SlideShare uma empresa Scribd logo
1 de 17
Dr. Margaret Cunningham, Principal Research Scientist
Forcepoint, X-Labs
Weary Warriors:
Reducing the Impact of Wishful
Thinking & Fatigue on Information
Security Decisions
4 June, 2019
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
Select the option that fits you best:
- I use the exact same password on multiple sites. ¯_(ツ)_/¯
- I change my passwords a little bit—Password1! is different from
Passw0rd, right?
- I never reuse passwords.
- I use a password manager.
Slido Q1
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
40-50% of users reuse
passwords
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
46% of organizations don’t
change their security strategy
after an attack!
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
Definitions & Outcomes
• Motivated Reasoning
• Decision Fatigue
Strategies & Solutions
Overview
Weary Warriors: Reducing the Impact of Wishful
Thinking & Fatigue on Information Security Decisions
• “Wishful Thinking” and self-
deception
• Avoidance of cognitive
dissonance
• Evaluating problems in favor
of preferred outcomes
Motivated Reasoning is…
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
• Inadequate solutions based
on biased information
• Aversion to change
• Rationalization, and denial,
of poor choices
Impact of Motivated Reasoning
Weary Warriors: Reducing the Impact of Wishful
Thinking & Fatigue on Information Security Decisions
• Decision-making draws on
finite mental resources
• Our capabilities degrade over
the course of each day
• Helped by food, cured by rest
Decision Fatigue is…
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
• Decision avoidance, relying
on defaults or “status quo”
• Difficulty weighing pros &
cons of multiple options
• Short-term > long-term
• Selecting the least effortful
choice
Impact of Decision Fatigue
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
• When faced with “facts that don’t fit” we ignore them
• When fatigued, we pick the easy way out – if we make
a choice at all
Motivated Reasoning + Decision Fatigue = Bad Decisions
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
Strategies & Solutions
1. Recognize the Signs
2. Be Choosy about
Choosing
3. Plan & Prioritize
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
• Impaired self-control & impulsivity
• Procrastination
• Decision avoidance
• Irritability
• Ignoring contradicting opinions or
facts?
Recognize the Signs
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
• Cut options
• Concrete examples
• Categorize
• Condition for Complexity
Be Choosy about Choosing1
1 Sheena Iyengar, “The Art of Choosing”
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
• Plan daily decisions in
advance
• Prioritize important decisions
for the morning
• Sleep on it – when possible
• Use tools & establish
decision-making processes to
support unplanned or late-
day choices
Plan & Prioritize
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
5 KEY TAKE AWAYS
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
• Motivated reasoning leads to biased decision making & denial of
alternative solutions that differ from existing practices
• Decision fatigue leads to decision avoidance, or selection of easier,
short-term solutions
• Recognize the signs: procrastination, distraction, impulsivity,
irritability, risk-aversion
• Use choice strategies: cut, categorize, concrete examples, &
conditioning for complexity
• And, when possible, plan and prioritize to optimize decision-making
5 KEY TAKE AWAYS
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on
Information Security Decisions
Follow-up questions or comments?
Margaret.Cunningham@Forcepoint.com
Or, visit my Forcepoint Author Page:
www.forcepoint.com/company/biographies/margaret-cunningham
Recent White Papers:
Exploring the Grey Space of Cybersecurity with
Insights from Cognitive Science
Thinking about Thinking: Exploring Bias in
Cybersecurity with Insights from Cognitive Science

Mais conteúdo relacionado

Semelhante a Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions

Topic6decisionmaking
Topic6decisionmakingTopic6decisionmaking
Topic6decisionmakingHariz Mustafa
 
MGT 3200 Exam #2
MGT 3200 Exam #2MGT 3200 Exam #2
MGT 3200 Exam #2kgreau1
 
Decision Making & Problem Solving _ Materi Training "LEADERSHIP for Manager &...
Decision Making & Problem Solving _ Materi Training "LEADERSHIP for Manager &...Decision Making & Problem Solving _ Materi Training "LEADERSHIP for Manager &...
Decision Making & Problem Solving _ Materi Training "LEADERSHIP for Manager &...Kanaidi ken
 
Motivation and Bias: Strategies for Developing Greater Self-Awareness and Obs...
Motivation and Bias: Strategies for Developing Greater Self-Awareness and Obs...Motivation and Bias: Strategies for Developing Greater Self-Awareness and Obs...
Motivation and Bias: Strategies for Developing Greater Self-Awareness and Obs...MRG (Management Research Group)
 
