SlideShare a Scribd company logo
Carrots Not Sticks
Using Gamification to Transform Security Mindset of an Organization
Masha Sedova
Senior Director of Trust Engagement, Salesforce
msedova@salesforce.com
@modMasha
I want my employees to:
Often our requirements are very general
What Does Security Awareness Mean To Your Organization?
Have more security
common sense
Make less security
mistakes
Be more
vigilant
Care more about
their actions
What Are Your Vital Behaviors?
Ask:
What behaviors am I
trying to change?
Ask:
What will people do
differently after my
effective program is in
place?
Ask:
How will I measure
this?
What behavior does this change?
What Are Your Vital Behaviors?
“More people will take more training more often”
1. What are your most frequent incidents?
2. What would be the most damaging to your company?
3. What are easy wins?
Less is more:
• Asking for executive backing on too many behaviors can dilute the power of their support.
• Have a backlog of behaviors but only act on the top few.
• Have a few wins and iterate.
Prioritizing your vital behaviors
How To Choose Vital Behaviors
Linking Results to Vital Behaviors
Say no to
badge surfing
See something,
say something
Think like a
Chief Security Officer
Don’t get fooled by
Phishing
Get certified and be
ready
# of people who
fall victim to a
phishing attack
# of people
who detect and
report a
vulnerability
# of employees
who completed
annual security
training
# of Security
Champions
in Org
# of unauthorized
people accessing
secure areas
Can this be solved with technology?
Do it! Changing mindset is the hardest way to go about enforcing change.
“I didn’t realize that security was part of my job”
Communication, marketing, awareness campaigns
“I didn’t know what to do about it”
Training and skills
“I didn’t have the resources or support to do it”
Management alignment
“I didn’t want to”
Gamification and incentives
Why are these behaviors not being done?
Investigate Root Cause
Why Does “Want To” Matter?
Most employees prefer a visit to the dentist over taking security training
It’s About Unleashing “Discretionary Performance”
Getting To “Want to”
Can we get more people to choose
the stairs by making it fun to do?
It’s About Unleashing “Discretionary Performance”
Getting To “Want to”
66% more people than normal
chose the stairs over the escalator.
It’s Not About Playing Games At Work
(Though 70% of Execs Admit Playing Video Games at Work)
Gamification Elements
3
1
4
5
2
Autonomy: we like having choices
Mastery: we like getting better at what we do
Feedback: we like getting feedback on how we are doing
Purpose: meaning amplifies what we do
Social: all this means more with others
Pick Vital
Behaviors
Connect to
Purpose
Test And Give
Feedback
Reward/
Recognize
or
Educate
Socialize
Gamifying Security
Vital Behaviors: Phishing, Reporting, and Badge-Surfing
Connect to Purpose
Source: Verizon Breach Report 2014
Trust
Conformity
Connecting to Purpose
Morality Curiosity
Fear
Reward
“Holy wow…Check out this video of a giant
snake eating a zoo keeper!”
“If you don’t pay the fine, your files will be
locked and you will be reported to the FBI!”
“Can you hold that office door open for me, my
arm’s broken and this package is heavy.”
How attackers exploit “bugs in human hardware”
Test With Feedback
Recognizing Badge-Surfing Awareness
Recognizing Reporting
Reward: Security Champion Program
Basic awarenessApprentice
Successful TestingPadawan
DoingKnight
TeachingMaster
InnovatingGrand Master
Trust Points
Item Point Value
Receiving a Trust badge 50
Read security newsletter and chatter about it 50
Reporting phishing email/ social engineering call 100
Completing 100 level course 100
Completing 200 or 300 level course 200
Identifying a vulnerability (P0 - P3) P0 =500, P1=300, P2=200, P3=50
Attending a Security lunch and learn 200
Winning a bug bounty event 500
Attending hands-on security training course 600
Teaching/Presenting on Security topic 1000
Presenting at Conference on Security 2500
Security Patent 3000
Interning with Trust 3000
Incentives and Rewards
• Competition
• Achievement
• Status
• Self-Expression
• Altruism
14,000 50% 82%
The Results
Salesforce Employees Have Gone
Through This Experience
Less Likely to Click on a Phishing
Link
More Likely to Report Threats to
security@salesforce.com
Incident Detection
Employee and customer reports
“My mouse cursor is
moving by itself”
“Is this email really from
American Express?”
“Someone just badge
surfed into 3 Landmark”
“I lost my sweater on
BART”
“My browser proxy settings
were changed”
Incident Detection
Employee and customer reports
• Salesforce employees trained to report any
suspicious activity.
• Customer reports also welcome.
Carrots not sticks- Using Gamification to Transform Security Mindset of an Organization
thank y u

