top of page
Security Champion Blog




Slaying Cyber Dragons: How to Turn Threat Modeling Into a Fantasy-Inspired Team Adventure
At Katilyst, we’ve found that the biggest barrier to strong threat modeling isn’t technical knowledge—it’s engagement. Even with the best frameworks (STRIDE, PASTA, etc.), teams tune out if threat modeling becomes a rote checklist. That’s why we set out to transform it into an epic quest. Inspired by tabletop RPGs like Dungeons & Dragons, our approach gives security champions the tools to lead fun, collaborative, and genuinely productive threat modeling sessions.
Stanley Harris
Jun 43 min read


How to Track Points in a Security Champion Program 🚀
Points aren’t about gamification. They’re about giving visibility to the invisible, and tracking the impact of security champions in a way that celebrates their contributions - without adding overhead. A good points system should reflect your culture and drive the behaviors you actually want to see.
Marisa Fagan
Apr 104 min read


Rewarding Your Security Champions: Going Beyond "Stuff"
Security Champions play a crucial role in fostering a culture of security within organizations. While "stuff"—like swag and gift cards—is a common way to reward them, there's an opportunity to think bigger and leverage other powerful motivators.
Stanley Harris
Aug 28, 20244 min read


Building a Security Champion Culture: Insights and Strategies from Katilyst
Enter Security Champion programs: your secret weapon for fostering a security-conscious culture. They arm employees with the knowledge and tools to combat these biases head-on.
Stanley Harris
Jun 11, 20243 min read
bottom of page