The Discernible Blog

Communication Measurement and AI
Melanie Ensign Melanie Ensign

Communication Measurement and AI

There is a lot of promise for AI in making it easier and more cost-effective for organizations to adopt an outcomes-based approach to measurement instead of merely counting outputs. Imagine, for example, that we could use AI to quickly and more expansively track the impact of the specific content, language, and timing of incident response communications.

Read More
CUSTOMER CASE STUDY: Trail of Bits
Melanie Ensign Melanie Ensign

CUSTOMER CASE STUDY: Trail of Bits

“I noticed that Melanie has a rare ability to speak in headlines and get right to the point in a compelling way… I wanted to learn how to do that.”

Read More
Communication Research Takes on the Myths of Privacy Compliance
Melanie Ensign Melanie Ensign

Communication Research Takes on the Myths of Privacy Compliance

We can’t build trust without understanding and if people don’t understand how their data is used, the rights they have, and how to exercise them then all our efforts to build trust in our privacy programs are for naught. To do this, we need to measure the effectiveness of our communications, including the channels, language, and visuals we use – so that we can adjust as needed to ensure the people whose data we’re using never feel duped into sharing it.

Read More
CUSTOMER CASE STUDY
Melanie Ensign Melanie Ensign

CUSTOMER CASE STUDY

The hallmark of Discernible’s approach is that incident response plans are designed to address a variety of security-related incidents regardless of severity or impact.

Read More
A CISO’s Guide to “Negative Megaphoning”
Melanie Ensign Melanie Ensign

A CISO’s Guide to “Negative Megaphoning”

Negative megaphoning can have a significant impact on the reputation of your company as well as specific teams, like infosec. It may seem obvious that organizations want to minimize negative news headlines, but how often do CISOs think about their reputation as an employer and how that affects their ability to hire and retain talent?

Read More
Scrub these Phrases from Your Data Breach Statements 
Melanie Ensign Melanie Ensign

Scrub these Phrases from Your Data Breach Statements 

In the event of a security incident, it's critical that your response is both fast and accurate. Unfortunately, many organizations make the mistake of including one or more of the following three elements in their public statements, which impairs the credibility and trustworthiness of their response. By avoiding them, you can help ensure that your organization's response is taken seriously.

Read More
Knocking on the Boardroom Door
Melanie Ensign Melanie Ensign

Knocking on the Boardroom Door

One of the most important aspects of my work is helping CISOs with what I like to call “the invisibility problem.” Many talented, hardworking CISOs try to do the right things to be seen: they present at quarterly board meetings and send their executive team regular updates about the security program. While these actions may check the boxes with their management and the Board, I don’t believe they are enough to build the credibility and visibility CISOs need to succeed - and obtain the resources required to protect an organization in a world of ever-expanding risk.

Read More
Words that Work: Persuasive Language for Security and Privacy Communications
Melanie Ensign Melanie Ensign

Words that Work: Persuasive Language for Security and Privacy Communications

Do you know which words are most effective for the context and audiences of your security and privacy communications? If you’re not sure, now is a good time to start measuring the impact of the language you use. Counting the number of times you distribute content or engage with stakeholders is a good measurement of why you’re so busy, but are your communications as effective as they could be? Want to find out? Let us know!

Read More
Does Your Security Comms Strategy Need an Upgrade?
Melanie Ensign Melanie Ensign

Does Your Security Comms Strategy Need an Upgrade?

In leading the security and privacy communications strategy for both small and global brands, I’ve found that ongoing attention to routine communications helps minimize both the volume and impact of potential crises. As a result, we advise our clients to prioritize routine security and privacy communications as one way to demonstrate persistent care.

Read More
Self-Inflicted Pain and Artificial Adversity in InfoSec
Melanie Ensign Melanie Ensign

Self-Inflicted Pain and Artificial Adversity in InfoSec

The popular saying “what doesn’t kill you makes you stronger” isn’t a guarantee. Traumatic or stressful situations can still destroy trust and motivation, cause irreparable damage to our health, and push people out of the profession.

Read More
Risk Communications: Recognizing Turning Points and Managing Decisions
Melanie Ensign Melanie Ensign

Risk Communications: Recognizing Turning Points and Managing Decisions

Not communicating about security until it escalates into a crisis is a self-fulfilling prophecy. Instead, security communicators should constantly be on the lookout for critical turning points that can determine the direction of the organization’s future or cost them their reputation.

Read More
Risk Communications: An Introduction
Melanie Ensign Melanie Ensign

Risk Communications: An Introduction

Risk makes individuals, groups, and markets behave in certain ways. Our success as security and privacy professionals depends on our ability to help non-experts make risk-related choices. The study of risk communications examines the processes that determine how our communication with these stakeholders enhances or degrades their decision-making ability.

Read More