More Related Content

Viewers also liked (19)

PDF
[Cluj] Information Security Through Gamification
OWASP EEE
 
PPTX
оригами Prezentaciya1 31
Kseniya Noskova
 
PPTX
вов
Kseniya Noskova
 
PPT
FEU-East Asia College Presentation
design-eastasia
 
PDF
Digital Summit Brasil 2016 - Social Selling: Como usar o LinkedIN para vendas
Gustavo de Boer
 
PPT
русская национальная кухня
Kseniya Noskova
 
PDF
Byod - IWEEE2013
Unesco Telemedicine
 
PPTX
Gamification for security
Vera Trubacheva
 
PPTX
Стратегия и тактика прямых инвестиций: математика или психология? Презентация...
«Велес Капитал»
 
PPTX
Kongenital gastrointestinal
Herry Utama
 
PPTX
kelainan kongenital saluran cerna
helmy lisik miko
 
PPTX
10 Things Disney Can Teach Us About Running a Security Awareness Program (Dow...
The Security Awareness Company
 
PDF
Jornadas protocolo NEAE granada
magarques
 
PDF
Cybersecurity Employee Training
Paige Rasid
 
PPTX
MBA 592 Ford Vs. General Motor's Master's Thesis power point
Steven Abdo
 
PDF
Dossier expopaz2016
luciafer1981
 
PPTX
8 Tips on Creating a Security Culture in the Workplace
Tripwire
 
PPTX
Acción tutorial a través de las bibliotecas escolares
Orientateca de OrienTapas
 
PDF
6 Truths About Persuasion
LifeatLeggett
 
[Cluj] Information Security Through Gamification
OWASP EEE
 
оригами Prezentaciya1 31
Kseniya Noskova
 
FEU-East Asia College Presentation
design-eastasia
 
Digital Summit Brasil 2016 - Social Selling: Como usar o LinkedIN para vendas
Gustavo de Boer
 
русская национальная кухня
Kseniya Noskova
 
Byod - IWEEE2013
Unesco Telemedicine
 
Gamification for security
Vera Trubacheva
 
Стратегия и тактика прямых инвестиций: математика или психология? Презентация...
«Велес Капитал»
 
Kongenital gastrointestinal
Herry Utama
 
kelainan kongenital saluran cerna
helmy lisik miko
 
10 Things Disney Can Teach Us About Running a Security Awareness Program (Dow...
The Security Awareness Company
 
Jornadas protocolo NEAE granada
magarques
 
Cybersecurity Employee Training
Paige Rasid
 
MBA 592 Ford Vs. General Motor's Master's Thesis power point
Steven Abdo
 
Dossier expopaz2016
luciafer1981
 
8 Tips on Creating a Security Culture in the Workplace
Tripwire
 
Acción tutorial a través de las bibliotecas escolares
Orientateca de OrienTapas
 
6 Truths About Persuasion
LifeatLeggett
 

Similar to Carrots not sticks- Using Gamification to Transform Security Mindset of an Organization (20)

PPTX
Using Behavioral Science to Secure Your Organization
Masha Sedova
 
PDF
Best Practices for Security Awareness and Training
Kimberly Hood
 
PPTX
How to motivate positive security behavior using gamification
TiffanySchoenike
 
