Security Culture Why You Need One and How to Create It Masha Sedova - - PowerPoint PPT Presentation

security culture
SMART_READER_LITE
LIVE PREVIEW

Security Culture Why You Need One and How to Create It Masha Sedova - - PowerPoint PPT Presentation

Security Culture Why You Need One and How to Create It Masha Sedova Co-Founder, Elevate Security About me Cyber Analyst for Co-Founder, building the defense community Behavioral Security Platform Built and ran Salesforce Passionate about


slide-1
SLIDE 1

Security Culture

Why You Need One and How to Create It

Masha Sedova Co-Founder, Elevate Security

slide-2
SLIDE 2

Elevate Security

2

About me

Built and ran Salesforce trust engagement team Co-Founder, building the Behavioral Security Platform Passionate about the intersection

  • f security & behavioral science

Cyber Analyst for defense community

slide-3
SLIDE 3

Elevate Security

3

Customer trust is built on security

slide-4
SLIDE 4

Elevate Security

4

slide-5
SLIDE 5

Elevate Security

5

52% of all breaches in the last year were due to hacking -VDBIR

slide-6
SLIDE 6

Elevate Security

6

Culture

slide-7
SLIDE 7

Elevate Security

7

What is culture?

Behavior Artifacts Beliefs Values Assumptions Experiences

“The way we do things around here....” Our experiences shape our beliefs, values, assumptions Our behaviors are driven by beliefs

slide-8
SLIDE 8

“Culture eats strategy for breakfast.”

  • Peter Drucker
slide-9
SLIDE 9

Elevate Security

9

Security Culture is a Subset of Enterprise Culture

Enterprise IT Security

slide-10
SLIDE 10

Elevate Security

10

Positive vs Negative Security Culture

slide-11
SLIDE 11

Elevate Security

11

Competing Priorities

Pick two

slide-12
SLIDE 12

Elevate Security

12

Deadlines Cost Bonus Security Security Failure Security Debt

Opposing forces in an employee’s business decisions

slide-13
SLIDE 13

Elevate Security

13

The Competing Security Cultures Framework

Process Culture

Goal: Enforce Policy

Compliance Culture

Goal: Pass Audits

Trust Culture

Goal: Empower People

Autonomy Culture

Goal: Get Results

External Focus Internal Focus Tight Control Loose Control

slide-14
SLIDE 14

Elevate Security

14

Process Culture

Managed Coordination Stability Visibility Standardization

Goal: Enforce Policy

Compliance Culture

Rational Goals Conformity Repeatability Documentation

Goal: Pass Audits

Trust Culture

Human Relations Communication Participation Commitment

Goal: Empower People

Autonomy Culture

Adaptive Systems Flexibility Agility Innovation

Goal: Get Results

External Focus Internal Focus Tight Control Loose Control

slide-15
SLIDE 15

Elevate Security

15

Results of SCDS

slide-16
SLIDE 16

How do we drive change?

slide-17
SLIDE 17

Elevate Security

17

Root Cause Analysis

slide-18
SLIDE 18

Elevate Security

18

Understanding the Problem

The Five Whys Tool

Ask the five whys to get to the root of a problem.

slide-19
SLIDE 19

Elevate Security

19

The Five Whys- Example

Problem Statement:

My car battery is dead

  • 1. Why? – The alternator is not functioning.
  • 2. Why? – The alternator belt has broken.
  • 3. Why? – The alternator belt was well beyond

its useful service life and has never been replaced.

  • 4. Why? – I have not been maintaining my

alternator belt according to any recommended service schedule.

  • 5. Why? I didn’t realize this had to be done.
slide-20
SLIDE 20

Elevate Security

20

Investigate Root Cause

  • Can this be solved with technology?

Do it! Changing mindset is the hardest way to go about enforcing change.

  • “I didn’t realize that security was part of my job.”

Communication, marketing, awareness campaigns

  • “I didn’t know what to do about it.”

Training and skills

  • “I didn’t have the resources or support to do it.”

Management alignment

  • “I didn’t want to.”

Gamification and incentives

slide-21
SLIDE 21

Behavior Change

slide-22
SLIDE 22

Motivation Ability Trigger

Key components of behavioral science

slide-23
SLIDE 23

Elevate Security

23

Behavior change model

*Dr. BJ Fogg

Motivation Ability

High Low Hard Easy Triggers Fail Triggers Succeed

slide-24
SLIDE 24

Elevate Security

24

Behavior change model

*Dr. BJ Fogg

Motivation Ability

High Low Hard Easy Triggers Fail Triggers Succeed

slide-25
SLIDE 25

Elevate Security

25

Remember 20 unique characters across 40+ sites Install a password manager Install a man-trap or in/out badging Social accountability Look up correct email, reporting guidelines & send Install a “report” button

Security action can be simplifjed

Have secure passwords for all sites Report suspicious activity Stop tailgating

HARD EASY

slide-26
SLIDE 26

Elevate Security

26

*Dr. BJ Fogg

Motivation Ability

High Low Hard Easy Triggers Fail Triggers Succeed

What about things that are hard to do?

slide-27
SLIDE 27

Elevate Security

27

Most employees will not care about security as much as we’d like them to

slide-28
SLIDE 28

Elevate Security

28

People will do things because they matter, they are interesting, part of something more important.

Daniel Pink, Drive

What motivates us?

“ ”

slide-29
SLIDE 29

Elevate Security

29

How to Create Positive Motivation

Competition Altruism Access Achievement Status

slide-30
SLIDE 30

Elevate Security

30

The power of social proof

slide-31
SLIDE 31

Elevate Security

31

Social proof in security

Control Keep Your Account Safe 108 of your friends use extra security settings. You can also protect your account and make sure it can be recovered if you ever lose access. Keep Your Account Safe You can use security settings to protect your account and make sure it can be recovered if you ever lose access. Social context

1.36x more successful when using social proof

slide-32
SLIDE 32

Elevate Security

32

Compromised Rates

slide-33
SLIDE 33

Elevate Security

33

Password manager

slide-34
SLIDE 34

Elevate Security

34

Applying Gamifjcation

slide-35
SLIDE 35

Elevate Security

35

Understand your security culture Assess if its a positive or negative security culture Identify the blockers to positive security culture Reinforce and motivate positive behaviors

Takeaways

slide-36
SLIDE 36

Elevate Security

36

Q&A

Masha@ElevateSecurity.com