Radical Results: A Security Org's Version of Radical Candor
This talk presents a management framework for security teams based on the 'Radical Candor' model, adapted to measure team effectiveness and cultural alignment. It explores how to plot security projects and team interactions on a Cartesian plane to identify areas for improvement in communication and project execution. The speaker provides real-world examples of applying this framework to security initiatives like WebAuthn rollouts and Linux laptop management. The talk emphasizes that security effectiveness is often difficult to measure and that team culture significantly impacts project velocity and success.
Beyond the Dashboard: Mapping Security Team Velocity and Cultural Friction
TLDR: Security teams often struggle to quantify their effectiveness or understand why certain initiatives stall while others succeed. By adapting the Radical Candor framework into a Cartesian coordinate system, security leaders can map project outcomes against team sentiment and cultural alignment. This approach helps identify whether a project failed due to technical hurdles or because the team was operating in a state of cultural friction.
Security teams are notoriously bad at measuring their own output. We track vulnerabilities, we count patches, and we monitor uptime, but these metrics rarely capture the actual health of a security organization. When a project like a company-wide WebAuthn rollout drags on for months, or a mandate to manage Linux laptops creates a revolt among the engineering staff, the problem is rarely just technical. It is almost always a failure of communication and cultural alignment.
Most security teams operate in a vacuum. We define a policy, we push it to the developers, and we wait for the inevitable pushback. When that pushback arrives, we treat it as a technical disagreement. We argue about the implementation details of the WebAuthn flow or the specific configuration of the Linux endpoint management agent. We miss the point entirely. The friction isn't about the code; it's about the relationship between the security team and the rest of the organization.
The Cartesian Plane of Security Culture
To fix this, we need a way to visualize the "vibes" and the "effectiveness" of our work. If you take the Radical Candor model—which is fundamentally about balancing personal care with direct challenge—you can map your security projects onto a simple four-quadrant grid.
On the Y-axis, we place "Collaboration." This is the measure of how well your team works with other departments. Are you a partner in the business, or are you the department of "no"? On the X-axis, we place "Effectiveness." This is the raw output of your security controls. Are you actually reducing risk, or are you just generating noise?
When you plot your projects over the last year, you start to see patterns. A project that was highly effective but destroyed your relationship with the engineering team lands in the "Obnoxious Aggression" quadrant. You got the security control in place, but you burned the bridge to do it. Conversely, a project that everyone loved but did nothing to actually improve the security posture lands in "Ruinous Empathy." You were nice, but you weren't effective.
Why Speed Often Masks Poor Security Culture
In the current tech climate, the pressure to move fast often forces security teams into a corner. We see this constantly in Silicon Valley environments where "move fast and break things" is the default operating system. When a security team is forced to adopt this mantra, they often skip the necessary consensus-building phase of a project.
Take the WebAuthn rollout example. If you force this on a company without buy-in, you will break authentication flows for users who aren't prepared. If you do it slowly, you give people time to adjust, but you leave the organization vulnerable to credential stuffing for longer. The "right" answer isn't a technical one; it's a cultural one. If your team is in the "Radical Candor" quadrant, you can have the tough conversation with the product team about the trade-offs. You can say, "We are going to break this, it will be painful for a week, but here is why it is necessary."
If you don't have that relationship, you are forced to either be a jerk (Obnoxious Aggression) or to do nothing (Ruinous Empathy). Neither of these options is sustainable.
Measuring the Unmeasurable
The biggest trap for a security leader is believing that everything we do is directly measurable. We love our NVD dashboards and our OWASP Top 10 compliance reports. But these are lagging indicators. They tell you what happened, not why it happened.
When you plot your projects on the grid, you are creating a leading indicator. If you see a cluster of projects in the "Manipulative Insincerity" quadrant—where you aren't challenging the business and you aren't building relationships—you know you have a problem before the next major incident occurs. You are essentially "phoning it in." You are doing the bare minimum to satisfy compliance requirements without actually engaging with the business risk.
This isn't about creating more paperwork. It's about having a tool to hold yourself accountable. If you are a pentester or a researcher, you can apply this to your own work. When you find a bug, how do you report it? Do you just dump a CVE in a ticket and walk away, or do you work with the developers to explain the exploit chain? The way you deliver your findings is just as important as the finding itself.
What to Do Next
Stop looking at your security program as a series of technical hurdles. Start looking at it as a series of human interactions. The next time you are planning a major security initiative, don't just draft the technical requirements. Draft the communication plan. Who are the stakeholders? What is the "no" you are going to hear, and how will you address it without falling into the trap of being either too aggressive or too passive?
Plot your last three major projects on a piece of paper. Be honest about where they landed. If they are all in the bottom-left quadrant, you aren't a security team; you're a compliance checkbox. If they are all in the bottom-right, you're a liability to your own company. The goal is to move toward the top-right, where you are both effective and respected. It is a harder path, but it is the only one that actually scales.
Up Next From This Conference
Similar Talks

The Dark Side of Bug Bounty

Abusing Windows Hello Without a Severed Hand




