top of page
Security Champion Blog




Slaying Cyber Dragons: How to Turn Threat Modeling Into a Fantasy-Inspired Team Adventure
At Katilyst, we’ve found that the biggest barrier to strong threat modeling isn’t technical knowledge—it’s engagement. Even with the best frameworks (STRIDE, PASTA, etc.), teams tune out if threat modeling becomes a rote checklist. That’s why we set out to transform it into an epic quest. Inspired by tabletop RPGs like Dungeons & Dragons, our approach gives security champions the tools to lead fun, collaborative, and genuinely productive threat modeling sessions.
Stanley Harris
6 days ago3 min read


How to Track Points in a Security Champion Program 🚀
Points aren’t about gamification. They’re about giving visibility to the invisible, and tracking the impact of security champions in a way that celebrates their contributions - without adding overhead. A good points system should reflect your culture and drive the behaviors you actually want to see.
Marisa Fagan
Apr 104 min read


Top 10 Security Champion Program Blunders
Through a combination of conversations and firsthand experience, we have developed a sixth sense about the mistakes that are most commonly made over the lifetime of a champion program which lead to failures.
Marisa Fagan
Apr 113 min read
bottom of page