SlideShare a Scribd company logo
Psychological Security
Introduction to the emerging field of PsySec.
Presented by:
Zachary Eikenberry
CEO & CoFounder of Hook Security Inc;
world’s first PsySec company.
First things first. The vast majority of
human history, security
dealt with physical
security. (PhySec)
● Guards
● Gates
● Guns
Let’s set this up one step further.
Computers + Internet =
Information Security (InfoSec)
70+ InfoSec Areas
Cyber Security Product Categories (in alphabetical order) / Application Control Application Security Testing / Authentication (User Authentication,
Biometric Authentication and PKI) / Automotive Cyber Security / Behavior Analytics (User and Entity) / Big Data Security / Browser Security (Secure
Virtual Browser and Remote Browser) / Cloud Access Security Broker / Cloud Security / Compliance Management / Container Security / Maneuver
(Network Masking) / Cyber Threat Hunting / Data Discovery / Data Loss (Leakage) Prevention (DLP) / Data Masking / Data Security / Data-at-Rest
Encryption / Data-in-Motion/Transit (Network) Encryption and VPN / Database Security / DDoS Protection / Deception-Based Security / Digital
Forensic Investigation and Computer Forensics / Digital Rights Management / Digital Risk Monitoring / Embedded Security /Endpoint Protection
and Anti-virus / Endpoint Threat Detection and Response /File Content Security / Firewall Configuration and Management / Fraud Prevention /
Governance/Compliance Management / Hypervisor Security / Identity and Access Management / Identity Theft Detection / Industrial Security
(ICS/SCADA Security) / Internet of Things (IoT) Security / Intrusion Prevention Systems (and Intrusion Detection Systems) / Malware Detection and
Analysis / Managed Security Service Providers / Messaging Security / Mobile Data Protection / Mobile Device Management / Network Access
Control / Network Behavior Analysis and Anomaly Detection / Network Firewall (includes Next Generation Firewalls) / Network Monitoring and
Forensics / Password Manager / Patch Configuration and Management / Penetration Testing / Pervasive Trust Services / Risk and Compliance
Management / Risk and Vulnerability Assessment/ Secure File Transfer / Secure Web Gateway / Security Configuration Management / Security
Incident Management and Response / Security Information and Event Management (and Log Management) / Security Operations Automation and
Orchestration / Security Rating / Security Training Software / Specialized Threat Analysis and Protection / SSL and Digital Certificate Authority and
Management / Threat Intelligence and Signature Feeds / Transport Access Control / Trusted Computing, Cross Domain / Security and Multi Level
Security / Unified Threat Management
What if?
Computers People
Furthermore,
What if?
Computers Brains
What is a “field?”
New Fields are
often a Synthesis;
combining 2
distinct knowledge
domains.
Old Field +
New Knowledge
Insights =
A New Synthetic Field
What are some of the
latest psychological
insights that could lead to
a new field?
A brief listing of scientific phenomena.
Blindsight: The “unconscious” ability to see once a
person becomes blind.
Serial Position Effect: The ability to only recall the
first and last thing is a list of 4 or more items.
Fundamental Attribution Error: The inability to
describe another’s behavior from one’s own
personal characteristics.
McGurk Effect: When someone watches a dubbed
video different from the voice, so that the audience
makes up a new third understanding of the
presentation.
Apophenia (Patternicity / Agenticity): The
phenomena of recognizing patterns in chaos or
assumptions of patterns.
Template Matching Patterns: The foremost going
theory that we only recognized patterns based upon
inherited narratives or previous experience.
Multiple Brains:
Multiple
Theories
One Thousand Brains:
The multi-processes for object
recognition to determine against
a series of other objects.
What if InfoSec solutions
are training the wrong
part of the brain?
Cognitive
Security: CogSec
High Resolution work and
training engaging the deals with
increasing complexity and
multiple variables.
This is where security
professionals live and learn.
Example: This presentation.
PsySec
Focused on the ability for
individuals to recognize and
respond to security threats and
manipulation.
An early PsySec Manifesto
1. Psychographics > Demographics
2. Culture eats compliance for breakfast.
3. Feedback, Feedback, Feedback
4. Security is too important to take
seriously.
5. Stories Matter.
6. Brains are not computers.
7. Don’t make it easy a.k.a. Build
games.
Psychographics. Training should be based
upon your people’s
interests, opinions,
conceptual focus, and
motivations.
*Not synonymous with
Myers-Briggs, DISC,
Strengthsfinder, or Enneagram.*
Culture. Training should be owned
by all levels of the
organizations and
unconscious by every
member.
*Yes, this means security lives in
the mission and vision of all
organizational levels.*
Feedback. Training should include
feedback and multiple and
ongoing reinforcement.
*The greater the distance between
training and reinforcement
diminishes the training’s
effectiveness.*
Importance. Training should be
self-aware, own its faults,
and disarming
(non-punitive).
*Seriousness and fear-based
training counteracts effective
training recognition.*
Stories. Training should be based
upon narrative structures
and mirror best practice
content delivery.
*Think memes, YouTube, Netflix,
and widely (not critic) acclaimed
content. Also, think game-based
narratives and stories like Candy
Crush or Angry Birds.*
Brains. Training should be aimed
to engage the subcognitive
elements.
*Security folks see and experience
the world differently; do not select
or endorse training that is effective
for you or you prefer without larger
considerations. *
Ease. Training should be
challenging and aim at
growth.
*All purpose of training is lost if
becomes a theatrical act by
members if there is experience
discontinuity between professed
importance and challenge.*
This is only the beginning.
Will you build with us?
#psysec
Contact Us For more information, please contact
us at:
hello@hooksecurity.co
Or follow us on LinkedIn:
https://www.linkedin.com/company/
hooksecurity/

