You will learn about important stakeholders in cybersecurity. In addition, you’ll create clear and concise communications to stakeholders.
Learning Objectives
- Define stakeholders and describe their security roles.
- Communicate sensitive information with care and confidentiality.
- Determine the information that needs to be communicated to stakeholders.
- Examine how to create a dashboard to communicate essential information to stakeholders.
Understand your stakeholders
Video: Welcome to module 3
Summary: Bridging the Gap – Communicating with Cybersecurity Stakeholders
Key takeaways:
- Previous Courses Laid the Foundation: You’ve built a strong base in security fundamentals, networks, and languages like SQL and Python.
- From Knowledge to Action: This course bridges the gap, showing you how to apply that knowledge daily by effectively communicating with key stakeholders.
- Stakeholder Spotlight: We’ll delve into who they are, their diverse roles in security, and how to tailor communication strategies for each.
- Understanding is Key: Before crafting messages, we’ll identify stakeholders and their importance to ensure impactful communication.
Overall: This section emphasizes the shift from theoretical knowledge to practical application, highlighting the crucial role of effective communication with stakeholders in the daily life of a security professional. It sets the stage for understanding stakeholders and their diverse roles in relation to security.
Bridging the Gap: A Communication Handbook for Cybersecurity Professionals
Welcome, future security champions! This tutorial equips you with the skillset to navigate the often-murky waters of cybersecurity stakeholder communication. By understanding who your audience is, what concerns them, and how to translate technical jargon into actionable insights, you’ll bridge the gap between technical expertise and impactful decision-making.
Demystifying the Stakeholder Landscape:
Before crafting messages, let’s identify the players:
- C-Suite Executives: CEOs, CFOs, and COOs need high-level overviews of threats and potential financial impact. Focus on business risks and mitigation strategies.
- IT Leadership: CIOs, CISOs, and IT Directors require detailed technical information and incident response plans. Speak their language, but avoid excessive technical jargon.
- Legal and Compliance Teams: Lawyers and compliance officers prioritize data privacy and regulatory adherence. Highlight legal implications and potential breaches.
- Marketing and Public Relations: Public image and reputation management are their game. Communicate potential PR disasters and crisis response plans.
- Line-of-Business Managers: Sales, HR, and Operations heads need to understand how security impacts their day-to-day operations. Focus on specific risks and best practices within their departments.
Tailoring Your Message:
One size doesn’t fit all! Adapt your communication to each stakeholder group:
- Executive Summary: For C-suite, provide concise reports with data visualizations and executive summaries.
- Technical Deep Dives: Offer detailed reports with technical analysis and incident timelines for IT leadership.
- Legal Jargon: Ensure communication with legal teams is clear, concise, and adheres to legal language and terminology.
- Plain English Please: For non-technical stakeholders, avoid technical jargon and explain risks and solutions in simple terms.
- Actionable Insights: Go beyond just informing; provide concrete recommendations and actionable steps for each stakeholder group.
Building the Bridge:
Effective communication tools bridge the gap:
- Dashboards: Visually represent key security metrics, threat levels, and incident updates.
- Reports: Tailor reports to each stakeholder group, emphasizing information relevant to their roles and responsibilities.
- Regular Meetings: Foster open communication through regular meetings and briefings, answer questions, and address concerns.
- Active Listening: Actively listen to stakeholder feedback and tailor future communication accordingly.
Remember: You are the translator, the interpreter, the bridge between the technical world of cybersecurity and the diverse world of stakeholders. By understanding their needs, speaking their language, and providing actionable insights, you empower them to make informed decisions and contribute to a more secure organization.
Ready to become a master communicator? Explore these resources for further learning:
- SANS Institute: https://www.sans.org/
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- MITRE ATT&CK: https://attack.mitre.org/
Embrace the challenge, hone your communication skills, and bridge the gap with confidence! Together, we can build a more secure digital future, one clear message at a time.
We’ve covered so much in previous courses, from the foundations of security to
a basic understanding of networks and programming languages like SQL and
Python. These concepts are core
knowledge when preparing for a role in the security profession. But how does this information help
you on a day-to-day basis? And to whom do you communicate
this information? In this course, we’ll start by
discussing who stakeholders are. Then, we’ll identify their
roles in relation to security. Finally, we’ll share effective
communication strategies for relaying key information to stakeholders. But before we can communicate
with stakeholders, we have to understand who they are and
why they’re important. So let’s get started!
Video: Stakeholders in cybersecurity
Summary: Stakeholders in Cybersecurity: Who They Are and What They Need
Key Takeaways:
- Stakeholders: Individuals/groups with vested interest in an organization’s security practices. Their decisions impact your daily work.
- Focus: Stakeholders who influence analyst decisions, potentially receiving your findings:
- Risk Managers: Identify risks, manage incident response, notify legal/PR teams.
