Cybersecurity with Andra Zaharia</a></li><li>The Shared Security podcast - <a href="https://sharedsecurity.net/2023/05/08/juice-jacking-debunked-photographer-vs-ai-dataset-google-authenticator-risks/">Juice jacking debunked, photographer vs. AI dataset, Google authenticator risks</a></li><li><a href="http://phrack.org/issues/7/3.html">The Hacker Manifesto</a></li></ul><p>Connect with Tom:</p><ul><li><a href="https://www.linkedin.com/in/tomeston/">LinkedIn</a></li><li><a href="https://twitter.com/agent0x0">Twitter</a></li><li><a href="https://infosec.exchange/@agent0x0">Infosec Exchange</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="47760310" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/bea9f25f-6533-4235-aef5-92d7cc1909eb/audio/76c638a5-4eeb-408e-8ee5-301cbbdf6abc/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Ethical hackers and the legacy of the Hacker Manifesto</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/b087e8a7-f687-499e-9519-7ad497c9a7cc/3000x3000/tom-eston-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:44</itunes:duration>
      <itunes:summary>In this captivating episode, we dive into the depths of hacker culture and explore the multifaceted aspects of The Hacker Manifesto with seasoned cybersecurity expert Tom Eston. 

Going beyond the surface, Tom sheds light on the driving forces behind cybersecurity enthusiasts and imparts invaluable insights on ethical hacking and leadership. Join us as we uncover the power of curiosity, the challenges of burnout, the golden age of training, ethical dilemmas, and the delicate balance young hackers must strike in this ever-evolving landscape. 

Tom&apos;s experiences and wisdom will leave you with a fresh perspective on cybersecurity and its impact on society. Don&apos;t miss this enlightening conversation filled with practical examples and thought-provoking discussions that challenge the status quo.</itunes:summary>
      <itunes:subtitle>In this captivating episode, we dive into the depths of hacker culture and explore the multifaceted aspects of The Hacker Manifesto with seasoned cybersecurity expert Tom Eston. 

Going beyond the surface, Tom sheds light on the driving forces behind cybersecurity enthusiasts and imparts invaluable insights on ethical hacking and leadership. Join us as we uncover the power of curiosity, the challenges of burnout, the golden age of training, ethical dilemmas, and the delicate balance young hackers must strike in this ever-evolving landscape. 

Tom&apos;s experiences and wisdom will leave you with a fresh perspective on cybersecurity and its impact on society. Don&apos;t miss this enlightening conversation filled with practical examples and thought-provoking discussions that challenge the status quo.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">af6bcc5c-fce5-4ebd-b20d-bf5748d5a36a</guid>
      <title>Empathy in cybersecurity is about picking a side</title>
      <description><![CDATA[<p>Regardless of the power, wealth, or influence a person or company might have, the only thing that can protect them from being hacked is another great (ethical) hacker.</p><p>Although the dark side of cybersecurity has several routes to explore and experiment with, they all have the same destination, and – spoiler alert – it is <i>never</i> a happy place. That’s why empathy in cybersecurity is about picking a side: you either use your skills to harm people or to protect them from cybercriminals. </p><p>In today's episode, I'm joined by the incredibly talented and eloquent <strong>Jenny Radcliffe, The People Hacker</strong>. She is a Social Engineer, Author, Burglar for Hire, Award-winning Podcast Host, Keynote Speaker, Panelist, and a 2022 Infosec Hall of Fame Inductee. Her latest book, "<strong>People Hacker: Confessions Of A Burglar For Hire</strong>," reveals how she gains access to top-grade private and commercial properties using her inimitable blend of psychology, stagecraft, and charm. </p><p>We had a fantastic conversation about what it <i>really</i> means to be a social engineer, why she believes empathy in cybersecurity is about picking a side, and the importance of learning to manage emotions as a defense mechanism against malicious hackers. Jenny also shared her thoughts on gaps in the education system, the importance of mastering so-called "soft skills," and so much more! </p><p><strong>In this episode, you can expand your views with:</strong></p><ul><li>A bit about Jenny's background and <i>why</i> she became a social engineer (3:10)</li><li>How understanding our emotions prepares us to deal with cybercriminals (8:00)</li><li>What it really means to be a social engineer and why it’s not what most people think (11:30)</li><li>What readers got from Jenny’s book and the impact it’s had (17:00)</li><li>Why empathy, just like cybersecurity, only works when you use it (24:20)</li><li>Why the gaps in the education system make entire generations susceptible to bad actors’ tactics (33:20)</li><li>Why Jenny doesn't use the word "mentor" to describe her guides in the industry (39:00)</li></ul><p>Resources:</p><ul><li>Book: Jenny Radcliffe - <a href="https://www.amazon.com/People-Hacker/dp/1398518999/ref=sr_1_1?crid=1B1QKSQ2A9RQO&keywords=people+hacker+jenny+radcliffe&qid=1683200649&sprefix=people+hacker%2Caps%2C188&sr=8-1#detailBullets_feature_div">People Hacker: Confessions Of A Burglar For Hire</a></li><li>Jenny’s <a href="https://humanfactorsecurity.co.uk/category/the-human-factor/">Human Factor Security podcast</a></li><li><a href="https://www.youtube.com/watch?v=h0kgB9S_O6Y">TedX Talk - Surrounded by lies (but never happier)</a></li><li><a href="https://www.youtube.com/watch?v=R3ycxy7DE98">How I Fooled A £2 mil Security System</a></li><li><a href="https://www.youtube.com/watch?v=qr1RCOjYoQA">Meet Jenny Radcliffe, the People Hacker</a></li><li><a href="https://www.youtube.com/watch?v=ZAz6FCV_lNI">How To Protect Yourself From Hackers | Inside The Mind Of The People Hacker</a></li><li><a href="https://twitter.com/Jenny_Radcliffe/status/1648568287893258240">People Hacker TV series</a></li><li><a href="https://twitter.com/GOllumfun">Brett Johnson - Twitter</a></li><li><a href="https://www.theguardian.com/books/2023/feb/04/im-not-snow-white-i-have-to-think-like-a-criminal-how-i-became-a-burglar-for-hire">I’m not Snow White. I have to think like a criminal’: how I became a burglar for hire</a></li></ul><p>Resources:</p><ul><li>Book: Jenny Radcliffe - <a href="https://www.amazon.com/People-Hacker/dp/1398518999/ref=sr_1_1?crid=1B1QKSQ2A9RQO&keywords=people+hacker+jenny+radcliffe&qid=1683200649&sprefix=people+hacker%2Caps%2C188&sr=8-1#detailBullets_feature_div">People Hacker</a>: Confessions Of A Burglar For Hire</li><li><a href="https://www.youtube.com/watch?v=h0kgB9S_O6Y">TedX Talk - Surrounded by lies (but never happier)</a></li><li><a href="https://www.youtube.com/watch?v=R3ycxy7DE98">How I Fooled A £2mil Security System</a></li><li><a href="https://www.youtube.com/watch?v=qr1RCOjYoQA">Meet Jenny Radcliffe, the People Hacker</a></li><li><a href="https://www.youtube.com/watch?v=ZAz6FCV_lNI">How To Protect Yourself From Hackers | Inside The Mind Of The People Hacker</a></li><li><a href="https://twitter.com/Jenny_Radcliffe/status/1648568287893258240">People Hacker TV series</a></li><li><a href="https://twitter.com/GOllumfun">Brett Johnson - Twitter</a></li><li><a href="https://www.theguardian.com/books/2023/feb/04/im-not-snow-white-i-have-to-think-like-a-criminal-how-i-became-a-burglar-for-hire">I’m not Snow White. I have to think like a criminal’: how I became a burglar for hire</a></li></ul><p>Connect with Jenny:</p><ul><li><a href="https://humanfactorsecurity.co.uk/">Website</a></li><li><a href="https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/?originalSubdomain=uk">LinkedIn</a></li><li><a href="https://twitter.com/jenny_radcliffe">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 9 May 2023 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Regardless of the power, wealth, or influence a person or company might have, the only thing that can protect them from being hacked is another great (ethical) hacker.</p><p>Although the dark side of cybersecurity has several routes to explore and experiment with, they all have the same destination, and – spoiler alert – it is <i>never</i> a happy place. That’s why empathy in cybersecurity is about picking a side: you either use your skills to harm people or to protect them from cybercriminals. </p><p>In today's episode, I'm joined by the incredibly talented and eloquent <strong>Jenny Radcliffe, The People Hacker</strong>. She is a Social Engineer, Author, Burglar for Hire, Award-winning Podcast Host, Keynote Speaker, Panelist, and a 2022 Infosec Hall of Fame Inductee. Her latest book, "<strong>People Hacker: Confessions Of A Burglar For Hire</strong>," reveals how she gains access to top-grade private and commercial properties using her inimitable blend of psychology, stagecraft, and charm. </p><p>We had a fantastic conversation about what it <i>really</i> means to be a social engineer, why she believes empathy in cybersecurity is about picking a side, and the importance of learning to manage emotions as a defense mechanism against malicious hackers. Jenny also shared her thoughts on gaps in the education system, the importance of mastering so-called "soft skills," and so much more! </p><p><strong>In this episode, you can expand your views with:</strong></p><ul><li>A bit about Jenny's background and <i>why</i> she became a social engineer (3:10)</li><li>How understanding our emotions prepares us to deal with cybercriminals (8:00)</li><li>What it really means to be a social engineer and why it’s not what most people think (11:30)</li><li>What readers got from Jenny’s book and the impact it’s had (17:00)</li><li>Why empathy, just like cybersecurity, only works when you use it (24:20)</li><li>Why the gaps in the education system make entire generations susceptible to bad actors’ tactics (33:20)</li><li>Why Jenny doesn't use the word "mentor" to describe her guides in the industry (39:00)</li></ul><p>Resources:</p><ul><li>Book: Jenny Radcliffe - <a href="https://www.amazon.com/People-Hacker/dp/1398518999/ref=sr_1_1?crid=1B1QKSQ2A9RQO&keywords=people+hacker+jenny+radcliffe&qid=1683200649&sprefix=people+hacker%2Caps%2C188&sr=8-1#detailBullets_feature_div">People Hacker: Confessions Of A Burglar For Hire</a></li><li>Jenny’s <a href="https://humanfactorsecurity.co.uk/category/the-human-factor/">Human Factor Security podcast</a></li><li><a href="https://www.youtube.com/watch?v=h0kgB9S_O6Y">TedX Talk - Surrounded by lies (but never happier)</a></li><li><a href="https://www.youtube.com/watch?v=R3ycxy7DE98">How I Fooled A £2 mil Security System</a></li><li><a href="https://www.youtube.com/watch?v=qr1RCOjYoQA">Meet Jenny Radcliffe, the People Hacker</a></li><li><a href="https://www.youtube.com/watch?v=ZAz6FCV_lNI">How To Protect Yourself From Hackers | Inside The Mind Of The People Hacker</a></li><li><a href="https://twitter.com/Jenny_Radcliffe/status/1648568287893258240">People Hacker TV series</a></li><li><a href="https://twitter.com/GOllumfun">Brett Johnson - Twitter</a></li><li><a href="https://www.theguardian.com/books/2023/feb/04/im-not-snow-white-i-have-to-think-like-a-criminal-how-i-became-a-burglar-for-hire">I’m not Snow White. I have to think like a criminal’: how I became a burglar for hire</a></li></ul><p>Resources:</p><ul><li>Book: Jenny Radcliffe - <a href="https://www.amazon.com/People-Hacker/dp/1398518999/ref=sr_1_1?crid=1B1QKSQ2A9RQO&keywords=people+hacker+jenny+radcliffe&qid=1683200649&sprefix=people+hacker%2Caps%2C188&sr=8-1#detailBullets_feature_div">People Hacker</a>: Confessions Of A Burglar For Hire</li><li><a href="https://www.youtube.com/watch?v=h0kgB9S_O6Y">TedX Talk - Surrounded by lies (but never happier)</a></li><li><a href="https://www.youtube.com/watch?v=R3ycxy7DE98">How I Fooled A £2mil Security System</a></li><li><a href="https://www.youtube.com/watch?v=qr1RCOjYoQA">Meet Jenny Radcliffe, the People Hacker</a></li><li><a href="https://www.youtube.com/watch?v=ZAz6FCV_lNI">How To Protect Yourself From Hackers | Inside The Mind Of The People Hacker</a></li><li><a href="https://twitter.com/Jenny_Radcliffe/status/1648568287893258240">People Hacker TV series</a></li><li><a href="https://twitter.com/GOllumfun">Brett Johnson - Twitter</a></li><li><a href="https://www.theguardian.com/books/2023/feb/04/im-not-snow-white-i-have-to-think-like-a-criminal-how-i-became-a-burglar-for-hire">I’m not Snow White. I have to think like a criminal’: how I became a burglar for hire</a></li></ul><p>Connect with Jenny:</p><ul><li><a href="https://humanfactorsecurity.co.uk/">Website</a></li><li><a href="https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/?originalSubdomain=uk">LinkedIn</a></li><li><a href="https://twitter.com/jenny_radcliffe">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="46529421" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/43f64e77-5c43-40f0-9b7a-0009def8b03b/audio/1c13735a-3182-45d3-b774-fb907a937a14/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Empathy in cybersecurity is about picking a side</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/0f528870-85d2-4b03-a123-2d32c875a4bf/3000x3000/jenny-radcliffe-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:28</itunes:duration>
      <itunes:summary>In today&apos;s episode, I&apos;m joined by the incredibly talented and eloquent Jenny Radcliffe, The People Hacker. She is a Social Engineer, Author, Burglar for hire, Award-winning Podcast Host, Keynote Speaker, Panelist, and 2022 Infosec Hall of Fame Inductee. Her latest book, &quot;People Hacker: Confessions Of A Burglar For Hire,&quot; reveals how she gains access to top-grade private and commercial properties using her inimitable blend of psychology, stagecraft, and charm.  A thrilling conversation you won&apos;t want to miss!</itunes:summary>
      <itunes:subtitle>In today&apos;s episode, I&apos;m joined by the incredibly talented and eloquent Jenny Radcliffe, The People Hacker. She is a Social Engineer, Author, Burglar for hire, Award-winning Podcast Host, Keynote Speaker, Panelist, and 2022 Infosec Hall of Fame Inductee. Her latest book, &quot;People Hacker: Confessions Of A Burglar For Hire,&quot; reveals how she gains access to top-grade private and commercial properties using her inimitable blend of psychology, stagecraft, and charm.  A thrilling conversation you won&apos;t want to miss!</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">1be3c05c-74a2-47f2-89d8-d090d3bd68a2</guid>
      <title>How to engage the Human OS in cybersecurity with the Heart, Head, and Hands method</title>
      <description><![CDATA[<p>Do you know what happens when "the ask is too high and the trust is too low" in cybersecurity? Requests related to cybersecurity fall flat. </p><p>If you’re frustrated that clients and colleagues don’t see the value of your work and don’t take your advice to heart, this episode offers the fix you need. </p><p>Along with Advisory CISO and Cybersecurity Strategist <strong>J. Wolfgang Goerlich (“Wolf”)</strong>, we delve into the critical roles of empathy and communication in addressing complex security challenges. </p><p>Join us to see how the perspectives we gain through travel can broaden and add nuance to our understanding of global issues. </p><p>Get hooked by Wolf’s powerful storytelling that makes cybersecurity relatable and engaging, while exploring the human OS and its limitations. </p><p>Find out how empathy, better communication, and Wolf’s <strong>heart, head, and hands storytelling method</strong> helps demystify risks and potential solutions.</p><p>Uncover the value of creativity, interdisciplinary collaboration, and "wandering outside of the box" by looking at the surprising intersection of cybersecurity with art – and even sexuality. </p><p>Find inspiration for your next actions in this eye-opening conversation that redefines cybersecurity and puts empathy and effective communication at the heart of the solutions to this industry's challenges.</p><p><strong>Tune in to learn:</strong></p><ul><li>How language and tone massively influence how effective what we say in IT security is (5:09)</li><li>Why vulnerability is necessary for good communication, yet carries such a negative connotation in cybersecurity (10:01)</li><li>Why empathy is only effective when it becomes a practice ( 14:41)</li><li>What made Wolf pay so much attention to the importance of communication in cybersecurity (17:42)</li><li>Why <i>how</i> we do things has a massive impact on the industry (27:01)</li><li>Why there’s a place for art in cybersecurity (29:58)</li><li>How cybersecurity apply to all areas of our lives, including sexuality (40:16)</li></ul><p>Resources mentioned: </p><ul><li><a href="https://def.camp/">DefCamp</a></li><li><a href="https://en.wikipedia.org/wiki/Jeffrey_Snover">Jeffrey Snover</a></li><li><a href="https://www.mckinsey.com/featured-insights/leadership/why-effective-leaders-must-manage-up-down-and-sideways">Why effective leaders must manage up, down, and sideways</a></li><li><a href="https://www.youtube.com/watch?v=Xz9dTAQ3vNc">BSides 2022 - Wolfgang Goerlich - And the Clouds Break: Continuity in the 21st Century</a></li><li><a href="https://jwgoerlich.com/tell-a-story-with-the-project-name-design-monday/">Tell a story with the project name – Design Monday</a></li><li><a href="https://en.wikipedia.org/wiki/Cognitive_dissonance">Cognitive Dissonance</a></li><li><a href="https://jwgoerlich.com/principles-for-designing-security-capabilities/">Principles for Designing Security Capabilities</a></li><li>Book: <a href="https://www.goodreads.com/book/show/54895700-effortless">Effortless: Make It Easier to Do What Matters Most</a></li><li><a href="https://www.noahscalin.com/old-navy">Noah Scalin</a></li><li><a href="https://www.securingsexuality.com/#/">Security Sexuality</a></li></ul><p>Connect with Wolf:</p><ul><li><a href="https://jwgoerlich.com/">Website</a></li><li><a href="https://www.linkedin.com/in/jwgoerlich/">LinkedIn</a></li><li><a href="https://infosec.exchange/@jwgoerlich">Mastodon</a></li><li><a href="https://twitter.com/jwgoerlich?lang=es.">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 25 Apr 2023 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Do you know what happens when "the ask is too high and the trust is too low" in cybersecurity? Requests related to cybersecurity fall flat. </p><p>If you’re frustrated that clients and colleagues don’t see the value of your work and don’t take your advice to heart, this episode offers the fix you need. </p><p>Along with Advisory CISO and Cybersecurity Strategist <strong>J. Wolfgang Goerlich (“Wolf”)</strong>, we delve into the critical roles of empathy and communication in addressing complex security challenges. </p><p>Join us to see how the perspectives we gain through travel can broaden and add nuance to our understanding of global issues. </p><p>Get hooked by Wolf’s powerful storytelling that makes cybersecurity relatable and engaging, while exploring the human OS and its limitations. </p><p>Find out how empathy, better communication, and Wolf’s <strong>heart, head, and hands storytelling method</strong> helps demystify risks and potential solutions.</p><p>Uncover the value of creativity, interdisciplinary collaboration, and "wandering outside of the box" by looking at the surprising intersection of cybersecurity with art – and even sexuality. </p><p>Find inspiration for your next actions in this eye-opening conversation that redefines cybersecurity and puts empathy and effective communication at the heart of the solutions to this industry's challenges.</p><p><strong>Tune in to learn:</strong></p><ul><li>How language and tone massively influence how effective what we say in IT security is (5:09)</li><li>Why vulnerability is necessary for good communication, yet carries such a negative connotation in cybersecurity (10:01)</li><li>Why empathy is only effective when it becomes a practice ( 14:41)</li><li>What made Wolf pay so much attention to the importance of communication in cybersecurity (17:42)</li><li>Why <i>how</i> we do things has a massive impact on the industry (27:01)</li><li>Why there’s a place for art in cybersecurity (29:58)</li><li>How cybersecurity apply to all areas of our lives, including sexuality (40:16)</li></ul><p>Resources mentioned: </p><ul><li><a href="https://def.camp/">DefCamp</a></li><li><a href="https://en.wikipedia.org/wiki/Jeffrey_Snover">Jeffrey Snover</a></li><li><a href="https://www.mckinsey.com/featured-insights/leadership/why-effective-leaders-must-manage-up-down-and-sideways">Why effective leaders must manage up, down, and sideways</a></li><li><a href="https://www.youtube.com/watch?v=Xz9dTAQ3vNc">BSides 2022 - Wolfgang Goerlich - And the Clouds Break: Continuity in the 21st Century</a></li><li><a href="https://jwgoerlich.com/tell-a-story-with-the-project-name-design-monday/">Tell a story with the project name – Design Monday</a></li><li><a href="https://en.wikipedia.org/wiki/Cognitive_dissonance">Cognitive Dissonance</a></li><li><a href="https://jwgoerlich.com/principles-for-designing-security-capabilities/">Principles for Designing Security Capabilities</a></li><li>Book: <a href="https://www.goodreads.com/book/show/54895700-effortless">Effortless: Make It Easier to Do What Matters Most</a></li><li><a href="https://www.noahscalin.com/old-navy">Noah Scalin</a></li><li><a href="https://www.securingsexuality.com/#/">Security Sexuality</a></li></ul><p>Connect with Wolf:</p><ul><li><a href="https://jwgoerlich.com/">Website</a></li><li><a href="https://www.linkedin.com/in/jwgoerlich/">LinkedIn</a></li><li><a href="https://infosec.exchange/@jwgoerlich">Mastodon</a></li><li><a href="https://twitter.com/jwgoerlich?lang=es.">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="46755954" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/5b220f2e-5a0b-4787-bd33-2939a71d5894/audio/5f849ddb-dea0-4b54-9b0f-c1720032a6fd/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>How to engage the Human OS in cybersecurity with the Heart, Head, and Hands method</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/4d2e404f-71b5-4ff7-ad57-f6fedf17ee5b/3000x3000/j-wolfgang-goerlich-cyber-empathy.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:42</itunes:duration>
      <itunes:summary>Discover the secret to making cybersecurity relatable and engaging in this eye-opening podcast episode featuring Advisory CISO and Cybersecurity Strategist, J. Wolfgang Goerlich (“Wolf”). 

