SlideShare a Scribd company logo
1 of 11
Download to read offline
Security Champions
Level 1 Octalysis
Dustin Lehr
September 29, 2021
What are Security Champions?
A major challenge facing software-focused organizations today is how to effectively incorporate good cyber security
practices into everyday habits without sacrificing business deliverables.
Software security experts are typically limited in number and cannot be everywhere at once. A common practice in
high-functioning organizations is to recruit Security Champions.
Security Champions are individuals in an organization who have agreed to spend a portion of their time helping
address software security by learning the skills to help their teams proactively find and address security risk.
The Champions act as a liaison between the security team and their own team, helping to translate and interpret
security best practices into the context of their team’s software development practices.
Challenge:
How can we motivate the Champions to increase the software
security maturity of their team?
Business Metrics (Security Maturity)
1. # of Security Habits Followed by Team (Prevent Issues)
• The Security Champion drives adoption of security best practice habits during their team’s software development
lifecycle (SDLC), such as performing Threat Modeling during design.
2. (Decrease) Avg # Security Issues per Developer (Fix Issues)
• The Security Champion encourages their team to fix known security issues discovered from a variety of sources: source
code analysis, security assessments and penetration tests.
3. % Security Assessment Coverage by Team (Find Issues)
• The Security Champion encourages their team to assess their architecture and code-base using source code analysis,
security assessments and penetration tests to find security issues.
• This is very important to feed #2. If you don’t have methods to find security issues, your issue counts will naturally be low.
Less important but needed to feed/improve the above:
4. Security Knowledge and Skills
• The Security Champion grows their own knowledge by completing learning activities such as training to ultimately help their teams affect
the metrics above.
5. Security Champion Program Participation
• The Security Champion demonstrates commitment to advancing and contributing to the program through attendance in meetings,
likes/comments in the group chat, inviting others to become a Champion, etc.
Security Champion Player Types
Team-Oriented Self-Oriented
Goal-Driven
Experiment-Driven
Driver Aspirer
Pioneer
Inspirer
1 2
3 4
Security Champion Player Types
1. Driver
• Team-Oriented and Goal-Driven
• Coaches, leads, and supports the team to reach their goals
2. Aspirer
• Self-Oriented and Goal-Driven
• Ambitiously pursues personal growth and development
3. Inspirer
• Team-Oriented and Experiment-Driven
• Motivates team to pursue their own unique visions
4. Pioneer
• Self-Oriented and Experiment-Driven
• Invents and experiments with innovative ideas
Security Champion Driver Player Type
Wants to contribute to overall
company success
Believes in company’s purpose
Constantly learns and grows technical knowledge
Drives to meet project goals
Earns certifications, degrees, and collects qualifications Designs creative technical solutions to solve business needs
Competes with others to stand out in technical
knowledge
Strives to appease leadership by meeting their goals
Works closely with team to ensure overall team
success
Is curious to learn about new business needs
Anticipates production outages and issues that can occur anytime
Reduces risk to ensure availability of
data and systems
Has a strong desire to not lose job
Is extremely busy to satisfy the needs of the business
and meet deadlines – no luxury of time, so must
determine and work top priorities
Anxious for their code and ideas to be tested and put
in front of customers to determine their effectiveness
Is very proud and protective of their ideas and the
things they’ve built
Has strong attachment to the technical ideas/
thoughts/ beliefs they’ve settled on over the years
Meaning
Empowerment
Social
Influence
Unpredictability
Avoidance
Scarcity
Ownership
Accomplishment
Scaffolding Phase Desired Actions
1. Program Participation (Business Metric 5):
• Attend monthly Champion training meetings
• Ask comment/question during meeting
• Share Champions meeting content with own team
• Like, comment, or post content in group chat area
• Invite a guest to the monthly Champion training meeting
• Invite someone to become a Security Champion
2. Security Knowledge and Skills (Business Metric 4):
• Watch a security training video
• Complete secure code training course
• Read a security-focused book
• Help refine company security standards or guidelines
3. % Security Assessment Coverage by Team (Business Metric 3)
• Invite security team to perform a security assessment for a project
• Assist security team in the security assessment of a project
• Identify and share a valid risk discovered
• Onboard an application that needs to be scanned by security tooling
4. (Decrease) Avg # Security Issues per Developer (Business Metric 2)
• Assist to analyze a security tool finding
• Assist to remediate security risk in own area
• Demonstrate clean security scan for a project
5. # of Security Habits Followed by Team (Business Metric 1)
• Integrate a new security activity into own Software Development Lifecycle
• Show team is following all Software Development Lifecycle practices