PPTX
How to Create a Security-Aware Culture in Your Company
David McHale
 
PDF
How To Promote Security Awareness In Your Company
danielblander
 
PPT
Why Security Awareness Training Is Essential for Every Business
Sam Vohra
 
PDF
Salesforce New Jersey User Group - Security Awareness
InternetCreations
 
PDF
Information Security Awareness
Net at Work
 
PDF
Фишинг — проклятие или возможность для ИБ?
Positive Hack Days
 
PDF
Awareness is only the first step
Hewlett Packard Enterprise Business Value Exchange
 
PDF
THE RELATIONSHIP BETWEEN THE CHARACTERISTICS OF SOFTWARE DEVELOPERS AND SECUR...
IJNSA Journal
 
PPTX
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Alexandre Sieira
 
PPTX
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Matt Hathaway
 
PPTX
Practical Advantages of a Security Educated Workforce
Keyaan Williams
 
PDF
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Anup Narayanan
 
PDF
Gamification - The Trail to Awesome Adoption
Louise Lockie
 
PDF
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
PPTX
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service Desk
itSMF UK
 
PDF
[DSC Europe 24] Uros Arsenijevic - Seif - People - Centric Security.pdf
DataScienceConferenc1
 
PDF
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
Anup Narayanan
 
Using Behavioral Science to Secure Your Organization
Masha Sedova
 
Best Practices for Security Awareness and Training
Kimberly Hood
 
How to motivate positive security behavior using gamification
TiffanySchoenike
 
How to Create a Security-Aware Culture in Your Company
David McHale
 
How To Promote Security Awareness In Your Company
danielblander
 
Why Security Awareness Training Is Essential for Every Business
Sam Vohra
 
Salesforce New Jersey User Group - Security Awareness
InternetCreations
 
Information Security Awareness
Net at Work
 
Фишинг — проклятие или возможность для ИБ?
Positive Hack Days
 
Awareness is only the first step
Hewlett Packard Enterprise Business Value Exchange
 
THE RELATIONSHIP BETWEEN THE CHARACTERISTICS OF SOFTWARE DEVELOPERS AND SECUR...
IJNSA Journal
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Alexandre Sieira
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Matt Hathaway
 
Practical Advantages of a Security Educated Workforce
Keyaan Williams
 
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Anup Narayanan
 
Gamification - The Trail to Awesome Adoption
Louise Lockie
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service Desk
itSMF UK
 
[DSC Europe 24] Uros Arsenijevic - Seif - People - Centric Security.pdf
DataScienceConferenc1
 
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
Anup Narayanan
 
Ad

More from Salesforce Engineering (20)

PPTX
Locker Service Ready Lightning Components With Webpack
Salesforce Engineering
 
PPTX
Scaling HBase for Big Data
Salesforce Engineering
 
PPTX
Techniques to Effectively Monitor the Performance of Customers in the Cloud
Salesforce Engineering
 
PPTX
Predictive System Performance Data Analysis
Salesforce Engineering
 
PPTX
Apache HBase State of the Project
Salesforce Engineering
 
PPTX
Hit the Trail with Trailhead
Salesforce Engineering
 
PPTX
HBase/PHOENIX @ Scale
Salesforce Engineering
 
PPTX
Scaling up data science applications
Salesforce Engineering
 
PPTX
Containers and Security for DevOps
Salesforce Engineering
 
PPTX
Aspect Oriented Programming: Hidden Toolkit That You Already Have
Salesforce Engineering
 
PPTX
Monitoring @ Scale in Salesforce
Salesforce Engineering
 
PPTX
Performance Tuning with XHProf
Salesforce Engineering
 
PPTX
A Smarter Pig: Building a SQL interface to Pig using Apache Calcite
Salesforce Engineering
 
PPTX
Implementing a Content Strategy Is Like Running 100 Miles
Salesforce Engineering
 
PPTX
Salesforce Cloud Infrastructure and Challenges - A Brief Overview
Salesforce Engineering
 
