Outside the Ivory Tower: Connecting Practice and Science—Why Human-Centered Cybersecurity Needs Both

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=CAf8_MsQT-U



Duration: 0:00
4 views
0


During the upcoming OWASP Global AppSec EU in Barcelona, Kate Labunets, a cybersecurity researcher focused on human factors and usable security, takes the stage to confront a disconnect that too often holds the industry back: the gap between academic research and real-world cybersecurity practice.

In her keynote, “Outside the Ivory Tower: Connecting Practice and Science,” Kate invites practitioners to reconsider their relationship with academic research—not as something removed from their daily reality, but as a vital tool that can lead to better decisions, more targeted security programs, and improved organizational resilience.

Drawing from her current research, Kate shares how interviews and surveys with employees reveal the hidden motivations behind the use of shadow IT—tools and technologies adopted without formal approval. These aren’t simply acts of rebellion or ignorance. They reflect misalignments between human behavior, workplace needs, and policy communication. By understanding these mindsets, organizations can move beyond one-size-fits-all training and begin designing interventions grounded in evidence.

This is where science meets practice. Kate’s work isn’t about generating abstract theories. It’s about applying research methods—like anonymous interviews and behavior-focused surveys—to surface insights that security leaders can act on. But for this to happen, researchers need access, and that depends on building trust with practitioners.

The keynote also raises a critical point about time. In industries like medicine, the gap between a published discovery and its application in the real world can be 15 years. Kate argues that cybersecurity faces a similar delay, citing the example of multi-factor authentication: patented in 1998, but still not universally adopted today. Her goal is to accelerate this timeline by helping practitioners see themselves as contributors to science—not just consumers of its outcomes.

By inviting companies to participate in research and engage with universities, Kate’s message is clear: collaboration benefits everyone. The path to smarter, more human-aligned cybersecurity isn’t gated behind academic walls. It’s open to any team curious enough to ask better questions—and brave enough to challenge assumptions.GUEST: Kate Labunets | Assistant Professor (UD1) in Cyber Security at Utrecht University | https://www.linkedin.com/in/klabunets/

HOSTS:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin

Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli

SPONSORS

Manicode Security: https://itspm.ag/manicode-security-7q8i

RESOURCES

Kate's Session: https://owasp2025globalappseceu.sched.com/event/1v86U/keynote-outside-the-ivory-tower-connecting-practice-and-science

Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain

Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage

Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf

Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us




Other Videos By ITSPmagazine


2025-05-28The API That Could Transform Software Transparency | An OWASP AppSec Global 2025 Conversation wit...
2025-05-28From AppSec Training to AI Standards: Teaching AI to Code Securely | A Brand Story with Jim Manic...
2025-05-28Redefining What Secure Application Development Looks Like: Bringing Application Security w/ ASVS v5
2025-05-28When Simplicity Meets Strategy: Making Immutability Accessible for All | A Brand Story with Sterl...
2025-05-27Turning AppSec into a Workflow, Not a Roadblock – Building Security Programs That Teams Want to Use
2025-05-27Turning AppSec into a Workflow, Not a Roadblock – Building Security Programs That Teams Actually ...
2025-05-27Turning AppSec into a Workflow, Not a Roadblock – Building Security Programs That Teams Actually ...
2025-05-26The 30s | A Conversation with Bryan Wish | After 40 Podcast with Dr. Deborah Heiser
2025-05-26The 30s | A Conversation with Bryan Wish | After 40 Podcast with Dr. Deborah Heiser
2025-05-26Agentic AI to the Rescue? From Billable Hours to Bots: The New Legal Workflow
2025-05-25Outside the Ivory Tower: Connecting Practice and Science—Why Human-Centered Cybersecurity Needs Both
2025-05-22What Helps You Sleep Better at Night: A Practical Take on Zero Trust | ThreatLocker Brand Story
2025-05-22What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob All...
2025-05-22What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob All...
2025-05-22From Cassette Tapes and Phrasebooks to AI Real-Time Translations — Machines Can Now Speak for Us,...
2025-05-22What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob All...
2025-05-22NASA's Budget for 2026: Tough Times Ahead
2025-05-22When Guardrails Aren’t Enough: How to Handle AI’s Hidden Vulnerabilities | An Infosecurity Europe...
2025-05-22When Guardrails Aren’t Enough: How to Handle AI’s Hidden Vulnerabilities | An Infosecurity Europe...
2025-05-22When Guardrails Aren’t Enough: How to Handle AI’s Hidden Vulnerabilities | Infosecurity Europe 2025
2025-05-22Celebrating 30 Years of Connection, Innovation, and Community at Infosecurity Europe in London | ...