More Related Content

PPTX
Security Transformation
PDF
Introduction to the concept of it security
PDF
Mobile Security Training, Mobile Device Security Training
PPTX
Cybersecurity Hands-On Training
PPTX
6 Ways to Deceive Cyber Attackers
PPTX
Robert Lentz - CSO Perspectives Roadshow 2016
PDF
Information security
PPT
Security Transformation
Introduction to the concept of it security
Mobile Security Training, Mobile Device Security Training
Cybersecurity Hands-On Training
6 Ways to Deceive Cyber Attackers
Robert Lentz - CSO Perspectives Roadshow 2016
Information security

What's hot (20)

PDF
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
PDF
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
PPTX
Security in it
PDF
Ehc brochure
DOC
Audit logs for Security and Compliance
PPTX
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
PDF
Cyber_Services_2015_company_intro_ENG_v2p0
PPT
Ne Course Part Two
PDF
PaloAlto Enterprise Security Solution
PDF
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
PDF
Combating Cyber Security Using Artificial Intelligence
PPTX
Information System Security
PDF
Selex ES at Le Bourget 2013 Cyber Partnership
PDF
Compliance standards interoperability - Zoltan Precsenyi
PPT
Introduction to information security
PPTX
Gainful Information Security 2012 services
PDF
Hakin9 interview w Prof Sood
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PPTX
Aurora - Lessons Learned
DOCX
University of maryland infa 620 homework help
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
Security in it
Ehc brochure
Audit logs for Security and Compliance
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Cyber_Services_2015_company_intro_ENG_v2p0
Ne Course Part Two
PaloAlto Enterprise Security Solution
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Combating Cyber Security Using Artificial Intelligence
Information System Security
Selex ES at Le Bourget 2013 Cyber Partnership
Compliance standards interoperability - Zoltan Precsenyi
Introduction to information security
Gainful Information Security 2012 services
Hakin9 interview w Prof Sood
The Cyber Security Landscape: An OurCrowd Briefing for Investors
Aurora - Lessons Learned
University of maryland infa 620 homework help
Ad