The experience flow is generally such that Security Champions will start with light participation in the program and get more involved over
time, ultimately working their way up to helping assist their team meet the most important business metrics.
Analysis of Current Experience
Consistent narrative on the bigger picture of helping protect the company
Champions are an elite group for which you must be selected
Acknowledgement from security team and program
facilitator for attending the training meetings
Ability to assist in the design and content of the Champions wiki
Champions answer quick “fill in the blank” quiz questions during training
Champions think of unique ways to hack the fake training website
Training knowledge shared motivates desire to reciprocate
Slack channel group to share knowledge, and ask questions,
and react to other posts
Unknown next training presentation topic
Random prize awarded to a training meeting attendee
Responsibility to protect the Champion’s area from a security breach
Don’t want to miss out on an entertaining training topic or event
Prizes rewarded only if attending the training
Live trainings only happen at specific times
Live trainings only last a limited amount of time
Security Champions can recruit and invite
others to become Security Champions
Meaning
Empowerment
Social
Influence
Unpredictability
Avoidance
Scarcity
Ownership
Accomplishment
Brainstorm of New Features
Name Description Core Drives
Karate Belt Level Champions earn points based on activities to either increase their security knowledge or
participate in the program (attend meetings, etc.). Based on points earned, they obtain a Karate
belt level (White through Black) that they can display proudly to others.
2, 4, 5, 6
Area Maturity Level Champions earn stars based on the ongoing security practices of their team (scanning,
remediation of findings, security development habits etc.). Certain points obtained earn them a
Security Maturity level (Bronze through Diamond). This level is also applied to their VP’s area and
micro/group leaderboards are used to compare VP areas.
2, 4, 5, 6
Level Sliding Window Belt and Maturity Levels are based on activity in the past year and must be maintained by
consistent activity. Ex: If a user doesn’t gain any extra knowledge in a year would cause a
demotion.
8
Relative Leaderboard Total stars and points are tallied (ignoring the sliding window) and Champions are consistently
shown their position relative to others of their player type (3 above and 3 below)
2, 5, 6
Knowledge Categories Champions can choose to gain knowledge in any of 8 security domain categories. An attribute
web chart can be used to show their knowledge profile. Experts in certain categories can emerge.
3, 5, 6
Badges Badges can be earned in two cases: 1. the first time Champions complete a desired action that
requires significant effort, and 2. When their knowledge level reaches a certain # of points in a
category (showcasing their “expert” status). Badges can be shown to others via a trophy room.
2, 4, 5
Crowning All Belt and Maturity level-ups will be shared during Champion meetings, including a moment of
silent recognition.
2, 5
Streak Booster Champions start with a streak of 100% attendance in meetings, which earns them a double-point
booster. Ends if they miss a meeting, but the streak starts again each fiscal year.
2, 7, 8
Brainstorm of New Features (Cont’d)
Name Description Core Drives
Attendance Raffle Attendees in the Champions meetings are added for a random prize drawing in the next
meeting, but they must be present in the next meeting to claim it.
6, 7
Mentorship Champions who have reached Blue belt level can volunteer to mentor up to 3 newer
participants (up to Green level). Mentors earn half the points of any activity the mentee
performs. Mentors can gift a double-points booster once a month to one of their mentees,
which can be combined with other boosters.
2, 3, 5, 6
Training Narrative In every training session, stress the importance of being a Champion and make them feel unique
by emphasizing the importance of their mission to help secure their organization and that they
are out to thwart malicious attackers.
1
Annual Bests Reward the Champions at the end of each year for various high-level achievements: most
points/stars gained that year, highest total # points/stars, biggest leaderboard jump, top
knowledge experts. Consider mystery box prizes and let this be an Easter Egg the first time.
2, 5, 7
Milestone Unlocks Access to chat forum restricted until Champion’s first points level-up to Yellow Belt. Invitation to
join Advisory Group (limited seats) only available to Brown Belts.
2, 4, 7
SDLC Collection Set Clearly communicate the available software development lifecycle (SDLC) practices the
Champion’s teams should be performing, the star rewards and badges for each, and provide an
extra reward once they complete them all the first time.
2, 3, 4
Invite Magnetic Cap Champions are only rewarded with points for two guests they invite to a Champions meeting 6
Thank you!
To Yu-kai and the OP team: I have learned so much
about how to motivate people through Octalysis and
can’t thank you enough for selflessly sharing your
knowledge!
At this point the concepts I’ve learned so far have
been applied to most aspects of my life, both at
work and at home.
The journey is just beginning.
Dustin Lehr
Accomplished software engineer and information security leader focused on
motivating organizations toward better security habits.
Let’s connect! https://www.linkedin.com/in/dustinlehr/

