Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Euro...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=lDJGvcIXxZ8



Duration: 0:00
3 views
0


Dr. Jason Nurse, academic and cybersecurity behavior researcher, joins Marco Ciappelli at Infosecurity Europe to unpack the shift in cybersecurity thinking—away from purely technical measures and toward a deeper understanding of human behavior and psychology. Nurse focuses his work on why people act the way they do when it comes to security decisions, and how culture, community, and workplace influences shape those actions.


Behavior is increasingly taking center stage in security conversations, and for good reason. Nurse points to recent attacks that succeed not because of flaws in technology but due to the manipulation of individuals—such as social engineering tactics that target help desk personnel. These incidents highlight how behavioral cues and psychological triggers are weaponized, making it critical for organizations to address not just systems, but the people using them.


The conversation then shifts to artificial intelligence, particularly the growing issue of “shadow AI” in corporate settings. Nurse cites research from the National Cybersecurity Alliance’s Behavior Report, revealing that approximately 40% of employees who use AI admit to sharing sensitive corporate information with these tools—often without their employer’s awareness. Even more concerning, over half of those organizations offer no training on safe or responsible AI use.


Rather than banning AI outright, Nurse advocates for responsible use grounded in training and transparency. He acknowledges that some companies attempt to enforce boundaries by deploying internal AI systems, but these are often limited in capability. Others are exploring solutions to filter or sanitize inputs, though achieving a practical balance remains elusive.


The conversation also touches on the emotional and psychological bonds forming between individuals and AI. Nurse notes that users increasingly treat AI like a companion, trusting it with personal information and seeking advice, even in sensitive contexts such as mental health. That trust, while understandable, opens new avenues for misuse and misjudgment—especially when users forget AI lacks genuine understanding.


This episode prompts an important question: as AI becomes part of our daily routines, how do we maintain control, context, and caution in our interactions with it—and what does that mean for the future of security?


___________

Guest: Dr. Jason R.C. Nurse, Associate Professor in Cybersecurity at the University of Kent | https://www.linkedin.com/in/jasonrcnurse/


Hosts:
Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.com/


Marco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com/


___________


Episode Sponsors


ThreatLocker: https://itspm.ag/threatlocker-r974


___________


Resources


Learn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25


Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage


Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf


Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us


___________


KEYWORDS


marco ciappelli, jason nurse, infosecurity europe, behavior, psychology, cybersecurity, ai, social engineering, workplace, trust, event coverage, on location, conference




Other Videos By ITSPmagazine


2025-06-10From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | An Infosecurity Europe...
2025-06-10Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach with Steve Wright
2025-06-10From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | An Infosecurity Europe...
2025-06-10The Digital Dark Alley: Teaching Cybersecurity Like Fire Safety by Building Cyber Habits Jemma Davis
2025-06-10Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in ...
2025-06-10Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in ...
2025-06-10From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | Infosecurity w/ Rob Black
2025-06-10Reframing | A Conversation with Frank Douglas | After 40 Podcast with Dr. Deborah Heiser
2025-06-10Reframing | A Conversation with Frank Douglas | After 40 Podcast with Dr. Deborah Heiser
2025-06-10Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Cyber Link
2025-06-10Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Euro...
2025-06-09From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsl...
2025-06-09From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsl...
2025-06-09From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsl...
2025-06-09Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Euro...
2025-06-09From Vulnerability to Visibility: Rethinking Exposure Management | Tod Beardsley from runZero
2025-06-09Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI with Jason Nurse
2025-06-08The Billion-Dollar Blueprint: Following the Digital Trail of Criminal Cash and the Human Cost of ...
2025-06-08The Billion-Dollar Blueprint: Following the Digital Trail of Criminal Cash—Human Cost of Cybercrime
2025-06-08When Automation Meets Ethics, Budget, Data, and Risk: The Real Factors Behind AI Deployment | An ...
2025-06-08When Automation Meets Ethics, Budget, Data, and Risk: Real Factors Behind AI Deployment Andrea Isoni