{"id":3450,"date":"2017-12-24T14:33:28","date_gmt":"2017-12-24T14:33:28","guid":{"rendered":"https:\/\/www.walkme.com\/blog\/?p=3450"},"modified":"2017-12-24T14:33:28","modified_gmt":"2017-12-24T14:33:28","slug":"security-walkme-in-the-life-daniel","status":"publish","type":"post","link":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/","title":{"rendered":"Security Breach? It Won\u2019t Happen To Me They Said"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A few months ago, WalkMe employees received a seemingly routine email in their inbox, notifying them of an impending expiration of their Gmail account password. \u00a0<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3466 size-full\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Image-1.png\" alt=\"\" width=\"1016\" height=\"512\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Image-1.png 1016w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Image-1.png?resize=300,151 300w\" sizes=\"auto, (max-width: 1016px) 100vw, 1016px\" \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">But, if we take a closer look, something about the email was fishy \u2014 or should we say phishy.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">Upon closer inspection, it can be seen that the description of the email contained discrepancies from the subject line.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3465 size-full\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Image-2.png\" alt=\"\" width=\"1016\" height=\"512\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Image-2.png 1016w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Image-2.png?resize=300,151 300w\" sizes=\"auto, (max-width: 1016px) 100vw, 1016px\" \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">Additionally, the slug contained a subtle but out of place dot under the letter \u201cm.\u201d<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p>&nbsp;<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-3456 size-large\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/login-1.png?w=952&#038;h=1024&#038;crop=1\" alt=\"\" width=\"640\" height=\"688\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/login-1.png 650w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/login-1.png?resize=279,300 279w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\r\n<p><span style=\"font-weight: 400;\">WalkMe employees are not easily fooled, however, and it wasn\u2019t long before someone blew the whistle and we found our perpetrator. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><strong>All signs pointed to Daniel, WalkMe\u2019s Chief Information Security Officer.\u00a0<\/strong><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">No typo there. This was all a carefully devised plan, to keep WalkMe employees on their toes. <\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">This test was meant to bring awareness to potential security threats and their significance as the dangers of cybercrime continue to rise.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">With an <\/span><a href=\"https:\/\/www.csoonline.com\/article\/3153707\/security\/top-5-cybersecurity-facts-figures-and-statistics-for-2017.html\"><span style=\"font-weight: 400;\">estimated damage expected to hit $6 trillion by 2021<\/span><\/a><span style=\"font-weight: 400;\">, it got us thinking about the role of our security team keeping WalkMe\u2019s employees and our thousands of enterprise users safe and sound. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">We turned to the mastermind himself for insider information. No password needed.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>WalkMe: <em>Daniel, Can you tell us a little about the fake phishing email test?<\/em><\/strong><\/h3>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:<\/strong> The purpose of the email was to test the awareness of WalkMe employees and push them to pay closer attention to details. The phishing test was nearly identical to a legitimate email. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">I recreated a plausible scenario of an attacker that managed to take control over the WalkMe mailing list service and send a phishing email to all our employees. The phishing itself was not 100% accurate, as we tried to exploit the &#8220;vulnerability&#8221; of <\/span><a href=\"https:\/\/www.xudongz.com\/blog\/2017\/idn-phishing\/\"><span style=\"font-weight: 400;\">phishing unicode domains<\/span><\/a><span style=\"font-weight: 400;\">, which created a big hype in the security industry \u2014 \u00a0even though it is an older strategy. In addition, we placed the attack strictly internally so we could not target those outside the company\u00a0\u2014 that is how we were able to utilize an official Gmail domain.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">The one fact people don&#8217;t know is that I tested it first on our <a href=\"https:\/\/www.walkme.com\/blog\/8-questions-ceos-2018\/\" target=\"_blank\" rel=\"noopener\">senior management<\/a>. I sent this email to our CEO, Dan Adika, and President, Rafi Sweary. A day later I sent this email during an R&amp;D Meeting to our CTO while I was sitting right next to him. I wanted to see his response and how he would face such an incident. They all caught on to the scam, which was very impressive. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">After the email went live, the first people to identify the phishing attempt not only avoided clicking the link,\u00a0but also reported it and created an internal channel to warn others within their office. For me, this was a great success.