Learn how empathy, communication, and powerful storytelling can bridge the gap between technical experts and their audience. Explore the importance of diverse perspectives, interdisciplinary collaboration, and venturing outside the box as we discuss the surprising connections between cybersecurity, art, and even sexuality.</itunes:summary>
      <itunes:subtitle>Discover the secret to making cybersecurity relatable and engaging in this eye-opening podcast episode featuring Advisory CISO and Cybersecurity Strategist, J. Wolfgang Goerlich (“Wolf”). 

Learn how empathy, communication, and powerful storytelling can bridge the gap between technical experts and their audience. Explore the importance of diverse perspectives, interdisciplinary collaboration, and venturing outside the box as we discuss the surprising connections between cybersecurity, art, and even sexuality.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">e4bd5547-88fc-48f4-86c2-bdf2ca88cba0</guid>
      <title>Practical empathy is crucial to attracting cybersecurity talent</title>
      <description><![CDATA[<p>Many young writers feel every subject in cybersecurity has already been exhausted. This is probably true for many topics, but that doesn't mean the conversation is over. </p><p>Diversity is one of the industry's main traits, which means people from around the world can (and should!) bring their own perspectives and experiences, making an already culturally wealthy space even richer.</p><p>Today's guest is <strong>Joe Pettit</strong>, Director at Bora, the go-to place for IT Security marketing professionals needing to improve their brand awareness and generate high-quality sales leads. He’s a Business and Marketing graduate who left the UK for Spain for a change of lifestyle, pursuing his curiosity and appetite for adventure. </p><p>One of the main things for which I respect Joe is how he pays it forward! After receiving support from others to break into IT security, he's now offering young writers the chance to do the same. Through collaboration and the power of expression, they spread the word on the importance of cybersecurity while exploring their passions.</p><p>In this episode, you'll hear about Joe "fell" into the industry and his view of cybersecurity as a marketing and communications professional. Joe also shares his perspective on practical empathy, how helping young writers find their voice can improve cybersecurity, and how working in this space changed his standpoint on taking risks and directing a company.</p><p>Plus, Joe explains what it takes to create content about topics that have been wrung dry, the difference between hackers and cybercriminals, and much more. </p><p>In this episode, you will learn:</p><ul><li>How Joe got into cybersecurity (3:24)</li><li>How things changed in cybersecurity over the years (11:16)</li><li>Why there are endless ways of creating content about a single topic (14:37)</li><li>How cybersecurity transformed Joe's views on taking risks (20:29)</li><li>The difference between good and bad hackers (27:57)</li><li>Practical ways to use empathy to improve lives and the cybersecurity space (34:12)</li></ul><p>Resources:</p><ul><li>Bora <a href="https://www.welcometobora.com/">website</a></li><li><a href="https://www.linkedin.com/in/wendynather/">Wendy Nather</a></li></ul><p>Connect with Joe:</p><ul><li><a href="https://www.linkedin.com/in/joepettit/?originalSubdomain=es">LinkedIn</a></li><li><a href="https://twitter.com/joepettit2">Twitter</a></li><li>Email: <a href="mailto:joe@welcometobora.com">joe@welcometobora.com</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 11 Apr 2023 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Many young writers feel every subject in cybersecurity has already been exhausted. This is probably true for many topics, but that doesn't mean the conversation is over. </p><p>Diversity is one of the industry's main traits, which means people from around the world can (and should!) bring their own perspectives and experiences, making an already culturally wealthy space even richer.</p><p>Today's guest is <strong>Joe Pettit</strong>, Director at Bora, the go-to place for IT Security marketing professionals needing to improve their brand awareness and generate high-quality sales leads. He’s a Business and Marketing graduate who left the UK for Spain for a change of lifestyle, pursuing his curiosity and appetite for adventure. </p><p>One of the main things for which I respect Joe is how he pays it forward! After receiving support from others to break into IT security, he's now offering young writers the chance to do the same. Through collaboration and the power of expression, they spread the word on the importance of cybersecurity while exploring their passions.</p><p>In this episode, you'll hear about Joe "fell" into the industry and his view of cybersecurity as a marketing and communications professional. Joe also shares his perspective on practical empathy, how helping young writers find their voice can improve cybersecurity, and how working in this space changed his standpoint on taking risks and directing a company.</p><p>Plus, Joe explains what it takes to create content about topics that have been wrung dry, the difference between hackers and cybercriminals, and much more. </p><p>In this episode, you will learn:</p><ul><li>How Joe got into cybersecurity (3:24)</li><li>How things changed in cybersecurity over the years (11:16)</li><li>Why there are endless ways of creating content about a single topic (14:37)</li><li>How cybersecurity transformed Joe's views on taking risks (20:29)</li><li>The difference between good and bad hackers (27:57)</li><li>Practical ways to use empathy to improve lives and the cybersecurity space (34:12)</li></ul><p>Resources:</p><ul><li>Bora <a href="https://www.welcometobora.com/">website</a></li><li><a href="https://www.linkedin.com/in/wendynather/">Wendy Nather</a></li></ul><p>Connect with Joe:</p><ul><li><a href="https://www.linkedin.com/in/joepettit/?originalSubdomain=es">LinkedIn</a></li><li><a href="https://twitter.com/joepettit2">Twitter</a></li><li>Email: <a href="mailto:joe@welcometobora.com">joe@welcometobora.com</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="47762818" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/ad131105-c60f-42b2-b9cb-834023106e3e/audio/cd973abb-1fca-4a0d-983b-9f3c2912a3cb/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Practical empathy is crucial to attracting cybersecurity talent</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/0d6a0191-1941-47f1-a682-ee28f89ed854/3000x3000/joe-pettit-cyber-empathy.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:45</itunes:duration>
      <itunes:summary>Are you a young writer interested in cybersecurity but feel like every topic has already been explored? In this episode, Joe Pettit, Director at Bora, shares his journey into IT security and how he&apos;s now using his expertise to help others break into the industry.

Discover the importance of diversity in cybersecurity, the difference between hackers and cybercriminals, and the practical impact of empathy in this fast-paced field. Plus, learn how to create meaningful content on exhausted topics and how working in IT security can change your perspective on taking risks and running a business.</itunes:summary>
      <itunes:subtitle>Are you a young writer interested in cybersecurity but feel like every topic has already been explored? In this episode, Joe Pettit, Director at Bora, shares his journey into IT security and how he&apos;s now using his expertise to help others break into the industry.

Discover the importance of diversity in cybersecurity, the difference between hackers and cybercriminals, and the practical impact of empathy in this fast-paced field. Plus, learn how to create meaningful content on exhausted topics and how working in IT security can change your perspective on taking risks and running a business.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">0b9fc867-e320-4b4e-8b33-af3e06fb37e6</guid>
      <title>Cybersecurity is about loving other people</title>
      <description><![CDATA[<p><i>What do Hercules and ancient Greek philosophers have to do with cybersecurity?</i></p><p>Today’s guest, <strong>Anastasios Arampatzis</strong>, Cybersecurity and Data Privacy Specialist and Cybersecurity Content Writer, helps us make that connection and draw inspiration from stories that have remained relevant for millenia. </p><p>Anastasios reminds us that we need more heroes in cybersecurity to help people turn their relationship with digital security from fear into friendship.</p><p>It’s much more exciting to follow a hero’s path and to imagine ourselves on that journey. It’s engaging to overcome challenges and learning new things boosts our self-confidence.</p><p>So in this conversation we explore the power of hope-driven protection and cybersecurity as a massive demonstration of generosity and love for other people. </p><p>In this episode, we get to learn about Anastasios' inspiring journey from the Greek Air Force to digital defender and much more. </p><p><strong>In this episode, you will learn:</strong></p><ul><li>What Anastasios’ career in the Greek Air Force taught him (9:01)</li><li>Anastasios shares a beautiful example of how empathy and cybersecurity are intertwined (15:06)</li><li>How to craft engaging and hope-promoting cybersecurity content (19:06)</li><li>What the shift towards human-centric cybersecurity looks like (28:14)</li><li>Why making a meaningful contribution to cybersecurity is a huge demonstration of love (39:29)</li></ul><p>Resources:</p><ul><li>Homo Digitalis <a href="https://www.homodigitalis.gr/en">website</a></li><li>Jessica Barker -<a href="https://www.linkedin.com/in/jessica-barker/"> LinkedIn</a></li><li><a href="https://en.wikipedia.org/wiki/Thucydides">Thucydides</a></li><li><a href="https://www.pcmag.com/how-to/twitter-two-factor-authentication-acting-up-how-to-secure-your-account">Lock It Down: How to Use 2FA on Twitter Without Paying for Twitter Blue</a></li><li><a href="https://www.coinbase.com/blog/social-engineering-a-coinbase-case-study">Social Engineering - A Coinbase Case Study</a></li><li><a href="https://dailystoic.com/9-core-stoic-beliefs/">The 9 Core Stoic Beliefs</a></li><li><a href="https://edri.org/">European Digital Rights Organization</a></li></ul><p>Connect with Anastasios:</p><ul><li><a href="https://www.linkedin.com/in/anastasiosarampatzis/?originalSubdomain=gr">LinkedIn</a></li><li><a href="https://twitter.com/TassosAramp?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 28 Mar 2023 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p><i>What do Hercules and ancient Greek philosophers have to do with cybersecurity?</i></p><p>Today’s guest, <strong>Anastasios Arampatzis</strong>, Cybersecurity and Data Privacy Specialist and Cybersecurity Content Writer, helps us make that connection and draw inspiration from stories that have remained relevant for millenia. </p><p>Anastasios reminds us that we need more heroes in cybersecurity to help people turn their relationship with digital security from fear into friendship.</p><p>It’s much more exciting to follow a hero’s path and to imagine ourselves on that journey. It’s engaging to overcome challenges and learning new things boosts our self-confidence.</p><p>So in this conversation we explore the power of hope-driven protection and cybersecurity as a massive demonstration of generosity and love for other people. </p><p>In this episode, we get to learn about Anastasios' inspiring journey from the Greek Air Force to digital defender and much more. </p><p><strong>In this episode, you will learn:</strong></p><ul><li>What Anastasios’ career in the Greek Air Force taught him (9:01)</li><li>Anastasios shares a beautiful example of how empathy and cybersecurity are intertwined (15:06)</li><li>How to craft engaging and hope-promoting cybersecurity content (19:06)</li><li>What the shift towards human-centric cybersecurity looks like (28:14)</li><li>Why making a meaningful contribution to cybersecurity is a huge demonstration of love (39:29)</li></ul><p>Resources:</p><ul><li>Homo Digitalis <a href="https://www.homodigitalis.gr/en">website</a></li><li>Jessica Barker -<a href="https://www.linkedin.com/in/jessica-barker/"> LinkedIn</a></li><li><a href="https://en.wikipedia.org/wiki/Thucydides">Thucydides</a></li><li><a href="https://www.pcmag.com/how-to/twitter-two-factor-authentication-acting-up-how-to-secure-your-account">Lock It Down: How to Use 2FA on Twitter Without Paying for Twitter Blue</a></li><li><a href="https://www.coinbase.com/blog/social-engineering-a-coinbase-case-study">Social Engineering - A Coinbase Case Study</a></li><li><a href="https://dailystoic.com/9-core-stoic-beliefs/">The 9 Core Stoic Beliefs</a></li><li><a href="https://edri.org/">European Digital Rights Organization</a></li></ul><p>Connect with Anastasios:</p><ul><li><a href="https://www.linkedin.com/in/anastasiosarampatzis/?originalSubdomain=gr">LinkedIn</a></li><li><a href="https://twitter.com/TassosAramp?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Twitter</a></li></ul><p>Let's connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="41256030" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/8ca0af5c-137b-41fb-8b90-ef13004971ae/audio/f1d3259c-0390-4274-920f-7322e79eff43/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Cybersecurity is about loving other people</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/3d6a16ba-2a5d-415e-8e15-3c600fedae85/3000x3000/anastasios-arampatzis-cyber-empathy-podcast.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:58</itunes:duration>
      <itunes:summary>To our guest, Anastasios Arampatzis, a Cybersecurity and Data Privacy Specialist and Cybersecurity Content Writer, the ancient Greek heroes and philosophers have much to teach us about helping people secure their digital lives. 

He believes that promoting, teaching, and spreading knowledge about cybersecurity is a massive demonstration of love. Here&apos;s why.</itunes:summary>
      <itunes:subtitle>To our guest, Anastasios Arampatzis, a Cybersecurity and Data Privacy Specialist and Cybersecurity Content Writer, the ancient Greek heroes and philosophers have much to teach us about helping people secure their digital lives. 

He believes that promoting, teaching, and spreading knowledge about cybersecurity is a massive demonstration of love. Here&apos;s why.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">0957fe9b-0868-4750-9e06-06ba6fcdd8cc</guid>
      <title>Creating psychological safety in cybersecurity</title>
      <description><![CDATA[<p>Psychological safety doesn't just help performance. It also creates space for us to name problems, admit vulnerabilities, and then find ways to get better.</p><p>Besides keeping technology safe to use, cybersecurity also needs to protect the people using it. Arguably, this is <i>the most</i> important goal for this industry.</p><p>That’s why cybersecurity specialists are responsible for making things safer, but also for making people <i>feel</i> safe. To achieve this, specialists in the information security space need to understand people’s emotional background: their fears, their motivations, their perceptions of cybersecurity, and what makes them pay attention and become emotionally invested.</p><p>When people feel that it's them against cybersecurity policies and specialists, they resist new information, processes, and habits. But when they feel heard and understood with no judgment, they open up to sharing their experience, to learning, and to putting those lessons into practice.</p><p>If cybersecurity specialists approach their work from an empathetic point of view, it becomes easier and it creates a powerful feeling of camaraderie between them and their colleagues.</p><p>Today's guest, Emma W., experienced cybersecurity specialist with the UK Civil Service, offers detail-rich, practical observations and examples on how cybersecurity teams can create a positive experience for the people they serve.</p><p>You’ll also learn about some of the abilities that information security specialists can use to create the psychological safety that’s conducive of openness and learning. Additionally, you get to hear Emma talk about her work and what keeps her going in such a complex and challenging space.</p><p>In this episode, discover how to make cybersecurity less intimidating and more approachable by:</p><ul><li>Creating a positive experience for people (02:26)</li><li>Developing the abilities to guide people (13:13)</li><li>Learning from Emma about what her role looks like (17:35)</li><li>Practicing self-care to make high-pressure cybersecurity work sustainable (29:55)</li></ul>
]]></description>
      <pubDate>Tue, 14 Mar 2023 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Psychological safety doesn't just help performance. It also creates space for us to name problems, admit vulnerabilities, and then find ways to get better.</p><p>Besides keeping technology safe to use, cybersecurity also needs to protect the people using it. Arguably, this is <i>the most</i> important goal for this industry.</p><p>That’s why cybersecurity specialists are responsible for making things safer, but also for making people <i>feel</i> safe. To achieve this, specialists in the information security space need to understand people’s emotional background: their fears, their motivations, their perceptions of cybersecurity, and what makes them pay attention and become emotionally invested.</p><p>When people feel that it's them against cybersecurity policies and specialists, they resist new information, processes, and habits. But when they feel heard and understood with no judgment, they open up to sharing their experience, to learning, and to putting those lessons into practice.</p><p>If cybersecurity specialists approach their work from an empathetic point of view, it becomes easier and it creates a powerful feeling of camaraderie between them and their colleagues.</p><p>Today's guest, Emma W., experienced cybersecurity specialist with the UK Civil Service, offers detail-rich, practical observations and examples on how cybersecurity teams can create a positive experience for the people they serve.</p><p>You’ll also learn about some of the abilities that information security specialists can use to create the psychological safety that’s conducive of openness and learning. Additionally, you get to hear Emma talk about her work and what keeps her going in such a complex and challenging space.</p><p>In this episode, discover how to make cybersecurity less intimidating and more approachable by:</p><ul><li>Creating a positive experience for people (02:26)</li><li>Developing the abilities to guide people (13:13)</li><li>Learning from Emma about what her role looks like (17:35)</li><li>Practicing self-care to make high-pressure cybersecurity work sustainable (29:55)</li></ul>
]]></content:encoded>
      <enclosure length="45089133" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/54991d21-012c-4abc-b346-506baa1654de/audio/b34157a3-eb76-4d03-9033-35bf47a7a891/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Creating psychological safety in cybersecurity</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/6c991961-6954-45f3-a70d-1be557254c6d/3000x3000/emma-w-cyber-empathy-podcast.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:58</itunes:duration>
      <itunes:summary>Psychological safety doesn&apos;t just help performance. It also creates space for us to name problems, admit vulnerabilities, and then find ways to get better.

Besides keeping technology safe to use, cybersecurity also needs to protect the people using it. Arguably, this is the most important goal for this industry. The path to achieving this is definitely not an easy one, but it is an attainable one when we have real-life examples to guide our work. </itunes:summary>
      <itunes:subtitle>Psychological safety doesn&apos;t just help performance. It also creates space for us to name problems, admit vulnerabilities, and then find ways to get better.

