SlideShare ist ein Scribd-Unternehmen logo
1 von 34
How to Become a Security Behavior Alchemist
Perry Carpenter, MSIA, C|CISO
Security Awareness and Secure Behavior are NOT the Same
Thing
Traditional
awareness
programs fail to
account for the
knowledge-
intention-behavior
gap…
Agenda
1. Why behavior?
2. How can you model and design
secure behaviors to help shape
good security hygiene?
3. How can you debug behavior?
Agenda
1. Why behavior?
2. How can you model and design
secure behaviors to help shape
good security hygiene?
3. How can you debug behavior?
There are Three Realities
of Security Awareness
Just because I’m
aware doesn’t mean
mean that I care.
If you try to work
against human
nature, you will fail.
What your
employees do is way
more important than
what they know.
Just because
I’m aware
doesn’t mean
that I care.
Security Awareness and Secure Behavior are NOT the Same Thing
If you try to work against human nature,
you will fail…
Thinking, Fast & Slow (Daniel Kahneman)
Graphic Source: https://readingraphics.com/book-summary-thinking-fast-and-slow/
System 1 Thinking Example
Which line is longest?
System 2 Thinking Example
x
532 86 x
System 1 vs. System 2:
an Example
A bat and a ball cost $1.10.
The bat costs $1.00 more than the ball.
How much does the ball cost?
System 1 vs. System 2:
an Example
Did you say that the ball costs ten cents?
If so, you were just a victim of System 1.
Total cost: $1.10
Minus ball cost : $0.10
Equals bat cost: $1.00
Here’s what System 1 gets you:
System 1 vs. System 2:
an Example
But remember:
The bat costs $1.00 more
than the ball.
Bat cost: $1.00
Minus ball cost : $0.10
Equals: $0.90
Warning:
Blindly following System 1
can be hazardous.
ciso.eccouncil.org 14
5¢
$1.05
Bat cost: $1.05
Plus ball cost: $0.05
Equals: $1.10
Yeah: Sometimes an answer or an action can feel
right even when it is wrong.
Your awareness program should not focus only on information delivery
Ask yourself:
Do you care more about what your people
know or what they do?
Thinking
about
Behavioral
Intersections
and
Interventions
ciso.eccouncil.org
Agenda
1. Why behavior?
2. How can you model and design
secure behaviors to help shape
good security hygiene?
3. How can you debug behavior?
Why Is Getting the Desired Behaviors
So Difficult?
http://behaviormodel.org
Behavior happens
when three things
come together at the
same time:
Motivation, Ability, and
a Prompt to do the
behavior…
BJ Fogg is the father of a field now referred as “Behavior Design.”
ciso.eccouncil.org
20
1.What behaviors, if adopted, would
have the most security benefit for our
organization?
2.Is this a group of behaviors, or is this
a single behavior?
3.Is this a behavior that we have the
appetite to take-on right now?
Get Specific:
Designing Behavior (A Non-Security Example)
Fogg Behavior Model Component Description
Behavior(B): What specific
behavior do we want someone to
do?
Drink a glass of water
Motivation(M): What types of
things might motivate someone
to perform the B?
 They could be thirsty
 The might want social acceptance (everyone else is doing it)
 They might want to avoid offending the person offering them water
 They believe that there are positive health benefits associated with staying
hydrated
 Etc.
Ability(A): What types of things
must someone already be able
to do or know to successfully
perform the B?
 A glass of water is available to the person or can be obtained with little effort
 The person’s mouth is not taped shut
 The person is not asleep or otherwise incapacitated
 Etc…
Prompts(P): What types of things
can cue the B?
 The person noticing that they are thirsty
 Someone offers the person a glass of water
 The person receives a prompt from a health-app reminding them to drink
 Etc.
ciso.eccouncil.org
Thoughts on Designing for Each Element
•Prompts
•Ability
•Motivation
Learn from Marketers and Storytellers
to Influence Motivation
ciso.eccouncil.org
Nudge your audience toward the behavior
A nudge, as we will use the term, is any aspect of the choice architecture that alters people's behavior in a
predictable way without forbidding any options or significantly changing their economic incentives. To count as a
mere nudge, the intervention must be easy and cheap to avoid. Nudges are not mandates. Putting fruit at eye level
counts as a nudge. Banning junk food does not. Nudge: Improving Decisions About Health, Wealth, and Happiness, 2008
