SlideShare a Scribd company logo
1 of 37
Or What IT Can Learn From Urban Planners
Embracing the Kanyes of Our
Organization
About Zander
2
Mononymous just like Kanye
Loves IT automation and long walks on the beach
Believes “Employee Experience” is only as real as the people behind it
Strives to make Security accessible to all employees
About HackerOne
3
4
By the numbers
5
330,000+
Hackers
1,300+
Customers
$48+ Million
In bounties paid
By the numbers
6
100,000+Vulnerabilities foundVulnerabilities found
Nightmares
7
8
9
Lets talk about Kanye
10
Lets talk about Kanye
11
Kanye Takes a Shortcut
12
13
We have to understand our
Coworker Kanyes
17
Desire paths
21
What Went Wrong?
● We build to a security or compliance or security goal
● We forget about the end user
● We fight against Desire Paths instead of Embracing them
22
It’s not US vs THEM, we all need to work
together to stay secure
23
24
31
What does this look like at
HackerOne
SSO or No Go
32
● SAML, SCIM, and Deprovisioning:
the sexiest words to HackerOne IT
● Negotiate HARD when companies
charge the SSO Tax
2 Passwords 2 Secure
33
● Laptop Password
● Password Manager password
● Encourage STUPID long passwords
for Okta
MFA All The Things
34
● Never SMS
● Skip Google Authenticator
● Start Push Based MFA
● Okta Verify
● Duo
● Yubikey
● Open Source tools
Updates Are Your Job
35
● Push Updates with MDM
● Gate Access on Software Versions
● Schedule You Updates like a Meeting
Compliance
36
● Not all Compliance Standards are Rigid
● Auditors Want to Work WITH You
● Guidelines Evolve, Evolve With Them
● Don’t Die on Every Hill, Pick Your Battles
37
What’s Your
Desire Path?

More Related Content

Similar to Embracing the Kanye's of your Organization

Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
DallasHaselhorst
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
DallasHaselhorst
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
Santhosh Tuppad
 

Similar to Embracing the Kanye's of your Organization (20)

Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
 
Pitss
PitssPitss
Pitss
 
Invenio Conquer-Password-Mgmt
Invenio Conquer-Password-MgmtInvenio Conquer-Password-Mgmt
Invenio Conquer-Password-Mgmt
 
Protectthepersonaldefendtheworkplace 121023115113-phpapp01
Protectthepersonaldefendtheworkplace 121023115113-phpapp01Protectthepersonaldefendtheworkplace 121023115113-phpapp01
Protectthepersonaldefendtheworkplace 121023115113-phpapp01
 
New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Why Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyWhy Hacking into Your Company is so Easy
Why Hacking into Your Company is so Easy
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account information
 
006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample Graduat006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample Graduat
 
Ethical Hacking.pdf
Ethical Hacking.pdfEthical Hacking.pdf
Ethical Hacking.pdf
 
INTERFACE by apidays 2023 - The New Developer Dance, Grace Francisco, Pangea
INTERFACE by apidays 2023 - The New Developer Dance, Grace Francisco, PangeaINTERFACE by apidays 2023 - The New Developer Dance, Grace Francisco, Pangea
INTERFACE by apidays 2023 - The New Developer Dance, Grace Francisco, Pangea
 
Is Cyber Threat an Emerging Concern Hire Tekkis.pptx
Is Cyber Threat an Emerging Concern Hire Tekkis.pptxIs Cyber Threat an Emerging Concern Hire Tekkis.pptx
Is Cyber Threat an Emerging Concern Hire Tekkis.pptx
 
Security First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessSecurity First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your Business
 
The Future of ATO
The Future of ATOThe Future of ATO
The Future of ATO
 
Cybersecurity services
Cybersecurity servicesCybersecurity services
Cybersecurity services
 
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Embracing the Kanye's of your Organization