<\/span><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3920 size-full\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-004_DSC1463-1.jpg\" alt=\"walkme security \" width=\"1200\" height=\"800\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-004_DSC1463-1.jpg 1200w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-004_DSC1463-1.jpg?resize=300,200 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-004_DSC1463-1.jpg?resize=1024,683 1024w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-004_DSC1463-1.jpg?resize=600,400 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\r\n<h3><span style=\"font-weight: 400;\"><strong>WalkMe: <em>Besides office prankster, can you give us insight into your role as CISO at WalkMe?<\/em><\/strong> <\/span><\/h3>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:\u00a0<\/strong>As CISO, I am responsible for the security of IT. My main goals are to secure the company and the product itself. This includes building a secure development lifecycle and ensuring our safety policies are constantly enforced. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">This spans from design and architecture development to QA testing and publishing. We continuously analyze our security procedures and undergo third-party audits to protect our customers&#8217; data and private data from within. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">It is also my role to ensure internal security of our data and maintain our security culture. Every employee plays a valuable part in creating a strong security culture. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">We set out to make sure that everyone understands how important it is to be knowledgeable, aware, and most importantly, vocal of these types of situations. <\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">That is why the test we ran was important; it helped all employees to understand that security is a group effort.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><span style=\"font-weight: 400;\"><strong>WalkMe: <em>WalkMe is a swiftly growing software company, doubling its employees in a year. How do you lead the security team to keep up with the privacy of data? \u00a0<\/em><\/strong><\/span><\/h3>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:\u00a0<\/strong>There&#8217;s no denying that it&#8217;s definitely an ongoing challenge, not just for the CISO, but for the entire company. Some of the most dangerous threats are internal. The first step is to get management on board, make them understand the importance of security and also the business benefits of delivering a secured product.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">The larger task is to continuously communicate the importance of security to the rest of the company. It is vital that all employees, no matter what department, understand how to perform daily tasks while keeping their data secure.<\/span><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3921 size-full\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-001_DSC1393-1.jpg\" alt=\"walkme security breach \" width=\"1200\" height=\"800\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-001_DSC1393-1.jpg 1050w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-001_DSC1393-1.jpg?resize=300,200 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-001_DSC1393-1.jpg?resize=1024,683 1024w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/Optimized-001_DSC1393-1.jpg?resize=600,400 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>WalkMe: <em>What certifications does WalkMe hold and what is their significance?<\/em><\/strong><\/h3>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:\u00a0<\/strong>One of the most important tools of a CISO and any company, in general, is to work according to security industry best practices. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">We don&#8217;t need to reinvent the wheel in order to be a secure company. One of the most familiar security certifications is the ISO 27001, which is very important for every software product \u2014 <a href=\"https:\/\/www.walkme.com\/blog\/saas-customer-not-satisfied\/\" target=\"_blank\" rel=\"noopener\">especially SaaS<\/a>. It covers all the security sections and measures the company every year to ensure security is always improving. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">Another security certification is SOC 2, which has become very popular in the past couple of years. Unlike the ISO certification, the output of the SOC 2 (TYPE II) is a report that includes a deep explanation of the company, the product, and a list of security controls that were examined by the auditors, as well as the results of each test. This report provides the customer with good visibility of the security in practice.