Besides keeping technology safe to use, cybersecurity also needs to protect the people using it. Arguably, this is the most important goal for this industry. The path to achieving this is definitely not an easy one, but it is an attainable one when we have real-life examples to guide our work. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">58bcfdc7-bb47-4e7e-a996-397c852761b9</guid>
      <title>Why security teams need an empathy filter</title>
      <description><![CDATA[<p>Everyone who works in cybersecurity needs this reminder from time to time: people who are not in this space aren’t obsessed with the latest attacks and their impact. They probably don’t care <i>at all</i> because they already have other difficult projects they’re working on or personal issues that stretch them thin. </p><p>Any security team that wants to be effective and make a difference needs to keep this idea at the top of their mind when rolling out an awareness campaign or sending out an email.</p><p>Overly technical and dramatic messages about trending or successful attacks fly right by busy ears. </p><p><i>So what’s the solution?</i></p><p>Creating simple messages that resonate with people in <i>their</i> context. This is a practical way of using empathy to create true resonance, but it’s often difficult to accomplish without help. That’s why a non-IT specialist with communication expertize can act as an empathy filter for the security team when bringing them on board. </p><p>My guest today, <strong>Lance Spitzner</strong>, Director of Security Awareness at the SANS Institute and founder of the Honeynet Project, coined that term (“empathy filter”) as we were recording.</p><p>His over 20 years of security experience in cyberthreat research, security architecture, and awareness training really shine in this episode, creating momentum and motivation for change. </p><p>Lance has published three security books, consulted in over 25 countries, and helped over 350 organizations build awareness programs to manage their human risk. He remains hands on, dedicated, and an energetic vector for the cybersecurity community.</p><p>In this Cyber Empathy episode, Lance explains why simplifying security is the best approach to protecting cybercriminals’ favorite target: people. He also shares examples of how to do this in practice and who to ask for help to achieve this. What’s more, this episode helps you find out how to determine if the security team is empathetic.</p><p>In this episode, you will learn:</p><ul><li>Why simplifying security is the best approach to secure people (02:24)</li><li>Why security teams need an “empathy filter” and who can play that role (10:20)</li><li>The importance of having an empathetic security team (18:13)</li><li>Lance shares an empathetic security approach success story (30:00)</li></ul><p>Resources: </p><ul><li><a href="https://www.amazon.com/Books-Lance-Spitzner/s?rh=n%3A283155%2Cp_27%3ALance+Spitzner">Lance’s books</a></li><li><a href="https://www.prosci.com/methodology/adkar">The ADKAR Model</a></li><li><a href="https://www.youtube.com/watch?v=Qoo8kSV_mVs">Lance Spitzner and Carolyn Crandall at RSAC 2019</a></li><li><a href="https://www.youtube.com/watch?v=elvuZ6rlVh8">Lance Spitzner - Securing the Human Being</a></li><li><a href="https://www.honeynet.org/">The Honeynet Project</a></li><li><a href="https://www.goodreads.com/author/list/72401.Daniel_Kahneman">Daniel Kahneman books</a></li><li><a href="https://www.goodreads.com/author/show/62303.Cass_R_Sunstein">Cass R. Sunstein books</a></li><li><a href="https://www.goodreads.com/author/list/160932.Robert_B_Cialdini">Robert B. Cialdini books</a></li></ul><p>Connect with Lance:</p><ul><li><a href="https://www.sans.org/profiles/lance-spitzner/">Website</a></li><li><a href="https://www.linkedin.com/in/lance-spitzner-0ab0ba1/">LinkedIn</a></li><li><a href="https://twitter.com/lspitzner">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 28 Feb 2023 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Everyone who works in cybersecurity needs this reminder from time to time: people who are not in this space aren’t obsessed with the latest attacks and their impact. They probably don’t care <i>at all</i> because they already have other difficult projects they’re working on or personal issues that stretch them thin. </p><p>Any security team that wants to be effective and make a difference needs to keep this idea at the top of their mind when rolling out an awareness campaign or sending out an email.</p><p>Overly technical and dramatic messages about trending or successful attacks fly right by busy ears. </p><p><i>So what’s the solution?</i></p><p>Creating simple messages that resonate with people in <i>their</i> context. This is a practical way of using empathy to create true resonance, but it’s often difficult to accomplish without help. That’s why a non-IT specialist with communication expertize can act as an empathy filter for the security team when bringing them on board. </p><p>My guest today, <strong>Lance Spitzner</strong>, Director of Security Awareness at the SANS Institute and founder of the Honeynet Project, coined that term (“empathy filter”) as we were recording.</p><p>His over 20 years of security experience in cyberthreat research, security architecture, and awareness training really shine in this episode, creating momentum and motivation for change. </p><p>Lance has published three security books, consulted in over 25 countries, and helped over 350 organizations build awareness programs to manage their human risk. He remains hands on, dedicated, and an energetic vector for the cybersecurity community.</p><p>In this Cyber Empathy episode, Lance explains why simplifying security is the best approach to protecting cybercriminals’ favorite target: people. He also shares examples of how to do this in practice and who to ask for help to achieve this. What’s more, this episode helps you find out how to determine if the security team is empathetic.</p><p>In this episode, you will learn:</p><ul><li>Why simplifying security is the best approach to secure people (02:24)</li><li>Why security teams need an “empathy filter” and who can play that role (10:20)</li><li>The importance of having an empathetic security team (18:13)</li><li>Lance shares an empathetic security approach success story (30:00)</li></ul><p>Resources: </p><ul><li><a href="https://www.amazon.com/Books-Lance-Spitzner/s?rh=n%3A283155%2Cp_27%3ALance+Spitzner">Lance’s books</a></li><li><a href="https://www.prosci.com/methodology/adkar">The ADKAR Model</a></li><li><a href="https://www.youtube.com/watch?v=Qoo8kSV_mVs">Lance Spitzner and Carolyn Crandall at RSAC 2019</a></li><li><a href="https://www.youtube.com/watch?v=elvuZ6rlVh8">Lance Spitzner - Securing the Human Being</a></li><li><a href="https://www.honeynet.org/">The Honeynet Project</a></li><li><a href="https://www.goodreads.com/author/list/72401.Daniel_Kahneman">Daniel Kahneman books</a></li><li><a href="https://www.goodreads.com/author/show/62303.Cass_R_Sunstein">Cass R. Sunstein books</a></li><li><a href="https://www.goodreads.com/author/list/160932.Robert_B_Cialdini">Robert B. Cialdini books</a></li></ul><p>Connect with Lance:</p><ul><li><a href="https://www.sans.org/profiles/lance-spitzner/">Website</a></li><li><a href="https://www.linkedin.com/in/lance-spitzner-0ab0ba1/">LinkedIn</a></li><li><a href="https://twitter.com/lspitzner">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="35085280" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/783af731-994e-476d-927c-c5ba31802a6f/audio/82c0fbb5-4d6a-4319-9198-5c0c618d5da3/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Why security teams need an empathy filter</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/be35d99c-36df-4342-9a35-338a45320f86/3000x3000/lance-spitzner-cyber-empathy-podcast.jpg?aid=rss_feed"/>
      <itunes:duration>00:36:32</itunes:duration>
      <itunes:summary>Overly technical and dramatic messages about trending or successful attacks fly right by busy ears. 

So what’s the solution?

Creating simple messages that resonate with people in their context. This is a practical way of using empathy to create true resonance, but it’s often difficult to accomplish without help. That’s why a non-IT specialist with communication expertize can act as an empathy filter for the security team when bringing them on board.</itunes:summary>
      <itunes:subtitle>Overly technical and dramatic messages about trending or successful attacks fly right by busy ears. 

So what’s the solution?

Creating simple messages that resonate with people in their context. This is a practical way of using empathy to create true resonance, but it’s often difficult to accomplish without help. That’s why a non-IT specialist with communication expertize can act as an empathy filter for the security team when bringing them on board.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">a84c5612-681f-4e4a-8940-522fa8329822</guid>
      <title>From fear to friendship: how positive language boosts cybersecurity awareness</title>
      <description><![CDATA[<p>Poor communication is a major roadblock in getting people to adopt cyber-safe habits. It also created a major disconnect between information security specialists and the people they serve. </p><p>For instance, threat-filled emails with a negative or sometimes threatening tone only confuse non-IT experts who need simple explanations and psychological safety to learn. </p><p>This makes empathy essential in the cybersecurity space because it’s a constant reminder that things which are quick and easy for technical specialists can be complex and unnecessary to people with a different background.</p><p>By revamping security training and communication, we can make people feel comfortable with digital security practices and appreciated for their continued efforts. This is the most effective way to encourage compliance with safety measures such as strong passwords and secure document handling.</p><p>Leading organizations and their leaders through this change takes a special kind of person. </p><p>Today, we're thrilled to welcome Ceri Jones, Head of Security Awareness & Community at Lego, to the podcast! </p><p>Ceri is a brilliant specialist who turns research from multiple fields into real-world tactics that build security-focused internal cultures. With over a decade of experience in people-focused security and awareness, Ceri is a true champion of positive security and language. She's a firm believer in fresh approaches to security awareness that “make security more approachable, conscious and considerate.“</p><p>Tune in to:</p><ul><li>discover why companies need to embrace positive language in their cybersecurity communications</li><li>learn how heavy cognitive load affects people's response to security best practices, and</li><li>get inspired by the positive changes happening in the exciting world of cybersecurity.</li></ul><p>In this episode we cover:</p><ul><li>The power of positive language in cyber defense (05:09)</li><li>A winning case of cyber-positivity straight from Ceri’s experience (12:35)</li><li>The personal drive behind Ceri's journey in cybersecurity (18:07)</li><li>The brain-drain effect on cyber safety measures (22:24)</li><li>Positive changes shaping the future of cybersecurity (29:58)</li></ul><p>Connect with Ceri:</p><ul><li><a href="https://www.linkedin.com/in/ceri-jones-9769802b/">LinkedIn</a></li><li><a href="https://twitter.com/Cezza10">Twitter</a></li><li><a href="https://cezza10-84245.medium.com/">Medium</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 14 Feb 2023 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Poor communication is a major roadblock in getting people to adopt cyber-safe habits. It also created a major disconnect between information security specialists and the people they serve. </p><p>For instance, threat-filled emails with a negative or sometimes threatening tone only confuse non-IT experts who need simple explanations and psychological safety to learn. </p><p>This makes empathy essential in the cybersecurity space because it’s a constant reminder that things which are quick and easy for technical specialists can be complex and unnecessary to people with a different background.</p><p>By revamping security training and communication, we can make people feel comfortable with digital security practices and appreciated for their continued efforts. This is the most effective way to encourage compliance with safety measures such as strong passwords and secure document handling.</p><p>Leading organizations and their leaders through this change takes a special kind of person. </p><p>Today, we're thrilled to welcome Ceri Jones, Head of Security Awareness & Community at Lego, to the podcast! </p><p>Ceri is a brilliant specialist who turns research from multiple fields into real-world tactics that build security-focused internal cultures. With over a decade of experience in people-focused security and awareness, Ceri is a true champion of positive security and language. She's a firm believer in fresh approaches to security awareness that “make security more approachable, conscious and considerate.“</p><p>Tune in to:</p><ul><li>discover why companies need to embrace positive language in their cybersecurity communications</li><li>learn how heavy cognitive load affects people's response to security best practices, and</li><li>get inspired by the positive changes happening in the exciting world of cybersecurity.</li></ul><p>In this episode we cover:</p><ul><li>The power of positive language in cyber defense (05:09)</li><li>A winning case of cyber-positivity straight from Ceri’s experience (12:35)</li><li>The personal drive behind Ceri's journey in cybersecurity (18:07)</li><li>The brain-drain effect on cyber safety measures (22:24)</li><li>Positive changes shaping the future of cybersecurity (29:58)</li></ul><p>Connect with Ceri:</p><ul><li><a href="https://www.linkedin.com/in/ceri-jones-9769802b/">LinkedIn</a></li><li><a href="https://twitter.com/Cezza10">Twitter</a></li><li><a href="https://cezza10-84245.medium.com/">Medium</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="40032245" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/9b9f233e-fe05-4f0a-8d54-66b5b849db0f/audio/ba948358-3a5a-4155-a799-71880066b230/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>From fear to friendship: how positive language boosts cybersecurity awareness</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/d8a7696e-add1-4eb7-9dde-a5a32cf1b30d/3000x3000/ceri-jonesc-cyber-empathy-podcast.jpg?aid=rss_feed"/>
      <itunes:duration>00:41:41</itunes:duration>
      <itunes:summary>Poor communication is a major roadblock in getting people to adopt cyber-safe habits. It also created a major disconnect between information security specialists and the people they serve. 

This makes empathy essential in the cybersecurity space because it’s a constant reminder that things which are quick and easy for technical specialists can be complex and unnecessary to people with a different background.</itunes:summary>
      <itunes:subtitle>Poor communication is a major roadblock in getting people to adopt cyber-safe habits. It also created a major disconnect between information security specialists and the people they serve. 

This makes empathy essential in the cybersecurity space because it’s a constant reminder that things which are quick and easy for technical specialists can be complex and unnecessary to people with a different background.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">4cb993d0-8765-4437-bcf3-72abb32807ae</guid>
      <title>How emotions shape human behavior in cybersecurity</title>
      <description><![CDATA[<p>People are critical to advancing cybersecurity on all fronts, whether it’s keeping an organization safe or building safer software. Using security software or rolling out an awareness course is not enough. You need to understand how people interact with the system and where following best practices fails them – and why.</p><p>This allows the creation of user-friendly policies that make people feel supported instead of hounded for their mistakes. A more empathetic approach to building relationships with cybersecurity (specialists, concepts, and practices) encourages people to ask for help when they identify a potential threat because they don’t feel judged.</p><p>Our guest today is Erlend Andreas Gjære, co-founder & CEO of Secure Practice, a Norwegian company that creates data-driven tools to engage, influence, and cultivate security within organizations. He specializes in security and people, focusing on security awareness, training and culture, human risk, behavior, and user experience. </p><p>In this episode, you will hear about the role of emotions in human behavior as it manifests and relates to cybersecurity, based on Erlend’s experience as a researcher. You’ll also learn why communication is one of the most important components of making things work in this space. Additionally, you’ll discover real examples that show why fear-based communication is ineffective in getting people to adopt a safer behavior.</p><p>In this episode, you will learn:</p><ul><li>How Erlend’s experience as a research scientist shaped his mission in cybersecurity (05:27)</li><li>Why having management backing is not the most important element for building a security-focused culture (07:53)</li><li>Real examples of the range of emotions that cybersecurity triggers in people (19:49)</li><li>How using fear-based communication damages the willingness to act on security advice in the long run (24:32)</li><li>How specialists’ familiarity with cybersecurity makes them underestimate the complexity of concepts and advice they give people (32:16)</li><li>A practical example of how to make a good business case for using empathy to advance secure behavior (34:49)</li></ul><p>Resources: </p><ul><li>Book: <a href="https://www.amazon.com/Nonviolent-Communication-Language-Life-Changing-Relationships/dp/189200528X">Nonviolent Communication</a></li><li>Study: <a href="https://discovery.ucl.ac.uk/id/eprint/1475820/">Rule breakers, excuse makers, and security champions</a></li><li><a href="https://www.datatilsynet.no/en/regulations-and-tools/sandbox-for-artificial-intelligence/reports/secure-practice--exit-report/">Security Practice - Exit Report</a></li></ul><p>Connect with Erlend:</p><ul><li><a href="https://securityandpeople.com/about/">Website</a></li><li><a href="https://www.linkedin.com/in/erlendgjaere/">LinkedIn</a></li><li><a href="https://twitter.com/erlangsec?lang=en">Twitter</a></li><li><a href="https://securepractice.co/">Secure Practice</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 1 Nov 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>People are critical to advancing cybersecurity on all fronts, whether it’s keeping an organization safe or building safer software. Using security software or rolling out an awareness course is not enough. You need to understand how people interact with the system and where following best practices fails them – and why.</p><p>This allows the creation of user-friendly policies that make people feel supported instead of hounded for their mistakes. A more empathetic approach to building relationships with cybersecurity (specialists, concepts, and practices) encourages people to ask for help when they identify a potential threat because they don’t feel judged.</p><p>Our guest today is Erlend Andreas Gjære, co-founder & CEO of Secure Practice, a Norwegian company that creates data-driven tools to engage, influence, and cultivate security within organizations. He specializes in security and people, focusing on security awareness, training and culture, human risk, behavior, and user experience. </p><p>In this episode, you will hear about the role of emotions in human behavior as it manifests and relates to cybersecurity, based on Erlend’s experience as a researcher. You’ll also learn why communication is one of the most important components of making things work in this space. Additionally, you’ll discover real examples that show why fear-based communication is ineffective in getting people to adopt a safer behavior.</p><p>In this episode, you will learn:</p><ul><li>How Erlend’s experience as a research scientist shaped his mission in cybersecurity (05:27)</li><li>Why having management backing is not the most important element for building a security-focused culture (07:53)</li><li>Real examples of the range of emotions that cybersecurity triggers in people (19:49)</li><li>How using fear-based communication damages the willingness to act on security advice in the long run (24:32)</li><li>How specialists’ familiarity with cybersecurity makes them underestimate the complexity of concepts and advice they give people (32:16)</li><li>A practical example of how to make a good business case for using empathy to advance secure behavior (34:49)</li></ul><p>Resources: </p><ul><li>Book: <a href="https://www.amazon.com/Nonviolent-Communication-Language-Life-Changing-Relationships/dp/189200528X">Nonviolent Communication</a></li><li>Study: <a href="https://discovery.ucl.ac.uk/id/eprint/1475820/">Rule breakers, excuse makers, and security champions</a></li><li><a href="https://www.datatilsynet.no/en/regulations-and-tools/sandbox-for-artificial-intelligence/reports/secure-practice--exit-report/">Security Practice - Exit Report</a></li></ul><p>Connect with Erlend:</p><ul><li><a href="https://securityandpeople.com/about/">Website</a></li><li><a href="https://www.linkedin.com/in/erlendgjaere/">LinkedIn</a></li><li><a href="https://twitter.com/erlangsec?lang=en">Twitter</a></li><li><a href="https://securepractice.co/">Secure Practice</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="43851974" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/de99ac5c-1f15-49bc-8691-3089f08d9c21/audio/95da4633-bc47-4643-8a10-64d489c60b6e/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>How emotions shape human behavior in cybersecurity</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/37dd5517-24a9-4bcb-90b9-1bb8d79652a2/3000x3000/erlend-andreas-gjaere-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:45:40</itunes:duration>
      <itunes:summary>Employees are a critical component when addressing cybersecurity problems within an organization. Creating software, a plugin, or an awareness course is not enough. You need to understand how people interact with the system and where they fall short of following best practices.
This allows the creation of user-friendly policies that make people feel supported and not attacked. It makes more people open to asking for help when they receive suspicious emails because they don’t feel judged.
</itunes:summary>
      <itunes:subtitle>Employees are a critical component when addressing cybersecurity problems within an organization. Creating software, a plugin, or an awareness course is not enough. You need to understand how people interact with the system and where they fall short of following best practices.
This allows the creation of user-friendly policies that make people feel supported and not attacked. It makes more people open to asking for help when they receive suspicious emails because they don’t feel judged.
</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">8f6fa3d3-944a-477d-802e-50d7e3292a5c</guid>
      <title>Rethinking communication in the cybersecurity space</title>
      <description><![CDATA[<p>One of the biggest barriers to promoting safe practices in cyberspace is attitude – both from users and from specialists in the industry. </p><p>People who’ve never experienced a cyberattack have a difficult time understanding the need for taking precautions in their digital lives because the consequences are abstract and far removed from their daily lives. This is absolutely natural given information security has been around for a second compared to human evolution.  </p><p>Most people see best practices as an unnecessary burden they don’t have time for. That’s why those in the cybersecurity space need to empathize with each user to be able to help and support them effectively. </p><p>Our guest today is Joe Giddens, the Director of Content & Communication at CybSafe – a company focused on lowering human cyber risk by educating, nudging, and supporting teams. He’ll help us understand the communication challenge in the cybersecurity space.</p><p>In this episode, you’ll hear about Joe’s experience in law enforcement and how he ended up in cybersecurity. You’ll also learn how familiarization makes it more difficult for experts in our industry to show empathy. Additionally, you’ll find out some honest, hard truths about practicing empathy in helping people acquire the digital security skills they need – and why they need them</p><p>In this episode, you will learn:</p><ul><li>Joe’s experience in law enforcement and the impact it had on him (04:08)</li><li>How Joe ended up in cybersecurity (10:11)</li><li>Why desensitization is a big challenge to overcome (15:08)</li><li>An overview of CybSafe’s Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022 (23:15)</li><li>The negative impact of learned helplessness (29:36)</li></ul><p>Connect with Joe:</p><ul><li><a href="https://www.linkedin.com/in/joe-giddens/">LinkedIn</a></li><li><a href="https://www.cybsafe.com/">Website</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 18 Oct 2022 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>One of the biggest barriers to promoting safe practices in cyberspace is attitude – both from users and from specialists in the industry. </p><p>People who’ve never experienced a cyberattack have a difficult time understanding the need for taking precautions in their digital lives because the consequences are abstract and far removed from their daily lives. This is absolutely natural given information security has been around for a second compared to human evolution.  </p><p>Most people see best practices as an unnecessary burden they don’t have time for. That’s why those in the cybersecurity space need to empathize with each user to be able to help and support them effectively. </p><p>Our guest today is Joe Giddens, the Director of Content & Communication at CybSafe – a company focused on lowering human cyber risk by educating, nudging, and supporting teams. He’ll help us understand the communication challenge in the cybersecurity space.</p><p>In this episode, you’ll hear about Joe’s experience in law enforcement and how he ended up in cybersecurity. You’ll also learn how familiarization makes it more difficult for experts in our industry to show empathy. Additionally, you’ll find out some honest, hard truths about practicing empathy in helping people acquire the digital security skills they need – and why they need them</p><p>In this episode, you will learn:</p><ul><li>Joe’s experience in law enforcement and the impact it had on him (04:08)</li><li>How Joe ended up in cybersecurity (10:11)</li><li>Why desensitization is a big challenge to overcome (15:08)</li><li>An overview of CybSafe’s Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022 (23:15)</li><li>The negative impact of learned helplessness (29:36)</li></ul><p>Connect with Joe:</p><ul><li><a href="https://www.linkedin.com/in/joe-giddens/">LinkedIn</a></li><li><a href="https://www.cybsafe.com/">Website</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="37519057" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/c9d8d1a8-8f17-4e88-a89b-960c5a64f4d7/audio/d951c54d-c84d-4eda-ab0b-14ab7a99c4ff/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Rethinking communication in the cybersecurity space</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/93f5d46f-cfbb-47db-aef0-15b5fdcaf569/3000x3000/joe-giddens-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:04</itunes:duration>
      <itunes:summary>It is very hard to make people who have never experienced a cyber attack threat the need for best practices, such as two-factor authentication, with urgency. 
Most users will see best practices as an unnecessary burden they do not need. That is why those in the cybersecurity space need to empathize with the user while advising them.
</itunes:summary>
      <itunes:subtitle>It is very hard to make people who have never experienced a cyber attack threat the need for best practices, such as two-factor authentication, with urgency. 
Most users will see best practices as an unnecessary burden they do not need. That is why those in the cybersecurity space need to empathize with the user while advising them.
</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">be6e22e7-212c-4d10-959f-29b2035fb21a</guid>
      <title>The value of approachability in cybersecurity</title>
      <description><![CDATA[<p>The key to being a successful cybersecurity expert is to be approachable and understand the needs of others.</p><p>Cybersecurity is a continuous process that touches on many critical organizational functions. It is, therefore, a bad idea to run it in a silo that is unapproachable by teams from other departments. </p><p>When cybersecurity personnel are approachable, people feel more comfortable consulting them and following their instructions. This helps in creating a safety-first culture that can improve the overall security posture of an organization and also help people in their day to day lives.</p><p>Our guest today is Tracy Z. Maleeff, a Security Researcher with the Krebs Stamos Group. She previously held the roles of Information Security Analyst at The New York Times Company and Cyber Analyst for GlaxoSmithKline. She is a dedicated practitioner and promoter of empathy in cybersecurity. </p><p>In this episode, you’ll learn the importance of being approachable as a cybersecurity expert and how it can make your work easier. Plus, Tracy shares a few simple initiatives an organization can undertake to promote a safety-first security culture. Additionally, you'll find out how people feel about empathy in cybersecurity in Europe versus North America.</p><p>In this episode, you will learn:</p><ul><li>How Tracy ended up in cybersecurity after working as a librarian (04:10)</li><li>A common misconception about practicing empathy in cybersecurity (16:19)</li><li>Initiatives that can truly help organizations strengthen their cybersecurity culture (29:12)</li><li>How Europeans perceive cyber empathy and its role (34:09)</li></ul><p>Connect with Tracy:</p><ul><li><a href="https://linktr.ee/infosecsherpa">Website</a></li><li><a href="https://www.linkedin.com/in/tzmaleeff/">LinkedIn</a></li><li><a href="https://twitter.com/InfoSecSherpa">Twitter</a></li><li><a href="https://youtu.be/K5nH9HgTv-M">YouTube</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 4 Oct 2022 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>The key to being a successful cybersecurity expert is to be approachable and understand the needs of others.</p><p>Cybersecurity is a continuous process that touches on many critical organizational functions. It is, therefore, a bad idea to run it in a silo that is unapproachable by teams from other departments. </p><p>When cybersecurity personnel are approachable, people feel more comfortable consulting them and following their instructions. This helps in creating a safety-first culture that can improve the overall security posture of an organization and also help people in their day to day lives.</p><p>Our guest today is Tracy Z. Maleeff, a Security Researcher with the Krebs Stamos Group. She previously held the roles of Information Security Analyst at The New York Times Company and Cyber Analyst for GlaxoSmithKline. She is a dedicated practitioner and promoter of empathy in cybersecurity. </p><p>In this episode, you’ll learn the importance of being approachable as a cybersecurity expert and how it can make your work easier. Plus, Tracy shares a few simple initiatives an organization can undertake to promote a safety-first security culture. Additionally, you'll find out how people feel about empathy in cybersecurity in Europe versus North America.</p><p>In this episode, you will learn:</p><ul><li>How Tracy ended up in cybersecurity after working as a librarian (04:10)</li><li>A common misconception about practicing empathy in cybersecurity (16:19)</li><li>Initiatives that can truly help organizations strengthen their cybersecurity culture (29:12)</li><li>How Europeans perceive cyber empathy and its role (34:09)</li></ul><p>Connect with Tracy:</p><ul><li><a href="https://linktr.ee/infosecsherpa">Website</a></li><li><a href="https://www.linkedin.com/in/tzmaleeff/">LinkedIn</a></li><li><a href="https://twitter.com/InfoSecSherpa">Twitter</a></li><li><a href="https://youtu.be/K5nH9HgTv-M">YouTube</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="46462546" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/b35ea1c4-81f9-48ba-b9e3-5d1ee460ce54/audio/4d65f691-5f23-4a05-a8d4-f380c0746650/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>The value of approachability in cybersecurity</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/a7a2d7ec-1741-4737-8a95-7bc93bb7b54b/3000x3000/tracy-z-maleeff-cyber-empathy-guest.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:23</itunes:duration>
      <itunes:summary>Cybersecurity is a continuous process that touches on many critical organizational functions. It is, therefore, a bad idea to run it in a silo that is unapproachable by teams from other departments. 