- CEO: Highest-ranking, responsible for financial/managerial decisions, prioritizes security.
- CFO: Manages financials, concerned about incident costs and security investments.
- CISO: Develops security architecture, conducts risk analysis, creates security plans.
- Operations Managers: Oversee security professionals, work directly with analysts, protect against threats, manage daily operations.
- Your Role: Primarily communicate with operations managers, who then share your findings with higher-level stakeholders.
Overall: This section introduces cybersecurity stakeholders, highlighting their diverse roles and interests in security decisions. As an analyst, understanding their needs and effective communication are crucial for successful collaboration and organizational security.
Stakeholders in Cybersecurity: Navigating the Ecosystem of Influence
Welcome, future security guardians! This tutorial unlocks the door to the diverse world of cybersecurity stakeholders, empowering you to understand their unique perspectives and communicate effectively for enhanced collaboration and security posture.
Understanding the Landscape:
Cybersecurity isn’t a solo act. Imagine an intricate ecosystem where various individuals and groups wield influence, shaping decisions and impacting daily operations. These are your stakeholders: individuals or groups with a vested interest in the organization’s security practices. Their decisions, from resource allocation to policy implementation, directly affect your work as an analyst.
Focusing on the Key Players:
While many stakeholders play a role, let’s zoom in on those influencing your day-to-day and potentially receiving your findings:
- Risk Managers: The risk management team champions proactive vigilance. They identify potential threats, manage incident response, and act as the bridge between security and legal/PR departments, ensuring clear communication in critical situations.
- The CEO: Commanding the helm, the CEO prioritizes overall business success, naturally placing security at the forefront. Understanding the financial and reputational risks of cyber threats is crucial for informed decision-making at the highest level.
- The CFO: Guardian of the organization’s financial well-being, the CFO analyzes the tangible costs of security incidents and weighs them against investments in preventative measures. Understanding their perspective helps tailor your communication to highlight cost-effectiveness and risk mitigation.
- The CISO: The maestro of the security orchestra, the CISO designs the organization’s security architecture, conducts risk assessments, and oversees incident response plans. Communicating your findings clearly and concisely empowers them to make informed decisions about security posture and resource allocation.
- Operations Managers: Your closest allies in the trenches, operations managers lead the security professionals on the front line. They rely on your expertise to identify threats, investigate incidents, and implement security controls. Effective communication with them ensures efficient operations and timely escalation of critical issues.
Your Role in the Symphony:
While direct communication with upper-level stakeholders may be infrequent, your insights reach them through the operations managers. Therefore, crafting clear, concise reports and effectively communicating your findings to your immediate team is crucial. Remember, you are the voice of technical expertise, translating complex jargon into actionable insights that guide their decisions and ultimately inform the strategic direction of the organization’s security posture.
Beyond the Basics:
As you navigate this dynamic landscape, remember to:
- Identify specific needs: Each stakeholder has a unique perspective. Tailor your messaging to address their specific concerns and priorities.
- Speak their language: Avoid technical jargon with non-technical stakeholders. Focus on clear, concise explanations that resonate with their understanding.
- Data is your ally: Support your findings with credible data and visualizations to enhance credibility and persuasiveness.
- Actively listen: Feedback is invaluable. Be open to questions, concerns, and alternative perspectives to foster collaboration and build trust.
By understanding your stakeholders, their needs, and honing your communication skills, you become a vital contributor to a robust cybersecurity ecosystem. Together, you can build a fortress against cyber threats, one informed decision at a time.
Ready to delve deeper? Explore these resources for further learning:
- SANS Institute: https://www.sans.org/
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- MITRE ATT&CK: https://attack.mitre.org/
Embrace the challenge, master the art of stakeholder communication, and become a champion of informed security decisions!
