Guerilla GRC
This talk introduces the concept of 'Guerilla GRC' as a practical, low-overhead approach to implementing cybersecurity controls for small and medium-sized businesses (SMBs). It emphasizes that cybersecurity is primarily a people and process problem rather than a purely technological one, advocating for the adoption of existing standards like CIS Controls over reinventing security policies. The speaker provides a framework for assessing SMB needs, selecting a subset of essential controls, and effectively communicating their importance to non-technical stakeholders to improve overall security posture.
Why Your Next Security Audit Should Start with the Bakery Down the Street
TLDR: Most small businesses are sitting ducks for ransomware because they lack the resources to implement enterprise-grade security. Instead of pushing complex frameworks, researchers are advocating for "Guerilla GRC"—a strategy of selecting a handful of high-impact controls like MFA to provide immediate, measurable risk reduction. This approach turns security from an abstract, overwhelming concept into a series of manageable, actionable steps that actually move the needle for non-technical owners.
Security professionals often get trapped in the echo chamber of enterprise tooling. We talk about zero trust, EDR orchestration, and automated threat hunting, but we frequently ignore the reality of the small business owner. If you are a pentester or a researcher, you have likely seen the aftermath: a local business, perhaps a bakery or a small medical office, completely wiped out by a ransomware gang. These attackers do not care about your sophisticated defense-in-depth strategy. They care about low-hanging fruit, and for most small and medium-sized businesses (SMBs), that fruit is ripe for the picking.
The Reality of SMB Security
Statistics show that roughly 70% of small businesses are targeted by phishing attacks, and a significant portion of those victims never recover. When we look at the OWASP Top 10, specifically A07:2021-Identification and Authentication Failures, we see the primary vector for these compromises. It is rarely a zero-day exploit against a custom application. It is almost always a compromised credential that could have been stopped by a simple, secondary layer of verification.
The problem is not a lack of technology. The problem is that we treat security as a binary state—you are either secure or you are not. When a business owner hears that they need a "robust security posture," they hear "expensive" and "complicated." They see a list of fifty controls and decide to do nothing because they cannot afford the time or the money to do everything. This is where the concept of Guerilla GRC comes in. It is about finding the right wheel, not reinventing the entire vehicle.
Implementing High-Impact Controls
Instead of overwhelming an SMB with a massive compliance checklist, the goal should be to identify the five most critical controls that provide the highest return on investment. For most small organizations, the CIS Critical Security Controls provide a perfect roadmap. Specifically, focusing on CIS Control 6: Access Control Management is often enough to stop the vast majority of automated attacks.
If you are performing an assessment, do not start by scanning for vulnerabilities. Start by asking if they have Multi-Factor Authentication (MFA) enabled on their primary email and financial accounts. If they do not, that is your single point of failure. You do not need to explain the mechanics of a session token theft or a sophisticated phishing bypass to a business owner. You just need to explain that a password is like a single key, and MFA is like a deadbolt. If they lose the key, the deadbolt keeps the door locked.
The Power of Communication
Technical experts often fail because they cannot communicate risk in a way that resonates with non-technical stakeholders. If you tell a baker that they need to implement a specific configuration for their server, they will tune you out. If you tell them that implementing MFA will prevent their bank account from being drained, they will listen.
The most effective way to drive change is to make security approachable. When you suggest a control, explain it in the context of their business operations. If they are using Microsoft 365, show them how to enable MFA in the admin console. It takes minutes, it costs nothing, and it is arguably the most effective defense against the T1566: Phishing technique used by almost every ransomware group today.
Moving Beyond the Audit
As researchers and pentesters, we have a unique opportunity to act as force multipliers. You do not need to be a full-time consultant to help the businesses in your community. When you identify a critical gap during a casual conversation or a professional engagement, provide a clear, actionable path to remediation.
Focus on the "win-win." A business that is slightly more secure than its neighbor is a less attractive target for an attacker looking for an easy payday. By helping them implement basic hygiene, you are not just checking a box; you are actively preventing a catastrophic event.
Stop trying to force enterprise-level complexity onto organizations that are just trying to keep the lights on. Start by helping them secure the one or two things that matter most. If you can get them to turn on MFA and maintain basic backups, you have already done more for their security than a hundred-page compliance report ever could. The next time you are on an engagement, look for the simple, high-impact wins. They are the ones that actually keep businesses alive.
Target Technologies
Attack Techniques
OWASP Categories
Up Next From This Conference
Similar Talks

Exploiting Shadow Data in AI Models and Embeddings

Social Engineering A.I. and Subverting H.I.