Similar to Psychological Security: Introducing the PsySec Field (20)

PPTX
Sj terp emerging tech radar
PPTX
2022 - Killer Bunny - TPRA Conference.pptx
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
PDF
Ibm cognitive security_white_paper_04_2016
ODP
Psych of Sec
PDF
CSW2022_01_introduction.pptx.pdf
PDF
CanSecWest_cogsec_course_01_introduction.pdf
PPTX
Information Security Awareness Training by Jeremiah
PDF
Security crashcourse openwest_2019
PDF
Security Awareness Training is broken.
PPTX
CapTech Talks Webinar Sept 2024 Sumona Banerji.pptx
PPTX
Blitzing with your defense bea con
PDF
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
PDF
Event Presentation: Cyber Security for Industrial Control Systems
PDF
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
PPTX
Hackers contemplations
PDF
Best Practices for Security Awareness and Training
PPTX
(2016_01_20)_IS_Management_Basics_LinkedIn
PPTX
Hieupc-The role of psychology in enhancing cybersecurity
PDF
(eBook PDF) Information Security: Principles and Practices 2nd Edition
Sj terp emerging tech radar
2022 - Killer Bunny - TPRA Conference.pptx
Artificial Intelligence – Time Bomb or The Promised Land?
Ibm cognitive security_white_paper_04_2016
Psych of Sec
CSW2022_01_introduction.pptx.pdf
CanSecWest_cogsec_course_01_introduction.pdf
Information Security Awareness Training by Jeremiah
Security crashcourse openwest_2019
Security Awareness Training is broken.
CapTech Talks Webinar Sept 2024 Sumona Banerji.pptx
Blitzing with your defense bea con
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Event Presentation: Cyber Security for Industrial Control Systems
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Hackers contemplations
Best Practices for Security Awareness and Training
(2016_01_20)_IS_Management_Basics_LinkedIn
Hieupc-The role of psychology in enhancing cybersecurity
(eBook PDF) Information Security: Principles and Practices 2nd Edition
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced IT Governance
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced IT Governance
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KodekX | Application Modernization Development
NewMind AI Monthly Chronicles - July 2025
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Psychological Security: Introducing the PsySec Field

