­
Unraveling the Illusion of Control: The Power of Habits in Human Behavior By Bikash Barai And Jennifer Lawinski - All Articles - CISO Platform

Unraveling%20the%20Illusion%20of%20Control%20The%20Power%20of%20Habits%20in%20Human%20Behavior.png?profile=RESIZE_710x

 

Welcome, esteemed attendees of the RSA Conference, to a discourse on a fundamental truth often obscured by the veneer of consciousness: our lack of control over our own actions. Despite our fervent belief in our autonomy, the reality is that much of our behavior is dictated by deeply ingrained habits that operate beneath the surface of our awareness. Join me as we delve into the intricate structure of human habits and explore how understanding this phenomenon can revolutionize our approach to IT security.

 

 

Here is the verbatim discussion:

The central theme is that we are not in control even though we would love to think that we are in control but we are not and I I would explain the the basic structure of a human habit and if you look at the kind of things which we do in our day-to-day life around 40% of the things which we do we do it unconsciously I'll give an example like tying up the shoelace or driving the car changing the gear all these things we do without thinking if you think tying a shoelace is quite complex right but we do it without thinking or just imagine you are in an elevator and and you are thinking of something mentally engrossed in some thought and the elevator door opens at the wrong floor what happens we just step out right because that's an automated program in our mind to step out when the door opens so we have a lot of these programs in our mind which are kind of inbuilt and which get triggered automatically every time there's that right trigger so one part of my talk is in terms of understanding the structure of human behavior or human habits so basically uh there are three parts one is the trigger then there is a routine and then there is a reward so we all respond to things in uh a specific way when the trigger happens and interestingly uh there are these companies uh like Coca-Cola and and Facebook and Google.

 

Highlights:

The Illusion of Control: Despite our desires to believe otherwise, research indicates that a significant portion of our daily actions occur on autopilot, driven by habit rather than conscious deliberation. From mundane tasks like tying shoelaces to complex behaviors like driving a car, approximately 40% of our actions are executed unconsciously. This realization challenges the notion of human agency and underscores the powerful influence of habit in shaping behavior.

Decoding the Structure of Habits: At the core of human habits lies a triad of components: the trigger, the routine, and the reward. When confronted with a particular cue or trigger, our brains instinctively initiate a predetermined routine, culminating in a reward that reinforces the behavior. This cyclical process forms the bedrock of habit formation, dictating our responses to stimuli in a predictable manner.

Insights from Corporate Giants: The ubiquity of habit-driven behavior extends beyond individual actions to shape the strategies of corporate behemoths like Coca-Cola and Facebook. Through meticulously crafted triggers, routines, and rewards, these companies engineer addictive products and experiences that compel users to engage with their platforms habitually. By leveraging insights from behavioral psychology, they exploit the innate tendencies of human cognition to drive desired outcomes.

 

As we reflect on the interplay between habit and human behavior, it becomes evident that our perceived agency is but an illusion, overshadowed by the omnipresent influence of habit. By unraveling the intricacies of habit formation and acknowledging our susceptibility to its sway, we can unlock new avenues for promoting IT security within organizations. Rather than relying solely on awareness campaigns, let us harness the power of habits to instill secure behaviors seamlessly and unconsciously. In doing so, we can fortify our defenses against cyber threats and navigate the digital landscape with heightened resilience. As we depart from this discourse, let us carry forth this newfound understanding and usher in a paradigm shift in our approach to cybersecurity.

 

Speakers:

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to
the cloud.

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/

 

Jennifer Lawinski Editor-in-Chief of online engagement for RSA Conference. With experience writing for publications like CRN and CIOInsight, Jennifer has the experience to facilitate the important security conversations. Keep an eye on this space. I am excited to see what the next phase of RSAC 365 will look like.

https://twitter.com/lawinski

https://www.linkedin.com/in/jenlawinski

 

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

CISO MeetUp: Executive Cocktail Reception @ Black Hat USA , Las Vegas 2025

  • Description:

    We are excited to invite you to the CISO MeetUp: Executive Cocktail Reception if you are there at the Black Hat Conference USA, Las Vegas 2025. This event is organized by EC-Council & FireCompass with CISOPlatform as proud community partner. 

    This evening is designed for Director-level and above cybersecurity professionals to connect, collaborate, and unwind in a relaxed setting. Enjoy…

  • Created by: Biswajit Banerjee
  • Tags: black hat 2025, ciso meetup, cocktail reception, usa events, cybersecurity events, ciso

6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.

    Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.

    Date : Sept 2025 - Oct 2025

    Venue: Delhi, Mumbai, Bangalore, Pune,…

  • Created by: Biswajit Banerjee

National Insider Risk Symposium, Washington DC, USA 2025

  • Description:

    We are excited to invite you to the 10th National Insider Risk Symposium, a premier forum bringing together leaders and experts from both the commercial and public sectors to address the evolving landscape of insider threats. CISOPlatform is a proud community partner for this event. 

    Event Details:
    Venue: National Housing Center, 1201 15th St NW, Washington, D.C. 20005
    Dates: September 17–18,…

  • Created by: Biswajit Banerjee
  • Tags: national insider risk symposium, ciso, cybersecurity events, usa events