PDF
Koober Preduction IO Presentation
Salesforce Engineering
 
PPTX
Finding Security Issues Fast!
Salesforce Engineering
 
PDF
Microservices
Salesforce Engineering
 
PPTX
Global State Management of Micro Services
Salesforce Engineering
 
PPTX
The Future of Hbase
Salesforce Engineering
 
Locker Service Ready Lightning Components With Webpack
Salesforce Engineering
 
Scaling HBase for Big Data
Salesforce Engineering
 
Techniques to Effectively Monitor the Performance of Customers in the Cloud
Salesforce Engineering
 
Predictive System Performance Data Analysis
Salesforce Engineering
 
Apache HBase State of the Project
Salesforce Engineering
 
Hit the Trail with Trailhead
Salesforce Engineering
 
HBase/PHOENIX @ Scale
Salesforce Engineering
 
Scaling up data science applications
Salesforce Engineering
 
Containers and Security for DevOps
Salesforce Engineering
 
Aspect Oriented Programming: Hidden Toolkit That You Already Have
Salesforce Engineering
 
Monitoring @ Scale in Salesforce
Salesforce Engineering
 
Performance Tuning with XHProf
Salesforce Engineering
 
A Smarter Pig: Building a SQL interface to Pig using Apache Calcite
Salesforce Engineering
 
Implementing a Content Strategy Is Like Running 100 Miles
Salesforce Engineering
 
Salesforce Cloud Infrastructure and Challenges - A Brief Overview
Salesforce Engineering
 
Koober Preduction IO Presentation
Salesforce Engineering
 
Finding Security Issues Fast!
Salesforce Engineering
 
Microservices
Salesforce Engineering
 
Global State Management of Micro Services
Salesforce Engineering
 
The Future of Hbase
Salesforce Engineering
 
Ad

Recently uploaded (20)

PPTX
REINFORCEMENT AS CONSTRUCTION MATERIALS.pptx
mohaiminulhaquesami
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PPTX
site survey architecture student B.arch.
sri02032006
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PDF
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
PDF
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPT
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
PPTX
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PDF
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
REINFORCEMENT AS CONSTRUCTION MATERIALS.pptx
mohaiminulhaquesami
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Day2 B2 Best.pptx
helenjenefa1
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
site survey architecture student B.arch.
sri02032006
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Thermal runway and thermal stability.pptx
godow93766
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 

Carrots not sticks- Using Gamification to Transform Security Mindset of an Organization

