

8th Layer Insights
Perry Carpenter | N2K Networks
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
Episodes
Mentioned books

Jun 7, 2022 • 45min
The Lazarus Heist: Investigative Journalism, Podcasting, and North Korean Hacking (with Geoff White)
On this bonus episode, Perry sits down with investigative journalist, speaker, podcaster, and author, Geoff White to talk about his path into investigative journalism, podcasting, and his new book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War."Guest:Geoff White (LinkedIn) (Twitter) (Website)Books & Podcasts:
Lazarus Heist Book
Lazarus Heist Podcast
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer (Amazon affiliate link)
Production Credits:Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks.Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/Want to get in touch with Perry? Here's how:
LinkedIn
Twitter
Instagram
Email: perry [at] 8thLayerMedia [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices

May 17, 2022 • 5min
An Announcement, a Request, and How You Can Win Some $$$
Please take the listener survey--->>> https://www.surveymonkey.com/r/8LI_Survey <<<---One of the things that defines 8th Layer Insights is the amount of writing, editing, and production that’s involved. Each episode generally takes about 30 hours of work to complete. And, since this is a personal project, that equates to quite a few late nights and weekends. It can be exhausting… but it’s totally worth it. YOU make it worth it.One of my main goals is ensuring that I’m doing everything possible to make this show sustainable AND continuing to improve and to never sacrifice quality. So – with that being said – I’ll let you in on how I’m planning to do it. Just a couple weeks ago, I created a company called 8th Layer Media and have brought on a brilliant partner – his name is Mason Amadeus. Mason will serve as a co-Creative Director and Production Manager. (like Carl, but more competent). Don’t worry – Carl will still be around in season 3 and beyond. It’s hard to unseat Carl. But Mason will play a big part in increasing my capacity.Here’s where you can help: we need your input on what’s working with the show and what can be improved. We want your honest, unfiltered feedback so that we can make a show that isn’t just good – it’s great… consistently great. We also want to get information on how you first found out about 8th Layer Insights, what topics you want the show to explore and more.We even want to know if you have better ideas for the name of the show. …Seriously, if you submit an alternate show name, and we decide to adopt that name, you’ll win a $300 Amazon gift card. There will be other prizes as well.If you’re ready to help shape the future of 8th Layer Insights, take the survey: https://www.surveymonkey.com/r/8LI_SurveySurvey closes Friday, June 3, 2022.Perry's Books:
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer (Amazon affiliate link)
Wondering who Mason is? Here are a few links:
Twitter (@itsMasonAmadeus)
Website (https://masonamadeus.com/)
Podcast (PodCube)
Want to get in touch with Perry? Here's how:
LinkedIn
Twitter
Instagram
Email: hello [at] 8thLayerMedia [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices

May 5, 2022 • 13min
An Interview with a Password
If you could interview a password, what questions would you ask?Today, May 5th, 2022 is World Password Day. World Password Day was first established in 2013 and is celebrated each year on the 1st Thursday in May. To celebrate, I thought it would be fun to share an excerpt of a previous episode ("Security is Alive") where I interviewed multiple security-related objects. This clip is my interview with Dave the Password.Stick around after the interview for a few password-related tips and best practices! Learn more about your ad choices. Visit megaphone.fm/adchoices