When the cybersecurity personnel is approachable, people feel more comfortable consulting them and following their instructions. This helps in creating a safety-first culture that can improve the overall security posture of the organization’s IT systems.</itunes:summary>
      <itunes:subtitle>Cybersecurity is a continuous process that touches on many critical organizational functions. It is, therefore, a bad idea to run it in a silo that is unapproachable by teams from other departments. 

When the cybersecurity personnel is approachable, people feel more comfortable consulting them and following their instructions. This helps in creating a safety-first culture that can improve the overall security posture of the organization’s IT systems.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">064ecc79-4221-4677-9241-cf9a9b5b454f</guid>
      <title>The art of listening</title>
      <description><![CDATA[<p>The biggest communication problem we have is that we listen with the intention of replying instead of understanding. This takes away the safety net that a speaker is expecting to have and closes the door on empathy.</p><p>That is why it is important to practice the critical art of listening if you wish to grow in how you practice empathy. Mastering it will help you connect with others in a generous and meaningful way. </p><p>Today, I will focus on the critical points that I got after going through a listening training program. I will share with you some basic listening tips as well as some less obvious ones that can make you a better cybersecurity expert. I’ll also share why the podcast went on a brief hiatus and what you can expect to get going forward. </p><p>Tune in and listen to the nineteenth episode of Cyber Empathy to learn how listening can help improve empathy.</p><p>In this episode, you will learn:</p><ul><li>Why I decided to give the podcast a break (01:56)</li><li>Four main ideas I took from the listening program (08:47)</li><li>The impact of letting people go through their entire thought process without any interruption (11:37)</li><li>Examples of empathy blockers (19:03)</li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 20 Sep 2022 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>The biggest communication problem we have is that we listen with the intention of replying instead of understanding. This takes away the safety net that a speaker is expecting to have and closes the door on empathy.</p><p>That is why it is important to practice the critical art of listening if you wish to grow in how you practice empathy. Mastering it will help you connect with others in a generous and meaningful way. </p><p>Today, I will focus on the critical points that I got after going through a listening training program. I will share with you some basic listening tips as well as some less obvious ones that can make you a better cybersecurity expert. I’ll also share why the podcast went on a brief hiatus and what you can expect to get going forward. </p><p>Tune in and listen to the nineteenth episode of Cyber Empathy to learn how listening can help improve empathy.</p><p>In this episode, you will learn:</p><ul><li>Why I decided to give the podcast a break (01:56)</li><li>Four main ideas I took from the listening program (08:47)</li><li>The impact of letting people go through their entire thought process without any interruption (11:37)</li><li>Examples of empathy blockers (19:03)</li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="29354219" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/75fb9695-4229-49ee-b646-6f941f9a17f8/audio/89c1c901-9569-4937-8954-0f72bec9095e/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>The art of listening</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/b5eae4b1-87af-481d-8bec-bf6d81b48893/3000x3000/andra-zaharia-intro-episode.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:34</itunes:duration>
      <itunes:summary>The biggest communication problem we have is that we listen with the intention of replying instead of understanding. This takes away the safety net that a speaker is expecting to have and closes the door on empathy.

That is why it is important to practice the critical art of listening if you wish to grow in how you practice empathy. Mastering it will help you connect with others in a generous and meaningful way. </itunes:summary>
      <itunes:subtitle>The biggest communication problem we have is that we listen with the intention of replying instead of understanding. This takes away the safety net that a speaker is expecting to have and closes the door on empathy.

That is why it is important to practice the critical art of listening if you wish to grow in how you practice empathy. Mastering it will help you connect with others in a generous and meaningful way. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">c1b8a481-0337-4c1d-a641-b6392546cf7a</guid>
      <title>Attaining a fulfilling life in the cybersecurity industry</title>
      <description><![CDATA[<p>When you take time to replenish, you can serve from the overflow and avoid burnout.</p><p>Cybersecurity is a stressful industry that demands a lot of commitment from professionals in it. Sometimes, people in this industry focus so much on the task at hand that they forget to replenish themselves.</p><p>This, in most cases, results in burnout or a significant reduction in the quality of their work. That’s why practicing self-care, self-empathy, and assertiveness are essential parts of personal and professional development. </p><p>Our guest today is Cristina Magro, a personal development coach for cybersecurity professionals. She’s passionate about teaching those who keep digital infrastructure and information safe how to take care of themselves. Today, she’ll share with us the role that empathy plays in her work.</p><p>In this episode, you’ll hear about the reality of what it’s like to work in the cybersecurity industry. You’ll also learn about the challenges that people in this industry face and some tips on how to overcome them. Additionally, you’ll discover the importance of practicing self-empathy and self-care.</p><p>In this episode, you will learn:</p><ul><li>The experience that motivated Cristina to start helping cybersecurity professionals (06:23)</li><li>Common traits of professionals in the cybersecurity space (09:45)</li><li>Why cybersecurity professionals need to be assertive (14:24)</li><li>How to help others without experiencing burnout (24:02)</li></ul><p>Resources: </p><ul><li>Book: <a href="https://www.amazon.com/Habits-Highly-Effective-People-Powerful/dp/0743269519">The Seven Habits of Highly Effective People</a></li></ul><p>Connect with Cristina:</p><ul><li><a href="https://cristinamagro.com/">Website</a></li><li><a href="https://www.linkedin.com/in/cristinamagr0/?originalSubdomain=uk">LinkedIn</a></li><li><a href="https://twitter.com/cristinam_litm">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 6 Sep 2022 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>When you take time to replenish, you can serve from the overflow and avoid burnout.</p><p>Cybersecurity is a stressful industry that demands a lot of commitment from professionals in it. Sometimes, people in this industry focus so much on the task at hand that they forget to replenish themselves.</p><p>This, in most cases, results in burnout or a significant reduction in the quality of their work. That’s why practicing self-care, self-empathy, and assertiveness are essential parts of personal and professional development. </p><p>Our guest today is Cristina Magro, a personal development coach for cybersecurity professionals. She’s passionate about teaching those who keep digital infrastructure and information safe how to take care of themselves. Today, she’ll share with us the role that empathy plays in her work.</p><p>In this episode, you’ll hear about the reality of what it’s like to work in the cybersecurity industry. You’ll also learn about the challenges that people in this industry face and some tips on how to overcome them. Additionally, you’ll discover the importance of practicing self-empathy and self-care.</p><p>In this episode, you will learn:</p><ul><li>The experience that motivated Cristina to start helping cybersecurity professionals (06:23)</li><li>Common traits of professionals in the cybersecurity space (09:45)</li><li>Why cybersecurity professionals need to be assertive (14:24)</li><li>How to help others without experiencing burnout (24:02)</li></ul><p>Resources: </p><ul><li>Book: <a href="https://www.amazon.com/Habits-Highly-Effective-People-Powerful/dp/0743269519">The Seven Habits of Highly Effective People</a></li></ul><p>Connect with Cristina:</p><ul><li><a href="https://cristinamagro.com/">Website</a></li><li><a href="https://www.linkedin.com/in/cristinamagr0/?originalSubdomain=uk">LinkedIn</a></li><li><a href="https://twitter.com/cristinam_litm">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="36667673" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/4fb9a880-8a2f-4b3f-9d3e-5d9602f7c251/audio/5ac09208-ad67-46ab-a7fe-36433a0277fa/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Attaining a fulfilling life in the cybersecurity industry</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/f3394d6c-e0fa-4798-ab67-a010a200c22e/3000x3000/use-cyber-empathy-guest-cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:38:11</itunes:duration>
      <itunes:summary>When you take time to replenish, you can serve from the overflow and avoid burnout.
Cybersecurity is a stressful industry that demands a lot of commitment from professionals in it. Sometimes, people in this industry focus so much on the task at hand that they forget to replenish themselves.</itunes:summary>
      <itunes:subtitle>When you take time to replenish, you can serve from the overflow and avoid burnout.
Cybersecurity is a stressful industry that demands a lot of commitment from professionals in it. Sometimes, people in this industry focus so much on the task at hand that they forget to replenish themselves.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">20efd478-95fd-4312-ac57-eb66e1eae74a</guid>
      <title>Building emotional resilience to fight disinformation</title>
      <description><![CDATA[<p>In the world of cybersecurity, not <i>all</i> information is power.</p><p>In fact, “only the right amount of the right information is power.” Too much information can easily lead to sensationalization of the threat and this can overwhelm even the most concerned audience. Bewildered people rarely consider actionable steps that can improve their security posture, because they have to use their resources to make sense of all the details coming towards them.</p><p>That’s why leaders in the cybersecurity community need to take an empathetic approach while disseminating information on the platforms available to them. It shouldn’t be about getting the most attention - it should be about creating a far-reaching positive impact.</p><p>Our guest today is Baptiste Robert, a cybersecurity expert and founder of <a href="https://predictalab.fr/">Predicta Lab</a>, where he focuses on fighting disinformation. He’s been an active contributor to the field for many years and has a lot of experience on the best way to identify and counter disinformation tactics.</p><p>In this episode, you’ll learn about how Baptiste practices empathy in his role as an ethical hacker and the area of impact he has chosen to concentrate on. You’ll also learn some important tips that can help you in identifying online scammers and misinformation. Additionally, he’ll share with us one of his success stories and the impact he hopes to have on the cybersecurity community.</p><p>In this episode, you will learn:</p><ul><li>How Baptiste uses empathy to fight disinformation (01:12)</li><li>How he finds the balance between being informed and avoiding overwhelm (05:13)</li><li>Most people’s reaction when they realize they’ve been attacked (16:45)</li><li>Tips to detect and avoid scammers online (23:44)</li></ul><p>Resources</p><ul><li><a href="https://en.wikipedia.org/wiki/Open-source_intelligence">OSINT - Open Source Intelligence (cybersecurity term)</a></li><li><a href="https://thecyberwire.com/glossary/mice">MICE</a> framework (cybersecurity term)</li><li><a href="https://toulouse.latribune.fr/decideurs/economie/2020-06-04/baptiste-robert-le-hacker-toulousain-qui-vous-veut-du-bien-848853.html">Baptiste Robert, le hacker toulousain qui vous veut du bien</a></li></ul><p>Connect with Baptiste Robert:</p><ul><li><a href="https://predictalab.fr">Predicta Lab</a></li><li><a href="https://twitter.com/fs0c131y">Twitter</a></li><li><a href="https://www.linkedin.com/in/baptiste-robert-70b6011b5/?originalSubdomain=fr">LinkedIn</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 15 Mar 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>In the world of cybersecurity, not <i>all</i> information is power.</p><p>In fact, “only the right amount of the right information is power.” Too much information can easily lead to sensationalization of the threat and this can overwhelm even the most concerned audience. Bewildered people rarely consider actionable steps that can improve their security posture, because they have to use their resources to make sense of all the details coming towards them.</p><p>That’s why leaders in the cybersecurity community need to take an empathetic approach while disseminating information on the platforms available to them. It shouldn’t be about getting the most attention - it should be about creating a far-reaching positive impact.</p><p>Our guest today is Baptiste Robert, a cybersecurity expert and founder of <a href="https://predictalab.fr/">Predicta Lab</a>, where he focuses on fighting disinformation. He’s been an active contributor to the field for many years and has a lot of experience on the best way to identify and counter disinformation tactics.</p><p>In this episode, you’ll learn about how Baptiste practices empathy in his role as an ethical hacker and the area of impact he has chosen to concentrate on. You’ll also learn some important tips that can help you in identifying online scammers and misinformation. Additionally, he’ll share with us one of his success stories and the impact he hopes to have on the cybersecurity community.</p><p>In this episode, you will learn:</p><ul><li>How Baptiste uses empathy to fight disinformation (01:12)</li><li>How he finds the balance between being informed and avoiding overwhelm (05:13)</li><li>Most people’s reaction when they realize they’ve been attacked (16:45)</li><li>Tips to detect and avoid scammers online (23:44)</li></ul><p>Resources</p><ul><li><a href="https://en.wikipedia.org/wiki/Open-source_intelligence">OSINT - Open Source Intelligence (cybersecurity term)</a></li><li><a href="https://thecyberwire.com/glossary/mice">MICE</a> framework (cybersecurity term)</li><li><a href="https://toulouse.latribune.fr/decideurs/economie/2020-06-04/baptiste-robert-le-hacker-toulousain-qui-vous-veut-du-bien-848853.html">Baptiste Robert, le hacker toulousain qui vous veut du bien</a></li></ul><p>Connect with Baptiste Robert:</p><ul><li><a href="https://predictalab.fr">Predicta Lab</a></li><li><a href="https://twitter.com/fs0c131y">Twitter</a></li><li><a href="https://www.linkedin.com/in/baptiste-robert-70b6011b5/?originalSubdomain=fr">LinkedIn</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="37479349" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/51555524-3e7f-439d-b031-208075d5ac4a/audio/623e3661-289d-4fce-a624-5f43c13de636/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Building emotional resilience to fight disinformation</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/4f6dfe24-2743-4d3c-a1fd-aaef916494ac/3000x3000/baptiste-robert-cyber-empathy-episode.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:02</itunes:duration>
      <itunes:summary>In the world of cybersecurity, not all information is power.
In fact, “only the right amount of the right information is power.” Too much information can easily lead to sensationalization of the threat and this can overwhelm even the most concerned audience. Bewildered people rarely consider actionable steps that can improve their security posture, because they have to use their resources to make sense of all the details coming towards them.
</itunes:summary>
      <itunes:subtitle>In the world of cybersecurity, not all information is power.
In fact, “only the right amount of the right information is power.” Too much information can easily lead to sensationalization of the threat and this can overwhelm even the most concerned audience. Bewildered people rarely consider actionable steps that can improve their security posture, because they have to use their resources to make sense of all the details coming towards them.
</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">75baca4c-962c-4677-87c7-267ef1d6bb6b</guid>
      <title>The role of empathy in the fight against stalkerware</title>
      <description><![CDATA[<p>In today’s social media-dominated world, the word stalking has been flipped to mean being harmlessly followed online, getting a ‘like’, getting a retweet, having your profile viewed constantly, among others. In fact, some even see it as a good thing because it shows how interesting one’s life is. But, that’s just one side of the coin.</p><p>The other side is dark. Stalkers use technology to abuse their victims emotionally by tracking and controlling their every move  – everyone they call, text, or share intimate details with. It's a tactic abusers use to scare, deter, control, or hurt people by stripping off their privacy.</p><p>While it may start off as harmless in many cases, the ending can turn out very violent as we’ve seen in many cases. And by this, I mean kidnappings, domestic abuse, extortion, and exposing private information, among others.</p><p>However, there are solutions that can prevent unauthorized access to personal devices or alert you if you were already being spied on. </p><p>Our guest today is Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation and co-founder of the <a href="https://stopstalkerware.org/">Coalition Against Stalkerware</a>. Inspired by victims who reached out for help, Eva has been helping people identify and secure their devices against stalkaware applications.</p><p>In this episode, you’ll hear about who uses stalkerware and why – and what is being done to keep our devices secure from this kind of tracking and intrusion. You’ll also learn more about the people working behind the scenes to help victims and prevent future attacks. Additionally, you’ll get straightforward examples of howempathy gives cyber security a higher and even more important role than you realize it has.</p><p>In this episode, you will learn:</p><ul><li>How empathy for victims determined Eva to advocate for stalkerware detection, removal, and blocking (01:11)</li><li>The people that Eva works with and their contribution to helping those most vulnerable (06:27)</li><li>A personal experience that led Eva to analyze and fight against stalkerware (10:12)</li><li>How she approaches the stalkerware conversation when talking to non-technical people (18:45)</li></ul><p>Resources: </p><ul><li><a href="https://www.wired.com/story/eva-galperin-stalkerware-kaspersky-antivirus/">Wired.com</a> (Stalkerware article)</li><li><a href="https://stopstalkerware.org/" target="_blank">Coalition Against Stalkerware</a></li><li><a href="https://www.eff.org" target="_blank"><strong>Electronic Frontier Foundation</strong></a></li><li><a href="https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/">Tech Crunch</a> (Stalkerware article)</li><li><a href="https://www.goodreads.com/book/show/1047513.Helping_Her_Get_Free?ac=1&from_search=true&qid=VF1GI8Zu6d&rank=1">Helping Her Get Free: A Guide for Families and Friends of Abused Women</a> (Book)</li><li><a href="https://www.goodreads.com/book/show/18693771-the-body-keeps-the-score?ac=1&from_search=true&qid=rdPTD26NsZ&rank=1">The Body Keeps the Score: Brain, Mind, and Body in the Healing of Trauma</a> (Book)</li><li><a href="https://www.goodreads.com/book/show/224552.Why_Does_He_Do_That_?ac=1&from_search=true&qid=d50wrXkz3R&rank=1">Why Does He Do That?: Inside the Minds of Angry and Controlling Men</a> (Book)</li><li><a href="https://en.wikipedia.org/wiki/Advanced_persistent_threat">APT - Advanced persistent threat</a> (Concept definition)</li><li><a href="https://www.comparitech.com/net-admin/pcap-guide/">PCAP - Packet Capture</a> (Concept definition)</li><li><a href="https://www.techtarget.com/searchsecurity/definition/computer-forensics">Forensic analysis</a> (Article)</li><li><a href="https://portswigger.net/daily-swig/ftc-set-to-ramp-up-privacy-and-security-rule-making-activity-in-2022">Federal Trade Commission (FTC) announcement for stronger privacy</a>  (Article)</li></ul><p>Connect with Eva:</p><ul><li><a href="https://stopstalkerware.org/">Website</a></li><li><a href="https://twitter.com/evacide">Twitter</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 8 Mar 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>In today’s social media-dominated world, the word stalking has been flipped to mean being harmlessly followed online, getting a ‘like’, getting a retweet, having your profile viewed constantly, among others. In fact, some even see it as a good thing because it shows how interesting one’s life is. But, that’s just one side of the coin.</p><p>The other side is dark. Stalkers use technology to abuse their victims emotionally by tracking and controlling their every move  – everyone they call, text, or share intimate details with. It's a tactic abusers use to scare, deter, control, or hurt people by stripping off their privacy.</p><p>While it may start off as harmless in many cases, the ending can turn out very violent as we’ve seen in many cases. And by this, I mean kidnappings, domestic abuse, extortion, and exposing private information, among others.</p><p>However, there are solutions that can prevent unauthorized access to personal devices or alert you if you were already being spied on. </p><p>Our guest today is Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation and co-founder of the <a href="https://stopstalkerware.org/">Coalition Against Stalkerware</a>. Inspired by victims who reached out for help, Eva has been helping people identify and secure their devices against stalkaware applications.</p><p>In this episode, you’ll hear about who uses stalkerware and why – and what is being done to keep our devices secure from this kind of tracking and intrusion. You’ll also learn more about the people working behind the scenes to help victims and prevent future attacks. Additionally, you’ll get straightforward examples of howempathy gives cyber security a higher and even more important role than you realize it has.</p><p>In this episode, you will learn:</p><ul><li>How empathy for victims determined Eva to advocate for stalkerware detection, removal, and blocking (01:11)</li><li>The people that Eva works with and their contribution to helping those most vulnerable (06:27)</li><li>A personal experience that led Eva to analyze and fight against stalkerware (10:12)</li><li>How she approaches the stalkerware conversation when talking to non-technical people (18:45)</li></ul><p>Resources: </p><ul><li><a href="https://www.wired.com/story/eva-galperin-stalkerware-kaspersky-antivirus/">Wired.com</a> (Stalkerware article)</li><li><a href="https://stopstalkerware.org/" target="_blank">Coalition Against Stalkerware</a></li><li><a href="https://www.eff.org" target="_blank"><strong>Electronic Frontier Foundation</strong></a></li><li><a href="https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/">Tech Crunch</a> (Stalkerware article)</li><li><a href="https://www.goodreads.com/book/show/1047513.Helping_Her_Get_Free?ac=1&from_search=true&qid=VF1GI8Zu6d&rank=1">Helping Her Get Free: A Guide for Families and Friends of Abused Women</a> (Book)</li><li><a href="https://www.goodreads.com/book/show/18693771-the-body-keeps-the-score?ac=1&from_search=true&qid=rdPTD26NsZ&rank=1">The Body Keeps the Score: Brain, Mind, and Body in the Healing of Trauma</a> (Book)</li><li><a href="https://www.goodreads.com/book/show/224552.Why_Does_He_Do_That_?ac=1&from_search=true&qid=d50wrXkz3R&rank=1">Why Does He Do That?: Inside the Minds of Angry and Controlling Men</a> (Book)</li><li><a href="https://en.wikipedia.org/wiki/Advanced_persistent_threat">APT - Advanced persistent threat</a> (Concept definition)</li><li><a href="https://www.comparitech.com/net-admin/pcap-guide/">PCAP - Packet Capture</a> (Concept definition)</li><li><a href="https://www.techtarget.com/searchsecurity/definition/computer-forensics">Forensic analysis</a> (Article)</li><li><a href="https://portswigger.net/daily-swig/ftc-set-to-ramp-up-privacy-and-security-rule-making-activity-in-2022">Federal Trade Commission (FTC) announcement for stronger privacy</a>  (Article)</li></ul><p>Connect with Eva:</p><ul><li><a href="https://stopstalkerware.org/">Website</a></li><li><a href="https://twitter.com/evacide">Twitter</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="33387112" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/f2679132-e6d9-4e10-b9f4-ce5e0addb147/audio/4ac8d2b1-91a1-4808-8660-4290a8fbd6f3/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>The role of empathy in the fight against stalkerware</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/fc3837bd-5199-4cf1-9650-77aae4507265/3000x3000/eva-galperin-cyber-empathy.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:47</itunes:duration>
      <itunes:summary>In today’s social media-dominated world, the word stalking has been flipped to mean being harmlessly followed online, getting a ‘like’, getting a retweet, having your profile viewed constantly, among others. In fact, some even see it as a good thing because it shows how interesting one’s life is. But, that’s just one side of the coin.</itunes:summary>
      <itunes:subtitle>In today’s social media-dominated world, the word stalking has been flipped to mean being harmlessly followed online, getting a ‘like’, getting a retweet, having your profile viewed constantly, among others. In fact, some even see it as a good thing because it shows how interesting one’s life is. But, that’s just one side of the coin.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">1bed0f3f-5f46-4629-9d49-e9ac1d28206c</guid>
      <title>The empathetic side of secure software development</title>
      <description><![CDATA[<p>In the high stake world of software development, it is easy to put aside empathy and prioritize meeting deadlines. After all, developers are key players when you want to reduce time-to-market or deliver regular updates.</p><p>This can easily lead to the important aspect of application security not getting as much attention as it deserves. In some cases, it might even be relegated to the “extra-not-a-must” features category.</p><p>However, when empathy accompanies the entire development process, it easily extends to the users of the application. For instance, a project leader can take time to clearly explain the need for security features and give enough time for developers to implement them. This helps the developer understand the impact of the requirements they receive as it relates to how people use the application.</p><p><a href="https://wehackpurple.com/">We Hack Purple</a> is an online academy where developers go to learn how to create secure software. The founder, Tanya Janca, who is joining us in this episode, is a big believer in practicing kindness and empathy as a means of promoting application security.</p><p>Today, you’ll hear about what We Hack Purple does and its ultimate mission in software development. You’ll also hear about how Tanya practices empathy and the impact it has on her team. Additionally, you’ll hear about how they are empowering communities through their diversity scholarship program.</p><p>In this episode, you will learn:</p><ul><li>How Tanya practices and encourages empathy in her work (01:20)</li><li>Practical ways in which empathy can make a difference in application security (04:30)</li><li>The reason Tanya opened the We Hack Purple academy (12:10)</li><li>Why she came up with a diversity scholarship (18:30)</li></ul><p>Connect with Tanya:</p><ul><li><a href="https://wehackpurple.com/">Website</a></li><li><a href="https://twitter.com/shehackspurple">Twitter</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 1 Mar 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>In the high stake world of software development, it is easy to put aside empathy and prioritize meeting deadlines. After all, developers are key players when you want to reduce time-to-market or deliver regular updates.</p><p>This can easily lead to the important aspect of application security not getting as much attention as it deserves. In some cases, it might even be relegated to the “extra-not-a-must” features category.</p><p>However, when empathy accompanies the entire development process, it easily extends to the users of the application. For instance, a project leader can take time to clearly explain the need for security features and give enough time for developers to implement them. This helps the developer understand the impact of the requirements they receive as it relates to how people use the application.</p><p><a href="https://wehackpurple.com/">We Hack Purple</a> is an online academy where developers go to learn how to create secure software. The founder, Tanya Janca, who is joining us in this episode, is a big believer in practicing kindness and empathy as a means of promoting application security.</p><p>Today, you’ll hear about what We Hack Purple does and its ultimate mission in software development. You’ll also hear about how Tanya practices empathy and the impact it has on her team. Additionally, you’ll hear about how they are empowering communities through their diversity scholarship program.</p><p>In this episode, you will learn:</p><ul><li>How Tanya practices and encourages empathy in her work (01:20)</li><li>Practical ways in which empathy can make a difference in application security (04:30)</li><li>The reason Tanya opened the We Hack Purple academy (12:10)</li><li>Why she came up with a diversity scholarship (18:30)</li></ul><p>Connect with Tanya:</p><ul><li><a href="https://wehackpurple.com/">Website</a></li><li><a href="https://twitter.com/shehackspurple">Twitter</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="30167990" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/be14b59d-d0f0-4a6e-a30e-eb836965ca42/audio/a8604ddf-bcef-4c09-a3c8-e7a60049e631/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>The empathetic side of secure software development</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/fc207f5e-61df-40ca-aa90-f28fc5d55667/3000x3000/tanya-janca-cyber-empathy.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:25</itunes:duration>
      <itunes:summary>In the high stake world of software development, it is easy to put aside empathy and prioritize meeting deadlines. After all, developers are key players when you want to reduce time-to-market or deliver regular updates.

