Lance Spitzner securingthehuman.sans.org lspitzner@sans.org - - PowerPoint PPT Presentation

lance spitzner
SMART_READER_LITE
LIVE PREVIEW

Lance Spitzner securingthehuman.sans.org lspitzner@sans.org - - PowerPoint PPT Presentation

Lance Spitzner securingthehuman.sans.org lspitzner@sans.org @securethehuman EMET WindowsOS Microsoft Security Essentials Encrypted File System WindowsOS vs. HumanOS AppLocker Mandatory Integrity Control Windows Service Hardening Security


slide-1
SLIDE 1

Lance Spitzner

securingthehuman.sans.org lspitzner@sans.org @securethehuman

slide-2
SLIDE 2

WindowsOS vs. HumanOS

2002 2012 2004 2006 2008 2010

Security Controls

Trustworthy Computing Software Restriction Policies Automatic Updating Microsoft Secure Development Lifecycle Firewall Enabled by Default Baseline Security Analyzer Data Execution Protection (DEP) Malicious Software Removal Tool Windows Defender ASDL User Account Control Bitlocker Windows Service Hardening Mandatory Integrity Control AppLocker Encrypted File System Microsoft Security Essentials EMET

2014 HumanOS WindowsOS

slide-3
SLIDE 3

Non-existent Compliance Focused Promoting Awareness & Behavior Change Long-Term Sustainment & Culture Change Metrics Framework

Security Awareness Maturity Model

slide-4
SLIDE 4

Fogg Behavior Model

slide-5
SLIDE 5

Communication

  • Most organizations have teams of security

experts and know what the human risks are.

  • Where we fail is communicating the solution

– curse of knowledge.

  • Security Communications Officer
slide-6
SLIDE 6

2016 Sec Awareness Report

slide-7
SLIDE 7

Start with WHY

  • Why does cyber security matter?
  • Communicate at an emotional level, do not

rationalize

  • Condense message to core, something

people can easily understand.

– Kotter [Leading Change] calls this the Vision – Heath [Made to Stick] call this the Commander’s Intent.

slide-8
SLIDE 8

How Organization Benefits

Instead of changing your culture, play on your

  • rganization’s existing culture

– Industrial Control System (ICS) industries have a very strong safety culture, cyber security contributes to safety – Healthcare has a strong culture of patient care, cyber security contributes to the wellbeing of patients – Where does your employees’ pride come from?

slide-9
SLIDE 9

How Individual Benefits

  • Keep message positive, focus on how

security enables (addresses blocker issue)

  • Your awareness topics are same for both

and work, focus on personal benefit

– Far more likely to listen – Security becomes part of their DNA, same behaviors at home and work

slide-10
SLIDE 10

Organizational Culture

  • How do we communicate this new vision?
  • Start with defining your culture

– Conservative vs. outgoing – Different definitions of offensive – Generational differences – Localization

  • You may have multiple cultures
slide-11
SLIDE 11

Outgoing

  • Examples include marketing firms,

technology companies, universities, and hospitality

  • Outgoing cultures prefer

– Using the latest technology such as social media

  • r mobile devices

– Watching content as opposed to reading content – Fun / entertaining material

slide-12
SLIDE 12

Conservative

  • Examples include financials, insurance,

defense industry or law firms

  • Conservative cultures prefer

– Content that is subdued and professional – Prefer to read content as opposed to watching content – May prefer to work directly with people

  • A conservative culture can be an advantage,

easier to stand out

slide-13
SLIDE 13

Push vs. Pull

  • Push: Sending information to people
  • Pull: People get information on their own

– People too busy for scheduled events – Peoples’ e-mail boxes are overwhelmed – Communications departments are limiting what you can push out – Competing with other training communications

slide-14
SLIDE 14

Computer Based Training

slide-15
SLIDE 15

Newsletters

  • Monthly or quarterly

newsletter

  • Keep it short, non-

technical, and easy to read, include contact information

  • Track downloads
  • Be prepared for it to go

home / go viral

slide-16
SLIDE 16
slide-17
SLIDE 17

Security Blog

  • Simple, interactive way to

reach people on their own schedule

  • Update your blog 1-3 times a week with

engaging content

  • Titles are everything
  • Engaging content that is not too long or too

short

slide-18
SLIDE 18

Promotional Items

Do Not Write Your Password On This

slide-19
SLIDE 19

Mascots / Tag Lines

I don’t like it here! There is nothing to eat! I like it here! There is lots of information to satify my stomach!

slide-20
SLIDE 20

Self-Education (Pull Method)

Create a central security portal for employees

– Links to trusted tools – Downloads for materials and presentations – Security Blog or news updates – Online form for submitting questions or incidents – Scan my computer – Glosassary of terms or FAQ – Examples / results of phishing assessments – Training or internally created videos – Update site regularly so people want to return

slide-21
SLIDE 21

Ambassador Program

  • Instead of training coming from the top

down, the training comes from peers

  • Security team trains volunteers to become

ambassadors, provides ambassadors with resources, then ‘embeds’ them throughout the organization

  • Have ambassadors help create your

materials

slide-22
SLIDE 22

Ambassador Keys to Success

  • Motivation

– Recognize ambassadors for their work (e-mail their boss / HR, letter from CEO, team shirts) – Chance to build their network throughout org – Chance to develop new skills / make a difference

  • Ability

– Train ambassadors – Provide resources such as a portal, dedicated maillist, premade FAQs, and presentations – Budget

slide-23
SLIDE 23

Gamification

  • The concept of turning learning into a game

– www.khanacademy.org – www.codeacademy.org

  • Recognize people for secure behaviors

through levels, badges or progression maps so people can visualize their progress

  • Not for everyone
slide-24
SLIDE 24

Salesforce

slide-25
SLIDE 25

Leveraging Leadership

  • Ensure your leaders understand the

important role they play

  • Often leaders believe in your security mission,

but do not know how to demonstrate that. Give them examples of key behaviors to show or things to say to employees

  • Reach them through their assistants
slide-26
SLIDE 26

Summary

Communication is where most awareness programs fail. The key to making it stick is focus on how people benefit and hit them with multiple methods.

securingthehuman.sans.org/events