More Related Content

What's hot

A closer look at CTF challenges
A closer look at CTF challengesA closer look at CTF challenges
A closer look at CTF challengesDNIF
 
Blaze Information Security: The cost of fixing security vulnerabilities in ea...
Blaze Information Security: The cost of fixing security vulnerabilities in ea...Blaze Information Security: The cost of fixing security vulnerabilities in ea...
Blaze Information Security: The cost of fixing security vulnerabilities in ea...Blaze Information Security
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 
Source Code Analysis with SAST
Source Code Analysis with SASTSource Code Analysis with SAST
Source Code Analysis with SASTBlueinfy Solutions
 
Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016Rihab Chebbah
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...Edureka!
 
Montreal Girl Geeks: Building the Modern Web
Montreal Girl Geeks: Building the Modern WebMontreal Girl Geeks: Building the Modern Web
Montreal Girl Geeks: Building the Modern WebRachel Andrew
 
Insecure direct object reference (null delhi meet)
Insecure direct object reference (null delhi meet)Insecure direct object reference (null delhi meet)
Insecure direct object reference (null delhi meet)Abhinav Mishra
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Digit Oktavianto
 
Building compelling business cases for Design Systems
Building compelling business cases for Design SystemsBuilding compelling business cases for Design Systems
Building compelling business cases for Design SystemsLaura Van Doore
 
Adversary Emulation and the C2 Matrix
Adversary Emulation and the C2 MatrixAdversary Emulation and the C2 Matrix
Adversary Emulation and the C2 MatrixJorge Orchilles
 
Caputre the flag
Caputre the flagCaputre the flag
Caputre the flagUIT
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityAbdul Wahid
 
Prioritization Method for Every Case by fmr Atlassian Principal PM
Prioritization Method for Every Case by fmr Atlassian Principal PMPrioritization Method for Every Case by fmr Atlassian Principal PM
Prioritization Method for Every Case by fmr Atlassian Principal PMProduct School
 
Web application security
Web application securityWeb application security
Web application securityKapil Sharma
 
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome ExtensionsI'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome ExtensionsKrzysztof Kotowicz
 

What's hot (20)

A closer look at CTF challenges
A closer look at CTF challengesA closer look at CTF challenges
A closer look at CTF challenges
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
Blaze Information Security: The cost of fixing security vulnerabilities in ea...
Blaze Information Security: The cost of fixing security vulnerabilities in ea...Blaze Information Security: The cost of fixing security vulnerabilities in ea...
Blaze Information Security: The cost of fixing security vulnerabilities in ea...
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
Source Code Analysis with SAST
Source Code Analysis with SASTSource Code Analysis with SAST
Source Code Analysis with SAST
 
Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Montreal Girl Geeks: Building the Modern Web
Montreal Girl Geeks: Building the Modern WebMontreal Girl Geeks: Building the Modern Web
Montreal Girl Geeks: Building the Modern Web
 
Insecure direct object reference (null delhi meet)
Insecure direct object reference (null delhi meet)Insecure direct object reference (null delhi meet)
Insecure direct object reference (null delhi meet)
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
 
Building compelling business cases for Design Systems
Building compelling business cases for Design SystemsBuilding compelling business cases for Design Systems
Building compelling business cases for Design Systems
 
Adversary Emulation and the C2 Matrix
Adversary Emulation and the C2 MatrixAdversary Emulation and the C2 Matrix
Adversary Emulation and the C2 Matrix
 
Caputre the flag
Caputre the flagCaputre the flag
Caputre the flag
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Prioritization Method for Every Case by fmr Atlassian Principal PM
Prioritization Method for Every Case by fmr Atlassian Principal PMPrioritization Method for Every Case by fmr Atlassian Principal PM
Prioritization Method for Every Case by fmr Atlassian Principal PM
 
Web application security
Web application securityWeb application security
Web application security
 
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome ExtensionsI'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
 

Similar to Octalysis Level 1 Certificate - Dustin Lehr - Security Champions

How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for YouCigital
 
Exin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course PreviewExin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course PreviewInvensis Learning
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
What Is The Process Of Becoming A Professional Agile Coach?
What Is The Process Of Becoming A Professional Agile Coach?What Is The Process Of Becoming A Professional Agile Coach?
What Is The Process Of Becoming A Professional Agile Coach?Advance Agility
 
Making security champions in organization
Making security champions in organizationMaking security champions in organization
Making security champions in organizationkunwaratul hax0r
 
202004-Scrum-Master-Certification-Training-Manual.pdf
202004-Scrum-Master-Certification-Training-Manual.pdf202004-Scrum-Master-Certification-Training-Manual.pdf
202004-Scrum-Master-Certification-Training-Manual.pdfDngoTrung1
 
Instant Mentoring
Instant MentoringInstant Mentoring
Instant MentoringMindLeaders
 
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...Security Catalyst
 
Transform your training with simulations speaker deck - march 2011
Transform your training with simulations   speaker deck - march 2011Transform your training with simulations   speaker deck - march 2011
Transform your training with simulations speaker deck - march 2011The Blockchain Academy
 
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryTechnology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryWCapra
 
Gamifying Agile project
Gamifying Agile project Gamifying Agile project
Gamifying Agile project Chandan Patary
 
Master scrum through scrum values
Master scrum through scrum valuesMaster scrum through scrum values
Master scrum through scrum valuessobiasheikh2
 
Group 6_Leading Self-Managed Teams.pptx
Group 6_Leading Self-Managed Teams.pptxGroup 6_Leading Self-Managed Teams.pptx
Group 6_Leading Self-Managed Teams.pptxssuser955fb81
 
BigScrum - Scaling Teams to Programs
BigScrum - Scaling Teams to ProgramsBigScrum - Scaling Teams to Programs
BigScrum - Scaling Teams to ProgramsThinkLouder
 
Agile Project Management Workshop.pptx
Agile Project Management Workshop.pptxAgile Project Management Workshop.pptx
Agile Project Management Workshop.pptxAbhishek Prasoon
 
Agile Software Development Team
Agile Software Development TeamAgile Software Development Team
Agile Software Development TeamAdvance Agility
 
pspotrainingbymanoharprasad-230119074638-553afd9f.ppt
pspotrainingbymanoharprasad-230119074638-553afd9f.pptpspotrainingbymanoharprasad-230119074638-553afd9f.ppt
pspotrainingbymanoharprasad-230119074638-553afd9f.pptMouhamed Anouar Fersi
 

Similar to Octalysis Level 1 Certificate - Dustin Lehr - Security Champions (20)

How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for You
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Exin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course PreviewExin Agile Scrum Master - Course Preview
Exin Agile Scrum Master - Course Preview
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
What Is The Process Of Becoming A Professional Agile Coach?
What Is The Process Of Becoming A Professional Agile Coach?What Is The Process Of Becoming A Professional Agile Coach?
What Is The Process Of Becoming A Professional Agile Coach?
 