This can easily lead to the important aspect of application security not getting as much attention as it deserves. In some cases, it might even be relegated to the “extra-not-a-must” features category.
</itunes:summary>
      <itunes:subtitle>In the high stake world of software development, it is easy to put aside empathy and prioritize meeting deadlines. After all, developers are key players when you want to reduce time-to-market or deliver regular updates.

This can easily lead to the important aspect of application security not getting as much attention as it deserves. In some cases, it might even be relegated to the “extra-not-a-must” features category.
</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">13dd6891-bbb3-4d3f-9370-a189c817550c</guid>
      <title>Cybersecurity tips for small business owners</title>
      <description><![CDATA[<p>Reality check: most cyberattacks and privacy infringements are not a result of sophisticated hacking done by malicious adversaries who want to hold your system hostage or steal all your data. They result from the victim falling into a criminal's trap by clicking on “interesting” malicious links or (re)using weak credentials all over their online accounts.</p><p>Most people who aren’t in tech won’t even know their device was attacked or their credentials stolen.</p><p>In fact, a majority of infringements on users' privacy and security are not noticeable at the moment they occur. You only perceive it later, when you get bombarded with unwanted emails, tracking-enabled newsletters, and targeted ads on your timeline, among others.</p><p>The good news is there are a few basic steps you can take to significantly bolster your security posture across all your devices and digital footprint. </p><p>If you are a business owner, this would substantially increase the protection of your business assets, including your clients’ valuable data. It’s also an opportunity to practice empathy towards those who are a critical part of your business. (We’ll show you how.)</p><p>Inspired by our experience in the field of cybersecurity, privacy, and the technology we use, we share some tips you can implement to increase your business’ safety.</p><p>In this episode, we break down common beliefs business owners have over the issues of privacy and cybersecurity. You’ll also learn how a password manager and two-factor authentication can reduce the risk of your accounts being illegally accessed. Additionally, we’ll explain why you should only collect the data you absolutely need from your clients.</p><p>In this episode, you will learn:</p><ul><li>Misconceptions many business owners have around privacy and cybersecurity (03:42)</li><li>Three principles that will lead to a safer and more ethical behavior (08:55)</li><li>Why you should get a password manager (13:16)</li><li>The importance of two-factor authentication (15:01)</li><li>Why you should avoid collecting more data than you need (24:21)</li></ul><p>Resources: </p><ul><li><a href="https://usefathom.com/">Fathom Analytics</a> (Website analytics tool)</li><li><a href="https://rosswintle.uk/">Rose Wintle</a> (Website)</li><li><a href="https://authy.com/">Authy</a> (2-factor authentication tool)</li><li><a href="https://rmgirl.co.uk/easy-dp-compliance-guide/">Easy Data Protection Guide</a></li><li><a href="https://notospypixels.com/">No To Spy Pixels</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 22 Feb 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Reality check: most cyberattacks and privacy infringements are not a result of sophisticated hacking done by malicious adversaries who want to hold your system hostage or steal all your data. They result from the victim falling into a criminal's trap by clicking on “interesting” malicious links or (re)using weak credentials all over their online accounts.</p><p>Most people who aren’t in tech won’t even know their device was attacked or their credentials stolen.</p><p>In fact, a majority of infringements on users' privacy and security are not noticeable at the moment they occur. You only perceive it later, when you get bombarded with unwanted emails, tracking-enabled newsletters, and targeted ads on your timeline, among others.</p><p>The good news is there are a few basic steps you can take to significantly bolster your security posture across all your devices and digital footprint. </p><p>If you are a business owner, this would substantially increase the protection of your business assets, including your clients’ valuable data. It’s also an opportunity to practice empathy towards those who are a critical part of your business. (We’ll show you how.)</p><p>Inspired by our experience in the field of cybersecurity, privacy, and the technology we use, we share some tips you can implement to increase your business’ safety.</p><p>In this episode, we break down common beliefs business owners have over the issues of privacy and cybersecurity. You’ll also learn how a password manager and two-factor authentication can reduce the risk of your accounts being illegally accessed. Additionally, we’ll explain why you should only collect the data you absolutely need from your clients.</p><p>In this episode, you will learn:</p><ul><li>Misconceptions many business owners have around privacy and cybersecurity (03:42)</li><li>Three principles that will lead to a safer and more ethical behavior (08:55)</li><li>Why you should get a password manager (13:16)</li><li>The importance of two-factor authentication (15:01)</li><li>Why you should avoid collecting more data than you need (24:21)</li></ul><p>Resources: </p><ul><li><a href="https://usefathom.com/">Fathom Analytics</a> (Website analytics tool)</li><li><a href="https://rosswintle.uk/">Rose Wintle</a> (Website)</li><li><a href="https://authy.com/">Authy</a> (2-factor authentication tool)</li><li><a href="https://rmgirl.co.uk/easy-dp-compliance-guide/">Easy Data Protection Guide</a></li><li><a href="https://notospypixels.com/">No To Spy Pixels</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="31395943" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/b0f23b7d-1c99-4573-9479-54a1890495f8/audio/88d3faff-a7d8-4a06-a155-df59d6bd6a23/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Cybersecurity tips for small business owners</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:duration>00:32:42</itunes:duration>
      <itunes:summary>Reality check: most cyberattacks and privacy infringements are not a result of sophisticated hacking done by malicious adversaries who want to hold your system hostage or steal all your data. They result from the victim falling into a criminal&apos;s trap by clicking on “interesting” malicious links or (re)using weak credentials all over their online accounts.

Most people who aren’t in tech won’t even know their device was attacked or their credentials stolen.</itunes:summary>
      <itunes:subtitle>Reality check: most cyberattacks and privacy infringements are not a result of sophisticated hacking done by malicious adversaries who want to hold your system hostage or steal all your data. They result from the victim falling into a criminal&apos;s trap by clicking on “interesting” malicious links or (re)using weak credentials all over their online accounts.

