top of page
Security Champion Blog




Slaying Cyber Dragons: How to Turn Threat Modeling Into a Fantasy-Inspired Team Adventure
At Katilyst, we’ve found that the biggest barrier to strong threat modeling isn’t technical knowledge—it’s engagement. Even with the best frameworks (STRIDE, PASTA, etc.), teams tune out if threat modeling becomes a rote checklist. That’s why we set out to transform it into an epic quest. Inspired by tabletop RPGs like Dungeons & Dragons, our approach gives security champions the tools to lead fun, collaborative, and genuinely productive threat modeling sessions.
Stanley Harris
Jun 43 min read


How to Track Points in a Security Champion Program 🚀
Points aren’t about gamification. They’re about giving visibility to the invisible, and tracking the impact of security champions in a way that celebrates their contributions - without adding overhead. A good points system should reflect your culture and drive the behaviors you actually want to see.
Marisa Fagan
Apr 104 min read


Top 10 Security Champion Program Blunders
Through a combination of conversations and firsthand experience, we have developed a sixth sense about the mistakes that are most commonly made over the lifetime of a champion program which lead to failures.
Marisa Fagan
Apr 113 min read


Rewarding Your Security Champions: Going Beyond "Stuff"
Security Champions play a crucial role in fostering a culture of security within organizations. While "stuff"—like swag and gift cards—is a common way to reward them, there's an opportunity to think bigger and leverage other powerful motivators.
Stanley Harris
Aug 28, 20244 min read


Katilyst: Making Security Champion Programs Easy & Fun
The key to building security culture is motivating and inspiring your colleagues to take proactive action - focusing on the carrot, not the stick. This can be a lot of work, so we created Katilyst to lift the burden.
Stanley Harris
Jul 10, 20241 min read
bottom of page