SlideShare uma empresa Scribd logo
1 de 39
Security Culture
Why You Need One and How to Create It
Masha Sedova
Co-Founder, Elevate Security
InfoQ.com: News & Community Site
• Over 1,000,000 software developers, architects and CTOs read the site world-
wide every month
• 250,000 senior developers subscribe to our weekly newsletter
• Published in 4 languages (English, Chinese, Japanese and Brazilian
Portuguese)
• Post content from our QCon conferences
• 2 dedicated podcast channels: The InfoQ Podcast, with a focus on
Architecture and The Engineering Culture Podcast, with a focus on building
• 96 deep dives on innovative topics packed as downloadable emags and
minibooks
• Over 40 new content items per week
Watch the video with slide
synchronization on InfoQ.com!
https://www.infoq.com/presentations/
techniques-security-culture/
Purpose of QCon
- to empower software development by facilitating the spread of
knowledge and innovation
Strategy
- practitioner-driven conference designed for YOU: influencers of
change and innovation in your teams
- speakers and topics driving the evolution and innovation
- connecting and catalyzing the influencers and innovators
Highlights
- attended by more than 12,000 delegates since 2007
- held in 9 cities worldwide
Presented at QCon San Francisco
www.qconsf.com
Elevate Security 2
About me
Built and ran Salesforce
trust engagement team
Co-Founder, building the
Behavioral Security Platform
Passionate about the intersection
of security & behavioral science
Cyber Analyst for
defense community
Elevate Security 3
Customer trust is built on security
Elevate Security 4
Elevate Security 5
52% of all breaches in the last
year were due to hacking -VDBIR
Elevate Security 6
Culture
Elevate Security 7
What is culture?
Behavior
Artifacts
Beliefs
Values
Assumptions
Experiences
“The way we do things around here....”
Our experiences shape our
beliefs, values, assumptions
Our behaviors aredriven by beliefs
“Culture eats
strategy for
breakfast.”
-Peter Drucker
Elevate Security 9
Security Culture is a Subset of Enterprise Culture
Enterprise
IT
Security
Elevate Security 10
Positive vs Negative Security Culture
Elevate Security 11
Competing Priorities
Pick two
Elevate Security 12
Deadlines
Cost
Bonus
Security
Security FailureSecurity Debt
Opposing forces in an employee’s
business decisions
Elevate Security 13
The Competing
Security Cultures
Framework
Process Culture
Goal: Enforce Policy
Compliance
Culture
Goal: Pass Audits
Trust
Culture
Goal: Empower People
Autonomy
Culture
Goal: Get Results
ExternalFocus
InternalFocus
Tight Control
Loose Control
Elevate Security 14
Process Culture
Managed Coordination
Stability
Visibility
Standardization
Goal: Enforce Policy
Compliance Culture
Rational Goals
Conformity
Repeatability
Documentation
Goal: Pass Audits
Trust Culture
Human Relations
Communication
Participation
Commitment
Goal: Empower People
Autonomy Culture
Adaptive Systems
Flexibility
Agility
Innovation
Goal: Get Results
ExternalFocus
InternalFocus
Tight Control
Loose Control
Elevate Security 15
Results of SCDS
How do we
drive change?
Elevate Security 17
Root Cause Analysis
Elevate Security 18
Understanding the Problem
The Five Whys Tool
Ask the five whys to
get to the root of a
problem.
Elevate Security 19
The Five Whys- Example
Problem Statement:
My car battery is dead
1. Why? – The alternator is not functioning.
2. Why? – The alternator belt has broken.
3. Why? – The alternator belt was well beyond
its useful service life and has never been
replaced.
4. Why? – I have not been maintaining my
alternator belt according to any recommended
service schedule.
5. Why? I didn’t realize this had to be done.
Elevate Security 20
Investigate Root Cause
● Can this be solved with technology?
Do it! Changing mindset is the hardest way to go about enforcing change.
● “I didn’t realize that security was part of my job.”
Communication, marketing, awareness campaigns
● “I didn’t know what to do about it.”
Training and skills
● “I didn’t have the resources or support to do it.”
Management alignment
● “I didn’t want to.”
Gamification and incentives
Behavior
Change
Motivation
Ability
Trigger
Key components of behavioral science
Elevate Security 23
Behavior change model
*Dr. BJ Fogg
Motivation
Ability
High
Low
Hard Easy
Triggers
Fail
Triggers
Succeed
Elevate Security 24
Behavior change model
*Dr. BJ Fogg
Motivation
Ability
High
Low
Hard Easy
Triggers
Fail
Triggers
Succeed
Elevate Security 25
Remember 20 unique
characters across 40+ sites
Install a password manager
Install a man-trap or
in/out badging
Social accountability
Look up correct email,
reporting guidelines & send
Install a “report” button
Security action can be simplified
Have secure
passwords for all sites
Report
suspicious activity
Stop
tailgating
HARD
EASY
Elevate Security 26
*Dr. BJ Fogg
Motivation
Ability
High
Low
Hard Easy
Triggers
Fail
Triggers
Succeed
What about things that are hard to do?
Elevate Security 27
Most employees will not care about
security as much as we’d like them to
Elevate Security 28
People will do things
because they matter, they
are interesting, part of
something more
important.
Daniel Pink, Drive
What motivates us?
“
”
Elevate Security 29
How to Create Positive Motivation
Competition Altruism Access AchievementStatus
Elevate Security 30
The power of
social proof
Elevate Security 31
Social proof
in security
Control
Keep Your Account Safe
108 of your friends use extra security settings. You can
also protect your account and make sure it can be
recovered if you ever lose access.
Keep Your Account Safe
You can use security settings to protect your account
and make sure it can be recovered if you ever lose
access.
Social context
1.36x more successful
when using social proof
Elevate Security 32
Compromised Rates
Elevate Security 33
Password manager
Elevate Security 34
Applying Gamification
Elevate Security 35
Understand your security culture
Assess if its a positive or negative security culture
Identify the blockers to positive security culture
Reinforce and motivate positive behaviors
Takeaways
Elevate Security 36
Q&A
Masha@ElevateSecurity.com
Watch the video with slide
synchronization on InfoQ.com!
https://www.infoq.com/presentations/
techniques-security-culture/

