The Unconscious Habits That Control Our Lives By Bikash Barai And Jennifer Lawinski

Jennifer Lawinski, Editor-In-chief of RSA Conference, speaks with Bikash Barai co founder of CISO Platform & Firecompass. They explores how 40% of our daily actions are unconscious habits driven by triggers, routines, and rewards. It highlights how companies like Coca-Cola, Facebook, and Google leverage these innate human behaviors.

 

 

Here is the verbatim discussion. The central theme is that we are not in control even though we would love to think that we are in control but we are not and I I would explain the the basic structure of a human habit and if you look at the kind of things which we do in our day-to-day life around 40% of the things which we do we do it unconsciously I'll give an example like tying up the shoelace or driving the car changing the gear all these things we do without thinking if you think tying a shoelace is quite complex right but we do it without thinking or just imagine you are in an elevator and and you are thinking of something mentally engrossed in some thought and the elevator door opens at the wrong floor what happens we just step out right because that's an automated program in our mind to step out when the door opens so we have a lot of these programs in our mind which are kind of inbuilt and which get triggered automatically every time there's that right trigger so one part of my talk is in terms of understanding the structure of human behavior or human habits so basically uh there are three parts one is the trigger then there is a routine and then there is a reward so we all respond to things in uh a specific way when the trigger happens and interestingly uh there are these companies uh like Coca-Cola and and Facebook and Google.

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)