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">In addition, we are: <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<ol>\r\n\t<li style=\"list-style-type: none;\">\r\n<ul>\r\n\t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\u00a0ISO\/IEC 27032:2012 certified for Guidelines for Cybersecurity<\/span><\/li>\r\n\t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">SO\/IEC 27017:2015 certified for Cloud Specific Controls<\/span><\/li>\r\n\t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">ISO\/IEC 27018:2014 certified for Personal Data Protection \u00a0\u00a0<\/span><\/li>\r\n\t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">ISO 27799:2016 certified for Security management in health<\/span><\/li>\r\n\t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">SOC 2 certified to meet AICPA\u2019s Trust Security Principles<\/span><\/li>\r\n\t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">EU-U.S. Privacy Shield (IP\/16\/216) certified<\/span><\/li>\r\n\t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">TRUSTe and Safe Harbor certified for data privacy<\/span><\/li>\r\n\t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">CSA Security, Trust, and Assurance Level One: Self-Assessment certified<\/span><\/li>\r\n\t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Graded Enterprise-Ready by CloudTrust program<\/span><\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ol>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>WalkMe: <em>What security measures are taken during our development process?<\/em><\/strong><\/h3>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:\u00a0<\/strong>The security in the development process is very important, especially from a business point of view. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">Discovering vulnerability at the end of the development task cycle or in the production process costs much more than addressing the issue at the beginning of the development. That is why security takes an active role throughout the development cycle, from the design phase through deployment.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3457 size-full\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7583.jpg\" alt=\"WalkMe\u2019s Chief Information Security Officer\" width=\"1600\" height=\"1067\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7583.jpg 1050w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7583.jpg?resize=300,200 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7583.jpg?resize=1024,683 1024w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7583.jpg?resize=600,400 600w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><b>We believe in secure design, secure development, secure coding, penetration testing, vulnerability assessment, security automation, and security testing.<\/b><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>WalkMe:<em> How do you keep a company with global offices on the same page in terms of security culture?<\/em><\/strong><\/h3>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:\u00a0<\/strong>Communication at the company level is very important. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">For example, exposing new employees to security and enforcing policies on their first day is much more effective than enforcing it later on. Therefore, as part of the employee onboarding process, we make sure to expose them to our security policies. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">We keep employees in-the-know, whether that&#8217;s providing notifications of security threats in software updates or keeping them in check from time to time. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<div class=\"docos-anchoreddocoview-content docos-docoview-replycontainer jfk-scrollbar\">\r\n<div class=\"docos-docoview-rootreply\">\r\n<div class=\"docos-anchoredreplyview docos-replyview-first docos-replyview-comment\">\r\n<div class=\"docos-collapsible-replyview docos-replyview-static\">\r\n<div class=\"docos-replyview-body docos-anchoredreplyview-body\" dir=\"ltr\">We also keep our talent engaged through internal initiatives, including\u00a0<span style=\"font-weight: 400;\">an internal Bug Bounty program to reward our employees for discovering potential threats, and a company-wide <a href=\"https:\/\/www.youtube.com\/watch?v=tOhShc5jkkg\">Hackathon<\/a> that enlists our greatest minds to attempt to hack their way to the top prize.<\/span><\/div>\r\n<div dir=\"ltr\">\u00a0<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<h3><strong>WalkMe:<\/strong><em><strong> What tools are built into the WalkMe product to ensure its security?<\/strong><\/em><\/h3>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:<\/strong> We follow security best-practices, which means building our security in layers to protect our infrastructure and especially our customer&#8217;s data. <\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Another important task is to always be up to date, read and learn about security incidents within other companies, and apply the lessons we learn to security at WalkMe. More of our guidelines and processes can be found <\/span><a href=\"https:\/\/www.walkme.com\/walkme-security\/\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>WalkMe:\u00a0<\/strong><em><strong>What\u2019s your security motto for WalkMe?<\/strong><\/em><\/h3>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:\u00a0<\/strong>Encrypt everything! We encrypt everything possible; that&#8217;s our approach. Every system, legacy or new, is encrypted. This is the easiest way to handle any potential risk. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><span style=\"font-weight: 400;\"><strong>WalkMe:<em> Looking ahead at 2018, what else are you working on to ensure data safety and protection?<\/em><\/strong><\/span><\/h3>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:\u00a0<\/strong>Major tasks for next year include preparing for preparing for the EU&#8217;s <\/span><a href=\"https:\/\/edps.europa.eu\/data-protection\/data-protection\/legislation\/history-general-data-protection-regulation_en\"><span style=\"font-weight: 400;\">\u00a0General Data Protection Regulation initiative (GDPR).