May 3, 2022 • 1h 11min
Creativity for Non-Creatives
Creativity can be a scary topic for technologists. Most of us haven't been trained in the art and science of creativity and so they either feel out of their depth when called on to create content. But it doesn't have to be that way. In this episode, Perry sits down with New York Times bestselling author, Michelle Richmond, Audible bestselling author Rob Dircks, and two critically acclaimed cybersecurity podcasters, Ran Levi (creator and host of the Malicious Life podcast) and David Spark (creator and host of the CISO Series podcast) to discuss creativity, how to create relatable content, and how to communicate technology-related content in clear and compelling ways.Guests:
Ran Levi (LinkedIn) (Website)
David Spark (LinkedIn) (Website)
Michelle Richmond (LinkedIn) (Website) (Amazon Page)
Rob Dircks (LinkedIn) (Website) (Amazon Page)
Books and Resources:
8Li Season 1, Episode 1: Unleashing Trojan Horses for the Mind
8Li Season 2, Episode 1: Igniting and Sustaining Creativity
8Li Season 2, Episode 2: You're Listening to "The Dark Stream"
8Li Season 2, Episode 3: Technology & the Law of Unintended Consequences
8Li Season 2, Episode 6: Security is Alive
"Malicious Life" Podcast, Ran Levi
"CISO Series" Podcast, David Spark
How do you explain virtualization to your mom? -- David Spark video
"Everything is Alive" Podcast
"Writing Excuses" Podcast
The Wonder Test: A Novel, by Michelle Richmond (Amazon affiliate link)
The Marriage Pact: A Novel, by Michelle Richmond (Amazon affiliate link)
Where the Hell is Tesla? A Novel, by Rob Dircks (Amazon affiliate link)
You're Going to Mars (An Audible Original), by Rob Dircks (Amazon affiliate link)
Story: Substance, Structure, Style and the Principles of Screenwriting, by Robert McKee (Amazon affiliate link)
HBR Guide to Persuasive Presentations (HBR Guide Series), by Nancy Duarte (Amazon affiliate link)
Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life, by Roy Sutherland (Amazon affiliate link)
How Creativity Rules the World: The Art and Business of Turning Your Ideas into Gold, by Maria Brito (Amazon affiliate link)
On Writing: A Memoir of the Craft, by Stephen King (Amazon affiliate link)
You Are an Artist: Assignments to Spark Creation, by Sarah Urist Green
Ticktime Pomodoro Timer (Amazon affiliate link)
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer (Amazon affiliate link)
Production Credits:Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks.Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/Want to get in touch with Perry? Here's how:
LinkedIn
Twitter
Instagram
Email: hello [at] 8thLayerMedia [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices

Apr 19, 2022 • 48min
The Next Evolution of Security Awareness
"Security Awareness" is a slippery topic for a lot of people. It's a well known phrase -- and, let's face it, it's a phrase that can be very misleading. In this episode, Perry sits down with Dr. Jessica Barker (author and co-CEO at Cygenta), Cassie Clark (Security Awareness Lead Engineer at Brex), John Scott (Head of Security Education at Bank of England), and Lance Spitzner (Director, SANS Institute: Founder, Honeynet Project) to discuss what is currently being done well and, more importantly, where it needs to grow over the next few years. Spoiler alert: it's all about managing human risk.Guests:
Dr. Jessica Barker (LinkedIn) (Twitter)
Cassie Clark (LinkedIn) (Twitter)
John Scott (LinkedIn) (Twitter)
Lance Spitzner (LinkedIn) (Twitter)
Books and Resources:
8Li S1 E9: Security ABCs Part 1: Make Awareness Transformational
8Li S1 E10: Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture
Cybersecurity ABCs: Delivering awareness, behaviours and culture change by Jessica Barker, Adrian Davis, Bruce Hallas, & Ciarán Mc Mahon
A Data-Driven Computer Defense: A Way to Improve Any Computer Defense by Roger A. Grimes
Security Awareness Program Builder: Practical guidelines for building your Information Security Awareness Program & prep guide for the Security Awareness and Culture Professional (SACP)™ by Mark Majewski
People-Centric Security: Transforming Your Enterprise Security Culture by Lance Hayden
Start with Why: How Great Leaders Inspire Everyone to Take Action by Simon Sinek (Amazon affiliate link)
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon affiliate link)
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer (Amazon affiliate link)
Production Credits:Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks.Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/Want to get in touch with Perry? Here's how:
LinkedIn
Twitter
Instagram
Email: hello [at] 8thLayerInsights [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices

Apr 4, 2022 • 52min
Why Are We So Bad At Risk?
Risk is a funny thing – our minds are constantly looking for risk, scanning our environments and our available choices. And sometimes we do a great job at anticipating and avoiding risky situations. But that doesn’t mean that we are universally good at dealing with risk. In fact, we can be downright appalling at considering and avoiding risk.In this episode, we explore the concept of risk, why we're so bad at understanding it, and the steps we can take to improve. Perry speaks with four risk experts who will help us understand the ups and downs of how we evaluate risk. We’ll touch on everything from Black Swans to Grey Rhinos to risk frameworks, risk equations, inbuilt risk in the design of computing interfaces, and more. Featuring Michele Wucker (author of The Grey Rhino and You Are What You Risk), Christian Hunt (Founder of Human Risk), Dr. Arun Vishwanath (Founder and Chief Technology Officer of Avant Research Group), and Matt Stamper (Chief Information Security Officer and Executive Advisor at EVOTEK and co-author of the CISO Desk Reference Guides vol1 & vol2).Original release date: Aug 31, 2021.Guests:
Michele Wucker
Christian Hunt
Arun Vishwanath
Matt Stamper
Resources & Books:
Black Swan Theory
Grey Rhino Events
Various Risk Equations
Risk Perception Equation, Freakonomics
20 Cognitive Biases That Affect Risk Decision Making, SafetyRisk.net
Factor Analysis of Information Risk (FAIR) Framework
The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore, by Michele Wucker (Amazon Affiliate Link)
You Are What You Risk: The New Art and Science of Navigating an Uncertain World, by Michele Wucker (Amazon Affiliate Link)
Why are Humans Bad at Calculating Risk?, Cogency
Why You're Probably Not So Great at Risk Assessment, NY Times
Why the Human Brain is a Poor Judge of Risk, Wired
Humans are Terrible at Assessing Risk, by Kimberly Forsythe
Why We're Awful at Assessing Risk, USA Today
CISO Desk Reference Guides vol1 & vol2, by Bill Bonney, Gary Hayslip, Matt Stamper (Amazon Affiliate Link)
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon Affiliate Link)
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer (Amazon Affiliate Link)
Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks.Artwork by Chris Machowski. Learn more about your ad choices. Visit megaphone.fm/adchoices