Making security champions in organization
Making security champions in organizationMaking security champions in organization
Making security champions in organization
 
202004-Scrum-Master-Certification-Training-Manual.pdf
202004-Scrum-Master-Certification-Training-Manual.pdf202004-Scrum-Master-Certification-Training-Manual.pdf
202004-Scrum-Master-Certification-Training-Manual.pdf
 
Instant Mentoring
Instant MentoringInstant Mentoring
Instant Mentoring
 
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
 
Introduction to agile
Introduction to agileIntroduction to agile
Introduction to agile
 
Transform your training with simulations speaker deck - march 2011
Transform your training with simulations   speaker deck - march 2011Transform your training with simulations   speaker deck - march 2011
Transform your training with simulations speaker deck - march 2011
 
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryTechnology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
 
Gamifying Agile project
Gamifying Agile project Gamifying Agile project
Gamifying Agile project
 
Agile for Business
Agile for BusinessAgile for Business
Agile for Business
 
Master scrum through scrum values
Master scrum through scrum valuesMaster scrum through scrum values
Master scrum through scrum values
 
Group 6_Leading Self-Managed Teams.pptx
Group 6_Leading Self-Managed Teams.pptxGroup 6_Leading Self-Managed Teams.pptx
Group 6_Leading Self-Managed Teams.pptx
 
BigScrum - Scaling Teams to Programs
BigScrum - Scaling Teams to ProgramsBigScrum - Scaling Teams to Programs
BigScrum - Scaling Teams to Programs
 
Agile Project Management Workshop.pptx
Agile Project Management Workshop.pptxAgile Project Management Workshop.pptx
Agile Project Management Workshop.pptx
 
Agile Software Development Team
Agile Software Development TeamAgile Software Development Team
Agile Software Development Team
 
pspotrainingbymanoharprasad-230119074638-553afd9f.ppt
pspotrainingbymanoharprasad-230119074638-553afd9f.pptpspotrainingbymanoharprasad-230119074638-553afd9f.ppt
pspotrainingbymanoharprasad-230119074638-553afd9f.ppt
 

More from Yu-kai Chou

OP Design Challenge - Make A Video
OP Design Challenge - Make A VideoOP Design Challenge - Make A Video
OP Design Challenge - Make A VideoYu-kai Chou
 
Make a VIDEO.pdf
Make a VIDEO.pdfMake a VIDEO.pdf
Make a VIDEO.pdfYu-kai Chou
 
Octalysis Level 1 Certificate - Adrian Ensner - Remote Gamification Workshop.pdf
Octalysis Level 1 Certificate - Adrian Ensner - Remote Gamification Workshop.pdfOctalysis Level 1 Certificate - Adrian Ensner - Remote Gamification Workshop.pdf
Octalysis Level 1 Certificate - Adrian Ensner - Remote Gamification Workshop.pdfYu-kai Chou
 
Octalysis Level 1 Certificate - Robert Sherman - Noom
Octalysis Level 1 Certificate - Robert Sherman - NoomOctalysis Level 1 Certificate - Robert Sherman - Noom
Octalysis Level 1 Certificate - Robert Sherman - NoomYu-kai Chou
 
Octalysis Level 1 Certificate - Timothy Sher - Victor Educational Institute
Octalysis Level 1 Certificate - Timothy Sher - Victor Educational InstituteOctalysis Level 1 Certificate - Timothy Sher - Victor Educational Institute
Octalysis Level 1 Certificate - Timothy Sher - Victor Educational InstituteYu-kai Chou
 
Octalysis Level 1 Certificate - Arturo Caudullo - Too Good To Go
Octalysis Level 1 Certificate - Arturo Caudullo - Too Good To GoOctalysis Level 1 Certificate - Arturo Caudullo - Too Good To Go
Octalysis Level 1 Certificate - Arturo Caudullo - Too Good To GoYu-kai Chou
 
Octalysis Level 1 Certificate - Predrag Stefanovic - Duff.pdf
Octalysis Level 1 Certificate - Predrag Stefanovic - Duff.pdfOctalysis Level 1 Certificate - Predrag Stefanovic - Duff.pdf
Octalysis Level 1 Certificate - Predrag Stefanovic - Duff.pdfYu-kai Chou
 
Octalysis Level 1 Certificate - Rodrigo Richter - Go Right Pilates Studio.pdf
Octalysis Level 1 Certificate - Rodrigo Richter - Go Right Pilates Studio.pdfOctalysis Level 1 Certificate - Rodrigo Richter - Go Right Pilates Studio.pdf
Octalysis Level 1 Certificate - Rodrigo Richter - Go Right Pilates Studio.pdfYu-kai Chou
 
Octalysis Level 1 Certificate - Joel Schmidt - Click & Learn 360
Octalysis Level 1 Certificate - Joel Schmidt - Click & Learn 360Octalysis Level 1 Certificate - Joel Schmidt - Click & Learn 360
Octalysis Level 1 Certificate - Joel Schmidt - Click & Learn 360Yu-kai Chou
 
