Gamification of Security: Making Security a Game. Spencer Wilcox, CISSP, CPP, Find this presentation at: Securiplay.com.

Slides:



Advertisements
Similar presentations
Board Governance: A Key to Quality Organizations
Advertisements

Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
Gallup Q12 Definitions Notes to Managers
Performance Management Guide for Supervisors. Objectives  Understand necessity of reviews;  To define a rating standard across the Foundation for an.
The Power of Employee Engagement
Maintaining Industrial Harmony at Work
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Managers roundtable 9/25/2013
Information Security Policies and Standards
Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a.
Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
HRM-755 PERFORMANCE MANAGEMENT
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
CHAPTER 2 – ROLES OF CONSTRUCTION PERSONNEL IN SAFETY AND HEALTH
Contents Click the link below to go directly to the slides for that chapter. Chapter 1 ■ Your Personal Strengths Chapter 2 ■ The Roles You Play Chapter.
Motivation What energizes human behavior?
MANA 4328 Dennis C. Veit Human Resource Staffing and Performance Management “Beginning the Staffing Process” MANA 4328 Dennis C. Veit
1 Challenges For A Credit Bureau In Emerging Markets.
Using product gamification to drive user engagement.
15 Powerful Habits Make You The Winner!!!.
For the organization to motivate employees, - Career development organization for the employees, - Another dismissal from work or a work.
SESSION ONE PERFORMANCE MANAGEMENT & APPRAISALS.
Welcome Maria Hegarty Equality Strategies Ltd. What ? Equality/Diversity Impact Assessment A series of steps you take that enable you to assess what you.
ISMMMO, Antalya April Internal Audit, Best Practices Özlem Aykaç, CIA,CCSA CAE Coca-Cola İçecek.
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
1 Moderator: Thomas N. Shorter, Godfrey & Kahn, S.C. Panelists: Nancy Davis, Ministry Health Care Lee Kadel, Wheaton Franciscan Healthcare Ralph Topinka,
Managerial Accounting: An Introduction To Concepts, Methods, And Uses Chapter 12 Incentive Issues Maher, Stickney and Weil.
Stakeholders and Ethics Organizational Stakeholders Stakeholders: people who have an interest, claim, or stake in an organization  Inside stakeholders.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Worker / Patient Safety: Steps in a Culture Change Mary Margaret Jackson Director, Performance Outcome Services Self Regional Healthcare.
CYBER CRIME.
Information Systems Security Operational Control for Information Security.
Career Mythbusters 2.0 Lee Kushner May 16, 2012 NY Metro ISSA Chapter 1.
Copyright © 2008 Allyn & Bacon Leadership and Management Skills 1. Identify the functions of a leader. 2. Understand major theories of management. 3. Explain.
Executive Invitation – Oracle Data Finder Service Oracle Corporation.
IT Professionalism Ethics Modified by Andrew Poon.
Management by open book Under supervision of Dr. Ahmed Fahmy Prepared by Salma Dawood.
HRM Human Resource management. HRM Class Emphasis Show “best-in-class” HRM practices Understand how HRM practices support business strategy How to use,
Introduction Motivating others in the workplace is being able to identify the reasons which make employees behave a particular way. In most cases this.
Management Plan Goran Smajlagic S English 2100.
Job Analysis - Competency Modeling MANA 5322 Dr. Jeanne Michalski
Education In 2014, at least 40% of the individuals elected to membership will receive their PGA Professional Golf Management education through one of the.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
An essential part of workplace success!
Developing skills and knowledge
Getting Everybody on Board Session 3 Module 4 Presented by the MBI Consultants.
Financial Supervisory Commission Chinese Taipei1 Ensuring Capacity, Integrity and Accountability of Regulators and Supervisors Rebecca Chung-Fern Wu, Ph.D.
Staff All Surveys Questions 1-27 n=45 surveys Strongly Disagree Disagree Neutral Agree Strongly Agree The relative sizes of the colored bars in the chart.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
HHHR Objective Setting and Performance Appraisal Cycle for Supervisors.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
HEALTH WEALTH CAREER April 28, 2016 STRICTLY PRIVATE & CONFIDENTIAL The information included in this report is strictly confidential and is proprietary.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Gamification Carsten Schlipf.
Gamify Your Message. Gamification applying game mechanics to non-game situations (education, advertising) referred to as "funware" in marketing What is.
PRINCIPLES OF MANAGEMENT – DDPQ2532 INTRODUCTION.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Marketing II Chapter 2: Company and Marketing Strategy Partnering to Build Customer relationships
 In Ned law are a company that provides strategic consulting and management, composed of a team of high academic and social esteem, focused on optimization,
SECURITY Prepared By: Dr. Vipul Vekariya.. 2 S ECURITY Secure system will control, through use of specific futures, access to information that only properly.
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Information Security and Privacy in HRIS
Groundwork to Create a Professional Organization
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Art of Stepping on the Same Rake, Volume 2
Empower Managers to Take Ownership of Employee Engagement
IS4680 Security Auditing for Compliance
Roadmap to an Organizational Culture of QI
Presentation transcript:

Gamification of Security: Making Security a Game. Spencer Wilcox, CISSP, CPP, Find this presentation at: Securiplay.com

ABSTRACT There seem to be two requirements implicit in security. First, stop the bad guys from doing bad things to us, and second limit the exposure to loss so the company can make money. Is your management playing the same game? Check-the-box security is regularly dismissed by security professionals as mere compliance, and a waste of highly trained staff. Instead of making security compliance the worst part of a security job, why not make it a game? Can we pay a receptionist to play a game to monitor logs between phone calls while helping to secure our networks?