Let’s discuss the hierarchy
within an organization. It goes from you, the analyst, to management, all the
way up to executives. Hierarchy is a great way to
understand stakeholders. A stakeholder is defined as an individual or group that has an interest in the decisions or activities of an organization. This is important
for your role as an entry-level analyst
because the decisions made on a day-to-day basis by stakeholders will impact
how you do your job. Let’s focus on stakeholders
who have an interest in the daily choices
analysts make. After all, you may be asked to communicate
your findings to them. So let’s learn a little
bit more about who they are and the roles they play
in regards to security. Security threats, risks, and vulnerabilities can affect an entire company’s
operations from financial implications
to the loss of customer data and trust, the impact of security
incidents are limitless. Each stakeholder has
a responsibility to provide input on the various decisions
and activities of the security team and how to best protect
the organization. There are many stakeholders
that pay close attention to the security of critical
organizational assets and data. We’re going to focus on
five of those stakeholders: risk managers; the Chief
Executive Officer, also known as the CEO; the Chief Financial Officer, also known as the CFO; the Chief Information
Security Officer, or CISO; and operation managers. Let’s discuss each of these
stakeholders in more detail. Risk managers are important in an organization
because they help identify risks and manage the response to
security incidents. They also notify the
legal department regarding regulatory issues
that need to be addressed. Additionally, risk managers
inform the organization’s public relations team in
case there is a need to publish public communications
regarding an incident. Next, is the Chief
Executive Officer, also known as the CEO. This is the highest ranking
person in an organization. CEOs are responsible for financial and
managerial decisions. They also have an
obligation to report to shareholders and manage the
operations of a company. So naturally, security is a
top priority for the CEO. Now, let’s discuss the
Chief Financial Officer, known as the CFO. CFOs are senior executives responsible for managing the financial operations
of a company. They are concerned
about security from a financial
standpoint because of the potential costs of an
incident to the business. They are also interested in
the costs associated with tools and strategies that are necessary to combat
security incidents. Another stakeholder with an
interest in security is the Chief Information
Security Officer, or CISO. CISOs are high-level executives responsible for developing an organization’s
security architecture and conducting risk
analysis and system audits. They’re also tasked
with creating security and business
continuity plans. Last, we have
operations managers. Operations managers oversee security professionals to help identify and safeguard an organization from
security threats. These individuals
often work directly with analysts as
the first line of defense when it comes to
protecting the company from threats, risks, and
vulnerabilities. They are also generally
responsible for the daily maintenance
of security operations. As an entry-level analyst
at a large organization, it’s unlikely that you’ll communicate directly
with the risk manager, CEO, CFO, or the CISO. However, the operations
manager will likely ask you to create communications to share with those individuals. Coming up, we’ll
focus a bit more on stakeholders and how to effectively
communicate with them.
Reading: The purpose and impact of stakeholders
Reading
You previously learned about incident escalation and the various security incident classification types. You also learned about the impact these incidents can have on an organization’s business operations.
This reading will explore the individuals who have a significant interest in those business operations: stakeholders.
Who are stakeholders?
A stakeholder is defined as an individual or group that has an interest in any decision or activity of an organization. A big part of what you’ll do as a security analyst is report your findings to various security stakeholders.
Levels of stakeholders
There are many levels of stakeholders within larger organizations. As an entry-level analyst, you might only communicate directly with a few of them. Although you might not communicate with all of the security stakeholders in an organization, it’s important to have an understanding of who key stakeholders are:
- A cybersecurity risk manager is a professional responsible for leading efforts to identify, assess, and mitigate security risks within an organization.
- A Chief Executive Officer, also known as the CEO, is the highest ranking person in an organization. You are unlikely to communicate directly with this stakeholder as an entry-level analyst.
- A Chief Financial Officer, also known as the CFO, is another high-level stakeholder that you’re unlikely to communicate with directly.
- A Chief Information Security Officer, also known as the CISO, is the highest level of security stakeholder. You are also unlikely to communicate directly with this stakeholder as an entry-level analyst.
- An operations manager oversees the day-to-day security operations. These individuals lead teams related to the development and implementation of security strategies that protect an organization from cyber threats.
CFOs and CISOs are focused on the big picture, like the potential financial burden of a security incident, whereas other roles like operations managers are more focused on the impact on day-to-day operations. Although you will rarely interact directly with high-level security stakeholders, it’s still important to recognize their relevance.
Stakeholder communications for entry-level analysts
Two examples of security stakeholders with whom you might regularly communicate are operations managers and risk managers. When you report to these stakeholders, you’ll need to clearly communicate the current security issue and its possible causes. The operations managers will then determine next steps and coordinate other team members to remediate or resolve the issue.
For example, you might report multiple failed login attempts by an employee to your operations manager. This stakeholder might contact the employee’s supervisor to ensure the occurrence is a genuine issue of entering the wrong password or determine if the account has been compromised. The stakeholder and supervisor might also need to discuss the consequences for day-to-day operations if genuine failed login attempts can lead to account lockouts that might impact business operations. As an entry-level security analyst, you might play a role in implementing preventative measures once next steps have been determined.
From one stakeholder to the next
Operations managers and risk managers are stakeholders who rely on entry-level analysts and other team members to keep them informed of security events in day-to-day operations. These stakeholders commonly report back to the CISOs and CFOs to give a broader narrative of the organization’s overall security picture. Although you won’t regularly communicate with high-level stakeholders, it’s important to recognize that your efforts still reach the highest levels of security stakeholders in the organization. These other members of your team keep those top-level stakeholders informed on the security measures and protocols in place that are continuously helping to protect the organization.
Key takeaways
Stakeholders play a major role in ensuring the security of an organization. Entry-level analysts should have a foundational understanding of the different levels of security stakeholders within an organization. Entry-level analysts will not communicate with every security stakeholder in a company, but there are certain stakeholders that the analyst will need to provide updates to. Those updates will eventually be reported up to the more senior-level stakeholders, such as the CISO and the CFO.
