The Discernible Blog

Scrub these Phrases from Your Data Breach Statements 
Melanie Ensign Melanie Ensign

Scrub these Phrases from Your Data Breach Statements 

In the event of a security incident, it's critical that your response is both fast and accurate. Unfortunately, many organizations make the mistake of including one or more of the following three elements in their public statements, which impairs the credibility and trustworthiness of their response. By avoiding them, you can help ensure that your organization's response is taken seriously.

Read More
Knocking on the Boardroom Door
Melanie Ensign Melanie Ensign

Knocking on the Boardroom Door

One of the most important aspects of my work is helping CISOs with what I like to call “the invisibility problem.” Many talented, hardworking CISOs try to do the right things to be seen: they present at quarterly board meetings and send their executive team regular updates about the security program. While these actions may check the boxes with their management and the Board, I don’t believe they are enough to build the credibility and visibility CISOs need to succeed - and obtain the resources required to protect an organization in a world of ever-expanding risk.

Read More
Words that Work: Persuasive Language for Security and Privacy Communications
Melanie Ensign Melanie Ensign

Words that Work: Persuasive Language for Security and Privacy Communications

Do you know which words are most effective for the context and audiences of your security and privacy communications? If you’re not sure, now is a good time to start measuring the impact of the language you use. Counting the number of times you distribute content or engage with stakeholders is a good measurement of why you’re so busy, but are your communications as effective as they could be? Want to find out? Let us know!

Read More
Does Your Security Comms Strategy Need an Upgrade?
Melanie Ensign Melanie Ensign

Does Your Security Comms Strategy Need an Upgrade?

In leading the security and privacy communications strategy for both small and global brands, I’ve found that ongoing attention to routine communications helps minimize both the volume and impact of potential crises. As a result, we advise our clients to prioritize routine security and privacy communications as one way to demonstrate persistent care.

Read More
Self-Inflicted Pain and Artificial Adversity in InfoSec
Melanie Ensign Melanie Ensign

Self-Inflicted Pain and Artificial Adversity in InfoSec

The popular saying “what doesn’t kill you makes you stronger” isn’t a guarantee. Traumatic or stressful situations can still destroy trust and motivation, cause irreparable damage to our health, and push people out of the profession.

Read More
Risk Communications: Recognizing Turning Points and Managing Decisions
Melanie Ensign Melanie Ensign

Risk Communications: Recognizing Turning Points and Managing Decisions

Not communicating about security until it escalates into a crisis is a self-fulfilling prophecy. Instead, security communicators should constantly be on the lookout for critical turning points that can determine the direction of the organization’s future or cost them their reputation.

Read More
Risk Communications: An Introduction
Melanie Ensign Melanie Ensign

Risk Communications: An Introduction

Risk makes individuals, groups, and markets behave in certain ways. Our success as security and privacy professionals depends on our ability to help non-experts make risk-related choices. The study of risk communications examines the processes that determine how our communication with these stakeholders enhances or degrades their decision-making ability.

Read More
This Year’s Strategic Relationships: Do You Have What You Need?
Melanie Ensign Melanie Ensign

This Year’s Strategic Relationships: Do You Have What You Need?

Many of us have spent the past few months planning for the coming year and documenting the objectives and outcomes we want to achieve this year. I bet fewer folks spent time considering the specific people whose support, approval, or adoption we need to meet those goals.

Read More
Measuring Communication Effectiveness in Security and Privacy
Melanie Ensign Melanie Ensign

Measuring Communication Effectiveness in Security and Privacy

Without effective communication, incident response is sluggish and chaotic, policies aren’t followed or enforced, business leaders make uninformed decrees, audits drown team morale, and confusion among external stakeholders breeds mistrust and resentment. If there was ever a time for security and privacy leaders to upgrade their communication skills and those of their team, this is it!

Read More