<\/span><\/a><span style=\"font-weight: 400;\">\u00a0This is a new regulation that will help protect users on web-based applications and increase transparency. This guideline will protect users from big companies collecting and keeping data after a service contract has ended. <\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p>We will also be looking to improve ISO, HIPPA controls, add more security controls to our systems, and additional security controls to emails.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>WalkMe:<em>\u00a0What Challenges do you foresee?<\/em><\/strong><\/h3>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\"><strong>Daniel:\u00a0<\/strong>Everyone is moving to cloud-based applications. Companies, especially those with SaaS business models, have no choice but to adapt and take the necessary security steps to stay abreast of new technology advancements and their accompanying new security weaknesses.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">Bottom line, our motivation for security is for our customer&#8217;s welfare and security.\u00a0This is why we do everything we can to secure WalkMe and go above and beyond. <strong>First class enterprises use our product. Fortune 50 and 20 companies use our product \u2014 because our security is top notch.<\/strong><\/span><\/p>","protected":false},"excerpt":{"rendered":"A few months ago, WalkMe employees received a seemingly routine email in their inbox, notifying them of an impending expiration<span class=\"moretag\">&#8230;<\/span>","protected":false},"author":246,"featured_media":3467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"mobile_image_id":0,"tablet_image_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[89,9],"tags":[],"class_list":["post-3450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-transformation","category-walkme-company-news"],"acf":{"__coauthors":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WalkMe Security &amp; Best Practices with CISO Daniel Chechik<\/title>\n<meta name=\"description\" content=\"Cloud-based software is the new normal for enterprise solutions, however, this trends brings new vulnerability. WalkMe&#039;s CSIO talks security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security breach? It won&#039;t happen to me they said.\" \/>\n<meta property=\"og:description\" content=\"Cloud-based software is the new normal for enterprise solutions, however, this trends brings new vulnerability. WalkMe&#039;s CSIO talks security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/\" \/>\n<meta property=\"og:site_name\" content=\"WalkMe Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-24T14:33:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/chechik-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WalkMe Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Security breach? It won\u2019t happen to me they said\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/2017\/12\/chechik-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WalkMe Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/\",\"url\":\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/\",\"name\":\"WalkMe Security & Best Practices with CISO Daniel Chechik\",\"isPartOf\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg\",\"datePublished\":\"2017-12-24T14:33:28+00:00\",\"author\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31\"},\"description\":\"Cloud-based software is the new normal for enterprise solutions, however, this trends brings new vulnerability. WalkMe's CSIO talks security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#primaryimage\",\"url\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg\",\"contentUrl\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg\",\"width\":1200,\"height\":583,\"caption\":\"WalkMe Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.walkme.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Transformation\",\"item\":\"https:\/\/www.walkme.com\/blog\/category\/digital-transformation\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Breach? It Won\u2019t Happen To Me They Said\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#website\",\"url\":\"https:\/\/www.walkme.com\/blog\/\",\"name\":\"WalkMe Blog\",\"description\":\"Digital adoption &amp; Change Management Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.walkme.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31\",\"name\":\"WalkMe Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g\",\"caption\":\"WalkMe Team\"},\"description\":\"WalkMe pioneered the Digital Adoption Platform (DAP) for organizations to utilize the full potential of their digital assets. Using artificial intelligence, machine learning and contextual guidance, WalkMe adds a dynamic user interface layer to raise the digital literacy of all users.