Communicate for impact
Video: Clear and concise communication
Summary: Communication with Stakeholders: A Balancing Act of Clarity and Security
Key takeaways:
- Sensitivity matters: Security information requires careful communication, considering audience and message importance.
- Tailored communication: Different stakeholders need different information. Craft messages accordingly with clear focus and purpose.
- Precision over jargon: Avoid unnecessary technical terms, respecting stakeholders’ time and focus.
- Security mindset: Ask questions to understand critical assets, tool effectiveness, and stakeholder needs.
- Relevance reigns: Share only the most relevant information, aiding stakeholders in their roles and security awareness.
- Your vital role: You bridge the gap between technical expertise and stakeholder understanding, contributing to improved security posture.
Overall: This section emphasizes the importance of clear, concise, and focused communication with stakeholders when dealing with sensitive security information. It highlights the need to tailor messages to specific audiences, avoiding unnecessary jargon, and prioritizing relevance. Your role as a security analyst is crucial in helping stakeholders understand critical information and contribute to a more secure organization.
Communication with Stakeholders: A Balancing Act of Clarity and Security
Welcome, future security guardians! This tutorial equips you with the skillset to navigate the delicate dance of communicating with stakeholders in the realm of cybersecurity. It’s a balancing act, demanding both clarity for understanding and security for sensitive information. Mastering this art empowers you to bridge the gap between technical expertise and stakeholder awareness, strengthening your organization’s security posture.
Navigating the Sensitive Landscape:
Remember, security information can be highly sensitive. A careless email could expose vulnerabilities or reveal confidential details. Therefore, your communication needs to be:
- Audience-Aware: Identify who you’re communicating with and tailor your message accordingly. What resonates with the CEO might be irrelevant to the marketing team.
- Focused and Purposeful: Avoid rambling or digressions. Each message should have a clear purpose, providing specific information relevant to the recipient’s needs.
- Concise and Clear: Respect your stakeholders’ time by being brief and clear. Avoid technical jargon unless absolutely necessary. Use simple, understandable language without sacrificing accuracy.
Mindset Matters:
Developing a security mindset is crucial for effective communication. This means:
- Asking Questions: Don’t assume you know what matters most. Ask your manager or supervisor what information specific stakeholders need and how much detail is appropriate.
- Understanding Assets: Consider the data and assets under your protection. What’s most critical? Which security tools have proven most effective? This knowledge guides your communication priorities.
- Empathizing with Stakeholders: Put yourself in their shoes. What information would you need to do your job effectively? What concerns might they have? Understanding their perspective helps you tailor your message.
The Art of Relevance:
Remember, information overload is counterproductive. Focus on relevance:
- Prioritize Need-to-Know: Identify the absolute minimum information each stakeholder needs to know. Don’t bombard them with unnecessary details.
- Contextualize for Impact: Provide enough context for them to understand the significance of the information and how it relates to their role.
- Actionable Insights: Don’t leave them hanging. Suggest next steps or actions they can take based on the information you shared.
Your Role as the Bridge:
Your communication plays a vital role in:
- Empowering Stakeholders: By informing them about security issues, you equip them to make informed decisions and contribute to a safer environment.
- Building Trust: Open and transparent communication fosters trust between you and the stakeholders, paving the way for stronger collaboration.
- Strengthening Security Posture: When everyone is informed and engaged, your organization becomes more resilient against cyber threats.
Remember, mastering communication with stakeholders is an ongoing journey. Embrace the challenge, hone your skills, and become a champion of clarity and security!
Additional Resources:
- SANS Institute: https://www.sans.org/: https://www.sans.org/
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework: https://www.nist.gov/cyberframework
- MITRE ATT&CK: https://attack.mitre.org/: https://attack.mitre.org/
Let your voice be heard, clearly and securely, and watch your organization’s security posture soar to new heights!
Welcome back! Previously, we discussed stakeholders and the important
security roles they play within an organization. Now, let’s explore the role you play in communicating
with those stakeholders. The information that’s
communicated to stakeholders is sensitive.