Nudging: A Security Example
A nudge, as we will use the
term, is any aspect of the choice
architecture that alters people's
behavior in a predictable way
without forbidding any options
or significantly changing their
economic incentives. To count
as a mere nudge, the
intervention must be easy and
cheap to avoid. Nudges are not
mandates. Putting fruit at eye
level counts as a nudge. Banning
junk food does not.
Nudge: Improving Decisions About Health,
Wealth, and Happiness, 2008
Your password change portal is a great place to insert a nudge:
• Strength Meters
• Videos on how to create & remember strong passwords
• Elective LMS modules
• etc.
ciso.eccouncil.org
Design
Power Prompts
Where Possible
A power prompt is a prompt that the user receives
that also contains something intended to increase motivation,
make the behavior easier, or both.
Designing Behavior (A Security Example)
Fogg Behavior Model Component Description
Behavior(B): What specific behavior do
we want someone to do?
Choose a good password
Motivation(M): What types of things
might motivate someone to perform
the B?
• They understand and appreciate the value of choosing a good password
• They feel empowered by choosing a good password
• They feel more secure by choosing a good password
• They are afraid that their current password has been (or might be) compromised due to its
simplicity
• They feel pressure to create a better password because the organization is monitoring
strength
Ability(A): What types of things must
someone already be able to do or know
to successfully perform the B?
• The person has the required knowledge of how to construct a password that is both strong
memorable
• The person has tools that will help them construct a password that is both strong and
memorable
• The person has tools that will choose a strong password and remember that password for
them
Prompts(P): What types of things can
cue the B?
• The person just feels like changing their password
• The person receives notification that it is time to change his/her password
• The person is locked-out of his/her account because they forgot their current password
• The organization issues a forced password reset
• The person receives a security tip that has advice on how to create and remember a good
password
• The person forgot their current password and is about to perform a password reset
• The person receives a notification that his/her account was breached, and hackers may
accessed the password
Phishing / Automated Social Engineering Testing
Plan like a Marketer. Test like an Attacker.
Time
Channel
Executive
Message/Video
LMS Modules
Newsletter
Digital Signage – Theme 1
LMS Modules
Department Manager
Message
Newsletter Newsletter Newsletter
Digital Signage – Theme 2
Security Town Hall
LMS Modules
ciso.eccouncil.org
Agenda
1. Why behavior?
2. How can you model and design
secure behaviors to help shape
good security hygiene?
3. How can you debug behavior?
Account for
Behavioral
Segments
ciso.eccouncil.org
Debugging Problem Behaviors
Prompt:
• Are we prompting for the
behavior? If not, prompt for the
behavior.
• If so, are the prompts designed
effectively?
• Have the prompts become
‘invisible’ through overuse?
• Are the prompts occurring
through an optimal channel?
• Can we create a power
prompt?
Ability:
• Is the behavior still too hard?
• Is there any way to make the
behavior easier? Perhaps
through tools, additional
training, etc.?
• Is this behavior even something
most humans can do
consistently?
• Is there a time that the
behavior feels easier or more
achievable than other times?
• Can we embed something
within the prompt that will
reduce the real (or perceived)
time, complexity, or effort
required to do the behavior?
Motivation:
• What factors might enhance or
erode emotion at the time of
behavior?
• Are their times when someone
may feel more naturally
motivated to do the behavior?
• Is there a way to make the
behavior feel more
meaningful?
• Are their social, environmental,
or other factors that can be
leveraged to provide intrinsic or
extrinsic motivation?
• Can we place a motivational
boost within the prompt?
thinking about passwords
Designing for the Larger Issue
“Do you care more about
what your employees know
or what they do?”
Shameless Plug
Thank You!Perry Carpenter
Chief Evangelist & Strategy Officer
ciso.eccouncil.org

