SECURITY CULTURE HACKING: DISRUPTING THE SECURITY STATUS QUO

Similar documents
Running a Bug Bounty Program

Social Engineering & How to Counteract Advanced Attacks. Joe Ferrara, President and CEO Wombat Security Technologies, Inc.

Global SCRUM GATHERING Reviewer Guidelines

Navy Family Framework

Golden Medallion Award Entry Special Communications Projects/Campaigns Internal Employee Engagement Plan

Welcome to the Forever Incentives Brochure. Your journey starts here. AUSTRALIA & NEW ZEALAND RALLY ALOE AMBASSADOR INCENTIVE LOCAL TRAVEL INCENTIVE

4/26/2017. I ll Do It My Way, Thank You Performance Improvement Strategies for Home Care. Session Objectives. Session Agenda

CROWDFUNDING STAKEHOLDER TOOLKIT BUILDING YOUR COMMUNITY

CAMPAIGN TEAM GUIDE 2018

About Advocate Good Samaritan Hospital

2017 TPCA Conference Schedule (subject to change)

Beyond Cost and Utilization: Rethinking Evaluation Strategies for Complex Care Programs

North School of Pharmacy and Medicines Optimisation Strategic Plan

Planning guidance National Breaking the Cycle Initiative April 2015

LOCAL COMMITTEE HANDBOOK. Module 6. Fundraising

Select the theme that best fits your abstract. You may use the Theme Areas of Focus (on the left sidebar) to help select the most appropriate theme.

FY2025 Master Plan/ FY Strategic Plan Summary

Work Smarter Not Harder

Prepare to Pack Your Bags!

Healing the Body Enriching the Mind Nurturing the Soul. Lighting Our Way Covenant Health Strategic Plan Overview

HR Conference Notebook

Quality Improvement Strategy 2017/ /21

Investing in Disruptive Science, for Non-Scientists

DesignNCut Creative Team Application

Employee Campaign Coordinator Training. United Way of Lebanon County Campaign

2015 HEALTHMATTERS PROGRAM. Help yourself to. good health

Creating Exceptional Physician-Nurse Partnerships

Transform Your Business Model with Social Enterprise Presented by:

2014 COMBINED CHARITIES CAMPAIGN COORDINATOR ORIENTATION

BPM Bootcamp 101 and 201

Copyright 2013 Alliance for Nevada Nonprofits 1

Running GM Reports in PeopleSoft

Editing Video for Storytelling. April 3, 2018

Improving the quality and safety of patient care through your workforce. Listening into Action (LiA) Briefing Pack

Trek, Bike Or Climb: Take your fundraising to new heights with an inspirational challenge trip

Hacking Bootcamp: Learning The Basics Of Hacking By C.J. McAllister, David Maxwell

WELCOME. Whatever the mind can conceive and believe, the mind can achieve. Dr. Napoleon Hill. from Lee Sharma

11/7/14. Community-Driven Fundraising. Ac#va#ng Your Supporters for Collec#ve Change. Joleen Ong Megan Keane. About NTEN

Gateway to Crowdfunding

City of Vancouver Digital Strategy. April 9, 2013

Presents the Game Plan for Higher Ed. Higher Ed Kickoff Meeting Workbook

2018 COMMUNICATIONS TOOLKIT

Four Safety Truths that Reduce Workplace Injuries. Llanne Jocson Concepcion OSH Practitioner

College Friday Activity Toolkit

Leadership for Quality A Strategy for Marketplace Success. Requirements for Transformation. Typical State of Shared Vision. It All Starts With Urgency

Patient and Family Caregiver Engagement The Change Foundation

Nursing Documentation 101

Meaningful Patient and Family Partnerships: Evidence and Leadership

HealthEast DiversityRx Quality Health Care for Culturally Diverse Populations

Dear Educator, Thank you for your interest in the Catholic Charities Service in Schools program. We look forward to partnering with you.