Octalysis Level 1 Certificate - Arsham Navid - Coffee Driver
Octalysis Level 1 Certificate - Arsham Navid - Coffee DriverOctalysis Level 1 Certificate - Arsham Navid - Coffee Driver
Octalysis Level 1 Certificate - Arsham Navid - Coffee DriverYu-kai Chou
 
BitDegree Island
BitDegree IslandBitDegree Island
BitDegree IslandYu-kai Chou
 
BitDegree Public
BitDegree PublicBitDegree Public
BitDegree PublicYu-kai Chou
 
Bit degree - Public
Bit degree - PublicBit degree - Public
Bit degree - PublicYu-kai Chou
 
Bit degree - Island
Bit degree - IslandBit degree - Island
Bit degree - IslandYu-kai Chou
 
Octalysis Certificate - Level 1 (Octalysis Prime)
Octalysis Certificate - Level 1 (Octalysis Prime)Octalysis Certificate - Level 1 (Octalysis Prime)
Octalysis Certificate - Level 1 (Octalysis Prime)Yu-kai Chou
 
Octalysis Certificate - Level 2 (Octalysis Prime)
Octalysis Certificate - Level 2 (Octalysis Prime)Octalysis Certificate - Level 2 (Octalysis Prime)
Octalysis Certificate - Level 2 (Octalysis Prime)Yu-kai Chou
 
Octalysis Level 2 Certificate - Colin Hahn - Leadership Engine
Octalysis Level 2 Certificate - Colin Hahn - Leadership EngineOctalysis Level 2 Certificate - Colin Hahn - Leadership Engine
Octalysis Level 2 Certificate - Colin Hahn - Leadership EngineYu-kai Chou
 
Guilds of Octalysis Prime
Guilds of Octalysis PrimeGuilds of Octalysis Prime
Guilds of Octalysis PrimeYu-kai Chou
 
Octalysis Level 1 Certificate - Colin Hahn - Association for Talent Development
Octalysis Level 1 Certificate - Colin Hahn - Association for Talent DevelopmentOctalysis Level 1 Certificate - Colin Hahn - Association for Talent Development
Octalysis Level 1 Certificate - Colin Hahn - Association for Talent DevelopmentYu-kai Chou
 
Octalysis Level 1 Certificate - Jedrzej Lewandowski - Soli Deo
Octalysis Level 1 Certificate - Jedrzej Lewandowski - Soli DeoOctalysis Level 1 Certificate - Jedrzej Lewandowski - Soli Deo
Octalysis Level 1 Certificate - Jedrzej Lewandowski - Soli DeoYu-kai Chou
 

More from Yu-kai Chou (20)

OP Design Challenge - Make A Video
OP Design Challenge - Make A VideoOP Design Challenge - Make A Video
OP Design Challenge - Make A Video
 
Make a VIDEO.pdf
Make a VIDEO.pdfMake a VIDEO.pdf
Make a VIDEO.pdf
 
Octalysis Level 1 Certificate - Adrian Ensner - Remote Gamification Workshop.pdf
Octalysis Level 1 Certificate - Adrian Ensner - Remote Gamification Workshop.pdfOctalysis Level 1 Certificate - Adrian Ensner - Remote Gamification Workshop.pdf
Octalysis Level 1 Certificate - Adrian Ensner - Remote Gamification Workshop.pdf
 
Octalysis Level 1 Certificate - Robert Sherman - Noom
Octalysis Level 1 Certificate - Robert Sherman - NoomOctalysis Level 1 Certificate - Robert Sherman - Noom
Octalysis Level 1 Certificate - Robert Sherman - Noom
 
Octalysis Level 1 Certificate - Timothy Sher - Victor Educational Institute
Octalysis Level 1 Certificate - Timothy Sher - Victor Educational InstituteOctalysis Level 1 Certificate - Timothy Sher - Victor Educational Institute
Octalysis Level 1 Certificate - Timothy Sher - Victor Educational Institute
 
Octalysis Level 1 Certificate - Arturo Caudullo - Too Good To Go
Octalysis Level 1 Certificate - Arturo Caudullo - Too Good To GoOctalysis Level 1 Certificate - Arturo Caudullo - Too Good To Go
Octalysis Level 1 Certificate - Arturo Caudullo - Too Good To Go
 
Octalysis Level 1 Certificate - Predrag Stefanovic - Duff.pdf
Octalysis Level 1 Certificate - Predrag Stefanovic - Duff.pdfOctalysis Level 1 Certificate - Predrag Stefanovic - Duff.pdf
Octalysis Level 1 Certificate - Predrag Stefanovic - Duff.pdf
 
Octalysis Level 1 Certificate - Rodrigo Richter - Go Right Pilates Studio.pdf
Octalysis Level 1 Certificate - Rodrigo Richter - Go Right Pilates Studio.pdfOctalysis Level 1 Certificate - Rodrigo Richter - Go Right Pilates Studio.pdf
Octalysis Level 1 Certificate - Rodrigo Richter - Go Right Pilates Studio.pdf
 
Octalysis Level 1 Certificate - Joel Schmidt - Click & Learn 360
Octalysis Level 1 Certificate - Joel Schmidt - Click & Learn 360Octalysis Level 1 Certificate - Joel Schmidt - Click & Learn 360
Octalysis Level 1 Certificate - Joel Schmidt - Click & Learn 360
 