Weitere ähnliche Inhalte

Ähnlich wie How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry Carpenter

Mahatma Gandhi Essay In Hindi For Class 6
Mahatma Gandhi Essay In Hindi For Class 6Mahatma Gandhi Essay In Hindi For Class 6
Mahatma Gandhi Essay In Hindi For Class 6Alicia Williams
 
Using Behavioral Science to Secure Your Organization
Using Behavioral Science to Secure Your OrganizationUsing Behavioral Science to Secure Your Organization
Using Behavioral Science to Secure Your OrganizationMasha Sedova
 
Demystifying agilecoaching
Demystifying agilecoachingDemystifying agilecoaching
Demystifying agilecoachingAnand Murthy Raj
 
Conversational Leadership
Conversational LeadershipConversational Leadership
Conversational Leadership2016
 
Stanford Social M CONVERGE: Mass Engagement through Persuasive Technology
Stanford Social M CONVERGE: Mass Engagement through Persuasive TechnologyStanford Social M CONVERGE: Mass Engagement through Persuasive Technology
Stanford Social M CONVERGE: Mass Engagement through Persuasive TechnologyMargarita Quihuis
 
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)Kelsey Anderson Foley
 
People, brain and change in the Manifesto for Agile Software Development
People, brain and change in the Manifesto for Agile Software DevelopmentPeople, brain and change in the Manifesto for Agile Software Development
People, brain and change in the Manifesto for Agile Software DevelopmentIvo Peksens
 
Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...Angus Carbarns
 
How Many Words Is The Common App Essay Supposed To Be
How Many Words Is The Common App Essay Supposed To BeHow Many Words Is The Common App Essay Supposed To Be
How Many Words Is The Common App Essay Supposed To BeLydia Jana
 
Applications of Behavioural Economics to consumer insight
Applications of Behavioural Economics to consumer insightApplications of Behavioural Economics to consumer insight
Applications of Behavioural Economics to consumer insightErica van Lieven
 
Double Loop Learning--Purpose and Power--PNSQC 2014 - slides
Double Loop Learning--Purpose and Power--PNSQC 2014 - slidesDouble Loop Learning--Purpose and Power--PNSQC 2014 - slides
Double Loop Learning--Purpose and Power--PNSQC 2014 - slidesJean Richardson
 
COMPISSUES08 - Credibility of Technology
COMPISSUES08 - Credibility of TechnologyCOMPISSUES08 - Credibility of Technology
COMPISSUES08 - Credibility of TechnologyMichael Heron
 
How to Get Started or Expand Your Learning Analytics Program
 How to Get Started or Expand Your Learning Analytics Program How to Get Started or Expand Your Learning Analytics Program
How to Get Started or Expand Your Learning Analytics ProgramWatershed
 
Entrepreneurial Psychology
Entrepreneurial PsychologyEntrepreneurial Psychology
Entrepreneurial Psychologyjericsinger
 
Mistake proofing presentation
Mistake proofing presentation Mistake proofing presentation
Mistake proofing presentation leanadvisors
 
Ai demystified for HR and TA leaders
Ai demystified for HR and TA leadersAi demystified for HR and TA leaders
Ai demystified for HR and TA leadersAntonia Macrides
 

Ähnlich wie How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry Carpenter (20)

Mahatma Gandhi Essay In Hindi For Class 6
Mahatma Gandhi Essay In Hindi For Class 6Mahatma Gandhi Essay In Hindi For Class 6
Mahatma Gandhi Essay In Hindi For Class 6
 
Using Behavioral Science to Secure Your Organization
Using Behavioral Science to Secure Your OrganizationUsing Behavioral Science to Secure Your Organization
Using Behavioral Science to Secure Your Organization
 
Demystifying agilecoaching
Demystifying agilecoachingDemystifying agilecoaching
Demystifying agilecoaching
 
Conversational Leadership
Conversational LeadershipConversational Leadership
Conversational Leadership
 
Stanford Social M CONVERGE: Mass Engagement through Persuasive Technology
Stanford Social M CONVERGE: Mass Engagement through Persuasive TechnologyStanford Social M CONVERGE: Mass Engagement through Persuasive Technology
Stanford Social M CONVERGE: Mass Engagement through Persuasive Technology
 
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
 
People, brain and change in the Manifesto for Agile Software Development
People, brain and change in the Manifesto for Agile Software DevelopmentPeople, brain and change in the Manifesto for Agile Software Development
People, brain and change in the Manifesto for Agile Software Development
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...
 
How Many Words Is The Common App Essay Supposed To Be
How Many Words Is The Common App Essay Supposed To BeHow Many Words Is The Common App Essay Supposed To Be
How Many Words Is The Common App Essay Supposed To Be
 
Applications of Behavioural Economics to consumer insight
Applications of Behavioural Economics to consumer insightApplications of Behavioural Economics to consumer insight
Applications of Behavioural Economics to consumer insight
 
Double Loop Learning--Purpose and Power--PNSQC 2014 - slides
Double Loop Learning--Purpose and Power--PNSQC 2014 - slidesDouble Loop Learning--Purpose and Power--PNSQC 2014 - slides
Double Loop Learning--Purpose and Power--PNSQC 2014 - slides
 