Most people who aren’t in tech won’t even know their device was attacked or their credentials stolen.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">f59f313c-6920-4e3e-a8ff-9651976d07e3</guid>
      <title>Cybersecurity books that help us understand technology</title>
      <description><![CDATA[<p>“It doesn’t go wrong, it starts wrong.”</p><p>This captures the privacy and security challenges that existing and new technologies alike are facing. </p><p>When you read about how government agencies are accessing your personal data, don’t get caught up on the actual collection event. You should be just as (or more!) concerned that companies are intentionally developing and promoting software products which allow them or third parties to spy on you.</p><p>This is why software developers play a key role in making sure the product they build doesn’t negatively impact the user.</p><p>Because the relationship between cause and effect is a very convoluted one in technology, reading books about cyber security is a good way to understand why we need it and how its principles help us. The main benefit of these books is that the pros who write them have done the research and broken down this complexity so anyone who wants to can easily understand it.</p><p>Inspired by our recent reads, we have a conversation about ethics in the technology development community and how this impacts our lives.</p><p>You’ll learn how the Wannacry ransomware attack triggered a new era in cybercrime tactics with global reach and very visible impact. You’ll also hear about the role government agencies sometimes play in enabling cybercriminals to create and distribute malicious software. Additionally, you’ll learn about the impact that internet overuse is having on people and how it makes bad actors’ “jobs” much easier. </p><p>In this episode, you will learn:</p><ul><li>What a zero-day vulnerability is (01:34)</li><li>How the WannaCry ransomware attack worked (03:53)</li><li>Why technology developers need to consider the ethical responsibility for what they build (12:56)</li><li>The impact the internet has on our thinking ability (26:34)</li></ul><p>Resources: </p><ul><li>Cindy Gallop - <a href="https://www.theguardian.com/media-network/video/2012/nov/02/advertising-business-cindy-gallop">Advertising Business</a> (article)</li><li><a href="https://twitter.com/WebDevLaw/,%20https://webdevlaw.uk/">Heather Burns</a> - <a href="https://webdevlaw.uk/book/">Understanding Privacy</a> (book)</li><li>Nicholas Carr - <a href="https://www.goodreads.com/book/show/9778945-the-shallows">The Shallows: What the Internet Is Doing to Our Brains</a> (book)</li><li>Edward Snowden - <a href="https://www.goodreads.com/book/show/49833241-permanent-record">Permanent Record</a> (book)</li><li>Nicole Perlroth - <a href="https://www.goodreads.com/book/show/49247043-this-is-how-they-tell-me-the-world-ends">This is how they tell me the world ends</a> (book)</li><li><a href="https://en.wikipedia.org/wiki/WannaCry_ransomware_attack">Wannacry</a></li><li><a href="https://en.wikipedia.org/wiki/Stuxnet">Stuxnet</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 15 Feb 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>“It doesn’t go wrong, it starts wrong.”</p><p>This captures the privacy and security challenges that existing and new technologies alike are facing. </p><p>When you read about how government agencies are accessing your personal data, don’t get caught up on the actual collection event. You should be just as (or more!) concerned that companies are intentionally developing and promoting software products which allow them or third parties to spy on you.</p><p>This is why software developers play a key role in making sure the product they build doesn’t negatively impact the user.</p><p>Because the relationship between cause and effect is a very convoluted one in technology, reading books about cyber security is a good way to understand why we need it and how its principles help us. The main benefit of these books is that the pros who write them have done the research and broken down this complexity so anyone who wants to can easily understand it.</p><p>Inspired by our recent reads, we have a conversation about ethics in the technology development community and how this impacts our lives.</p><p>You’ll learn how the Wannacry ransomware attack triggered a new era in cybercrime tactics with global reach and very visible impact. You’ll also hear about the role government agencies sometimes play in enabling cybercriminals to create and distribute malicious software. Additionally, you’ll learn about the impact that internet overuse is having on people and how it makes bad actors’ “jobs” much easier. </p><p>In this episode, you will learn:</p><ul><li>What a zero-day vulnerability is (01:34)</li><li>How the WannaCry ransomware attack worked (03:53)</li><li>Why technology developers need to consider the ethical responsibility for what they build (12:56)</li><li>The impact the internet has on our thinking ability (26:34)</li></ul><p>Resources: </p><ul><li>Cindy Gallop - <a href="https://www.theguardian.com/media-network/video/2012/nov/02/advertising-business-cindy-gallop">Advertising Business</a> (article)</li><li><a href="https://twitter.com/WebDevLaw/,%20https://webdevlaw.uk/">Heather Burns</a> - <a href="https://webdevlaw.uk/book/">Understanding Privacy</a> (book)</li><li>Nicholas Carr - <a href="https://www.goodreads.com/book/show/9778945-the-shallows">The Shallows: What the Internet Is Doing to Our Brains</a> (book)</li><li>Edward Snowden - <a href="https://www.goodreads.com/book/show/49833241-permanent-record">Permanent Record</a> (book)</li><li>Nicole Perlroth - <a href="https://www.goodreads.com/book/show/49247043-this-is-how-they-tell-me-the-world-ends">This is how they tell me the world ends</a> (book)</li><li><a href="https://en.wikipedia.org/wiki/WannaCry_ransomware_attack">Wannacry</a></li><li><a href="https://en.wikipedia.org/wiki/Stuxnet">Stuxnet</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="36483342" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/316dbe7f-111a-44db-9e83-84d348873f83/audio/3c4335a0-819d-49fa-87ba-1b73f458c819/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Cybersecurity books that help us understand technology</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:duration>00:38:00</itunes:duration>
      <itunes:summary>“Digital vulnerabilities that affect one, affect us all.” These are some of the books that helped us understand the complex connections between technology development, cybersecurity, privacy, geo-politics, and human nature. Here&apos;s how they inspired our explorations and what we learned from them to improve our mindset and skillset. </itunes:summary>
      <itunes:subtitle>“Digital vulnerabilities that affect one, affect us all.” These are some of the books that helped us understand the complex connections between technology development, cybersecurity, privacy, geo-politics, and human nature. Here&apos;s how they inspired our explorations and what we learned from them to improve our mindset and skillset. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">37fa847b-b23a-4d23-a6d6-2a8fe3e68d9f</guid>
      <title>Perfect privacy vs. good enough privacy</title>
      <description><![CDATA[<p>Privacy gets thrown around <i>a lot</i> these days. But talking more about it doesn’t often solve the problem of its lack of emotional resonance with most people. </p><p>Although we instinctively know what privacy is, if you’d ask most people to explain it to others, they might feel puzzled. Because so many elements come together to form our privacy, it often becomes disconnected from what we care about the most. That’s what makes it so difficult for most people to react to aggressive, persistent attacks on their privacy.</p><p>It’s not just lack of awareness that has allowed many tech companies to viciously push the boundaries on the data they collect and how they use it. It’s the lack of emotional connection to this issue and an inability to internalize the consequences of this assault on our privacy. </p><p>Today, we unpack what privacy means for us and what <i>perfect privacy versus good enough privacy </i>looks like. You’ll get to hear how we ended up becoming invested in protecting our privacy and some of the best practices that each of us has adopted.</p><p>You’ll learn about the small steps you can take to increase your privacy while continuing to enjoy technology and the benefits it offers. You’ll also learn two technorealism principles, along with their deeper implications for your life. Additionally, you’ll get a list of privacy-focused alternatives to the most used browser in the world, which shows how rich the list of options you have has become. </p><p>In this episode, you will learn:</p><ul><li>What triggered Dave to look deeper into the issue of privacy (04:16)</li><li>Why you shouldn’t shy away from good enough privacy (10:14)</li><li>How two technorealism principles can help shape your understanding and practice of privacy (14:41)</li><li>An easy step you can take that has a big impact on your privacy (17:25)</li><li>Why Chrome is bad for our privacy and what to replace it with (21:38)</li></ul><p>Resources: </p><ul><li><a href="https://www.eff.org/">Electronic Frontier Foundation</a></li><li><a href="https://en.wikipedia.org/wiki/Shoshana_Zuboff">Soshana Zuboff</a></li><li><a href="https://twitter.com/swodinsky">Shoshana Wodinsky</a></li><li><a href="https://notochrome.org/">NoToChrome</a></li><li><a href="https://twitter.com/jamesmullarkey">James’s Tweet</a></li><li><a href="https://usefathom.com/">Fathom Analytics</a></li><li><a href="https://www.technorealism.org/">TECHNOREALISM</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 8 Feb 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Privacy gets thrown around <i>a lot</i> these days. But talking more about it doesn’t often solve the problem of its lack of emotional resonance with most people. </p><p>Although we instinctively know what privacy is, if you’d ask most people to explain it to others, they might feel puzzled. Because so many elements come together to form our privacy, it often becomes disconnected from what we care about the most. That’s what makes it so difficult for most people to react to aggressive, persistent attacks on their privacy.</p><p>It’s not just lack of awareness that has allowed many tech companies to viciously push the boundaries on the data they collect and how they use it. It’s the lack of emotional connection to this issue and an inability to internalize the consequences of this assault on our privacy. </p><p>Today, we unpack what privacy means for us and what <i>perfect privacy versus good enough privacy </i>looks like. You’ll get to hear how we ended up becoming invested in protecting our privacy and some of the best practices that each of us has adopted.</p><p>You’ll learn about the small steps you can take to increase your privacy while continuing to enjoy technology and the benefits it offers. You’ll also learn two technorealism principles, along with their deeper implications for your life. Additionally, you’ll get a list of privacy-focused alternatives to the most used browser in the world, which shows how rich the list of options you have has become. </p><p>In this episode, you will learn:</p><ul><li>What triggered Dave to look deeper into the issue of privacy (04:16)</li><li>Why you shouldn’t shy away from good enough privacy (10:14)</li><li>How two technorealism principles can help shape your understanding and practice of privacy (14:41)</li><li>An easy step you can take that has a big impact on your privacy (17:25)</li><li>Why Chrome is bad for our privacy and what to replace it with (21:38)</li></ul><p>Resources: </p><ul><li><a href="https://www.eff.org/">Electronic Frontier Foundation</a></li><li><a href="https://en.wikipedia.org/wiki/Shoshana_Zuboff">Soshana Zuboff</a></li><li><a href="https://twitter.com/swodinsky">Shoshana Wodinsky</a></li><li><a href="https://notochrome.org/">NoToChrome</a></li><li><a href="https://twitter.com/jamesmullarkey">James’s Tweet</a></li><li><a href="https://usefathom.com/">Fathom Analytics</a></li><li><a href="https://www.technorealism.org/">TECHNOREALISM</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Connect with Andra:</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="30303397" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/ff374df3-d32c-49d1-9191-7492cdbad846/audio/e42e2fbc-4a45-4f83-90ce-7f384ddb31cc/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Perfect privacy vs. good enough privacy</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/b68e3f76-b3cf-44da-8c4f-d71d37688598/3000x3000/cyber-empathy-andra-zaharia-web-smyth.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:34</itunes:duration>
      <itunes:summary>It’s not just lack of awareness that has allowed many tech companies to viciously push the boundaries on the data they collect and how they use it. It’s the lack of emotional connection to this issue and an inability to internalize the consequences of this assault on our privacy. </itunes:summary>
      <itunes:subtitle>It’s not just lack of awareness that has allowed many tech companies to viciously push the boundaries on the data they collect and how they use it. It’s the lack of emotional connection to this issue and an inability to internalize the consequences of this assault on our privacy. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">9e6bde55-3849-434c-9b01-d44edecf9e11</guid>
      <title>How empathy helps decision-makers connect the dots</title>
      <description><![CDATA[<p>It’s almost impossible to build a culture where security is central to big decisions without someone leading the way – someone who cares so deeply that they’re able to gain the board’s trust and support. </p><p>How? Building a shared vocabulary, a shared understanding of complex challenges, and by creating a safe space to discuss them. These are all fundamental factors to making cybersecurity a priority for C-level executives. </p><p>Today I’m joined by Claire Pales, the director of the security consultancy company <a href="https://www.thesecuritycollective.com/">The Security Collective</a> and one of the people who knows this problem space best and is spearheading change with a unique approach. </p><p>Claire also does the long-running <a href="https://www.thesecuritycollective.com/podcast">The Security Collective podcast</a>, which is currently in its 9th season. She’s also authored two books – “<a href="https://www.goodreads.com/book/show/45456175-the-secure-cio">The Secure CIO</a>” and “<a href="https://www.goodreads.com/book/show/57679062-the-secure-board">The Secure Board</a>” – which guide leaders through the complex world of cybersecurity and its myriad of implications. </p><p>In this episode, you’ll learn about the main points that company boards consider while developing their plans to invest in cybersecurity. You’ll also hear about the most effective approach while communicating the need for increased effort and focus in this direction. Lastly, you’ll understand why fear has repeatedly failed as a tool for pushing the field of cybersecurity ahead and delivering better outcomes. </p><p>Claire is our thoughtful, incredibly experienced guide into the complex world of high-impact decision-making and we can all learn from her nuances and compassionate methods. </p><p>In this episode, you will learn:</p><ul><li>How Claire practices empathy in her work as as an Interim Chief Information Security Officer (05:23)</li><li>How she aligns her message with leaders’ priorities to keep cybersecurity at the heart of their decisions (10:35)</li><li>How she channels her listeners' needs to make her podcast helpful and compelling (17:31)</li><li>What keeps her motivated as she continuously pushes ahead in the face of repetitive challenges (20:21)</li><li>What principle has been used for a long time in cybersecurity without positive long-term results (24:56)</li></ul><p>Resources: </p><ul><li><a href="https://www.thesecuritycollective.com/podcast">Security Collective Podcast</a></li><li><a href="https://www.thesecuritycollective.com/blog/2020/06/06/2020-6-6-secure-by-choice-not-by-chance">Secure by Choice not by Chance</a></li></ul><p>Connect with Claire:</p><ul><li><a href="https://www.thesecuritycollective.com/">Website</a></li><li><a href="https://www.linkedin.com/in/claire-pales/">LinkedIn</a></li><li><a href="https://twitter.com/clpales">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 1 Feb 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>It’s almost impossible to build a culture where security is central to big decisions without someone leading the way – someone who cares so deeply that they’re able to gain the board’s trust and support. </p><p>How? Building a shared vocabulary, a shared understanding of complex challenges, and by creating a safe space to discuss them. These are all fundamental factors to making cybersecurity a priority for C-level executives. </p><p>Today I’m joined by Claire Pales, the director of the security consultancy company <a href="https://www.thesecuritycollective.com/">The Security Collective</a> and one of the people who knows this problem space best and is spearheading change with a unique approach. </p><p>Claire also does the long-running <a href="https://www.thesecuritycollective.com/podcast">The Security Collective podcast</a>, which is currently in its 9th season. She’s also authored two books – “<a href="https://www.goodreads.com/book/show/45456175-the-secure-cio">The Secure CIO</a>” and “<a href="https://www.goodreads.com/book/show/57679062-the-secure-board">The Secure Board</a>” – which guide leaders through the complex world of cybersecurity and its myriad of implications. </p><p>In this episode, you’ll learn about the main points that company boards consider while developing their plans to invest in cybersecurity. You’ll also hear about the most effective approach while communicating the need for increased effort and focus in this direction. Lastly, you’ll understand why fear has repeatedly failed as a tool for pushing the field of cybersecurity ahead and delivering better outcomes. </p><p>Claire is our thoughtful, incredibly experienced guide into the complex world of high-impact decision-making and we can all learn from her nuances and compassionate methods. </p><p>In this episode, you will learn:</p><ul><li>How Claire practices empathy in her work as as an Interim Chief Information Security Officer (05:23)</li><li>How she aligns her message with leaders’ priorities to keep cybersecurity at the heart of their decisions (10:35)</li><li>How she channels her listeners' needs to make her podcast helpful and compelling (17:31)</li><li>What keeps her motivated as she continuously pushes ahead in the face of repetitive challenges (20:21)</li><li>What principle has been used for a long time in cybersecurity without positive long-term results (24:56)</li></ul><p>Resources: </p><ul><li><a href="https://www.thesecuritycollective.com/podcast">Security Collective Podcast</a></li><li><a href="https://www.thesecuritycollective.com/blog/2020/06/06/2020-6-6-secure-by-choice-not-by-chance">Secure by Choice not by Chance</a></li></ul><p>Connect with Claire:</p><ul><li><a href="https://www.thesecuritycollective.com/">Website</a></li><li><a href="https://www.linkedin.com/in/claire-pales/">LinkedIn</a></li><li><a href="https://twitter.com/clpales">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="28144650" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/46731e00-84d9-4c94-83d7-65afc0ad4e10/audio/38e761cd-284c-4974-b1af-cf4c45e7d86b/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>How empathy helps decision-makers connect the dots</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/4442dcb8-c535-49f8-b93a-b6d424dc3589/3000x3000/claire-pales-podcast-episode.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:19</itunes:duration>
      <itunes:summary>It’s almost impossible to build a culture where security is central to big decisions without someone leading the way – someone who cares so deeply that they’re able to gain the board’s trust and support. 

How? Building a shared vocabulary, a shared understanding of complex challenges, and by creating a safe space to discuss them. These are all fundamental factors to making cybersecurity a priority for C-level executives. </itunes:summary>
      <itunes:subtitle>It’s almost impossible to build a culture where security is central to big decisions without someone leading the way – someone who cares so deeply that they’re able to gain the board’s trust and support. 