EXECUTIVE SUMMARY... 3 INTRODUCTION... 3 VISION, MISSION, GUIDING PRINCIPLES... 4 BUSINESS PLAN OUTLINE... 4 OVERVIEW OF STRATEGIC DIRECTIONS...

Dear Parent or Guardian, Thank you for your interest in the Catholic Charities Service in Schools program. We look forward to partnering with you.

Summer Intensive Fundraising Masterclass

FEATURES AND FUNCTIONALITY GUIDE

The Patient s Voice. Key findings from LHIN engagements with patients, families and caregivers. September 2015

Wednesday, April 22, :00 a.m. Eastern

SUCCESSFUL ROUNDING IMPLEMENTATION

Technology's Threat Landscape: Healthcare's New Battleground

Fundraising Solutions For Charities

Leveraging Nonprofits as Endowment Builders. Engaging nonprofits for donor connectivity and growing their own endowments

September Dear CME Colleagues,

Bug Bounty programs in Switzerland? Florian Badertscher, C1 - public

Lessons Learned from North America s First All Digital Hospital

Roadmap to Accreditation

Prototyping at West County Health Centers

MCPS on the Move Program Guide: What is MCPS on the Move? Online Tools The Coach s Role The Competition and Prizes Next Steps

The influx of newly insured Californians through

Patient Experience & Engagement Strategy Listen & Learn

Dear Bootcamper, Business School Bootcamp for Therapists! We want to welcome you to your Lifetime Membership of the

Defining and Tracking Grant Outcomes

6Cs in social care. Introduction

COMPETITION GUIDELINES

Jackie Loversidge, PhD, RNC-AWHC Assistant Professor of Clinical Nursing The Ohio State University College of Nursing

THE VIRTUAL MANAGER: LEADING SUCCESSFUL TEAMS FROM AFAR #ILTA048 #ILTACON

Consultation on developing approach to regulating registered pharmacies

TAPP The Telework Assessment and Profile Process Who is TCR? What is the TAPP Where does the TAPP fit in? Why is a Strategy Needed?

Philanthropy and Fundraising in Today s Environment. Beyond Federal Funds: The role of Philanthropy and Fundraising.

2016 Bug Bounty Hacker Report

Employee Campaign Manager TRAINING GUIDE

the communities of coastal georgia foundation + you

second-harvest-hero/

Pediatric Collaborative Executive Summary

A Winning Program For Chairs, Vice Chairs & Directors!

Health Literacy and Patient Safety: A Clear Health Communication Mandate

for success Strategic Plan 1 Doctors Nova Scotia Strategic Plan Highlights

Confronting the Challenges of Rare Disease:

Courtesy of Mark F. Weiss

Kim Baker, Chief Executive Officer, Central LHIN

The UNC System Needs a More Comprehensive Approach and Metrics for Operational Efficiency

The Patient Experience Paradigm

Fundraising Toolkit. Table of Contents

SUMMARY REPORT TRUST BOARD IN PUBLIC 3 May 2018 Agenda Number: 9

White Coat Many Hats

Strategy & Business Plan: Executive Summary

INNOVATIONS IN CARE MANAGEMENT. Michael Burcham, Narus Health

University Advancement

Facebook & MySpace: Strategies to Boost Your Alumni & Development Efforts

Quality Improvement Plan (QIP) Narrative: Markham Stouffville Hospital Last updated: March 29, 2018 v5

York Teaching Hospital NHS Foundation Trust. Caring with pride. The Nursing and Midwifery Strategy

Welcome Sector Champions. The session will begin soon.

Transcription:

SESSION ID: HUM-R14 SECURITY CULTURE HACKING: DISRUPTING THE SECURITY STATUS QUO Christopher J. Romeo CEO Security Journey @edgeroute

Agenda Security culture hacking The security culture hacker How to hack a security culture Phase 1: Assess Phase 2: Communicate Phase 3: Connect Phase 4: Teach Phase 5: Reward Where to start and year one

Security culture Systems Structure Shared Values Style Security culture Staff Skills Strategy

The reality of security culture What happens with security when people are left to their own devices.