DISCLAIMER I am not an attorney. I am not providing a legal opinion, or offering legal advice. I am providing information regarding my research on this topic, which may include law or case law. My views are my own, any opinions expressed in this presentation are mine, and do not necessarily reflect the opinions of my employer. Please consult your attorney before adopting any of the practices discussed in this presentation. If you choose to implement any of the ideas expressed in this presentation, please mention the inspiration that this presentation provided.

So what is Gamification? Michael Wu – – Gamification is the use of game-like mechanics to drive game-like engagement and actions. Wikipedia – – Gamification is the use of game thinking and game mechanics to engage users in solving problems. Gamification is used in applications and processes to improve user engagement, return on investment, data quality, timeliness, and learning. Dictionary.com – No results found, do you mean Gasification?

What is Gamification What Gamification is not: – Game Theory A Beautiful Mind Problem-Solving approach to model complex problems – Video Games – Role Playing Games – Strategy Games – Train Games – Board (Bored Games)

THE TYPE OF PENETRATION TESTING USED TO DISCOVER WHETHER NUMEROUS USERCODE/PASSWORD COMBINATIONS CAN BE ATTEMPTED WITHOUT DETECTION IS CALLED? a. Keystroke capturing b. Access validation testing c. Brute force testing d. Accountability testing

SURVEY SAYS? c. Brute force testing

What is Gamification Using Game Mechanics – Fogg’s Behavior Model (BJ Fogg Stanford University) Motivation – WANT – Sensation (Pleasure, Pain) – Anticipation (Hope, Fear) – Social Cohesion (Rejection, Acceptance) Ability – “By focusing on Simplicity of the target behavior you increase Ability. “ Trigger – Getting someone to act at the right time, when both motivation and ability are at their peak. For more on this search for Michael Wu: the Science of Gamification (fora.tv)

AN ACCESS SYSTEM THAT GRANTS USERS ONLY THOSE RIGHTS NECESSARY FOR THEM TO PERFORM THEIR WORK IS OPERATING ON WHICH SECURITY PRINCIPLE? a. Discretionary access b. Least privilege c. Mandatory access d. Separation of duties

SURVEY SAYS? b. Least privilege

So how does this apply to me? Gamification has three direct applications to security – Gamification to increase employee engagement and employee retention – Gamification to increase employee productivity, by simplifying work, and by increasing motivation. – Gamification to increase executive buy-in.

WHICH OF THE FOLLOWING IS A MALICIOUS PROGRAM, THE PURPOSE OF WHICH IS TO REPRODUCE ITSELF THROUGHOUT THE NETWORK UTILIZING SYSTEM RESOURCES? a. Logic bomb b. Virus c. Worm d. Trojan horse

SURVEY SAYS? c. Worm

Increase Employee Engagement Gamify the work experience – Immediate gratification – Achievements for completions – Achievements for Certs, degrees, promotions, years experience, etc. Gamify the Bug Hunt – A note for finding the bug, a badge (and spot bonus) for following it through the GRC Gamify Secure Coding – If your code makes it through code review with no bugs, WIN FABULOUS PRIZES! Gamify Incident Detection – APT detection (much like the bug hunt.) Help Solve the “Never a Prophet In Your Own Land Syndrome.” Create a team intranet site, and DISPLAY your employee’s earned badges. Make it the Security LEADER board. Pro-Tip

ALL YOUR BASE? a. Are Hidden On Dantooine. b. Are Belong To The Kilrathi. c. Are Belong To Us. d. Are being closed in BRAC.

SURVEY SAYS?

Increase Employee Productivity Lets build a game: – Needs to engage your employees – Solve a problem. – Be simple enough to understand, motivating enough to challenge. Candy Crush A real-world problem: – Log Monitoring – Receptionists with free-time – A match made in gamification heaven. Did you play Galaga to “Earn the High Score”, to “Knock off the guy in number 1,” to “Hang at the arcade with your buddies,” or to “See the Mothership?” Richard Bartle, PhD notes that there are four player personality types: Achievers Killers Socializers Explorers

WHY ARE UNIQUE USER IDS CRITICAL IN THE REVIEW OF AUDIT TRAILS? a. They show which files were altered. b. They establish individual accountability. c. They cannot be easily altered. d. They trigger corrective controls.

SURVEY SAYS? b. They establish individual accountability.

Gamify Your Management Return on Investment is important. – What are the tangible and intangible returns? – Financial ROI is virtually incalculable in a large company. – Intangible ROI may be a better return. What experience can security provide your executives and your board? – Earn the “Briefing at Cheyenne Mountain” Badge – Earn the “Secret Clearance” Badge – Earn the “Best Security Program in Class” Badge – Earn the “Q works for me” Badge – Earn the “Not FUD But Science” Badge – Earn the “We PROTECT our Customers / Infrastructure / Nation” Badge

WHAT PRINCIPLE RECOMMENDS THE DIVISION OF RESPONSIBILITIES SO THAT ONE PERSON CANNOT COMMIT AN UNDETECTED FRAUD? a. Separation of duties b. Mutual exclusion c. Need to know d. Least privilege

SURVEY SAYS? a. Separation of duties

Bibliography See securiplay.com A formal bibliography is forthcoming.