Editor's Notes

  1. IT for more than a decade Directory-less since 2015 I like to build organizations that can grow fast with trust, automation and efficiency I actually really like my HR department
  2. 1300 customers all around the world 330,000 hackers, from every walk of life 46 million paid in bounties to those hackers over our lifetime, paid by people like you
  3. Over 100,000 vulnerabilities found and reported on HackerOne Those are 100,000 nightmares if they get out. Not only is the data private, but if it gets out, it doesn’t just impact HackerOne, it impacts all of our customers too. So we have a company filled with people of different backgrounds, how does that relate to This guy
  4. We work with Hackers, around the world, to give them a place use their skills for good. We work with companies like all of yours to allow them a safe place to receive these vulnerabilties
  5. We’ve grown in size from 60 people to over 200 in a little less than 18 months Unlike Most security companies we don’t hire people with only security experience, we have to train and instill a security culture to those who might not have seen it before
  6. We’ve all seen this right? Kanye White hosue 000000000 Kanye’s Security Friction Threshold is Low
  7. Pause for laughs (I hope)
  8. We all laughed at this, but how many of our colleagues and coworkers are just like Kanye?
  9. Maybe he is your kanye
  10. Or is this exec your Kanye? But what is Kanye doing? Apple nudged people to 6 digit passcodes especially with biometrics so why is his passcode all zeros? He took a shortcut, When lots of people take a shortcut it starts to get noticed, it becomes a Desire path
  11. No matter how well and elegantly we build our rules, and security process. If there’s an easier path users will take it
  12. Some times people love it so much they preserve it under any condition I call this the “documentation” step. When a cut corner enters your wiki, you’re your user onboarding.
  13. A lot of the time it’s because we wanted to try and protect people, so we created a roadblock, but all it did was make us look silly
  14. When we create security procedures without the end user in mind, we're creating the opportunities for users to cut corners.
  15. Employee Enablement ensures IT gets the right feedback, and we work with the goal of strengthening us all equally.
  16. We can’t just put up a sign and hope for results. Again we just end up looking silly and no one will really stop We have to shift to meet our users
  17. Urban Planners spend time analyzing these paths and use them to make the world they control BETTER WE can and should do the same
  18. Some times we need to make a small fix, a small investment
  19. For example better timeouts on sessions Or working on better education
  20. Some times we have to provide safety to an existing process
  21. Like taking ownernship of Shadow IT purchase Buying the SSO tier of an app marketing bought Working with a vendor for sales to have better audit tools
  22. Sometimes we need to embrace a larger more serious project. This takes serious costs, timing and planning
  23. Example Moving to beyond corp, Going in the deep end with SSO. WE need to create the most linear path possible to accelerate users from Point A to Point B, not just straightening the trajectory but speeding it up.
  24. So what do we do at Hackerone? We’ve spent a lot of time trying to take out as many hurdles
  25. Passphrases We encourage 64 char password for mac users for Okta so they become addicted to a password manager
  26. Skip SMS Skip Google Authenticator or any other TOTP tool Copy/pasting code worst/people hate it The circle of anxiety waiting for ever for slow SMS "Dyslexia" (spell it with letter jumbled on purpose) Move to push-based MFA/u2f tokens everyone understands "tap the push notification" no copy paste better logging easier recovery
  27. We Push updates with our MDM 1-2 weeks after EVERY OS update If you don’t update in time, forced updates can interrupt meetings, we can’t stop the update We use Duo to block users who are out of date from our apps
  28. Compliance is frequently about documenting and proving you have controls, not that you have a SPECIFIC setup or setting Work with your auditors don’t assume they know everything about your org. Ask questions NIST Guidelines change, but they aren’t the ONLY option either You can fight every single audit inquiry, but try and fight the ones that matter, and point out the stupid ones
  29. Special thanks 99% Invisible r/desirepaths My PR team for encouraging me to write an article about something so silly Kanye West and his stupidity