Mais conteúdo relacionado

Mais de C4Media

Shifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDShifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDC4Media
 
CI/CD for Machine Learning
CI/CD for Machine LearningCI/CD for Machine Learning
CI/CD for Machine LearningC4Media
 
Fault Tolerance at Speed
Fault Tolerance at SpeedFault Tolerance at Speed
Fault Tolerance at SpeedC4Media
 
Architectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsArchitectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsC4Media
 
ML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsC4Media
 
Build Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerBuild Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerC4Media
 
User & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleUser & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleC4Media
 
Scaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeScaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeC4Media
 
Make Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereMake Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereC4Media
 
The Talk You've Been Await-ing For
The Talk You've Been Await-ing ForThe Talk You've Been Await-ing For
The Talk You've Been Await-ing ForC4Media
 
Future of Data Engineering
Future of Data EngineeringFuture of Data Engineering
Future of Data EngineeringC4Media
 
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreAutomated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreC4Media
 
Navigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery TeamsNavigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery TeamsC4Media
 
High Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechHigh Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechC4Media
 
Rust's Journey to Async/await
Rust's Journey to Async/awaitRust's Journey to Async/await
Rust's Journey to Async/awaitC4Media
 
Opportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven UtopiaOpportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven UtopiaC4Media
 
Datadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/DayDatadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/DayC4Media
 
Are We Really Cloud-Native?
Are We Really Cloud-Native?Are We Really Cloud-Native?
Are We Really Cloud-Native?C4Media
 
CockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL DatabaseCockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL DatabaseC4Media
 
A Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with BrooklinA Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with BrooklinC4Media
 

Mais de C4Media (20)

Shifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDShifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CD
 
CI/CD for Machine Learning
CI/CD for Machine LearningCI/CD for Machine Learning
CI/CD for Machine Learning
 
Fault Tolerance at Speed
Fault Tolerance at SpeedFault Tolerance at Speed
Fault Tolerance at Speed
 
Architectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsArchitectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep Systems
 
ML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.js
 
Build Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerBuild Your Own WebAssembly Compiler
Build Your Own WebAssembly Compiler
 
User & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleUser & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix Scale
 
Scaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeScaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's Edge
 
Make Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereMake Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home Everywhere
 
The Talk You've Been Await-ing For
The Talk You've Been Await-ing ForThe Talk You've Been Await-ing For
The Talk You've Been Await-ing For
 
Future of Data Engineering
Future of Data EngineeringFuture of Data Engineering
Future of Data Engineering
 
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreAutomated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
 
Navigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery TeamsNavigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery Teams
 
High Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechHigh Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in Adtech
 
Rust's Journey to Async/await
Rust's Journey to Async/awaitRust's Journey to Async/await
Rust's Journey to Async/await
 
Opportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven UtopiaOpportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven Utopia
 
Datadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/DayDatadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/Day
 
Are We Really Cloud-Native?
Are We Really Cloud-Native?Are We Really Cloud-Native?
Are We Really Cloud-Native?
 
CockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL DatabaseCockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL Database
 
A Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with BrooklinA Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with Brooklin
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Security Culture: Why You Need One and How to Create It

