4 hours 12 minutes
Hello and welcome to another video from the module attribution.
After seeing the cognitive biases and logical fallacy, let's learn together in this lesson how to manage them.
Now that we gather, it's some knowledge to identify biases and logical fallacies.
It's about time to see how we can avoid them or manage them or mitigate them, which is the main objective off this lesson.
Basically, the cognitive bias mitigation
consists on the reduction off negative effects off cognitive biases,
but and we totally avoid our Bisys.
My answer is, no
errors in analyzes may happen, and it is extremely difficult exercise for analysts to defeat their vices, especially the experience at once.
Bye improvement, understanding off vices. It becomes easier to identify and mitigate the impact off flowed reasoning and decision making conventions.
An increasing number off academic and professional disciplines are identifying means off cognitive bias medication.
Let's see how we can manage our bisys
first. It is highly recommended to avoid making decisions under time pressure. Our ability to detect on correct in error in judgment significantly worsen when we are deciding under pressure.
is also advice to avoid making decisions when we are cognitively involved in different task.
Some researchers show that performance on puzzle silent tasks
reduces if participants are asked to keep some numbers in their heads while they are solving the puzzle.
What matters here isn't how many emails reply or how many lines off, Kolja writes. What matters instead, is the quality off your thinking on decisions
insert. It's important to train yourself to think statistically. Statistical thinking is taxing so it doesn't come to us intuitively.
Humans overweight low and high probabilities and completely ignore very low on very high probabilities.
And finally, please always review your findings with Pierce.
Ask others to review your conclusions.
Sometimes others will see things that you missed or can identify gaps in your argument that need to be addressed.
They also provide information that your conclusions are sound and reasonable, given your later.
People tend to make mistakes when there is too much information,
good blacks, information or information linked to probabilities. Do you remember the analyzes methods and techniques that we discuss it in one off our previous models? I mean the structural analytic techniques such as analyzes off competing hypotheses, devils, advocacies, cybercult chain
and courses, affections,
the biggest contribution off these methods is tohave. Analysts defeat and manage their biases and policies.
Let's take the example off entering,
because in cyber threat intelligence, there is new information emerging every second, and ensuring would be one of the most common difficult Bisys to defeat.
This is why working on an analysis using the technique off competing hypothesis or a CH is good in this situation,
with a condition off rethinking new sets off hypothesis whenever there is new information available.
So please don't fall in the trap off tweak and old hypothesis because it will only lead to errors in conclusions.
After taken the time to review our experiences, professional environment and decision making habits, we will all likely find that some of these biases impact us,
our teams or our companies more heavily than others.
It is critical, even in today's environment, off never ending alerts and dangers that cyber security teams and professionals slow down and think more deeply unstrap tragically in order to combat their vices.
we may find that vices are blinding us.
You're the real threats.
This is why we dedicated this'll Essen to see if we can't really avoid our vices.
and how can we manage them using some of the techniques that we learned in previous lessons?
We have also discusses the entering bias.
And how can we manage this bias using the technique off a T H.
The next video will be the last one for this model,
and it will be covering the nation state attribution topic.
Advanced Cyber Threat Intelligence
Advanced Cyber Threat Intelligence will benefit security practitioners interested in preventing cyber threats. Learn how to leverage your existing data sources to extract useful information and find complementary information from external sources.