How? Building a shared vocabulary, a shared understanding of complex challenges, and by creating a safe space to discuss them. These are all fundamental factors to making cybersecurity a priority for C-level executives. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">5db3a4f7-6e6d-450b-b9bd-53bd04673b62</guid>
      <title>Making a positive contribution to cybersecurity</title>
      <description><![CDATA[<p>Creating real change in people’s behavior is one of the biggest challenges in cybersecurity. That’s why I often tell people with no connection to this space that technology is <i>secondary</i> to human psychology when it comes to protecting the tech ecosystem our lives depend on (which is not an exaggeration). </p><p>So the strategy companies choose to get their teams to care about information security practices is critical. Approach them with a checkbox-ticking attitude and you’ll just waste everyone’s time, deepening the rift between their universe and these foreign notions with zero emotional impact. </p><p>But focus on building meaningful relationships and you get the opportunity to expand your ‘bubble of trust’ to bring out the best in others. This makes it easier for anyone to find a personal connection to cybersecurity principles and tactics, increasing their willingness to try them out on their own.</p><p>Once you’ve achieved that moment of lift, you need consistency to prove that alignment between what you say and what you do – as an individual, as a team, or as a company. This allows us, the security advocates, to be effective in the long term, even as new challenges continue to crop up.</p><p>There’s no better real-life example for this process than John Opdenakker, champion of web app security and security awareness – both at work and in his contribution to the information security community. We both share a keen interest in human psychology and the role empathy plays in advancing cybersecurity as a key element for stability, continuity, and progress in the tech world and beyond. </p><p>In this episode, you’ll hear about how John practices empathy through his work and how it translates into real value for his colleagues. You’ll also learn about how creating relationships makes it easier to have meaningful conversations about cybersecurity. We’ve even included a real-life example of how an institution effectively handled a data breach in an empathetic way (yes, it can be done!).</p><p>In this episode, you will learn:</p><ul><li>How John practices empathy to advance his security awareness work (05:15)</li><li>The essential role good relationships play in creating a sustainable security culture (10:33) </li><li>How John gets fellow security specialists to replicate his approach (12:52)</li><li>Where he feels empathy is lacking the most in cybersecurity (19:34)</li><li>The best communication strategy to create a positive impact in cybersecurity (27:08)</li></ul><p>Resources: </p><ul><li><a href="https://twitter.com/jwgoerlich/status/1459201641132040203">Good security reflects our values</a></li><li><a href="https://andrazaharia.com/calibrate-how-you-perceive-manage-risks-john-opdenakker/">Calibrate how you perceive and manage actual risks</a></li><li><a href="https://www.maastrichtuniversity.nl/um-cyber-attack-symposium-%E2%80%93-lessons-learnt">UM Cyber Attack Symposium</a></li></ul><p>Connect with John:</p><ul><li><a href="https://johnopdenakker.com/">Website</a></li><li><a href="https://twitter.com/j_opdenakker">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 18 Jan 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Creating real change in people’s behavior is one of the biggest challenges in cybersecurity. That’s why I often tell people with no connection to this space that technology is <i>secondary</i> to human psychology when it comes to protecting the tech ecosystem our lives depend on (which is not an exaggeration). </p><p>So the strategy companies choose to get their teams to care about information security practices is critical. Approach them with a checkbox-ticking attitude and you’ll just waste everyone’s time, deepening the rift between their universe and these foreign notions with zero emotional impact. </p><p>But focus on building meaningful relationships and you get the opportunity to expand your ‘bubble of trust’ to bring out the best in others. This makes it easier for anyone to find a personal connection to cybersecurity principles and tactics, increasing their willingness to try them out on their own.</p><p>Once you’ve achieved that moment of lift, you need consistency to prove that alignment between what you say and what you do – as an individual, as a team, or as a company. This allows us, the security advocates, to be effective in the long term, even as new challenges continue to crop up.</p><p>There’s no better real-life example for this process than John Opdenakker, champion of web app security and security awareness – both at work and in his contribution to the information security community. We both share a keen interest in human psychology and the role empathy plays in advancing cybersecurity as a key element for stability, continuity, and progress in the tech world and beyond. </p><p>In this episode, you’ll hear about how John practices empathy through his work and how it translates into real value for his colleagues. You’ll also learn about how creating relationships makes it easier to have meaningful conversations about cybersecurity. We’ve even included a real-life example of how an institution effectively handled a data breach in an empathetic way (yes, it can be done!).</p><p>In this episode, you will learn:</p><ul><li>How John practices empathy to advance his security awareness work (05:15)</li><li>The essential role good relationships play in creating a sustainable security culture (10:33) </li><li>How John gets fellow security specialists to replicate his approach (12:52)</li><li>Where he feels empathy is lacking the most in cybersecurity (19:34)</li><li>The best communication strategy to create a positive impact in cybersecurity (27:08)</li></ul><p>Resources: </p><ul><li><a href="https://twitter.com/jwgoerlich/status/1459201641132040203">Good security reflects our values</a></li><li><a href="https://andrazaharia.com/calibrate-how-you-perceive-manage-risks-john-opdenakker/">Calibrate how you perceive and manage actual risks</a></li><li><a href="https://www.maastrichtuniversity.nl/um-cyber-attack-symposium-%E2%80%93-lessons-learnt">UM Cyber Attack Symposium</a></li></ul><p>Connect with John:</p><ul><li><a href="https://johnopdenakker.com/">Website</a></li><li><a href="https://twitter.com/j_opdenakker">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="33862750" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/6fed5509-e8fc-4ccc-a010-e32fdb0ae856/audio/1a7bc839-6916-4429-9647-d6daea5f6c7d/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Making a positive contribution to cybersecurity</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/61677f29-6dc5-4045-91e2-a79dcacb6511/3000x3000/john-opdenakker-episode.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:16</itunes:duration>
      <itunes:summary>Creating real change in people’s behavior is one of the biggest challenges in cybersecurity. That’s why I often tell people with no connection to this space that technology is secondary to human psychology when it comes to protecting the tech ecosystem our lives depend on (which is not an exaggeration). </itunes:summary>
      <itunes:subtitle>Creating real change in people’s behavior is one of the biggest challenges in cybersecurity. That’s why I often tell people with no connection to this space that technology is secondary to human psychology when it comes to protecting the tech ecosystem our lives depend on (which is not an exaggeration). </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">8aa66c80-7124-4952-841d-05028baf8dcf</guid>
      <title>Replacing fear with empathy in cybersecurity communication</title>
      <description><![CDATA[<p>In the cybersecurity field, communication strategies will only take you as far as your understanding of human nature extends. </p><p>Our guest today is Melanie Ensign, founder and CEO of Discernible, which helps organizations overcome communication challenges in cybersecurity and privacy. She is also the press lead for DEF CON, the biggest hacker conference in the world. </p><p>With a keen focus on what really makes communication an effective process that supports cybersecurity and privacy initiatives in organizations, Melanie is one of the best people to pinpoint what needs to change to make meaningful progress. </p><p>For example, FUD (fear, uncertainty, and doubt) has been widely used to make people pay more attention to cybersecurity. While it’s effective in the short run, it rarely keeps the audience motivated enough to continuously embrace habits that increase their safety.</p><p>On the other hand, when you choose to diligently use empathy in communicating solutions to cyberthreats and privacy issues, it keeps the audience focused on the real problems. It helps people easily relate to solutions and recommendations because they understand the “why” behind them.</p><p>In this episode, you’ll learn about how Melanie helps clients remain empathetic when dealing with complex cybersecurity challenges. She’ll also share with us an example of how empathy works in real life to protect their users.  Lastly, you’ll learn about where companies fail when promoting cybersecurity and how they can change that.</p><p>In this episode, you will learn:</p><ul><li>What cybersecurity and shark conservation have in common (05:03)</li><li>How Melanie helps her clients remain empathetic when dealing with complex challenges (09:09)</li><li>Her personal experience with companies <i>not</i> practicing empathy (18:17)</li><li>Recommendations on how to use empathy and improve the state of cybersecurity (20:47)</li></ul><p>Resources: </p><ul><li><a href="https://www.youtube.com/watch?v=irFIPgI4Qx0">The Weakest Link in Security is Fear</a></li><li><a href="https://en.wikipedia.org/wiki/Amygdala">Amygdala</a></li><li><a href="https://defcon.org/">Defcon</a></li><li><a href="https://www.usenix.org/conference/enigma2021">Enigma 2021</a></li><li><a href="https://www.goodreads.com/book/show/53479927-the-practice?ac=1&from_search=true&qid=nXAqu7Uq5Y&rank=2">The Practice:  Shipping Creative Work</a></li></ul><p>Connect with Melanie:</p><ul><li><a href="https://discernibleinc.com">Website</a></li><li><a href="https://www.linkedin.com/in/melanieensign/">LinkedIn</a></li><li><a href="https://twitter.com/iMeluny">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 11 Jan 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>In the cybersecurity field, communication strategies will only take you as far as your understanding of human nature extends. </p><p>Our guest today is Melanie Ensign, founder and CEO of Discernible, which helps organizations overcome communication challenges in cybersecurity and privacy. She is also the press lead for DEF CON, the biggest hacker conference in the world. </p><p>With a keen focus on what really makes communication an effective process that supports cybersecurity and privacy initiatives in organizations, Melanie is one of the best people to pinpoint what needs to change to make meaningful progress. </p><p>For example, FUD (fear, uncertainty, and doubt) has been widely used to make people pay more attention to cybersecurity. While it’s effective in the short run, it rarely keeps the audience motivated enough to continuously embrace habits that increase their safety.</p><p>On the other hand, when you choose to diligently use empathy in communicating solutions to cyberthreats and privacy issues, it keeps the audience focused on the real problems. It helps people easily relate to solutions and recommendations because they understand the “why” behind them.</p><p>In this episode, you’ll learn about how Melanie helps clients remain empathetic when dealing with complex cybersecurity challenges. She’ll also share with us an example of how empathy works in real life to protect their users.  Lastly, you’ll learn about where companies fail when promoting cybersecurity and how they can change that.</p><p>In this episode, you will learn:</p><ul><li>What cybersecurity and shark conservation have in common (05:03)</li><li>How Melanie helps her clients remain empathetic when dealing with complex challenges (09:09)</li><li>Her personal experience with companies <i>not</i> practicing empathy (18:17)</li><li>Recommendations on how to use empathy and improve the state of cybersecurity (20:47)</li></ul><p>Resources: </p><ul><li><a href="https://www.youtube.com/watch?v=irFIPgI4Qx0">The Weakest Link in Security is Fear</a></li><li><a href="https://en.wikipedia.org/wiki/Amygdala">Amygdala</a></li><li><a href="https://defcon.org/">Defcon</a></li><li><a href="https://www.usenix.org/conference/enigma2021">Enigma 2021</a></li><li><a href="https://www.goodreads.com/book/show/53479927-the-practice?ac=1&from_search=true&qid=nXAqu7Uq5Y&rank=2">The Practice:  Shipping Creative Work</a></li></ul><p>Connect with Melanie:</p><ul><li><a href="https://discernibleinc.com">Website</a></li><li><a href="https://www.linkedin.com/in/melanieensign/">LinkedIn</a></li><li><a href="https://twitter.com/iMeluny">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="27139040" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/6dfd8cba-5ada-4167-91d0-cba891aa469b/audio/12858d9d-a8ea-4668-b0d2-091ee722f715/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Replacing fear with empathy in cybersecurity communication</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/51002a8c-5376-4b1d-9751-bad4ede9dcc3/3000x3000/melanie-ensign.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:16</itunes:duration>
      <itunes:summary>In the cybersecurity field, communication strategies will only take you as far as your understanding of human nature extends. </itunes:summary>
      <itunes:subtitle>In the cybersecurity field, communication strategies will only take you as far as your understanding of human nature extends. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">fbecfa8f-cdea-417a-a602-03218b48b650</guid>
      <title>How a technology journalist creates empathy</title>
      <description><![CDATA[<p>Technology has permeated almost all aspects of our lives and, with the current advancements, it’ll seep into even more layers of society. Sometimes, tech holds a mirror to us, as humans. Just like us, it can’t thrive in isolation. Similar to us, tech expands and evolves through the sustained work of communities of users and developers.</p><p>The only way to truly understand how this interdependence is impacting our society is to talk to people about their personal experiences with technology. Few other people do this as consistently and in depth as great journalists do. </p><p>So I invited the kindest one I know to talk about Cyber Empathy.  Andrada Fiscutean, science and technology writer drawn to stories about “people with very few resources, building things out of thin air” is today’s guest. </p><p>She has over 13 years of experience and has written for Nature, Wired, Vice, Motherboard, CSO Online, BBC Radio and so many other publications. Her writing offers unique perspectives of how people shape technology while also making outliers’ stories relatable and offering new ways to be in the world. </p><p>In this episode, you’ll find out how Andrada practices empathy as a journalist covering stories at the intersection of society and technology. You’ll also hear about why it is important to get perspectives from all sides while dealing with tech-related topics and the difference it makes. And we also discuss the role of empathy in promoting mental health within cybersecurity, with a couple of takeaways you can apply no matter your field.</p><p>In this episode, you will learn:</p><ul><li>How practicing empathy as a technology journalist looks like (06:23)</li><li>How Andradada gets people to open up and share their stories (07:36)</li><li>The importance of gender equity when approaching technology-related issues (13:20)</li><li>How cybersecurity communities tackle mental health issues (16:49)</li></ul><p>Resources: </p><ul><li><a href="https://www.csoonline.com/article/3627331/5-best-practices-for-designing-application-logs.html">Best Practices for Designing Application Logs</a></li><li><a href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a></li><li><a href="https://www.csoonline.com/article/3575093/stretched-and-stressed-best-practices-for-protecting-security-workers-mental-health.html">Stretched and stressed</a></li><li>(Profile) <a href="https://ksj.mit.edu/news/2019/12/05/meet-andrada-fiscutean/">Meet This Year’s Fellows: Andrada Fiscutean</a></li><li>(Book) <a href="https://www.goodreads.com/book/show/52879286-humankind?ac=1&from_search=true&qid=tYT7ry9Coo&rank=2">Humankind: A Hopeful History by Rutger Bregman</a></li><li>(Podcast)<a href="https://podcasts.apple.com/us/podcast/hack-chat-chris-gates-positivity-and-becoming-a/id1552266614?i=1000522540166"> Hack Chat</a></li></ul><p>Connect with Andrada:</p><ul><li><a href="https://andradafiscutean.contently.com">Website</a></li><li><a href="https://www.linkedin.com/in/andradafiscutean/">LinkedIn</a></li><li><a href="https://twitter.com/AFiscutean">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 4 Jan 2022 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Technology has permeated almost all aspects of our lives and, with the current advancements, it’ll seep into even more layers of society. Sometimes, tech holds a mirror to us, as humans. Just like us, it can’t thrive in isolation. Similar to us, tech expands and evolves through the sustained work of communities of users and developers.</p><p>The only way to truly understand how this interdependence is impacting our society is to talk to people about their personal experiences with technology. Few other people do this as consistently and in depth as great journalists do. </p><p>So I invited the kindest one I know to talk about Cyber Empathy.  Andrada Fiscutean, science and technology writer drawn to stories about “people with very few resources, building things out of thin air” is today’s guest. </p><p>She has over 13 years of experience and has written for Nature, Wired, Vice, Motherboard, CSO Online, BBC Radio and so many other publications. Her writing offers unique perspectives of how people shape technology while also making outliers’ stories relatable and offering new ways to be in the world. </p><p>In this episode, you’ll find out how Andrada practices empathy as a journalist covering stories at the intersection of society and technology. You’ll also hear about why it is important to get perspectives from all sides while dealing with tech-related topics and the difference it makes. And we also discuss the role of empathy in promoting mental health within cybersecurity, with a couple of takeaways you can apply no matter your field.</p><p>In this episode, you will learn:</p><ul><li>How practicing empathy as a technology journalist looks like (06:23)</li><li>How Andradada gets people to open up and share their stories (07:36)</li><li>The importance of gender equity when approaching technology-related issues (13:20)</li><li>How cybersecurity communities tackle mental health issues (16:49)</li></ul><p>Resources: </p><ul><li><a href="https://www.csoonline.com/article/3627331/5-best-practices-for-designing-application-logs.html">Best Practices for Designing Application Logs</a></li><li><a href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a></li><li><a href="https://www.csoonline.com/article/3575093/stretched-and-stressed-best-practices-for-protecting-security-workers-mental-health.html">Stretched and stressed</a></li><li>(Profile) <a href="https://ksj.mit.edu/news/2019/12/05/meet-andrada-fiscutean/">Meet This Year’s Fellows: Andrada Fiscutean</a></li><li>(Book) <a href="https://www.goodreads.com/book/show/52879286-humankind?ac=1&from_search=true&qid=tYT7ry9Coo&rank=2">Humankind: A Hopeful History by Rutger Bregman</a></li><li>(Podcast)<a href="https://podcasts.apple.com/us/podcast/hack-chat-chris-gates-positivity-and-becoming-a/id1552266614?i=1000522540166"> Hack Chat</a></li></ul><p>Connect with Andrada:</p><ul><li><a href="https://andradafiscutean.contently.com">Website</a></li><li><a href="https://www.linkedin.com/in/andradafiscutean/">LinkedIn</a></li><li><a href="https://twitter.com/AFiscutean">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="24301097" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/070d72f8-3f3a-420f-8fc6-19791de11396/audio/ab436665-1235-405d-8b25-bff40c8cc156/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>How a technology journalist creates empathy</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/e27d63d8-2f98-4f6d-a848-f45840fddc4a/3000x3000/andrada-fiscutean.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:19</itunes:duration>
      <itunes:summary>Technology has permeated almost all aspects of our lives and, with the current advancements, it’ll seep into even more layers of society. Sometimes, tech holds a mirror to us, as humans. Just like us, it can’t thrive in isolation. Similar to us, tech expands and evolves through the sustained work of communities of users and developers.

The only way to truly understand how this interdependence is impacting our society is to talk to people about their personal experiences with technology. Few other people do this as consistently and in depth as great journalists do. 
</itunes:summary>
      <itunes:subtitle>Technology has permeated almost all aspects of our lives and, with the current advancements, it’ll seep into even more layers of society. Sometimes, tech holds a mirror to us, as humans. Just like us, it can’t thrive in isolation. Similar to us, tech expands and evolves through the sustained work of communities of users and developers.

The only way to truly understand how this interdependence is impacting our society is to talk to people about their personal experiences with technology. Few other people do this as consistently and in depth as great journalists do. 
</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">69cc1bdd-34a6-4154-accd-8136f2116fae</guid>
      <title>Building and Selling Cybersecurity Solutions - with Empathy</title>
      <description><![CDATA[<p>How do you develop and sell a cybersecurity solution without sensationalizing it to create fear and panic buying?</p><p>Well, you need to build trust with potential customers by being empathetic of their position and the threats they are facing in their context. When you approach it from a kind and ethical place, cybersecurity is a positivity-filled and community-centered industry that functions best when people look out for each other.</p><p>My guest today is Saaim Khan, founder of Jumpstart Security, a cybersecurity company based in Australia. He’s spent almost two decades in the industry and is now using his experience to help small businesses build security into their workflow. He’ll share with us how he integrates empathy when guiding small business owners on their path to security maturity. </p><p>In this episode, you learn about how entrepreneurs within the cybersecurity space can practice empathy while dealing with their customers. Additionally, you hear about the differences between how small businesses and mid-sized companies approach cybersecurity solutions purchases. Lastly, you’ll learn about the role that empathy can play to move the industry forward.</p><p>In this episode, you will learn:</p><ul><li>How Saaim integrates empathy into his cybersecurity business (03:45)</li><li>The difference between selling cybersecurity solutions to small businesses and selling to bigger companies (05:50)</li><li>How Saaim approaches the topic of cybersecurity while dealing with potential clients (05:05)</li><li>How empathy can be applied to drive the cybersecurity industry forward (13:57)</li></ul><p>Connect with Saaim:</p><ul><li><a href="https://www.jumpstart.security">Website</a></li><li><a href="https://www.linkedin.com/in/saaimkhan/">LinkedIn</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 7 Dec 2021 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>How do you develop and sell a cybersecurity solution without sensationalizing it to create fear and panic buying?</p><p>Well, you need to build trust with potential customers by being empathetic of their position and the threats they are facing in their context. When you approach it from a kind and ethical place, cybersecurity is a positivity-filled and community-centered industry that functions best when people look out for each other.</p><p>My guest today is Saaim Khan, founder of Jumpstart Security, a cybersecurity company based in Australia. He’s spent almost two decades in the industry and is now using his experience to help small businesses build security into their workflow. He’ll share with us how he integrates empathy when guiding small business owners on their path to security maturity. </p><p>In this episode, you learn about how entrepreneurs within the cybersecurity space can practice empathy while dealing with their customers. Additionally, you hear about the differences between how small businesses and mid-sized companies approach cybersecurity solutions purchases. Lastly, you’ll learn about the role that empathy can play to move the industry forward.</p><p>In this episode, you will learn:</p><ul><li>How Saaim integrates empathy into his cybersecurity business (03:45)</li><li>The difference between selling cybersecurity solutions to small businesses and selling to bigger companies (05:50)</li><li>How Saaim approaches the topic of cybersecurity while dealing with potential clients (05:05)</li><li>How empathy can be applied to drive the cybersecurity industry forward (13:57)</li></ul><p>Connect with Saaim:</p><ul><li><a href="https://www.jumpstart.security">Website</a></li><li><a href="https://www.linkedin.com/in/saaimkhan/">LinkedIn</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="21772862" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/75461e7c-832d-4911-aeab-a5f90c451438/audio/d9784063-3886-4a24-86b0-00afc61283a9/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Building and Selling Cybersecurity Solutions - with Empathy</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/970a5ef7-0f0d-4202-b35b-13fd99344b7d/3000x3000/saaim-khan.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:41</itunes:duration>
      <itunes:summary>How do you develop and sell a cybersecurity solution without sensationalizing it to create fear and panic buying?

Well, you need to build trust with potential customers by being empathetic of their position and the threats they are facing in their context. When you approach it from a kind and ethical place, cybersecurity is a positivity-filled and community-centered industry that functions best when people look out for each other.</itunes:summary>
      <itunes:subtitle>How do you develop and sell a cybersecurity solution without sensationalizing it to create fear and panic buying?

Well, you need to build trust with potential customers by being empathetic of their position and the threats they are facing in their context. When you approach it from a kind and ethical place, cybersecurity is a positivity-filled and community-centered industry that functions best when people look out for each other.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">d15c3179-53a4-45e3-b462-ccfc72248823</guid>
      <title>Empathy in Digital Assets Security</title>
      <description><![CDATA[<p>Digital assets such as cryptocurrencies are revolutionizing how we transact and store wealth. However, they have introduced new cyber threats that go beyond just protecting your password. </p><p>Every month, millions of dollars' worth of digital assets are lost to malicious hackers. Apart from the advancement of hacking tools and skills, the other big contributor to these losses is poor cybersecurity practices. Many digital wallets companies do not take time to explain to their customers the risks involved and how they can minimize their exposure. </p><p>Today, I’m joined by Dario Duran, a cybersecurity expert currently focused on digital assets and non-fungible tokens (NFTs). He’s been in the industry for decades and will share his wealth of experience with us. Dario will help us see if there’s a place for empathy in cybersecurity applied to digital assets and what that looks like.</p><p>In this episode, you can discover how using a win-win approach while dealing with clients promotes empathy (something you can apply to your own work as well). You’ll also learn the concept of cryptocurrencies and the logic behind their development. And we’ll top it all off with suggestions for cost-effective methods to improve a company’s cybersecurity.</p><p>In this episode, you will learn:</p><ul><li>How practicing and encouraging empathy looks like from Dario’s perspective (04:06)</li><li>What digital assets are and why you need them secured (10:17)</li><li>How digital agents can promote empathy after their development (13:53)</li><li>The most cost-effective way to improve a company’s cybersecurity posture (19:01)</li></ul><p>Connect with Dario Duran:</p><ul><li><a href="http://www.utxo.ch/">Website</a></li><li><a href="https://www.linkedin.com/in/dario-duran/">LinkedIn</a></li><li><a href="https://twitter.com/DarioUTXO">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 30 Nov 2021 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Digital assets such as cryptocurrencies are revolutionizing how we transact and store wealth. However, they have introduced new cyber threats that go beyond just protecting your password. </p><p>Every month, millions of dollars' worth of digital assets are lost to malicious hackers. Apart from the advancement of hacking tools and skills, the other big contributor to these losses is poor cybersecurity practices. Many digital wallets companies do not take time to explain to their customers the risks involved and how they can minimize their exposure. </p><p>Today, I’m joined by Dario Duran, a cybersecurity expert currently focused on digital assets and non-fungible tokens (NFTs). He’s been in the industry for decades and will share his wealth of experience with us. Dario will help us see if there’s a place for empathy in cybersecurity applied to digital assets and what that looks like.</p><p>In this episode, you can discover how using a win-win approach while dealing with clients promotes empathy (something you can apply to your own work as well). You’ll also learn the concept of cryptocurrencies and the logic behind their development. And we’ll top it all off with suggestions for cost-effective methods to improve a company’s cybersecurity.</p><p>In this episode, you will learn:</p><ul><li>How practicing and encouraging empathy looks like from Dario’s perspective (04:06)</li><li>What digital assets are and why you need them secured (10:17)</li><li>How digital agents can promote empathy after their development (13:53)</li><li>The most cost-effective way to improve a company’s cybersecurity posture (19:01)</li></ul><p>Connect with Dario Duran:</p><ul><li><a href="http://www.utxo.ch/">Website</a></li><li><a href="https://www.linkedin.com/in/dario-duran/">LinkedIn</a></li><li><a href="https://twitter.com/DarioUTXO">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="25451321" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/49c4fd3f-1447-4c76-ad17-683700c9d63d/audio/8382e7dd-6e59-4893-8e65-db1e22da0c43/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Empathy in Digital Assets Security</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/a5051065-0c41-4044-93f9-4616c1d1fa7a/3000x3000/dario-duran.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:31</itunes:duration>
      <itunes:summary>Digital assets such as cryptocurrencies are revolutionizing how we transact and store wealth. However, they have introduced new cyber threats that go beyond just protecting your password. 
Every month millions of dollars worth of digital assets are lost to are being lost to hackers. Apart from the advancement of hacking tools and skills, the other big contributor to these losses is bad cybersecurity practices. Many digital wallets companies do not take time to explain to the users the risks involved and how they can minimize their exposure. </itunes:summary>
      <itunes:subtitle>Digital assets such as cryptocurrencies are revolutionizing how we transact and store wealth. However, they have introduced new cyber threats that go beyond just protecting your password. 
Every month millions of dollars worth of digital assets are lost to are being lost to hackers. Apart from the advancement of hacking tools and skills, the other big contributor to these losses is bad cybersecurity practices. Many digital wallets companies do not take time to explain to the users the risks involved and how they can minimize their exposure. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">3fa9e630-2c8b-41a3-b834-2b072b0bde64</guid>
      <title>Empathy in Ethical Hacking</title>
      <description><![CDATA[<p>How do you remain empathetic when your job is to act like an attacker and point out issues with security systems?</p><p>With all its military language, cybersecurity can feel very aggressive but this offensive security specialist shows us that it doesn’t have to be.</p><p>Today I’m joined by Alexei Doudkine, penetration tester and co-founder of Volkis. I deeply resonate with how he puts his 10+ years of experience on the offensive side of cybersecurity to good use and challenges the status quo. He shares with us his views on empathy and how it embeds into his work as an ethical hacker.</p><p>For example, the belief that you are too good and technologically advanced that you can’t be hacked is actually a weakness in cybersecurity - and this is because it is still a very young field with new threats popping up every day and old threats evolving very fast.</p><p>This is why many companies seek the services of ethical hackers to test the robustness of their current security setup. They also get guidance on how to improve or change their security to reduce the chances of being compromised by malicious attackers.</p><p>In this episode, you’ll find out what penetration testing involves and the role it plays in a company’s cybersecurity resilience. You’ll also hear about how empathy supports the efforts and approaches adopted by ethical hackers. Lastly, you’ll discover the considerations that help the most when designing security architectures. </p><p>In this episode, you will learn:</p><ul><li>How ethical hackers practice empathy (03:21)</li><li>What to consider when building security architectures (07:43)</li><li>How putting people in the attacker's shoes for a minute changes their perception of cybersecurity (10:26)</li><li>The role of transparency in building trust within a company (17:04)</li></ul><p>Resources: </p><ul><li><a href="https://www.volkis.com.au/blog/independence-policy/">The Volkis Independence Policy</a></li></ul><p>Connect with Alexei:</p><ul><li><a href="https://www.volkis.com.au">Website</a></li><li><a href="https://www.linkedin.com/in/alexei-doudkine/">LinkedIn</a></li><li><a href="https://twitter.com/VolkisAU">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 23 Nov 2021 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>How do you remain empathetic when your job is to act like an attacker and point out issues with security systems?</p><p>With all its military language, cybersecurity can feel very aggressive but this offensive security specialist shows us that it doesn’t have to be.</p><p>Today I’m joined by Alexei Doudkine, penetration tester and co-founder of Volkis. I deeply resonate with how he puts his 10+ years of experience on the offensive side of cybersecurity to good use and challenges the status quo. He shares with us his views on empathy and how it embeds into his work as an ethical hacker.</p><p>For example, the belief that you are too good and technologically advanced that you can’t be hacked is actually a weakness in cybersecurity - and this is because it is still a very young field with new threats popping up every day and old threats evolving very fast.</p><p>This is why many companies seek the services of ethical hackers to test the robustness of their current security setup. They also get guidance on how to improve or change their security to reduce the chances of being compromised by malicious attackers.</p><p>In this episode, you’ll find out what penetration testing involves and the role it plays in a company’s cybersecurity resilience. You’ll also hear about how empathy supports the efforts and approaches adopted by ethical hackers. Lastly, you’ll discover the considerations that help the most when designing security architectures. </p><p>In this episode, you will learn:</p><ul><li>How ethical hackers practice empathy (03:21)</li><li>What to consider when building security architectures (07:43)</li><li>How putting people in the attacker's shoes for a minute changes their perception of cybersecurity (10:26)</li><li>The role of transparency in building trust within a company (17:04)</li></ul><p>Resources: </p><ul><li><a href="https://www.volkis.com.au/blog/independence-policy/">The Volkis Independence Policy</a></li></ul><p>Connect with Alexei:</p><ul><li><a href="https://www.volkis.com.au">Website</a></li><li><a href="https://www.linkedin.com/in/alexei-doudkine/">LinkedIn</a></li><li><a href="https://twitter.com/VolkisAU">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="25864683" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/5b55d975-6ea9-4fe9-a14c-3dc8a00ac745/audio/a0305135-3a2e-4067-97e8-3aa84a975839/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Empathy in Ethical Hacking</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/8781be11-ed22-4a66-9c67-da231133c32d/3000x3000/alexei-doudkine.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:56</itunes:duration>
      <itunes:summary>How do you remain empathetic when your job is to act like an attacker and point out issues with security systems?