Mar 22, 2022 • 1h
Fun and Games: Lock Picking, Capture the Flag Contests, Simulations, and More
What images come to mind when you see or hear the word 'Cybersecurity?' That word probably evokes mental images of people hunched over keyboards launching cyberattacks at each other. Or maybe you picture someone picking a lock or stealing a badge to slip into a building. In other words, most people picture the battle... or what some might think of as "the fun parts." But, here's the thing. Not everyone gets to participate in these aspects of cybersecurity and, in many cases, finding safe and legal ways to practice these skills can be challenging. So where can curious minds turn?That's where gamification can really help. There are a ton of really fun and engaging ways to learn these skills without fear of being arrested or breaking something. These are also great ways to level-up cybersecurity skills and help bring new people into the field. In this episode, we explore the "fun and games" of cybersecurity: lock picking, (CTFs) capture the flag competitions, simulations, and even pickpocketing and magical (sleight of hand and misdirection) thinking.Perry's guests are Alethe Denis (social engineer and DefCon 2019 Social Engineering CTF winner), Deviant Ollam (penetration tester, lock picking guru, and Board Member of The Open Organization of Lockpickers), Chris Kirsch (Co-Founder and CEO of Rumble, DefCon 2017 Social Engineering CTF winner) , and Gerald Auger (Founder of Simply Cyber, Director of Cybersecurity Education & Cybersecurity Program Manager at ThreatGEN).Guests:
Alethe Denis (LinkedIn) (Twitter) (Website)
Deviant Ollam (Twitter) (YouTube) (Website)
Chris Kirsch (LinkedIn) (Twitter)
Gerald Auger (LinkedIn) (Twitter) (YouTube)
Resources & Books:
What is Gamification?
Lockpicking Resources from Deviant Ollam
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks, by Deviant Ollam
Practical Lock Picking: A Physical Penetration Tester's Training Guide, by Deviant Ollam
TOOOL US -- The Open Organization of Lockpickers
TOOOL US instructional videos on YouTube
The Official TOOOL Slides
The Lockpicking Lawyer on YouTube
Bump Keys in the News - San Francisco #3 -- YouTube clip
TraceLabs OSINT Capture the Flags
50 CTF (Capture the Flag) & Pentesting Websites to Practice Your Hacking & Cybersecurity Skills in 2021
Hands-on Hacking Demo | CTF - Capture the Flag in 15 Minutes!, YouTube video by ITProTV
Capture the Flag? Change Your Life, YouTube video by John Hammond
Don’t Wait for the Perfect Time for a Tabletop Exercise, National Law Review
ThreatGEN's Red & Blue Game
Gerald Auger's Simply Cyber Discord Server
Chris Krisch's pickpocketing talk at Layer8 Security Conference
Production Credits:Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks.Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/Want to get in touch with Perry? Here's how:
LinkedIn
Twitter
Instagram
Email: hello [at] 8thLayerInsights [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices

Mar 8, 2022 • 1h 5min
World's Greatest Con – A Conversation with Brian Brushwood
If you love learning about cons, scams, and tricks, then this is the episode for you. Listen as Perry sits down with Brian Brushwood, someone who has made understanding and teaching scams and tricks his life's work. Brian is the creator of Scam School, Scam Nation, Hacking the System, Modern Rogue, and more. For the past 20 years, he's toured around the world teaching and demonstrating everything from side show stunts, to sleight-of-hand magic, to the intricacies of con artistry.Brian’s new podcast, World’s Greatest Con is a deep-dive into the stories and tactics behind the most intricate and interesting cons imaginable. In season 1, he told the story of Operation Mincemeat, a WWII plot devised by Ian Fleming (creator of James Bond) to trick none other than Adolf Hitler. Season 2 covers five different cons all related to the game show industry… it’s both entertaining and riveting in some very unexpected ways.A big thank you to my friends over at the PodCube podcast for creating a custom skit for this episode. If you are a fan of sketch comedy, be sure to check out their show! (PodCube: The Future, is Yesterday™).Guest: Brian Brushwood (Website) (Twitter)Books and Resources
Brian's Website
World's Greatest Con podcast site
Scam School YouTube Channel
Modern Rogue YouTube Channel
Brian Brushwood Mistreats His Tongue
Brian doing psychic surgery on Penn & Teller: Fool Us
Brian doing the "hidden ghost" trick
Brian's Entire Bizarre Magic Stage Show
How to make a fake tongue (without using a deer tongue)
Operation Mincemeat -- Wikipedia
13 Unbelievably Fascinating Game Show Cheating Scandals That'll Shock Both Devoted And Casual Fans -- Buzzfeed
Project Alpha -- Wikipedia
Going Mental: A Conversation with Banachek -- 8th Layer Insights S1E7
PodCube Podcast
Thinking, Fast and Slow by Daniel Kahneman
Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer
Production Credits:
The opening skit featured the voice talents of Rich Daigle (a.k.a. Mouth Almighty), Hannah Trusty, Adriana Beals, and Rob McCollum.
Writing support for this episode's opening section from Terry Hicks
Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks.
Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:
LinkedIn
Twitter
Instagram
Email: hello [at] 8thLayerInsights [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices

Feb 22, 2022 • 47min
Security is Alive
Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.Guests:
Samantha – Facial Recognition Software
Dave – Password
Devon – Secure Email Gateway
Barb – Phishing Email
Books and Resources:
MasterClass -- Margaret Atwood Teaches Creative Writing
"Everything is Alive" Podcast
Krebs on Security - Password Do’s and Don’ts
What makes a good password? 9 rules to protect you from cyberattacks
World Password Day: Roger Grimes on passwords
Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate
How does facial recognition work?
Facial recognition: top 7 trends (tech, vendors, use cases)
NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification
How Accurate are Facial Recognition Systems – and Why Does It Matter?
Social Engineering Red Flags
Email Security Gap Analysis Shows 10.5% Miss Rate
What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?
The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry
On Writing: A Memoir of the Craft by Stephen King
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer
Production Credits:Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha GarlandMusic and Sound Effects by Blue Dot Sessions, Envato Elements, & SmartSoundArtwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/Want to get in touch with Perry? Here's how:
LinkedIn
Twitter
Instagram
Email: hello [at] 8thLayerInsights [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices

Feb 8, 2022 • 1h 4min
How to Fool The White House -- A conversation with James Linton (aka The Email Prankster)
On this episode, Perry sits down with James Linton (formerly known as The Email Prankster). In 2017, James went on a virtual joyride exploiting the ways that people interact with emails. One of the most interesting things about James' story is that his exploits didn't rely on any type of highly technical method(s); they were simple display name deceptions. But that didn't stop him from fooling CEOs from some of the worlds largest banks, celebrities, and high ranking staff members in the White House.James' success using these simple methods serves as a warning for us all. We don't fall for scams because they are technically sophisticated or because we are stupid. We fall for scams because we are human.Guest: James Linton (LinkedIn) (Website)Books and Resources:
Anatomy Of An Email Impersonation Spree: Who Got Pranked And Why
An email prankster is hitting the CEOs of the world's biggest banks
How to Prank the Rich and Powerful Without Really Trying
Morgan Stanley CEO James Gorman falls for email prank
This Man Pranked Eric Trump And Harvey Weinstein — Now He Just Wants A Job
Media Coverage YouTube Playlist
James Linton -- Wikipedia Entry
The Journal of Best Practices: A Memoir of Marriage, Asperger Syndrome, and One Man's Quest to Be a Better Husband by David Finch
Perry -- Interview on Springbrook's Converge Autism Radio
Perry -- Security Weekly Interview
Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer
Production Credits:Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks.Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/Want to get in touch with Perry? Here's how:
LinkedIn
Twitter
Instagram
Email: hello [at] 8thLayerInsights [dot] com
Learn more about your ad choices. Visit megaphone.fm/adchoices