Security culture goals Shared responsibility for security A mentality of security first Role-specific, base level knowledge of security Demonstrate impact of security investment

Avoid the security status quo

Security culture is a long game Security people Security interested Early Majority Forced compliance Not going to happen 0-3 months 3-12 months 1-2 years 2-4 years Never

Security culture that lasts A plan with a disruptive edge Fun for all parties involved Rewards engage with stuff Return on investment via metrics

Security culture hacking Security culture hacking = applying a series of shortcuts or tricks for getting an org to focus on security, one person at a time.

Communication, active listening, collaboration Skills of the security culture hacker Deep knowledge of the area of security you are trying to reach Methodology and lingo Plays with an edge; not always the nice person

Inverse of a social engineer Social Engineer Black hat / works for evil Break in Uses phishing, vishing, impersonation Calls Execs to steal passwords Security Culture Hacker White hat / works for good Build up Persuasion skills E-mail, web conference, and face-to-face meetings Calls Execs to protect passwords

How to hack a security culture Phase 5: Reward Phase 4: Educate Phase 3: Connect Phase 2: Communicate Phase 1: Assess

Phase 1: Assess Goal: Create a strategy based on where the organization needs to go in the quest for a strong security culture.

Assessment random sampling Information Security Developers Executives Program Managers Finance HR

A simple self-assessment What does security mean to us as an organization? How do we do security? How does security impact each job role? How risky is our application fleet or data that we store? Who are the attackers we face? Do we do high-level security awareness training? Role-specific? Ever heard of a secure design principle? What are some that we apply? Do we have a security response team? How do we contact them?

Case study: water cooler

Assessment tips for success Time box Assess --> Strategy Other sources

Phase 2: Communicate Goal: Reach out to people from across the organization, at all levels, and tell them about security.

Various communication approaches Bottoms up Top down Hybrid

Case study: scare tactics Break whatever you build in front of your Executives

Communication tips for success Strategy Travel Face to face

Phase 3: Connect Advocates Ambassadors Champions Guilds Goal: Educate about security and embed expertise within every team.

Champion case study

Champion tips for success Organizational distribution Clear roles and expectations Management support and buy-in is mandatory Program as destination; create a program that people seek out Invest in the champions and they will pay it forward

Champion activities Monthly training Online community Miniconference Spot the flaw Hack-a-thons Full conference

Phase 4: Educate Goal: Provide meaningful, transformational security education that everyone wants to consume.

Mechanisms of security learning Video Classroom Hands-on

Continuous security education case study

Continuous security education tips for success Begin with the foundations; never assume base knowledge Start with why; focus on why the learner needs to care Connect Security Champions with the education program Recognize individual achievements or levels Pick a fun theme and market the program using the theme Role-specific education

Phase 5: Reward Goal: Use more carrot and less stick to encourage the adoption of security culture.

Reward using the tools you already have Good job in front of team E-mail Gift cards Cash Enhanced training External conferences

Rewards case study

Rewards tips for success Ask team members for reward ideas Plug into existing organizational rewards and recognition programs Reward early and often; a rewards program is not a place to by stingy

Data (Metrics) Flaw prevalence -- lower count of vulnerabilities and security bugs Security bug fix rate Physical security incidents (tailgating) Total number of people that reach each education level Total number of security activities Security community engagement Positive engagements with the security team

A hacked security culture Recognition Continuous security education Security champions Bottoms up, top down comms Strategy Phase 5: Reward Phase 4: Educate Phase 3: Connect Phase 2: Communicate Phase 1: Assess 0-4 years

Apply Slide Next week you should: Begin the security culture assessment process and build out a culture strategy In the first three months following this presentation you should: Begin the communicate phase (ongoing forever), and connect at grass roots and Executive levels Begin the process of identifying rewards and recognition Within six months you should: Launch your Security Champions program Deploy continuous security education Continue rewards and recognition roll-out 40

Q+A and Thank you! Chris Romeo, CEO / Co-Founder chris_romeo@securityjourney.com www.securityjourney.com @edgeroute, @SecurityJourney