Fundamentals of Decision Making
Fundamentals of Decision Making Fundamentals of Decision Making
Fundamentals of Decision Making Andrew Hirst
 
Ob slides - decision making hold(1)
Ob slides  - decision making  hold(1)Ob slides  - decision making  hold(1)
Ob slides - decision making hold(1)stuitstrain2
 
Brian Glass Making Decisions
Brian Glass Making DecisionsBrian Glass Making Decisions
Brian Glass Making Decisionsbrnglass
 
Career decision making
Career decision makingCareer decision making
Career decision makingsdonatel
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsKeith Harris
 
Entrepreneurial Psychology
Entrepreneurial PsychologyEntrepreneurial Psychology
Entrepreneurial Psychologyjericsinger
 
OODA OODA! How Rapid Iteration Can Help Level Up Your Gaming Business
OODA OODA! How Rapid Iteration Can Help Level Up Your Gaming BusinessOODA OODA! How Rapid Iteration Can Help Level Up Your Gaming Business
OODA OODA! How Rapid Iteration Can Help Level Up Your Gaming BusinessSeriousGamesAssoc
 
Session 4 - Lectures in Leadership (Relating).pptx
Session 4 - Lectures in Leadership (Relating).pptxSession 4 - Lectures in Leadership (Relating).pptx
Session 4 - Lectures in Leadership (Relating).pptxssuserde1c26
 
I am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatI am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatAhmed Masud
 
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة D...
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة  D...د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة  D...
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة D...د حاتم البيطار
 
Presentation: Avoiding Nonprofit Disasters Through Decision-Making Science
Presentation: Avoiding Nonprofit Disasters Through Decision-Making SciencePresentation: Avoiding Nonprofit Disasters Through Decision-Making Science
Presentation: Avoiding Nonprofit Disasters Through Decision-Making ScienceGleb Tsipursky
 

Semelhante a Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions (20)

Presentation2
Presentation2Presentation2
Presentation2
 
Topic6decisionmaking
Topic6decisionmakingTopic6decisionmaking
Topic6decisionmaking
 
Decision Making
Decision MakingDecision Making
Decision Making
 
MGT 3200 Exam #2
MGT 3200 Exam #2MGT 3200 Exam #2
MGT 3200 Exam #2
 
Decision Making & Problem Solving _ Materi Training "LEADERSHIP for Manager &...
Decision Making & Problem Solving _ Materi Training "LEADERSHIP for Manager &...Decision Making & Problem Solving _ Materi Training "LEADERSHIP for Manager &...
Decision Making & Problem Solving _ Materi Training "LEADERSHIP for Manager &...
 
Motivation and Bias: Strategies for Developing Greater Self-Awareness and Obs...
Motivation and Bias: Strategies for Developing Greater Self-Awareness and Obs...Motivation and Bias: Strategies for Developing Greater Self-Awareness and Obs...
Motivation and Bias: Strategies for Developing Greater Self-Awareness and Obs...
 
Fundamentals of Decision Making
Fundamentals of Decision Making Fundamentals of Decision Making
Fundamentals of Decision Making
 
Decision Making 1
Decision Making 1Decision Making 1
Decision Making 1
 
decision making.pptx
decision making.pptxdecision making.pptx
decision making.pptx
 
Ob slides - decision making hold(1)
Ob slides  - decision making  hold(1)Ob slides  - decision making  hold(1)
Ob slides - decision making hold(1)
 
Brian Glass Making Decisions
Brian Glass Making DecisionsBrian Glass Making Decisions
Brian Glass Making Decisions
 
Career decision making
Career decision makingCareer decision making
Career decision making
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
Entrepreneurial Psychology
Entrepreneurial PsychologyEntrepreneurial Psychology
Entrepreneurial Psychology
 
OODA OODA! How Rapid Iteration Can Help Level Up Your Gaming Business
OODA OODA! How Rapid Iteration Can Help Level Up Your Gaming BusinessOODA OODA! How Rapid Iteration Can Help Level Up Your Gaming Business
OODA OODA! How Rapid Iteration Can Help Level Up Your Gaming Business
 
Session 4 - Lectures in Leadership (Relating).pptx
Session 4 - Lectures in Leadership (Relating).pptxSession 4 - Lectures in Leadership (Relating).pptx
Session 4 - Lectures in Leadership (Relating).pptx
 
I am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatI am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider Threat
 
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة D...
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة  D...د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة  D...
د حاتم البيطار استشاري وجراح الفم والاسنان 01005684344 اتصل للحجز بالعيادة D...
 