For example, if you send an email to stakeholders about a
recent security breach, it’s important to be mindful of what you communicate and
who you communicate to. Different stakeholders
may need to be informed about different issues. As a result, your
communications with them need to be clear,
concise, and focused. Security is a detail-driven
profession, so it’s essential that
you stay mindful of the details when sending
your communications. Stakeholders are
very busy people. Your communication
should be precise, avoid unnecessary
technical terms, and have a clear purpose. You don’t want them to
have to guess the reason for your email or why
it matters to them. To help with this,
ask your manager or immediate supervisors
questions to find out what the stakeholders you
communicate with need to know. As you may recall, earlier we discussed what it means
to have a security mindset. A part of that
mindset means asking questions about the assets
and data you’re protecting. For example, you could ask: What’s the most
important data to protect on a daily basis? Or, what security tool has been
most important or useful to protect
our data and assets? Having a security
mindset also means understanding what matters
most to stakeholders, so you know what information
to share with them. Effective communication
involves relaying only the information that is most relevant to stakeholders. Staying informed
about security issues helps stakeholders do their
jobs more effectively. Your role in communicating with stakeholders is to help them
obtain that information. This is yet another
example of how essential your role is
within a security team. Coming up, we’ll discuss
the information that is most important to communicate
with stakeholders.
Video: Building blocks of cybersecurity communications
Summary: Crafting Compelling Security Stories for Stakeholders
Key takeaways:
- Storytelling for Security: Effective communication with stakeholders resembles telling a clear, concise story with a beginning, middle, and end.
- Elements of the Security Story:
- Challenge: Describe the security issue, potential threat, or incident.
- Impact: Explain the consequences for the organization and its stakeholders.
- Solutions: Propose possible resolutions or mitigation strategies, referencing relevant playbooks or procedures.
- Data: Supplement the story with relevant data, reports, or lists of critical issues.
- Example Scenario: Monitoring logs reveals potential malicious code, impacting sensitive user information. Communicate this to your supervisor by:
- Detailing the issue: Malicious code detected in logs.
- Referencing the incident response playbook for guidance.
- Proposing a possible solution (escalation, further investigation).
- Communication Channels:
- Email, documents, visual representations, incident management systems, ticketing systems.
- Visual Impact: Graphs, charts, videos, dashboards can effectively convey key details and tell a full security story.
- Benefits:
- Empowers stakeholders to make informed decisions.
- Simplifies their jobs by providing clear information and potential solutions.
- Strengthens your reputation as a valuable team member.
Overall: This section emphasizes the importance of crafting clear, concise, and compelling security stories for effective communication with stakeholders. It highlights the key elements of such stories, using a practical example to illustrate the process. Additionally, it discusses various communication channels and the power of visual representation in enhancing understanding.
Captivating Your Audience: Crafting Compelling Security Stories for Stakeholders
Welcome, future guardians of digital fortresses! This tutorial equips you with the art of turning complex security narratives into captivating stories for stakeholders. By mastering this skill, you’ll bridge the gap between technical expertise and organizational understanding, empowering informed decisions and stronger security posture.
The Power of Storytelling:
Think of effective communication as weaving a captivating tale. Security concerns, often intricate and technical, can appear as a tangled mess to non-technical stakeholders. Your job is to transform this mess into a compelling narrative, one that resonates with their needs and priorities.
Building the Blocks of Your Security Story:
- The Challenge: Introduce the security issue – a suspicious network anomaly, a potential phishing attack, or a data breach. Be clear and concise, avoiding technical jargon.
- The Impact: Paint a vivid picture of the consequences. How does this incident affect the organization’s operations, finances, or reputation? Quantify the risk if possible, using data and real-world examples.
- The Resolution: Offer a roadmap for action. Reference relevant security policies, propose mitigation strategies, and outline potential solutions.
- The Hero’s Journey: Highlight your role in the story. Did you discover the threat? Did you initiate the response plan? Show yourself as a proactive defender, safeguarding organizational assets.
Pro Tips for a Captivating Narrative:
- Conciseness is King: Respect stakeholder time by keeping your story short and to the point. Focus on the essential details and avoid unnecessary digressions.
- Empathy Matters: Step into the stakeholder’s shoes. What information would be most relevant to them? Tailor your story to their specific role and responsibilities.
- Data Drives Decisions: Supplement your narrative with data – incident reports, threat analytics, or risk assessments. Visualize key points with charts or graphs to enhance understanding.
- Visuals Matter: Consider using visual aids like dashboards, infographics, or even video simulations to bring your story to life.
- Actionable Insights: Don’t leave stakeholders hanging. Conclude with clear recommendations, next steps, or calls to action.
Remember, your communication doesn’t exist in a vacuum. Consider the appropriate channel for your story:
- Email: For clear, concise updates and reports.
- Meetings: For interactive discussions and Q&A sessions.
- Dashboards: For ongoing monitoring and real-time updates.
- Ticketing Systems: For documenting and tracking incident response.
By crafting compelling security stories, you become a translator, a bridge between technical complexities and stakeholder understanding. You empower informed decisions, build trust, and ultimately, contribute to a more secure digital landscape.
Ready to hone your storytelling skills? Explore these resources:
- Security Storytelling: https://www.cybrary.it/success-stories
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- MITRE ATT&CK: https://attack.mitre.org/
Embrace the challenge, weave your tales, and watch your communication become a shield against cyber threats!
