The Discernible Blog
Tags
Keep Calm and Plan On: Expert Advice on Incident Response Communications
In this Q&A with Brooke Pearson, we discuss the relationship between internal and external communications as part of a comprehensive incident response program. Brooke is the former head of security awareness at Uber and Discernible advisory board member.
CEO Interview: “Words with Impact: Communication Tips for Privacy Technologists”
An interview with Discernible CEO Melanie Ensign and the Shifting Privacy Left Podcast.
Turning Incident Response Communications into a Sustainable Security Communications Program
The best incident response communications are built on a foundation of strong, ongoing security communications. Here are a few thoughts on how to do that.
Communication Measurement and AI
There is a lot of promise for AI in making it easier and more cost-effective for organizations to adopt an outcomes-based approach to measurement instead of merely counting outputs. Imagine, for example, that we could use AI to quickly and more expansively track the impact of the specific content, language, and timing of incident response communications.
CUSTOMER CASE STUDY: Trail of Bits
“I noticed that Melanie has a rare ability to speak in headlines and get right to the point in a compelling way… I wanted to learn how to do that.”
Communication Research Takes on the Myths of Privacy Compliance
We can’t build trust without understanding and if people don’t understand how their data is used, the rights they have, and how to exercise them then all our efforts to build trust in our privacy programs are for naught. To do this, we need to measure the effectiveness of our communications, including the channels, language, and visuals we use – so that we can adjust as needed to ensure the people whose data we’re using never feel duped into sharing it.
CUSTOMER CASE STUDY
The hallmark of Discernible’s approach is that incident response plans are designed to address a variety of security-related incidents regardless of severity or impact.
A CISO’s Guide to “Negative Megaphoning”
Negative megaphoning can have a significant impact on the reputation of your company as well as specific teams, like infosec. It may seem obvious that organizations want to minimize negative news headlines, but how often do CISOs think about their reputation as an employer and how that affects their ability to hire and retain talent?
Scrub these Phrases from Your Data Breach Statements
In the event of a security incident, it's critical that your response is both fast and accurate. Unfortunately, many organizations make the mistake of including one or more of the following three elements in their public statements, which impairs the credibility and trustworthiness of their response. By avoiding them, you can help ensure that your organization's response is taken seriously.
Don’t Get Stuck in Conflict: Communication Techniques for InfoSec and Privacy Teams
People on opposite sides of a contentious issue, like data collection and privacy, might never change their minds. Nevertheless, they still need to work together on important issues. How can infosec and privacy professionals influence engineering, product, and other business decisions in the presence of disagreement?
Knocking on the Boardroom Door
One of the most important aspects of my work is helping CISOs with what I like to call “the invisibility problem.” Many talented, hardworking CISOs try to do the right things to be seen: they present at quarterly board meetings and send their executive team regular updates about the security program. While these actions may check the boxes with their management and the Board, I don’t believe they are enough to build the credibility and visibility CISOs need to succeed - and obtain the resources required to protect an organization in a world of ever-expanding risk.
📬 Mailbag: How should brands talk about security threats from abroad without sounding xenophobic?
A reader asks, “How should brands talk about security threats from abroad without sounding xenophobic?”
Words that Work: Persuasive Language for Security and Privacy Communications
Do you know which words are most effective for the context and audiences of your security and privacy communications? If you’re not sure, now is a good time to start measuring the impact of the language you use. Counting the number of times you distribute content or engage with stakeholders is a good measurement of why you’re so busy, but are your communications as effective as they could be? Want to find out? Let us know!
Does Your Security Comms Strategy Need an Upgrade?
In leading the security and privacy communications strategy for both small and global brands, I’ve found that ongoing attention to routine communications helps minimize both the volume and impact of potential crises. As a result, we advise our clients to prioritize routine security and privacy communications as one way to demonstrate persistent care.
Beyond the Technical: Emotions and Negotiating in Security Leadership Roles
Discussions about emotions come up a lot in our incident preparedness and response work with clients because we’re always thinking about how different stimuli impact people’s expectations and ability to communicate effectively.
Self-Inflicted Pain and Artificial Adversity in InfoSec
The popular saying “what doesn’t kill you makes you stronger” isn’t a guarantee. Traumatic or stressful situations can still destroy trust and motivation, cause irreparable damage to our health, and push people out of the profession.
Risk Communications: Recognizing Turning Points and Managing Decisions
Not communicating about security until it escalates into a crisis is a self-fulfilling prophecy. Instead, security communicators should constantly be on the lookout for critical turning points that can determine the direction of the organization’s future or cost them their reputation.
Third Party Security Incident Response
Why you should communicate with stakeholders about 3rd party security incidents even if you’re not exposed
Risk Communications: An Introduction
Risk makes individuals, groups, and markets behave in certain ways. Our success as security and privacy professionals depends on our ability to help non-experts make risk-related choices. The study of risk communications examines the processes that determine how our communication with these stakeholders enhances or degrades their decision-making ability.