  • 1. Psychological Security Introduction to the emerging field of PsySec.
  • 2. Presented by: Zachary Eikenberry CEO & CoFounder of Hook Security Inc; world’s first PsySec company.
  • 3. First things first. The vast majority of human history, security dealt with physical security. (PhySec) ● Guards ● Gates ● Guns
  • 4. Let’s set this up one step further. Computers + Internet = Information Security (InfoSec)
  • 5. 70+ InfoSec Areas Cyber Security Product Categories (in alphabetical order) / Application Control Application Security Testing / Authentication (User Authentication, Biometric Authentication and PKI) / Automotive Cyber Security / Behavior Analytics (User and Entity) / Big Data Security / Browser Security (Secure Virtual Browser and Remote Browser) / Cloud Access Security Broker / Cloud Security / Compliance Management / Container Security / Maneuver (Network Masking) / Cyber Threat Hunting / Data Discovery / Data Loss (Leakage) Prevention (DLP) / Data Masking / Data Security / Data-at-Rest Encryption / Data-in-Motion/Transit (Network) Encryption and VPN / Database Security / DDoS Protection / Deception-Based Security / Digital Forensic Investigation and Computer Forensics / Digital Rights Management / Digital Risk Monitoring / Embedded Security /Endpoint Protection and Anti-virus / Endpoint Threat Detection and Response /File Content Security / Firewall Configuration and Management / Fraud Prevention / Governance/Compliance Management / Hypervisor Security / Identity and Access Management / Identity Theft Detection / Industrial Security (ICS/SCADA Security) / Internet of Things (IoT) Security / Intrusion Prevention Systems (and Intrusion Detection Systems) / Malware Detection and Analysis / Managed Security Service Providers / Messaging Security / Mobile Data Protection / Mobile Device Management / Network Access Control / Network Behavior Analysis and Anomaly Detection / Network Firewall (includes Next Generation Firewalls) / Network Monitoring and Forensics / Password Manager / Patch Configuration and Management / Penetration Testing / Pervasive Trust Services / Risk and Compliance Management / Risk and Vulnerability Assessment/ Secure File Transfer / Secure Web Gateway / Security Configuration Management / Security Incident Management and Response / Security Information and Event Management (and Log Management) / Security Operations Automation and Orchestration / Security Rating / Security Training Software / Specialized Threat Analysis and Protection / SSL and Digital Certificate Authority and Management / Threat Intelligence and Signature Feeds / Transport Access Control / Trusted Computing, Cross Domain / Security and Multi Level Security / Unified Threat Management
  • 8. What is a “field?”
  • 9. New Fields are often a Synthesis; combining 2 distinct knowledge domains. Old Field + New Knowledge Insights = A New Synthetic Field
  • 10. What are some of the latest psychological insights that could lead to a new field?
  • 11. A brief listing of scientific phenomena. Blindsight: The “unconscious” ability to see once a person becomes blind. Serial Position Effect: The ability to only recall the first and last thing is a list of 4 or more items. Fundamental Attribution Error: The inability to describe another’s behavior from one’s own personal characteristics. McGurk Effect: When someone watches a dubbed video different from the voice, so that the audience makes up a new third understanding of the presentation. Apophenia (Patternicity / Agenticity): The phenomena of recognizing patterns in chaos or assumptions of patterns. Template Matching Patterns: The foremost going theory that we only recognized patterns based upon inherited narratives or previous experience.
  • 12. Multiple Brains: Multiple Theories One Thousand Brains: The multi-processes for object recognition to determine against a series of other objects.
  • 13. What if InfoSec solutions are training the wrong part of the brain?
  • 14. Cognitive Security: CogSec High Resolution work and training engaging the deals with increasing complexity and multiple variables. This is where security professionals live and learn. Example: This presentation.
  • 15. PsySec Focused on the ability for individuals to recognize and respond to security threats and manipulation.
  • 16. An early PsySec Manifesto 1. Psychographics > Demographics 2. Culture eats compliance for breakfast. 3. Feedback, Feedback, Feedback 4. Security is too important to take seriously. 5. Stories Matter. 6. Brains are not computers. 7. Don’t make it easy a.k.a. Build games.
  • 17. Psychographics. Training should be based upon your people’s interests, opinions, conceptual focus, and motivations. *Not synonymous with Myers-Briggs, DISC, Strengthsfinder, or Enneagram.*
  • 18. Culture. Training should be owned by all levels of the organizations and unconscious by every member. *Yes, this means security lives in the mission and vision of all organizational levels.*
  • 19. Feedback. Training should include feedback and multiple and ongoing reinforcement. *The greater the distance between training and reinforcement diminishes the training’s effectiveness.*
  • 20. Importance. Training should be self-aware, own its faults, and disarming (non-punitive). *Seriousness and fear-based training counteracts effective training recognition.*
  • 21. Stories. Training should be based upon narrative structures and mirror best practice content delivery. *Think memes, YouTube, Netflix, and widely (not critic) acclaimed content. Also, think game-based narratives and stories like Candy Crush or Angry Birds.*
  • 22. Brains. Training should be aimed to engage the subcognitive elements. *Security folks see and experience the world differently; do not select or endorse training that is effective for you or you prefer without larger considerations. *
  • 23. Ease. Training should be challenging and aim at growth. *All purpose of training is lost if becomes a theatrical act by members if there is experience discontinuity between professed importance and challenge.*
  • 24. This is only the beginning. Will you build with us?
  • 26. Contact Us For more information, please contact us at: hello@hooksecurity.co Or follow us on LinkedIn: https://www.linkedin.com/company/ hooksecurity/