Which of the following are concise, effective communication methods for conveying key details to stakeholders? Select two answers.
An email. A visual presentation
Visual presentations and emails can be used to effectively convey key details to stakeholders.
Previously, we discussed
communicating information that is important
to stakeholders. It’s essential that
communications are specific and clear, so stakeholders understand
what’s happening and what actions may
need to be taken. In this video, we’ll go
into more detail about how to create precise and
clear communications. Creating security
communications to share with stakeholders is similar
to telling a great story. Stories typically have a
beginning, middle, and end. Somewhere in that story
there is some sort of conflict and an
eventual resolution. This concept is also true when telling security stories
to stakeholders. The security story details what the security challenge is, how it impacts the organization, and possible solutions
to the issue. The security story also includes data related to the challenge, its impact and
proposed solutions. This data could be in the form
of reports that summarize key findings or a list of issues that may need
immediate attention. Let’s use the following
scenario as an example. You’ve been monitoring
system logs and notice possible
malicious code execution in the logs that can lead to the exposure of sensitive
user information. Now, you need to communicate what is happening
to a stakeholder, in this case, your
immediate supervisor. The first step is to
detail the issue: potential malicious
code execution found while monitoring the logs. The next step is to refer to the organization’s incident
response playbook, and mention the suggested
guidance from the playbook regarding
malicious code found in system logs. This shows your supervisor that you’ve been
paying attention to the procedures already
established by the team. The final piece of your story is to provide a possible
solution to the issue. In this scenario, you may not be the final decision maker
regarding what action is taken, but you’ve explained to
the stakeholder what has happened and a possible
solution to the problem. You can communicate the story we just discussed
in various ways. Send an email, share a document, or even communicate through the use of a visual
representation. You can also use
incident management or ticketing systems. Many organizations have
incident management or ticketing systems that follow the steps outlined in
their security playbooks. Some scenarios are better expressed by using
visual elements. Visuals are used to convey key details in the
form of graphs, charts, videos, or
other visual effects. This allows stakeholders to view a pictorial representation
of what is being explained. Visual dashboards
can help you tell a full security story
to stakeholders. Later in this course, you’ll have an opportunity
to learn how to use Google Sheets to create
a visual security story. That’s going to be fun! A security professional
who knows how to tell a compelling and concise
security story can help stakeholders make
decisions about the best ways to
respond to an incident. Ideally, you want to be someone that make
stakeholders’ jobs easier, and communicating
effectively will certainly help you do that. Coming up, we’ll continue our discussion about
communicating with stakeholders.
Reading: Communicate effectively with stakeholders
Reading
You previously learned about security stakeholders and their significance in an organization. In this reading, you’ll learn the importance of clearly communicating to stakeholders to ensure they have a thorough understanding of the information you’re sharing and why it’s meaningful to the organization.
Get to the point
Security stakeholders have roles and responsibilities that are time sensitive and impact the business. It’s important that any communications they receive, and the actions they need to take, are clear. To get to the point in your communications, ask yourself:
- What do I want this person to know?
- Why is it important for them to know it?
- When do they need to take action?
- How do I explain the situation in a nontechnical manner?
Follow the protocols
When you first join a security team, you’ll want to learn about the different protocols and procedures in place for communicating with stakeholders and other members of the organization. It’s important to make sure you know what applications and forms of communications are acceptable before you begin communicating with stakeholders, such as in-person meetings, video-conferencing, emails, or company chat applications.
Communicate with impact
You previously learned about the different stakeholders within an organization and what specific areas they’re focused on. When you first begin your career in the cybersecurity field, you’re more likely to interact with lower-level stakeholders, like operations managers or security risk managers, who are interested in the day-to-day operations, such as logging. Senior-level stakeholders might be more interested in the underlying risks, such as the potential financial burden of a security incident—as opposed to the details around logs.
When you communicate with an operations manager, make sure you address relevant information that relates to their daily responsibilities, such as anomalies in data logs that you are escalating. Concentrating on a manager’s daily responsibilities will help you communicate the need-to-know information to that individual.
Communication methods
Your method of communication will vary, depending on the type of information you’re sharing. Knowing which communication channels are appropriate for different scenarios is a great skill to help you communicate effectively with stakeholders. Here are a few ways you might choose to communicate:
- Instant messaging
- Emailing
- Video calling
- Phone calls
- Sharing a spreadsheet of data
- Sharing a slideshow presentation
If your message is straightforward, an instant message or phone call might be the route to take. If you have to describe a complex situation with multiple layers, an email or in-person meeting might be the better option. If you’re providing a lot of data and numbers, sharing a graph might be the best solution. Each situation helps you determine the best means of communication.
Key takeaways
Stakeholders are busy people who have very specific interests within the organization. Therefore, it’s important to only communicate information that is specific to their interests and impacts their role in the company.