  • 1. Security Culture Why You Need One and How to Create It Masha Sedova Co-Founder, Elevate Security
  • 2. InfoQ.com: News & Community Site • Over 1,000,000 software developers, architects and CTOs read the site world- wide every month • 250,000 senior developers subscribe to our weekly newsletter • Published in 4 languages (English, Chinese, Japanese and Brazilian Portuguese) • Post content from our QCon conferences • 2 dedicated podcast channels: The InfoQ Podcast, with a focus on Architecture and The Engineering Culture Podcast, with a focus on building • 96 deep dives on innovative topics packed as downloadable emags and minibooks • Over 40 new content items per week Watch the video with slide synchronization on InfoQ.com! https://www.infoq.com/presentations/ techniques-security-culture/
  • 3. Purpose of QCon - to empower software development by facilitating the spread of knowledge and innovation Strategy - practitioner-driven conference designed for YOU: influencers of change and innovation in your teams - speakers and topics driving the evolution and innovation - connecting and catalyzing the influencers and innovators Highlights - attended by more than 12,000 delegates since 2007 - held in 9 cities worldwide Presented at QCon San Francisco www.qconsf.com
  • 4. Elevate Security 2 About me Built and ran Salesforce trust engagement team Co-Founder, building the Behavioral Security Platform Passionate about the intersection of security & behavioral science Cyber Analyst for defense community
  • 5. Elevate Security 3 Customer trust is built on security
  • 7. Elevate Security 5 52% of all breaches in the last year were due to hacking -VDBIR
  • 9. Elevate Security 7 What is culture? Behavior Artifacts Beliefs Values Assumptions Experiences “The way we do things around here....” Our experiences shape our beliefs, values, assumptions Our behaviors aredriven by beliefs
  • 11. Elevate Security 9 Security Culture is a Subset of Enterprise Culture Enterprise IT Security
  • 12. Elevate Security 10 Positive vs Negative Security Culture
  • 13. Elevate Security 11 Competing Priorities Pick two
  • 14. Elevate Security 12 Deadlines Cost Bonus Security Security FailureSecurity Debt Opposing forces in an employee’s business decisions
  • 15. Elevate Security 13 The Competing Security Cultures Framework Process Culture Goal: Enforce Policy Compliance Culture Goal: Pass Audits Trust Culture Goal: Empower People Autonomy Culture Goal: Get Results ExternalFocus InternalFocus Tight Control Loose Control
  • 16. Elevate Security 14 Process Culture Managed Coordination Stability Visibility Standardization Goal: Enforce Policy Compliance Culture Rational Goals Conformity Repeatability Documentation Goal: Pass Audits Trust Culture Human Relations Communication Participation Commitment Goal: Empower People Autonomy Culture Adaptive Systems Flexibility Agility Innovation Goal: Get Results ExternalFocus InternalFocus Tight Control Loose Control
  • 18. How do we drive change?
  • 19. Elevate Security 17 Root Cause Analysis
  • 20. Elevate Security 18 Understanding the Problem The Five Whys Tool Ask the five whys to get to the root of a problem.
  • 21. Elevate Security 19 The Five Whys- Example Problem Statement: My car battery is dead 1. Why? – The alternator is not functioning. 2. Why? – The alternator belt has broken. 3. Why? – The alternator belt was well beyond its useful service life and has never been replaced. 4. Why? – I have not been maintaining my alternator belt according to any recommended service schedule. 5. Why? I didn’t realize this had to be done.
  • 22. Elevate Security 20 Investigate Root Cause ● Can this be solved with technology? Do it! Changing mindset is the hardest way to go about enforcing change. ● “I didn’t realize that security was part of my job.” Communication, marketing, awareness campaigns ● “I didn’t know what to do about it.” Training and skills ● “I didn’t have the resources or support to do it.” Management alignment ● “I didn’t want to.” Gamification and incentives
  • 25. Elevate Security 23 Behavior change model *Dr. BJ Fogg Motivation Ability High Low Hard Easy Triggers Fail Triggers Succeed
  • 26. Elevate Security 24 Behavior change model *Dr. BJ Fogg Motivation Ability High Low Hard Easy Triggers Fail Triggers Succeed
  • 27. Elevate Security 25 Remember 20 unique characters across 40+ sites Install a password manager Install a man-trap or in/out badging Social accountability Look up correct email, reporting guidelines & send Install a “report” button Security action can be simplified Have secure passwords for all sites Report suspicious activity Stop tailgating HARD EASY
  • 28. Elevate Security 26 *Dr. BJ Fogg Motivation Ability High Low Hard Easy Triggers Fail Triggers Succeed What about things that are hard to do?
  • 29. Elevate Security 27 Most employees will not care about security as much as we’d like them to
  • 30. Elevate Security 28 People will do things because they matter, they are interesting, part of something more important. Daniel Pink, Drive What motivates us? “ ”
  • 31. Elevate Security 29 How to Create Positive Motivation Competition Altruism Access AchievementStatus
  • 32. Elevate Security 30 The power of social proof
  • 33. Elevate Security 31 Social proof in security Control Keep Your Account Safe 108 of your friends use extra security settings. You can also protect your account and make sure it can be recovered if you ever lose access. Keep Your Account Safe You can use security settings to protect your account and make sure it can be recovered if you ever lose access. Social context 1.36x more successful when using social proof
  • 37. Elevate Security 35 Understand your security culture Assess if its a positive or negative security culture Identify the blockers to positive security culture Reinforce and motivate positive behaviors Takeaways
  • 39. Watch the video with slide synchronization on InfoQ.com! https://www.infoq.com/presentations/ techniques-security-culture/