2020-018- Masha Sedova, bespoke security training, useful metrics to tailor training
Published May 13, 2020
44 min
    Add to queue
    Copy URL
    Show notes

    Masha Sedova - Founder, Elevate Security

    Inability to measure human security behaviors leads to increased risk in our computing environments. For too long, we’ve accepted training completion and mock phishing data as a sufficient way to measure this risk. But where do the vulnerabilities and strengths truly lie? 

    The secret is, security teams have installed tons of security tooling that can give insights into how our employees are behaving. But we just leave this data on the cutting room floor. Masha Sedova can talk about where to find this goldmine of data and what security teams can do to leverage this new found knowledge. 


    Study after study shows that the reason why people don’t do things is not always because they don’t understand, it’s because they are not motivated. Motivating employees to change their cybersecurity behavior can seem like an overwhelming task but there are simple behavioral science techniques cybersecurity professionals can leverage to motivate employees to do the right thing. Masha Sedova will discuss the power of integrating elements of behavioral science into security in order to influence positive behavior. 

    Motivation Theory (deming): https://en.wikipedia.org/wiki/W._Edwards_Deming#Key_principles

    X&Y: https://en.wikipedia.org/wiki/Theory_X_and_Theory_Y

    Ouchi Z theory https://en.wikipedia.org/wiki/Theory_Z_of_Ouchi



    Why do security teams have difficulty in understanding their human risk today? What are the blockers? 

    What should security teams be measuring to get a holistic view of human risk? 

    What's the difference between security culture, security behavior change, and security awareness? 

    Is security culture a core capability in security defense? Why or why not?  

    Quantifying risk…

    Is investing in human training a waste of time?

    Phishing - mock phish or real phishing

    Pull data to see who is clicking on links

    Send an ‘intervention’


    Gotta move away from training

    The ‘security team’ will save them…







    Reality broken: https://www.amazon.com/Reality-Broken-Games-Better-Change/dp/0143120611

    People centric security: https://www.amazon.com/People-Centric-Security-Transforming-Enterprise-Culture/dp/0071846778/ref=sr_1_1?dchild=1&keywords=people+centric+security&qid=1588733580&s=books&sr=1-1

    Deep thought: a Cybersecurity novela: https://www.ideas42.org/blog/project/human-behavior-cybersecurity/deep-thought-a-cybersecurity-story/



    Check out our Store on Teepub! https://brakesec.com/store

    Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com

    #Brakesec Store!:https://www.teepublic.com/user/bdspodcast




    #Youtube Channel:  http://www.youtube.com/c/BDSPodcast

    #iTunes Store Link: https://brakesec.com/BDSiTunes

    #Google Play Store: https://brakesec.com/BDS-GooglePlay

    Our main site:  https://brakesec.com/bdswebsite

    #iHeartRadio App:  https://brakesec.com/iHeartBrakesec


    Comments, Questions, Feedback: bds.podcast@gmail.com

    Support Brakeing Down Security Podcast by using our #Paypalhttps://brakesec.com/PaypalBDS OR our #Patreon


    #Twitter@brakesec @boettcherpwned @bryanbrake @infosystir

    #Player.FM : https://brakesec.com/BDS-PlayerFM

    #Stitcher Network: https://brakesec.com/BrakeSecStitcher

    #TuneIn Radio App: https://brakesec.com/TuneInBrakesec

        0:00:00 / 0:00:00