With all its military language, cybersecurity can feel very aggressive but this offensive security specialist shows us that it doesn’t have to be.

Today I’m joined by Alexei Doudkine, penetration tester and co-founder of Volkis. I deeply resonate with how he puts his 10+ years of experience on the offensive side of cybersecurity to good use and challenges the status quo. He shares with us his views on empathy and how it embeds into his work as an ethical hacker.</itunes:summary>
      <itunes:subtitle>How do you remain empathetic when your job is to act like an attacker and point out issues with security systems?

With all its military language, cybersecurity can feel very aggressive but this offensive security specialist shows us that it doesn’t have to be.

Today I’m joined by Alexei Doudkine, penetration tester and co-founder of Volkis. I deeply resonate with how he puts his 10+ years of experience on the offensive side of cybersecurity to good use and challenges the status quo. He shares with us his views on empathy and how it embeds into his work as an ethical hacker.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">d9e1d2b2-8cd9-4498-98ed-659e0ed4dea3</guid>
      <title>Cybersecurity - A designer’s perspective</title>
      <description><![CDATA[<p>Cyber security goes beyond protecting your digital assets!</p><p>The unique part of cybersecurity is that the more you know about it, the less secure you feel. This can limit your digital experience and even cause anxiety because you constantly feel exposed to invisible threats.</p><p>Design and user experience make a substantial contribution to making online security and privacy easier to understand and manage. Visual cues and certain types of interactions with websites, apps, and other digital products teach us what a safe experience looks and feels like. With these habits formed, we can identify when something goes amiss so we can spot the threat and act with caution. </p><p>Today I’m joined by Lucian Grofsonean, brand strategist and brand designer who developed the visual identity for this podcast. I’m very glad to have Lucian as a guest in his very first podcast interview. He’ll share with us his perspective on Cyber Empathy as an industry outsider and the inspiration behind the inspired designs that he created.</p><p>In this episode, you’ll learn about the challenges Lucian encountered while trying to integrate empathy and cybersecurity, two notions that, at first glance, seem to have nothing in common. You’ll also get to hear about this important topic from an outsider’s perspective. Lastly, you’ll hear about a real-life story on a cybersecurity breach and the impact it had on the targeted company, as well as its users.</p><p>In this episode, you will learn:</p><ul><li>The challenges faced when trying to combine cybersecurity and empathy into a coherent and appealing visual identity (04:12)</li><li>The inspiration behind the podcast’s brand design (06:34)</li><li>How empathy goes a long way in every company (11:08)</li><li>How adding extra layers of security to a platform impacts the users (15:58)</li></ul><p>Resources: </p><ul><li><a href="https://www.binance.com/en">Binance</a></li><li><a href="https://en.wikipedia.org/wiki/Blade_Runner">Blade Runner</a></li></ul><p>Connect with Lucian:</p><ul><li><a href="https://www.darkcore.studio">Website</a></li><li><a href="https://www.linkedin.com/in/lucian-grofsorean-415365ba/">LinkedIn</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 16 Nov 2021 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Cyber security goes beyond protecting your digital assets!</p><p>The unique part of cybersecurity is that the more you know about it, the less secure you feel. This can limit your digital experience and even cause anxiety because you constantly feel exposed to invisible threats.</p><p>Design and user experience make a substantial contribution to making online security and privacy easier to understand and manage. Visual cues and certain types of interactions with websites, apps, and other digital products teach us what a safe experience looks and feels like. With these habits formed, we can identify when something goes amiss so we can spot the threat and act with caution. </p><p>Today I’m joined by Lucian Grofsonean, brand strategist and brand designer who developed the visual identity for this podcast. I’m very glad to have Lucian as a guest in his very first podcast interview. He’ll share with us his perspective on Cyber Empathy as an industry outsider and the inspiration behind the inspired designs that he created.</p><p>In this episode, you’ll learn about the challenges Lucian encountered while trying to integrate empathy and cybersecurity, two notions that, at first glance, seem to have nothing in common. You’ll also get to hear about this important topic from an outsider’s perspective. Lastly, you’ll hear about a real-life story on a cybersecurity breach and the impact it had on the targeted company, as well as its users.</p><p>In this episode, you will learn:</p><ul><li>The challenges faced when trying to combine cybersecurity and empathy into a coherent and appealing visual identity (04:12)</li><li>The inspiration behind the podcast’s brand design (06:34)</li><li>How empathy goes a long way in every company (11:08)</li><li>How adding extra layers of security to a platform impacts the users (15:58)</li></ul><p>Resources: </p><ul><li><a href="https://www.binance.com/en">Binance</a></li><li><a href="https://en.wikipedia.org/wiki/Blade_Runner">Blade Runner</a></li></ul><p>Connect with Lucian:</p><ul><li><a href="https://www.darkcore.studio">Website</a></li><li><a href="https://www.linkedin.com/in/lucian-grofsorean-415365ba/">LinkedIn</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="21408820" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/99f12eb6-ee63-4180-a66c-75795e91781a/audio/6b4be7fe-bdea-4fcb-9fc9-13d616e76e4f/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Cybersecurity - A designer’s perspective</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/6b22917b-3057-4142-9179-0328ee56d4c9/3000x3000/lucian-grofsonean.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:18</itunes:duration>
      <itunes:summary>Cyber security goes beyond protecting your digital assets! The unique part of cybersecurity is that the more you know about it, the less secure you feel. This can limit your digital experience and even cause anxiety because you constantly feel exposed to invisible threats.</itunes:summary>
      <itunes:subtitle>Cyber security goes beyond protecting your digital assets! The unique part of cybersecurity is that the more you know about it, the less secure you feel. This can limit your digital experience and even cause anxiety because you constantly feel exposed to invisible threats.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">1ebda499-8cb5-44dc-9a6b-1a72975de216</guid>
      <title>Am I being tracked? Solutions to online user tracking</title>
      <description><![CDATA[<p>Are you making mindful choices in your digital life?</p><p>Many companies have been profiting from exploiting your data, whether you choose to share it or unknowingly do so while using online services. </p><p>One of the most commonly used methods of exploitation is tracking. The good thing is that there are many empathetic people and companies that are also working to protect us from it.</p><p>Today I’m joined by Dave Smyth, designer and developer with a keen passion for privacy and ethics. Dave is using empathy to guide his clients to choose solutions that enhance privacy while also helping them grow their business.</p><p>I’m delighted to have Dave on not just as a guest on the podcast but also as a co-host! This is the first of many conversations where we’ll explore the implications of lack of empathy in tech and, particularly, in cybersecurity and privacy, as well as the options and solutions to the problems this generates.</p><p>In this episode, you’ll learn about why empathy is important when addressing privacy and cybersecurity issues. You’ll also learn about email tracking and the information this invasive – but inconspicuous – strategy harvests. Lastly, we’ll discuss the steps that Apple has taken to enhance the privacy of its users and the impact that those initiatives are expected to have.</p><p>In this episode, you will learn:</p><ul><li>Why empathy is becoming a big deal in tech and cybersecurity (04:51)</li><li>How email tracking works and why many people are unaware it exists (06:56)</li><li>Tools you can use to block companies from tracking you and how they work (10:52)</li><li>How Apple mail protects users from being tracked (15:33)</li></ul><p>Resources: </p><ul><li>Article: <a href="https://www.forbes.com/sites/tracybrower/2021/09/19/empathy-is-the-most-important-leadership-skill-according-to-research/?sh=2b1a282f3dc5">Empathy is the most important leadership skill according to research</a></li><li><a href="https://notospypixels.com/">No to spy pixels</a></li><li><a href="https://belowradar.co.uk/">Below Radar</a></li><li><a href="https://usefathom.com/">Fathom</a></li><li><a href="https://buttondown.email/">Buttondown email</a></li><li>Article: <a href="https://www.wired.co.uk/article/ios-15-privacy">The iOS 15 privacy settings you should change right now</a></li><li><a href="https://csrc.nist.gov/glossary/term/PII">PII definition</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 9 Nov 2021 03:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Are you making mindful choices in your digital life?</p><p>Many companies have been profiting from exploiting your data, whether you choose to share it or unknowingly do so while using online services. </p><p>One of the most commonly used methods of exploitation is tracking. The good thing is that there are many empathetic people and companies that are also working to protect us from it.</p><p>Today I’m joined by Dave Smyth, designer and developer with a keen passion for privacy and ethics. Dave is using empathy to guide his clients to choose solutions that enhance privacy while also helping them grow their business.</p><p>I’m delighted to have Dave on not just as a guest on the podcast but also as a co-host! This is the first of many conversations where we’ll explore the implications of lack of empathy in tech and, particularly, in cybersecurity and privacy, as well as the options and solutions to the problems this generates.</p><p>In this episode, you’ll learn about why empathy is important when addressing privacy and cybersecurity issues. You’ll also learn about email tracking and the information this invasive – but inconspicuous – strategy harvests. Lastly, we’ll discuss the steps that Apple has taken to enhance the privacy of its users and the impact that those initiatives are expected to have.</p><p>In this episode, you will learn:</p><ul><li>Why empathy is becoming a big deal in tech and cybersecurity (04:51)</li><li>How email tracking works and why many people are unaware it exists (06:56)</li><li>Tools you can use to block companies from tracking you and how they work (10:52)</li><li>How Apple mail protects users from being tracked (15:33)</li></ul><p>Resources: </p><ul><li>Article: <a href="https://www.forbes.com/sites/tracybrower/2021/09/19/empathy-is-the-most-important-leadership-skill-according-to-research/?sh=2b1a282f3dc5">Empathy is the most important leadership skill according to research</a></li><li><a href="https://notospypixels.com/">No to spy pixels</a></li><li><a href="https://belowradar.co.uk/">Below Radar</a></li><li><a href="https://usefathom.com/">Fathom</a></li><li><a href="https://buttondown.email/">Buttondown email</a></li><li>Article: <a href="https://www.wired.co.uk/article/ios-15-privacy">The iOS 15 privacy settings you should change right now</a></li><li><a href="https://csrc.nist.gov/glossary/term/PII">PII definition</a></li></ul><p>Connect with Dave:</p><ul><li><a href="https://davesmyth.com/">Website</a></li><li><a href="https://www.linkedin.com/in/dave-smyth/">LinkedIn</a></li><li><a href="https://twitter.com/websmyth">Twitter</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="28351540" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/b8dbbcdc-e722-493e-a25d-b32aa3d7f4e4/audio/6db00382-68a0-46e7-bcca-677bdd36f5ea/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Am I being tracked? Solutions to online user tracking</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/aa993ef8-9735-4222-9844-7327ad699a33/3000x3000/dave-smyth.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:32</itunes:duration>
      <itunes:summary>Many companies have been profiting from exploiting your data, whether you choose to share it or unknowingly do so while using online services. 
One of the most commonly used methods of exploitation is tracking. The good thing is that there are many empathetic people and companies that are also working to protect us from it.</itunes:summary>
      <itunes:subtitle>Many companies have been profiting from exploiting your data, whether you choose to share it or unknowingly do so while using online services. 
One of the most commonly used methods of exploitation is tracking. The good thing is that there are many empathetic people and companies that are also working to protect us from it.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">92111cd5-38db-4079-ba22-95af6d7fd3b1</guid>
      <title>A considerate view to cybersecurity</title>
      <description><![CDATA[<p>A secure world is a better world!</p><p>In a world where technology is advancing at lightning speed, security can sometimes seem to be lagging behind. This is especially so if you are not an IT guru who understands cybersecurity concepts very well. </p><p>This is a gap that can be filled by caring people sharing trustworthy information and experiences to help others. </p><p>Today I’m joined by Chris Kubecka, the founder, and CEO of HypaSec. She’s also the Distinguished Chair at the Middle East Institute Cyber Program at the Middle East Institute. </p><p>I’m delighted we have an expert and industry leader, sharing her experiences with us and shedding more light on the important field of cybersecurity.</p><p>In this episode, you’ll get some simple tips that can help secure your data and digital assets. You’ll also get to hear about how our guest employs empathy while dealing with cybersecurity-related problems. Lastly, you’ll hear about some of the challenges in the personal cybersecurity arena as well as the progress made in the past few years. </p><p>In this episode, you will learn:</p><ul><li>How cybersecurity impacts other aspects beyond our interactions with computers (05:41)</li><li>How to get people to be empathetic and to think beyond their immediate reactions when in a crisis (07:35)</li><li>Aspects of cybersecurity that have become easier in the past few years (14:32)</li><li>How to choose and use the right networks to get trustworthy cybersecurity advice (17:10)</li></ul><p>Connect with Chris Kubecka:</p><ul><li><a href="https://nl.linkedin.com/in/chris-kubecka">Linkedin</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 2 Nov 2021 04:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>A secure world is a better world!</p><p>In a world where technology is advancing at lightning speed, security can sometimes seem to be lagging behind. This is especially so if you are not an IT guru who understands cybersecurity concepts very well. </p><p>This is a gap that can be filled by caring people sharing trustworthy information and experiences to help others. </p><p>Today I’m joined by Chris Kubecka, the founder, and CEO of HypaSec. She’s also the Distinguished Chair at the Middle East Institute Cyber Program at the Middle East Institute. </p><p>I’m delighted we have an expert and industry leader, sharing her experiences with us and shedding more light on the important field of cybersecurity.</p><p>In this episode, you’ll get some simple tips that can help secure your data and digital assets. You’ll also get to hear about how our guest employs empathy while dealing with cybersecurity-related problems. Lastly, you’ll hear about some of the challenges in the personal cybersecurity arena as well as the progress made in the past few years. </p><p>In this episode, you will learn:</p><ul><li>How cybersecurity impacts other aspects beyond our interactions with computers (05:41)</li><li>How to get people to be empathetic and to think beyond their immediate reactions when in a crisis (07:35)</li><li>Aspects of cybersecurity that have become easier in the past few years (14:32)</li><li>How to choose and use the right networks to get trustworthy cybersecurity advice (17:10)</li></ul><p>Connect with Chris Kubecka:</p><ul><li><a href="https://nl.linkedin.com/in/chris-kubecka">Linkedin</a></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="27022848" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/4af1d302-d083-4c9e-9e70-b3090d2f08ca/audio/f742a479-184f-4412-a089-9e5465fbdabc/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>A considerate view to cybersecurity</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/a7daafa8-78d2-4189-aaa4-c55d869c8686/f4a3b8dd-3526-41f0-b18d-aed22c655c83/3000x3000/chris-kubecka.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:09</itunes:duration>
      <itunes:summary>In a world where technology is advancing at lightning speed, security can sometimes seem to be lagging behind. This is especially so if you are not an IT guru who understands cybersecurity concepts very well. 
This is a gap that can be filled by caring people sharing trustworthy information and experiences to help others. </itunes:summary>
      <itunes:subtitle>In a world where technology is advancing at lightning speed, security can sometimes seem to be lagging behind. This is especially so if you are not an IT guru who understands cybersecurity concepts very well. 
This is a gap that can be filled by caring people sharing trustworthy information and experiences to help others. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">b49e2ee8-7b8e-45ad-a6b9-985c488b197c</guid>
      <title>Why I chose an empathetic approach to cybersecurity</title>
      <description><![CDATA[<p>Today, I’ll share with you how I ended up in the field of cybersecurity and how I am trying to bridge the gap between the general perception and what it really feels like to work in it. I feel privileged to be sharing my experience with you as well as showing the role empathy plays to this important discipline.</p><p>Tune in and listen to <strong>the</strong> <strong>first episode of Cyber Empathy</strong>. You’re in for an exciting and informative experience! I hope you will get a new perspective on cybersecurity as you navigate today’s complex tech-dominated world.</p><p>In this episode, you will learn:</p><ul><li>The common trait of the people who have worked in cybersecurity for years <strong>(06:44)</strong></li><li>Why this podcast exists and why it’s happening now <strong>(13:53)</strong></li><li>Why I chose empathy as the main topic of the podcast <strong>(15:07)</strong></li><li>How you can use this podcast to make progress on your chosen path <strong>(18:34)</strong></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></description>
      <pubDate>Tue, 26 Oct 2021 05:00:00 +0000</pubDate>
      <author>andra@thecontenthabit.com (Andra Zaharia)</author>
      <link>https://cyberempathy.org</link>
      <content:encoded><![CDATA[<p>Today, I’ll share with you how I ended up in the field of cybersecurity and how I am trying to bridge the gap between the general perception and what it really feels like to work in it. I feel privileged to be sharing my experience with you as well as showing the role empathy plays to this important discipline.</p><p>Tune in and listen to <strong>the</strong> <strong>first episode of Cyber Empathy</strong>. You’re in for an exciting and informative experience! I hope you will get a new perspective on cybersecurity as you navigate today’s complex tech-dominated world.</p><p>In this episode, you will learn:</p><ul><li>The common trait of the people who have worked in cybersecurity for years <strong>(06:44)</strong></li><li>Why this podcast exists and why it’s happening now <strong>(13:53)</strong></li><li>Why I chose empathy as the main topic of the podcast <strong>(15:07)</strong></li><li>How you can use this podcast to make progress on your chosen path <strong>(18:34)</strong></li></ul><p>Let’s connect!</p><ul><li><a href="https://andrazaharia.com/">Website</a></li><li><a href="https://ro.linkedin.com/in/andrazaharia">LinkedIn</a></li><li><a href="https://twitter.com/andrazaharia">Twitter</a></li></ul>
]]></content:encoded>
      <enclosure length="22546918" type="audio/mpeg" url="https://cdn.simplecast.com/audio/cc5426aa-4863-4b3e-8b2e-314703c59978/episodes/652e16e0-3d99-4da9-b43f-4379559b4021/audio/c98186d2-c93a-406c-9ad3-c2a2c4a84da8/default_tc.mp3?aid=rss_feed&amp;feed=QI5PSp3T"/>
      <itunes:title>Why I chose an empathetic approach to cybersecurity</itunes:title>
      <itunes:author>Andra Zaharia</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/1219ff00-0f0f-496a-94ab-a3a169d593af/db042c68-c8c7-40f7-acf8-260b98446591/3000x3000/andra-zaharia-intro-episode.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:29</itunes:duration>
      <itunes:summary>Cybersecurity is not just about big companies being hacked and data stolen. No. It’s also about you and the safety of your data. 

There are many people who are committed to ensuring that your rights are protected as you interact with technology. Yet you rarely get to meet these people because you hardly ever see them talking about other topics than security upgrades for your new smartphone or laptop. But they are there - committed warriors who have dedicated their lives to your safety on and offline.</itunes:summary>
      <itunes:subtitle>Cybersecurity is not just about big companies being hacked and data stolen. No. It’s also about you and the safety of your data. 

There are many people who are committed to ensuring that your rights are protected as you interact with technology. Yet you rarely get to meet these people because you hardly ever see them talking about other topics than security upgrades for your new smartphone or laptop. But they are there - committed warriors who have dedicated their lives to your safety on and offline.</itunes:subtitle>
      <itunes:keywords>cybersecurity, cybersecurity education, online security, empathy, online privacy</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
  </channel>
</rss>