Be mindful of the kind of information you’re communicating because that will help determine what method of communication you should use.
Practice Quiz: Test your knowledge: Communicate for impact
Which of the following are stakeholder communication best practices? Select all that apply.
They should have a clear purpose, They should be precise, They should avoid unnecessary jargon
Communications with stakeholders should be precise, avoid unnecessary technical terms, and have a clear purpose.
Fill in the blank: Information that is communicated to stakeholders is _____.
sensitive
Information that is communicated to stakeholders is sensitive. It is important to be cautious when exchanging emails with stakeholders. Always make sure you are sending emails to the correct address.
What actions can a security analyst take to learn what matters to the stakeholders they communicate with?
Ask stakeholders questions about the data and assets they are responsible for protecting.
Asking stakeholders questions about the data and assets they are responsible for protecting is a great way to learn what matters most to them. Directly asking the stakeholders what data and assets they are responsible for protecting gives more personal insight into their technological needs and prompts a more immediate response from them.
Fill in the blank: Graphs, charts, videos, and dashboards are examples of _____ communications that are created to provide and compare important data and metrics with stakeholders.
visual
Graphs, charts, videos, and dashboards are examples of visual communications. Visual communications are helpful in situations where various numbers and data sets are being compared or reviewed.
Visual communication using a dashboard
Video: Visual storytelling in cybersecurity
The video highlights effective communication strategies for security professionals to engage stakeholders on threats, risks, vulnerabilities, and incidents. Key takeaways include:
- Using visuals (charts, graphs): Captures attention, simplifies complex data, aids decision-making for stakeholder protection.
- Balancing communication channels: Sensitive information in emails requires caution, consider phone calls or instant messages for prompt responses.
- Direct communication: Follow up on unanswered emails with phone calls to prevent bigger issues.
- Showcasing skills: Visuals demonstrate data analysis, follow-up shows initiative, both enhance your professional image.
By adapting these strategies, security professionals can effectively engage stakeholders and improve organizational security.
The ability to communicate threats,
risks, vulnerabilities, or incidents and possible solutions is a valuable skill for
security professionals. In this video, we’ll focus on various
communication strategies that can help you engage with and
convey key ideas to stakeholders. Let’s start with visuals. The use of visuals to tell a security
story can help you communicate impactful data and metrics. Charts and
graphs are particularly helpful for this. They can be used to compare data points or
show small parts of a larger issue. Using relevant and detailed graphics can help you develop
the story you want to tell stakeholders, so they can make decisions that would
help protect the organization. While visuals are a compelling way
to capture the attention of your stakeholders, some issues
are best explained in an email or even a phone call. Be mindful of the sensitive
information contained in these types of communications. For security purposes, it’s important to communicate
sensitive information with care. Be sure to follow the procedures outlined
in your organization’s playbooks and always make sure to send emails to the
right email recipient, as it could create a risk if the wrong person receives
confidential security information. One challenging thing about emails is the
potentially long wait time for response. Stakeholders have many responsibilities. This means they may
sometimes miss an email, or fail to respond in a timely manner. In these instances, a simple phone call or
instant message may be a better option. My experience in security has taught me
that sometimes a simple instant message or call can help move a situation forward. Direct communication is often better
than waiting days or weeks for an email response to an issue that
requires immediate attention. When appropriate, take the initiative
to follow up with a stakeholder if they haven’t responded to
an email in a timely manner. It sounds simple, but a friendly call can often prevent
a major issue from occurring. It’s important to stand out
in the security profession, especially if you don’t have
previous experience in the industry. Visual representations, emails, and
phone calls are great ways to showcase your written and
verbal communication skills. The visual aspect shows your
ability to put metrics and data together in an impactful way. If you don’t receive a timely
response from a stakeholder, following up shows initiative.
Reading: Create visual dashboards for impactful cybersecurity communications
Reading
You previously learned about security stakeholders, the people responsible for protecting the data and systems of various departments of an organization. An entry-level analyst might communicate directly or indirectly with these individuals. If you do end up communicating with a stakeholder, it’s important to use the right method of communication. This reading will further elaborate on the significance of using visual dashboards to communicate information to stakeholders. Dashboards can include charts, graphs, and even infographics. You’ll learn more about when to use visual communication strategies in this reading.
Using visuals to communicate effectively
Security is about protecting a company from threats that can affect its reputation and finances. Oftentimes, responding to threats quickly and effectively depends on clear communications between the stakeholders who are involved.
In the cybersecurity field, the stakeholders you’ll deal with will often be busy with other responsibilities. Showing them important information visually is a great way to gain their input and support to address security challenges that arise. Visuals help provide these decision-makers with actionable information that can help them identify potential risks to the organization’s security posture.