  • 1. Carrots Not Sticks Using Gamification to Transform Security Mindset of an Organization Masha Sedova Senior Director of Trust Engagement, Salesforce [email protected] @modMasha
  • 2. I want my employees to: Often our requirements are very general What Does Security Awareness Mean To Your Organization? Have more security common sense Make less security mistakes Be more vigilant Care more about their actions
  • 3. What Are Your Vital Behaviors? Ask: What behaviors am I trying to change? Ask: What will people do differently after my effective program is in place? Ask: How will I measure this?
  • 4. What behavior does this change? What Are Your Vital Behaviors? “More people will take more training more often”
  • 5. 1. What are your most frequent incidents? 2. What would be the most damaging to your company? 3. What are easy wins? Less is more: • Asking for executive backing on too many behaviors can dilute the power of their support. • Have a backlog of behaviors but only act on the top few. • Have a few wins and iterate. Prioritizing your vital behaviors How To Choose Vital Behaviors
  • 6. Linking Results to Vital Behaviors Say no to badge surfing See something, say something Think like a Chief Security Officer Don’t get fooled by Phishing Get certified and be ready # of people who fall victim to a phishing attack # of people who detect and report a vulnerability # of employees who completed annual security training # of Security Champions in Org # of unauthorized people accessing secure areas
  • 7. Can this be solved with technology? Do it! Changing mindset is the hardest way to go about enforcing change. “I didn’t realize that security was part of my job” Communication, marketing, awareness campaigns “I didn’t know what to do about it” Training and skills “I didn’t have the resources or support to do it” Management alignment “I didn’t want to” Gamification and incentives Why are these behaviors not being done? Investigate Root Cause
  • 8. Why Does “Want To” Matter? Most employees prefer a visit to the dentist over taking security training
  • 9. It’s About Unleashing “Discretionary Performance” Getting To “Want to” Can we get more people to choose the stairs by making it fun to do?
  • 10. It’s About Unleashing “Discretionary Performance” Getting To “Want to” 66% more people than normal chose the stairs over the escalator.
  • 11. It’s Not About Playing Games At Work (Though 70% of Execs Admit Playing Video Games at Work)
  • 12. Gamification Elements 3 1 4 5 2 Autonomy: we like having choices Mastery: we like getting better at what we do Feedback: we like getting feedback on how we are doing Purpose: meaning amplifies what we do Social: all this means more with others
  • 13. Pick Vital Behaviors Connect to Purpose Test And Give Feedback Reward/ Recognize or Educate Socialize Gamifying Security
  • 14. Vital Behaviors: Phishing, Reporting, and Badge-Surfing
  • 15. Connect to Purpose Source: Verizon Breach Report 2014
  • 16. Trust Conformity Connecting to Purpose Morality Curiosity Fear Reward “Holy wow…Check out this video of a giant snake eating a zoo keeper!” “If you don’t pay the fine, your files will be locked and you will be reported to the FBI!” “Can you hold that office door open for me, my arm’s broken and this package is heavy.” How attackers exploit “bugs in human hardware”
  • 20. Reward: Security Champion Program Basic awarenessApprentice Successful TestingPadawan DoingKnight TeachingMaster InnovatingGrand Master Trust Points
  • 21. Item Point Value Receiving a Trust badge 50 Read security newsletter and chatter about it 50 Reporting phishing email/ social engineering call 100 Completing 100 level course 100 Completing 200 or 300 level course 200 Identifying a vulnerability (P0 - P3) P0 =500, P1=300, P2=200, P3=50 Attending a Security lunch and learn 200 Winning a bug bounty event 500 Attending hands-on security training course 600 Teaching/Presenting on Security topic 1000 Presenting at Conference on Security 2500 Security Patent 3000 Interning with Trust 3000
  • 22. Incentives and Rewards • Competition • Achievement • Status • Self-Expression • Altruism
  • 23. 14,000 50% 82% The Results Salesforce Employees Have Gone Through This Experience Less Likely to Click on a Phishing Link More Likely to Report Threats to [email protected]
  • 24. Incident Detection Employee and customer reports “My mouse cursor is moving by itself” “Is this email really from American Express?” “Someone just badge surfed into 3 Landmark” “I lost my sweater on BART” “My browser proxy settings were changed”
  • 25. Incident Detection Employee and customer reports • Salesforce employees trained to report any suspicious activity. • Customer reports also welcome.

Editor's Notes

  • #2: Over the next 40 minutes I will walk you through the journey I took to creating a gamification program at Salesforce. This includes the questions I asked of myself, my security team, and the organization to get clear direction on the program I was going to build.
  • #3: How can we measure this? I want to argue that metrics come first, not as the last step of a program.
  • #4: The training is not the end result. It is a stepping stone to drive an outcome of a behavior you are targeting Mistake: I want more people to take more training more often. Does that prove security mindset? No, it proves that people have sat through a training. Figure out what you are measuring! Test people on that behaviors first! Maybe they dont need training and are already doing it!
  • #6: Dont try to boil the ocean. Execs have a hard time backing 12 things they should enforce, but it is easier for them to see how their orgs are doing on one key behavior.
  • #7: Define what done looks like so you can move on! Phishing is a great example. Click rate doesn’t matter. Reporting does. Find a % range your organization is confortable, get there, and maintain.
  • #8: Once you find your behaviors, do some investigation work. Why are things not being done?
  • #23: John Gottman and colleagues (1998) explored the positive-to-negative ratios in marriages. Using a 5:1 ratio, which Gottman dubbed "the magic ratio," he and his colleagues predicted whether 700 newlywed couples would stay together or divorce by scoring their positive and negative interactions in one 15-minute conversation between each husband and wife. Ten years later, the follow-up revealed that they had predicted divorce with 94% accuracy.