Social engineering and indian jugaad
Social engineering and indian jugaadSocial engineering and indian jugaad
Social engineering and indian jugaad
 
COMPISSUES08 - Credibility of Technology
COMPISSUES08 - Credibility of TechnologyCOMPISSUES08 - Credibility of Technology
COMPISSUES08 - Credibility of Technology
 
Ritcha R
Ritcha RRitcha R
Ritcha R
 
Behaviroal Design
Behaviroal DesignBehaviroal Design
Behaviroal Design
 
How to Get Started or Expand Your Learning Analytics Program
 How to Get Started or Expand Your Learning Analytics Program How to Get Started or Expand Your Learning Analytics Program
How to Get Started or Expand Your Learning Analytics Program
 
Entrepreneurial Psychology
Entrepreneurial PsychologyEntrepreneurial Psychology
Entrepreneurial Psychology
 
Mistake proofing presentation
Mistake proofing presentation Mistake proofing presentation
Mistake proofing presentation
 
Ai demystified for HR and TA leaders
Ai demystified for HR and TA leadersAi demystified for HR and TA leaders
Ai demystified for HR and TA leaders
 

Mehr von EC-Council

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldEC-Council
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approachEC-Council
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident ResponseEC-Council
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinEC-Council
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeEC-Council
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverEC-Council
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...EC-Council
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoEC-Council
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderEC-Council
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanEC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019EC-Council
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerEC-Council
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementEC-Council
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...EC-Council
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...EC-Council
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...EC-Council
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...EC-Council
 