Octalysis Level 1 Certificate - Arsham Navid - Coffee Driver
Octalysis Level 1 Certificate - Arsham Navid - Coffee DriverOctalysis Level 1 Certificate - Arsham Navid - Coffee Driver
Octalysis Level 1 Certificate - Arsham Navid - Coffee Driver
 
BitDegree Island
BitDegree IslandBitDegree Island
BitDegree Island
 
BitDegree Public
BitDegree PublicBitDegree Public
BitDegree Public
 
Bit degree - Public
Bit degree - PublicBit degree - Public
Bit degree - Public
 
Bit degree - Island
Bit degree - IslandBit degree - Island
Bit degree - Island
 
Octalysis Certificate - Level 1 (Octalysis Prime)
Octalysis Certificate - Level 1 (Octalysis Prime)Octalysis Certificate - Level 1 (Octalysis Prime)
Octalysis Certificate - Level 1 (Octalysis Prime)
 
Octalysis Certificate - Level 2 (Octalysis Prime)
Octalysis Certificate - Level 2 (Octalysis Prime)Octalysis Certificate - Level 2 (Octalysis Prime)
Octalysis Certificate - Level 2 (Octalysis Prime)
 
Octalysis Level 2 Certificate - Colin Hahn - Leadership Engine
Octalysis Level 2 Certificate - Colin Hahn - Leadership EngineOctalysis Level 2 Certificate - Colin Hahn - Leadership Engine
Octalysis Level 2 Certificate - Colin Hahn - Leadership Engine
 
Guilds of Octalysis Prime
Guilds of Octalysis PrimeGuilds of Octalysis Prime
Guilds of Octalysis Prime
 
Octalysis Level 1 Certificate - Colin Hahn - Association for Talent Development
Octalysis Level 1 Certificate - Colin Hahn - Association for Talent DevelopmentOctalysis Level 1 Certificate - Colin Hahn - Association for Talent Development
Octalysis Level 1 Certificate - Colin Hahn - Association for Talent Development
 
Octalysis Level 1 Certificate - Jedrzej Lewandowski - Soli Deo
Octalysis Level 1 Certificate - Jedrzej Lewandowski - Soli DeoOctalysis Level 1 Certificate - Jedrzej Lewandowski - Soli Deo
Octalysis Level 1 Certificate - Jedrzej Lewandowski - Soli Deo
 

Recently uploaded

3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdfSwaraliBorhade
 
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCRCall In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCRdollysharma2066
 
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一F dds
 
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一F La
 
西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造kbdhl05e
 
Call Girls Satellite 7397865700 Ridhima Hire Me Full Night
Call Girls Satellite 7397865700 Ridhima Hire Me Full NightCall Girls Satellite 7397865700 Ridhima Hire Me Full Night
Call Girls Satellite 7397865700 Ridhima Hire Me Full Nightssuser7cb4ff
 
Call Girls Meghani Nagar 7397865700 Independent Call Girls
Call Girls Meghani Nagar 7397865700  Independent Call GirlsCall Girls Meghani Nagar 7397865700  Independent Call Girls
Call Girls Meghani Nagar 7397865700 Independent Call Girlsssuser7cb4ff
 
Design Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryDesign Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryWilliamVickery6
 
Abu Dhabi Call Girls O58993O4O2 Call Girls in Abu Dhabi`
Abu Dhabi Call Girls O58993O4O2 Call Girls in Abu Dhabi`Abu Dhabi Call Girls O58993O4O2 Call Girls in Abu Dhabi`
Abu Dhabi Call Girls O58993O4O2 Call Girls in Abu Dhabi`dajasot375
 
专业一比一美国亚利桑那大学毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国亚利桑那大学毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国亚利桑那大学毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国亚利桑那大学毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.Mookuthi
 
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一Fi L
 
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证nhjeo1gg
 
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,Aginakm1
 
Passbook project document_april_21__.pdf
Passbook project document_april_21__.pdfPassbook project document_april_21__.pdf
Passbook project document_april_21__.pdfvaibhavkanaujia
 
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改yuu sss
 

Recently uploaded (20)

3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf
 
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCRCall In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
Call In girls Bhikaji Cama Place 🔝 ⇛8377877756 FULL Enjoy Delhi NCR
 
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
办理学位证(SFU证书)西蒙菲莎大学毕业证成绩单原版一比一
 
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
办理(宾州州立毕业证书)美国宾夕法尼亚州立大学毕业证成绩单原版一比一
 
西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造西北大学毕业证学位证成绩单-怎么样办伪造
西北大学毕业证学位证成绩单-怎么样办伪造
 
Call Girls Satellite 7397865700 Ridhima Hire Me Full Night
Call Girls Satellite 7397865700 Ridhima Hire Me Full NightCall Girls Satellite 7397865700 Ridhima Hire Me Full Night
Call Girls Satellite 7397865700 Ridhima Hire Me Full Night
 
Call Girls Meghani Nagar 7397865700 Independent Call Girls
Call Girls Meghani Nagar 7397865700  Independent Call GirlsCall Girls Meghani Nagar 7397865700  Independent Call Girls
Call Girls Meghani Nagar 7397865700 Independent Call Girls
 
Design Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William VickeryDesign Portfolio - 2024 - William Vickery
Design Portfolio - 2024 - William Vickery
 
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk GurgaonCheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
 
Abu Dhabi Call Girls O58993O4O2 Call Girls in Abu Dhabi`
Abu Dhabi Call Girls O58993O4O2 Call Girls in Abu Dhabi`Abu Dhabi Call Girls O58993O4O2 Call Girls in Abu Dhabi`
Abu Dhabi Call Girls O58993O4O2 Call Girls in Abu Dhabi`
 
专业一比一美国亚利桑那大学毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国亚利桑那大学毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国亚利桑那大学毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国亚利桑那大学毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
昆士兰大学毕业证(UQ毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.Mookuthi is an artisanal nose ornament brand based in Madras.
Mookuthi is an artisanal nose ornament brand based in Madras.
 