\",\"url\":\"https:\/\/www.walkme.com\/blog\/author\/walkme-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WalkMe Security & Best Practices with CISO Daniel Chechik","description":"Cloud-based software is the new normal for enterprise solutions, however, this trends brings new vulnerability. WalkMe's CSIO talks security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/","og_locale":"en_US","og_type":"article","og_title":"Security breach? It won't happen to me they said.","og_description":"Cloud-based software is the new normal for enterprise solutions, however, this trends brings new vulnerability. WalkMe's CSIO talks security.","og_url":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/","og_site_name":"WalkMe Blog","article_published_time":"2017-12-24T14:33:28+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/chechik-1.jpg","type":"image\/jpeg"}],"author":"WalkMe Team","twitter_card":"summary_large_image","twitter_title":"Security breach? It won\u2019t happen to me they said","twitter_image":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/2017\/12\/chechik-1.jpg","twitter_misc":{"Written by":"WalkMe Team","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/","url":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/","name":"WalkMe Security & Best Practices with CISO Daniel Chechik","isPartOf":{"@id":"https:\/\/www.walkme.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#primaryimage"},"image":{"@id":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg","datePublished":"2017-12-24T14:33:28+00:00","author":{"@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31"},"description":"Cloud-based software is the new normal for enterprise solutions, however, this trends brings new vulnerability. WalkMe's CSIO talks security.","breadcrumb":{"@id":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#primaryimage","url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg","contentUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg","width":1200,"height":583,"caption":"WalkMe Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.walkme.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Digital Transformation","item":"https:\/\/www.walkme.com\/blog\/category\/digital-transformation\/"},{"@type":"ListItem","position":3,"name":"Security Breach? It Won\u2019t Happen To Me They Said"}]},{"@type":"WebSite","@id":"https:\/\/www.walkme.com\/blog\/#website","url":"https:\/\/www.walkme.com\/blog\/","name":"WalkMe Blog","description":"Digital adoption &amp; Change Management Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.walkme.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31","name":"WalkMe Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g","caption":"WalkMe Team"},"description":"WalkMe pioneered the Digital Adoption Platform (DAP) for organizations to utilize the full potential of their digital assets. Using artificial intelligence, machine learning and contextual guidance, WalkMe adds a dynamic user interface layer to raise the digital literacy of all users.","url":"https:\/\/www.walkme.com\/blog\/author\/walkme-team\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/walkme.com\/blog\/security-walkme-in-the-life-daniel\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Security Breach? It Won\u2019t Happen To Me They Said","url":"http:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/www.walkme.com\/blog\/security-walkme-in-the-life-daniel\/"},"thumbnailUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg","image":{"@type":"ImageObject","url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg"},"articleSection":"Digital Transformation","author":[{"@type":"Person","name":"WalkMe Team"}],"creator":["WalkMe Team"],"publisher":{"@type":"Organization","name":"WalkMe Blog","logo":""},"keywords":[],"dateCreated":"2017-12-24T14:33:28Z","datePublished":"2017-12-24T14:33:28Z","dateModified":"2017-12-24T14:33:28Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"Security Breach? It Won\\u2019t Happen To Me They Said\",\"url\":\"http:\\\/\\\/www.walkme.com\\\/blog\\\/security-walkme-in-the-life-daniel\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/www.walkme.com\\\/blog\\\/security-walkme-in-the-life-daniel\\\/\"},\"thumbnailUrl\":\"https:\\\/\\\/www.walkme.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2017\\\/12\\\/IMG_7556-1.jpg\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.walkme.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2017\\\/12\\\/IMG_7556-1.jpg\"},\"articleSection\":\"Digital Transformation\",\"author\":[{\"@type\":\"Person\",\"name\":\"WalkMe Team\"}],\"creator\":[\"WalkMe Team\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"WalkMe Blog\",\"logo\":\"\"},\"keywords\":[],\"dateCreated\":\"2017-12-24T14:33:28Z\",\"datePublished\":\"2017-12-24T14:33:28Z\",\"dateModified\":\"2017-12-24T14:33:28Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/walkme.com\/p.js"},"lang":"en","translations":{"en":3450},"jetpack_featured_media_url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg","featured_image_src":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg","featured_image_src_square":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2017\/12\/IMG_7556-1.jpg","author_info":{"display_name":"WalkMe Team","author_link":"https:\/\/www.walkme.com\/blog\/author\/walkme-team\/"},"jetpack_sharing_enabled":true,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts\/3450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/users\/246"}],"replies":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/comments?post=3450"}],"version-history":[{"count":0,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts\/3450\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/media\/3467"}],"wp:attachment":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/media?parent=3450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/categories?post=3450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/tags?post=3450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}