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...EC-Council
 

Mehr von EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry Carpenter

  • 1. How to Become a Security Behavior Alchemist Perry Carpenter, MSIA, C|CISO
  • 2. Security Awareness and Secure Behavior are NOT the Same Thing Traditional awareness programs fail to account for the knowledge- intention-behavior gap…
  • 3. Agenda 1. Why behavior? 2. How can you model and design secure behaviors to help shape good security hygiene? 3. How can you debug behavior?
  • 4. Agenda 1. Why behavior? 2. How can you model and design secure behaviors to help shape good security hygiene? 3. How can you debug behavior?
  • 5. There are Three Realities of Security Awareness Just because I’m aware doesn’t mean mean that I care. If you try to work against human nature, you will fail. What your employees do is way more important than what they know.
  • 6. Just because I’m aware doesn’t mean that I care. Security Awareness and Secure Behavior are NOT the Same Thing
  • 7. If you try to work against human nature, you will fail…
  • 8. Thinking, Fast & Slow (Daniel Kahneman) Graphic Source: https://readingraphics.com/book-summary-thinking-fast-and-slow/
  • 9. System 1 Thinking Example Which line is longest?
  • 10. System 2 Thinking Example x 532 86 x
  • 11. System 1 vs. System 2: an Example A bat and a ball cost $1.10. The bat costs $1.00 more than the ball. How much does the ball cost?
  • 12. System 1 vs. System 2: an Example Did you say that the ball costs ten cents? If so, you were just a victim of System 1. Total cost: $1.10 Minus ball cost : $0.10 Equals bat cost: $1.00 Here’s what System 1 gets you:
  • 13. System 1 vs. System 2: an Example But remember: The bat costs $1.00 more than the ball. Bat cost: $1.00 Minus ball cost : $0.10 Equals: $0.90 Warning: Blindly following System 1 can be hazardous.
  • 14. ciso.eccouncil.org 14 5¢ $1.05 Bat cost: $1.05 Plus ball cost: $0.05 Equals: $1.10 Yeah: Sometimes an answer or an action can feel right even when it is wrong.
  • 15. Your awareness program should not focus only on information delivery Ask yourself: Do you care more about what your people know or what they do?
  • 17. Agenda 1. Why behavior? 2. How can you model and design secure behaviors to help shape good security hygiene? 3. How can you debug behavior?
  • 18. Why Is Getting the Desired Behaviors So Difficult?
  • 19. http://behaviormodel.org Behavior happens when three things come together at the same time: Motivation, Ability, and a Prompt to do the behavior… BJ Fogg is the father of a field now referred as “Behavior Design.” ciso.eccouncil.org
  • 20. 20 1.What behaviors, if adopted, would have the most security benefit for our organization? 2.Is this a group of behaviors, or is this a single behavior? 3.Is this a behavior that we have the appetite to take-on right now? Get Specific:
  • 21. Designing Behavior (A Non-Security Example) Fogg Behavior Model Component Description Behavior(B): What specific behavior do we want someone to do? Drink a glass of water Motivation(M): What types of things might motivate someone to perform the B?  They could be thirsty  The might want social acceptance (everyone else is doing it)  They might want to avoid offending the person offering them water  They believe that there are positive health benefits associated with staying hydrated  Etc. Ability(A): What types of things must someone already be able to do or know to successfully perform the B?  A glass of water is available to the person or can be obtained with little effort  The person’s mouth is not taped shut  The person is not asleep or otherwise incapacitated  Etc… Prompts(P): What types of things can cue the B?  The person noticing that they are thirsty  Someone offers the person a glass of water  The person receives a prompt from a health-app reminding them to drink  Etc. ciso.eccouncil.org
  • 22. Thoughts on Designing for Each Element •Prompts •Ability •Motivation
  • 23. Learn from Marketers and Storytellers to Influence Motivation ciso.eccouncil.org
  • 24. Nudge your audience toward the behavior A nudge, as we will use the term, is any aspect of the choice architecture that alters people's behavior in a predictable way without forbidding any options or significantly changing their economic incentives. To count as a mere nudge, the intervention must be easy and cheap to avoid. Nudges are not mandates. Putting fruit at eye level counts as a nudge. Banning junk food does not. Nudge: Improving Decisions About Health, Wealth, and Happiness, 2008
  • 25. Nudging: A Security Example A nudge, as we will use the term, is any aspect of the choice architecture that alters people's behavior in a predictable way without forbidding any options or significantly changing their economic incentives. To count as a mere nudge, the intervention must be easy and cheap to avoid. Nudges are not mandates. Putting fruit at eye level counts as a nudge. Banning junk food does not. Nudge: Improving Decisions About Health, Wealth, and Happiness, 2008 Your password change portal is a great place to insert a nudge: • Strength Meters • Videos on how to create & remember strong passwords • Elective LMS modules • etc. ciso.eccouncil.org
  • 26. Design Power Prompts Where Possible A power prompt is a prompt that the user receives that also contains something intended to increase motivation, make the behavior easier, or both.
  • 27. Designing Behavior (A Security Example) Fogg Behavior Model Component Description Behavior(B): What specific behavior do we want someone to do? Choose a good password Motivation(M): What types of things might motivate someone to perform the B? • They understand and appreciate the value of choosing a good password • They feel empowered by choosing a good password • They feel more secure by choosing a good password • They are afraid that their current password has been (or might be) compromised due to its simplicity • They feel pressure to create a better password because the organization is monitoring strength Ability(A): What types of things must someone already be able to do or know to successfully perform the B? • The person has the required knowledge of how to construct a password that is both strong memorable • The person has tools that will help them construct a password that is both strong and memorable • The person has tools that will choose a strong password and remember that password for them Prompts(P): What types of things can cue the B? • The person just feels like changing their password • The person receives notification that it is time to change his/her password • The person is locked-out of his/her account because they forgot their current password • The organization issues a forced password reset • The person receives a security tip that has advice on how to create and remember a good password • The person forgot their current password and is about to perform a password reset • The person receives a notification that his/her account was breached, and hackers may accessed the password
  • 28. Phishing / Automated Social Engineering Testing Plan like a Marketer. Test like an Attacker. Time Channel Executive Message/Video LMS Modules Newsletter Digital Signage – Theme 1 LMS Modules Department Manager Message Newsletter Newsletter Newsletter Digital Signage – Theme 2 Security Town Hall LMS Modules ciso.eccouncil.org
  • 29. Agenda 1. Why behavior? 2. How can you model and design secure behaviors to help shape good security hygiene? 3. How can you debug behavior?
  • 31. Debugging Problem Behaviors Prompt: • Are we prompting for the behavior? If not, prompt for the behavior. • If so, are the prompts designed effectively? • Have the prompts become ‘invisible’ through overuse? • Are the prompts occurring through an optimal channel? • Can we create a power prompt? Ability: • Is the behavior still too hard? • Is there any way to make the behavior easier? Perhaps through tools, additional training, etc.? • Is this behavior even something most humans can do consistently? • Is there a time that the behavior feels easier or more achievable than other times? • Can we embed something within the prompt that will reduce the real (or perceived) time, complexity, or effort required to do the behavior? Motivation: • What factors might enhance or erode emotion at the time of behavior? • Are their times when someone may feel more naturally motivated to do the behavior? • Is there a way to make the behavior feel more meaningful? • Are their social, environmental, or other factors that can be leveraged to provide intrinsic or extrinsic motivation? • Can we place a motivational boost within the prompt?
  • 32. thinking about passwords Designing for the Larger Issue
  • 33. “Do you care more about what your employees know or what they do?” Shameless Plug
  • 34. Thank You!Perry Carpenter Chief Evangelist & Strategy Officer ciso.eccouncil.org