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
办理学位证(TheAuckland证书)新西兰奥克兰大学毕业证成绩单原版一比一
 
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
在线办理ohio毕业证俄亥俄大学毕业证成绩单留信学历认证
 
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
原版美国亚利桑那州立大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Call Girls in Pratap Nagar, 9953056974 Escort Service
Call Girls in Pratap Nagar,  9953056974 Escort ServiceCall Girls in Pratap Nagar,  9953056974 Escort Service
Call Girls in Pratap Nagar, 9953056974 Escort Service
 
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
'CASE STUDY OF INDIRA PARYAVARAN BHAVAN DELHI ,
 
Passbook project document_april_21__.pdf
Passbook project document_april_21__.pdfPassbook project document_april_21__.pdf
Passbook project document_april_21__.pdf
 
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
1比1办理美国北卡罗莱纳州立大学毕业证成绩单pdf电子版制作修改
 

Octalysis Level 1 Certificate - Dustin Lehr - Security Champions

  • 1. Security Champions Level 1 Octalysis Dustin Lehr September 29, 2021
  • 2. What are Security Champions? A major challenge facing software-focused organizations today is how to effectively incorporate good cyber security practices into everyday habits without sacrificing business deliverables. Software security experts are typically limited in number and cannot be everywhere at once. A common practice in high-functioning organizations is to recruit Security Champions. Security Champions are individuals in an organization who have agreed to spend a portion of their time helping address software security by learning the skills to help their teams proactively find and address security risk. The Champions act as a liaison between the security team and their own team, helping to translate and interpret security best practices into the context of their team’s software development practices. Challenge: How can we motivate the Champions to increase the software security maturity of their team?
  • 3. Business Metrics (Security Maturity) 1. # of Security Habits Followed by Team (Prevent Issues) • The Security Champion drives adoption of security best practice habits during their team’s software development lifecycle (SDLC), such as performing Threat Modeling during design. 2. (Decrease) Avg # Security Issues per Developer (Fix Issues) • The Security Champion encourages their team to fix known security issues discovered from a variety of sources: source code analysis, security assessments and penetration tests. 3. % Security Assessment Coverage by Team (Find Issues) • The Security Champion encourages their team to assess their architecture and code-base using source code analysis, security assessments and penetration tests to find security issues. • This is very important to feed #2. If you don’t have methods to find security issues, your issue counts will naturally be low. Less important but needed to feed/improve the above: 4. Security Knowledge and Skills • The Security Champion grows their own knowledge by completing learning activities such as training to ultimately help their teams affect the metrics above. 5. Security Champion Program Participation • The Security Champion demonstrates commitment to advancing and contributing to the program through attendance in meetings, likes/comments in the group chat, inviting others to become a Champion, etc.
  • 4. Security Champion Player Types Team-Oriented Self-Oriented Goal-Driven Experiment-Driven Driver Aspirer Pioneer Inspirer 1 2 3 4
  • 5. Security Champion Player Types 1. Driver • Team-Oriented and Goal-Driven • Coaches, leads, and supports the team to reach their goals 2. Aspirer • Self-Oriented and Goal-Driven • Ambitiously pursues personal growth and development 3. Inspirer • Team-Oriented and Experiment-Driven • Motivates team to pursue their own unique visions 4. Pioneer • Self-Oriented and Experiment-Driven • Invents and experiments with innovative ideas
  • 6. Security Champion Driver Player Type Wants to contribute to overall company success Believes in company’s purpose Constantly learns and grows technical knowledge Drives to meet project goals Earns certifications, degrees, and collects qualifications Designs creative technical solutions to solve business needs Competes with others to stand out in technical knowledge Strives to appease leadership by meeting their goals Works closely with team to ensure overall team success Is curious to learn about new business needs Anticipates production outages and issues that can occur anytime Reduces risk to ensure availability of data and systems Has a strong desire to not lose job Is extremely busy to satisfy the needs of the business and meet deadlines – no luxury of time, so must determine and work top priorities Anxious for their code and ideas to be tested and put in front of customers to determine their effectiveness Is very proud and protective of their ideas and the things they’ve built Has strong attachment to the technical ideas/ thoughts/ beliefs they’ve settled on over the years Meaning Empowerment Social Influence Unpredictability Avoidance Scarcity Ownership Accomplishment
  • 7. Scaffolding Phase Desired Actions 1. Program Participation (Business Metric 5): • Attend monthly Champion training meetings • Ask comment/question during meeting • Share Champions meeting content with own team • Like, comment, or post content in group chat area • Invite a guest to the monthly Champion training meeting • Invite someone to become a Security Champion 2. Security Knowledge and Skills (Business Metric 4): • Watch a security training video • Complete secure code training course • Read a security-focused book • Help refine company security standards or guidelines 3. % Security Assessment Coverage by Team (Business Metric 3) • Invite security team to perform a security assessment for a project • Assist security team in the security assessment of a project • Identify and share a valid risk discovered • Onboard an application that needs to be scanned by security tooling 4. (Decrease) Avg # Security Issues per Developer (Business Metric 2) • Assist to analyze a security tool finding • Assist to remediate security risk in own area • Demonstrate clean security scan for a project 5. # of Security Habits Followed by Team (Business Metric 1) • Integrate a new security activity into own Software Development Lifecycle • Show team is following all Software Development Lifecycle practices The experience flow is generally such that Security Champions will start with light participation in the program and get more involved over time, ultimately working their way up to helping assist their team meet the most important business metrics.