Decision Making
Decision MakingDecision Making
Decision Making
 
Presentation: Avoiding Nonprofit Disasters Through Decision-Making Science
Presentation: Avoiding Nonprofit Disasters Through Decision-Making SciencePresentation: Avoiding Nonprofit Disasters Through Decision-Making Science
Presentation: Avoiding Nonprofit Disasters Through Decision-Making Science
 

Mais de Forcepoint LLC

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Forcepoint LLC
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsForcepoint LLC
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIForcepoint LLC
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesForcepoint LLC
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint LLC
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applicationsForcepoint LLC
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?Forcepoint LLC
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusForcepoint LLC
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouForcepoint LLC
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Forcepoint LLC
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksForcepoint LLC
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterForcepoint LLC
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial TsunamiForcepoint LLC
 

Mais de Forcepoint LLC (20)

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security Behaviors
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User Identities
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human Focus
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and You
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial Tsunami
 
Shift the Burden
Shift the BurdenShift the Burden
Shift the Burden
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions

  • 1. Dr. Margaret Cunningham, Principal Research Scientist Forcepoint, X-Labs Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions 4 June, 2019
  • 2. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions Select the option that fits you best: - I use the exact same password on multiple sites. ¯_(ツ)_/¯ - I change my passwords a little bit—Password1! is different from Passw0rd, right? - I never reuse passwords. - I use a password manager. Slido Q1
  • 3. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions 40-50% of users reuse passwords
  • 4. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions 46% of organizations don’t change their security strategy after an attack!
  • 5. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions Definitions & Outcomes • Motivated Reasoning • Decision Fatigue Strategies & Solutions Overview
  • 6. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions • “Wishful Thinking” and self- deception • Avoidance of cognitive dissonance • Evaluating problems in favor of preferred outcomes Motivated Reasoning is…
  • 7. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions • Inadequate solutions based on biased information • Aversion to change • Rationalization, and denial, of poor choices Impact of Motivated Reasoning
  • 8. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions • Decision-making draws on finite mental resources • Our capabilities degrade over the course of each day • Helped by food, cured by rest Decision Fatigue is…
  • 9. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions • Decision avoidance, relying on defaults or “status quo” • Difficulty weighing pros & cons of multiple options • Short-term > long-term • Selecting the least effortful choice Impact of Decision Fatigue
  • 10. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions • When faced with “facts that don’t fit” we ignore them • When fatigued, we pick the easy way out – if we make a choice at all Motivated Reasoning + Decision Fatigue = Bad Decisions
  • 11. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions Strategies & Solutions 1. Recognize the Signs 2. Be Choosy about Choosing 3. Plan & Prioritize
  • 12. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions • Impaired self-control & impulsivity • Procrastination • Decision avoidance • Irritability • Ignoring contradicting opinions or facts? Recognize the Signs
  • 13. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions • Cut options • Concrete examples • Categorize • Condition for Complexity Be Choosy about Choosing1 1 Sheena Iyengar, “The Art of Choosing”
  • 14. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions • Plan daily decisions in advance • Prioritize important decisions for the morning • Sleep on it – when possible • Use tools & establish decision-making processes to support unplanned or late- day choices Plan & Prioritize
  • 15. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions 5 KEY TAKE AWAYS
  • 16. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions • Motivated reasoning leads to biased decision making & denial of alternative solutions that differ from existing practices • Decision fatigue leads to decision avoidance, or selection of easier, short-term solutions • Recognize the signs: procrastination, distraction, impulsivity, irritability, risk-aversion • Use choice strategies: cut, categorize, concrete examples, & conditioning for complexity • And, when possible, plan and prioritize to optimize decision-making 5 KEY TAKE AWAYS
  • 17. Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions Follow-up questions or comments? Margaret.Cunningham@Forcepoint.com Or, visit my Forcepoint Author Page: www.forcepoint.com/company/biographies/margaret-cunningham Recent White Papers: Exploring the Grey Space of Cybersecurity with Insights from Cognitive Science Thinking about Thinking: Exploring Bias in Cybersecurity with Insights from Cognitive Science