Hinweis der Redaktion

  1. I’m aware of a ton of things that I don’t care about! 
  2. Your awareness program shouldn’t focus only on information delivery. There are plenty of things that most of us are aware of – but we just don’t care about those things. Because of this, if the underlying motivation for your program is to reduce the overall risk of human-related security incidents in your organization, you need to incorporate behavior management practices. Most of my thinking about behavior management is heavily influenced by the research by BJ Fogg, who heads-up the Persuasion Tech Lab at Stanford University.  Fogg’s research has influenced technology companies around the world who seek to create engaging experiences for their users and drive specific behaviors. His behavior model and work around habit creation is located here (http://behaviormodel.org/) and here (http://tinyhabits.com/). I realize that most readers won’t have time to dig into the deeper details of behavior management and create their own unique programs. Don’t lose heart! Simulated phishing platforms – like the one offered by my company, KnowBe4 , as well as a few others in the market – distill some of the fundamentals of behavior management into an easy to deploy platform that allows you to send simulated social engineering attacks to your users and then immediately initiate corrective and rehabilitative action if the user falls victim for the simulated attack. Do this frequently, and you will see dramatic behavior change!  http://captology.stanford.edu/about/about-bj-fogg.html   
  3. Group 1: Sufficient Motivation and Sufficient Ability Group 1 is a no-brainer (though with this behavior, it will likely be a small group). You just need to prompt them, and they will do the behavior. But you need to ensure that your prompts will be received by the group and are effective. So, you still don’t want to take prompt design for granted. Use more than one style of prompt across multiple channels, if possible. For instance: email notifications, intranet banners, desktop popup notifications, etc. Group 2: Sufficient Motivation, Lacking in Ability Group 2 gets a bit more complicated. You’ve got people who have sufficient motivation, but they lack the ability to create and remember a good password. This is likely the majority of your organization. They want to do the right thing, but they feel like the process is scary, cumbersome, or they simply don’t know how. With this group, your job is to find ways to make creating and remembering a good password easier. And there are only a few ways to do so. Remember the barrel of rocks example and how that applies to security? I mentioned four (well, actually five) options: 1. Train them (strengthen their ability) so that the behavior is no longer difficult, onerous, or scary 2. Provide them with tools that assist with the behavior 3. Help them accomplish the behavior 4. Make the behavior easier or smaller 5. Do the behavior for them Here’s how that would look. I can both train them and help them accomplish the behavior if I place just-in-time training on the password change page. The training would be timely and relevant, thus more easily remembered. This could be a combination of information (how to do it) and training (ways to practice, including real-time feedback). I could also include a just-in-time tool, like a password strength meter to help nudge people into the behavior, while also providing a bit of motivation. Of course, there are ways we might make this even easier, but I’m saving those for our discussion of Group 4. Group 3: Lack of Motivation, Sufficient Ability Group 3 consists of people who have the requisite ability but lack motivation. We’ve discussed the inherent difficulties in addressing motivation. Your Group 3 people, in this scenario, are likely pressed for time, have too much on their mind, or just don’t feel like they can be bothered. For this group, you should consider tactics like nudging, creating social expectations, and so on. Your best bet here would be to take a multifaceted approach. Use a combination of nudges and power prompts to increase motivation. The prompt should be positive, encouraging, and remind them that the behavior is easy. The prompt can also include a link to the password change page that includes all of the nudges and tools that we setup for Group 2. So now, the behavior is easy, fast, and the person feels supported and encouraged. This increases the likelihood that they will engage. Group 4: Lack of Motivation and Lack of Ability Group 4 is difficult. They lack motivation and they don’t have the ability to perform the behavior even if they did. If you want to get them to perform the behavior, you’ll have a lot of work and possible frustration ahead. Your options are to simultaneously dramatically decrease the effort involved in the task, provide training support, and encourage -- or threaten -- them until they do the behavior. Or, you can go with a combination of options 2 and 5 from above, which is (you guessed it) give them a password manager (like 1Password, Dashlane, KeyPass, or LastPass) that can automate the creation of strong passwords and will remember the password on their behalf.