  • 8. Analysis of Current Experience Consistent narrative on the bigger picture of helping protect the company Champions are an elite group for which you must be selected Acknowledgement from security team and program facilitator for attending the training meetings Ability to assist in the design and content of the Champions wiki Champions answer quick “fill in the blank” quiz questions during training Champions think of unique ways to hack the fake training website Training knowledge shared motivates desire to reciprocate Slack channel group to share knowledge, and ask questions, and react to other posts Unknown next training presentation topic Random prize awarded to a training meeting attendee Responsibility to protect the Champion’s area from a security breach Don’t want to miss out on an entertaining training topic or event Prizes rewarded only if attending the training Live trainings only happen at specific times Live trainings only last a limited amount of time Security Champions can recruit and invite others to become Security Champions Meaning Empowerment Social Influence Unpredictability Avoidance Scarcity Ownership Accomplishment
  • 9. Brainstorm of New Features Name Description Core Drives Karate Belt Level Champions earn points based on activities to either increase their security knowledge or participate in the program (attend meetings, etc.). Based on points earned, they obtain a Karate belt level (White through Black) that they can display proudly to others. 2, 4, 5, 6 Area Maturity Level Champions earn stars based on the ongoing security practices of their team (scanning, remediation of findings, security development habits etc.). Certain points obtained earn them a Security Maturity level (Bronze through Diamond). This level is also applied to their VP’s area and micro/group leaderboards are used to compare VP areas. 2, 4, 5, 6 Level Sliding Window Belt and Maturity Levels are based on activity in the past year and must be maintained by consistent activity. Ex: If a user doesn’t gain any extra knowledge in a year would cause a demotion. 8 Relative Leaderboard Total stars and points are tallied (ignoring the sliding window) and Champions are consistently shown their position relative to others of their player type (3 above and 3 below) 2, 5, 6 Knowledge Categories Champions can choose to gain knowledge in any of 8 security domain categories. An attribute web chart can be used to show their knowledge profile. Experts in certain categories can emerge. 3, 5, 6 Badges Badges can be earned in two cases: 1. the first time Champions complete a desired action that requires significant effort, and 2. When their knowledge level reaches a certain # of points in a category (showcasing their “expert” status). Badges can be shown to others via a trophy room. 2, 4, 5 Crowning All Belt and Maturity level-ups will be shared during Champion meetings, including a moment of silent recognition. 2, 5 Streak Booster Champions start with a streak of 100% attendance in meetings, which earns them a double-point booster. Ends if they miss a meeting, but the streak starts again each fiscal year. 2, 7, 8
  • 10. Brainstorm of New Features (Cont’d) Name Description Core Drives Attendance Raffle Attendees in the Champions meetings are added for a random prize drawing in the next meeting, but they must be present in the next meeting to claim it. 6, 7 Mentorship Champions who have reached Blue belt level can volunteer to mentor up to 3 newer participants (up to Green level). Mentors earn half the points of any activity the mentee performs. Mentors can gift a double-points booster once a month to one of their mentees, which can be combined with other boosters. 2, 3, 5, 6 Training Narrative In every training session, stress the importance of being a Champion and make them feel unique by emphasizing the importance of their mission to help secure their organization and that they are out to thwart malicious attackers. 1 Annual Bests Reward the Champions at the end of each year for various high-level achievements: most points/stars gained that year, highest total # points/stars, biggest leaderboard jump, top knowledge experts. Consider mystery box prizes and let this be an Easter Egg the first time. 2, 5, 7 Milestone Unlocks Access to chat forum restricted until Champion’s first points level-up to Yellow Belt. Invitation to join Advisory Group (limited seats) only available to Brown Belts. 2, 4, 7 SDLC Collection Set Clearly communicate the available software development lifecycle (SDLC) practices the Champion’s teams should be performing, the star rewards and badges for each, and provide an extra reward once they complete them all the first time. 2, 3, 4 Invite Magnetic Cap Champions are only rewarded with points for two guests they invite to a Champions meeting 6
  • 11. Thank you! To Yu-kai and the OP team: I have learned so much about how to motivate people through Octalysis and can’t thank you enough for selflessly sharing your knowledge! At this point the concepts I’ve learned so far have been applied to most aspects of my life, both at work and at home. The journey is just beginning. Dustin Lehr Accomplished software engineer and information security leader focused on motivating organizations toward better security habits. Let’s connect! https://www.linkedin.com/in/dustinlehr/