Visual dashboards
A visual dashboard is a way of displaying various types of data quickly in one place. Visual dashboards are useful tools that can be used to communicate stories to stakeholders about security events—especially when they involve numbers and data.
Dashboards can be simple or complex depending on the information you’re communicating. A simple dashboard might contain a single chart, while a complex one can include multiple detailed charts, graphs, and tables. Deciding which type to use will depend on the situation and story you are telling. However, attention to detail and accurately representing information is important anytime you’re communicating data to stakeholders.
Pro tip: Programs like Google Sheets and Apache OpenOffice are tools that can be used to create visual dashboards.
When to use visual communication
Security is often a team effort. Everyone must work together to ensure an organization is properly protected from bad actors. Knowing how to communicate with your colleagues is a big part of the team-focused aspect.
Sometimes it’s enough to send a simple email update. Other times you might want to include a document attachment that further elaborates on a specific topic. A simple phone call can also be valuable because it allows you to quickly communicate the necessary information without having to wait for a response to an email or message. Other times, the best way to communicate is through visuals.
For example, consider a situation where your supervisor has asked you to provide them with results from a recent internal audit of five different departments within the organization. The audit gathered data showing how many phishing emails each department clicked over the last five months. This is an ideal opportunity to tell this story using visualization tools. Instead of sending an email that simply describes what the findings are, a graph or chart will clearly illustrate those findings, making them easier for the stakeholder to understand quickly and easily.
Key takeaways
Stakeholders, like the rest of the security team, are busy. With that in mind, be clear and concise any time you communicate with them. This makes everyone’s job easier! It’s important to recognize when visual dashboards are the most effective communication method. A visual dashboard is often best to use when you’re communicating information that involves numbers and data.
Video: How to create a visual dashboard
Summary: Building a Visual Security Story
Scenario: The CISO wants to know which departments click on phishing emails the most. An investigation reveals the top 5 offenders: Human Resources, Customer Service, Global Security, Media Relations, and Professional Development.
Goal: Create a visual representation of the data to share with stakeholders and inform mitigation strategies.
Tools: Google Sheets and bar chart visualization.
Steps:
- Create a Google Sheets account if needed.
- Enter department names and phishing email counts in separate columns.
- Select data and header rows/columns.
- Insert a bar chart and customize it:
- Change chart type to desired bar chart option.
- Update title to reflect data (e.g., “Clicked Phishing Emails by Department”).
- Close the chart editor.
Benefits:
- Visual data stories effectively communicate security information to stakeholders.
- Stakeholders gain clearer understanding of organizational security issues.
- Data facilitates informed decision-making and risk mitigation strategies.
This tutorial empowers security teams to leverage visual storytelling for improved stakeholder communication and proactive risk management.
Captivate Your Audience: Building a Visual Security Story with Google Sheets
Welcome, security champions! This tutorial equips you with the power of visual storytelling to captivate stakeholders and inform critical security decisions. Today, we’ll use Google Sheets to craft a compelling narrative around phishing email clicks, showcasing your data analysis and communication skills.
The Scenario: The CISO seeks insight. They want to know which departments champion (or perhaps unintentionally champion) phishing email clicks. Your investigation reveals the top five culprits: Human Resources, Customer Service, Global Security, Media Relations, and Professional Development.
Our Mission: Transform this data into a visual security story that resonates with stakeholders and guides effective action.
Tools of the Trade:
- Google Sheets: Our free, cloud-based platform for data manipulation and visualization.
- Bar Chart: Our chosen weapon for showcasing departmental phishing click trends.
Let’s Get Started:
Step 1: Setting the Stage:
- Access Google Sheets: Sign in or create your free account.
- Start a New Sheet: Click the “+” icon and choose “Blank spreadsheet.”
- Label your Data: In Cell A1, type “Department.” In Cell B1, type “# of Clicked Phishing Emails.”
Step 2: Enter the Data:
- List the Departments: In Cell A2, type “Human Resources.” Continue filling in Departments (A3, A4, etc.) for the remaining four offenders.
- Record the Clicks: In Cell B2, type the number of phishing email clicks for Human Resources. Repeat for each Department (B3, B4, etc.).
Step 3: Craft the Visual Narrative:
- Highlight the Data: Select the entire data range (Cells A1:B6).
- Insert the Chart: Click the “Insert” menu and choose “Chart.”
- Choose the Bar Chart: In the Chart editor, select the desired bar chart type. (Clustered or stacked bars are good options.)
- Customize the Title: Click “Chart & axis titles” and update the title to reflect your story (e.g., “Phishing Email Clicks by Department”).
Step 4: Sharing Your Story:
- Download or Share: Click “File” and choose “Download” to save the sheet as a file. Alternatively, click “Share” to grant access to stakeholders.
Beyond the Bar Chart:
- Experiment with Different Chart Types: Explore line charts, pie charts, or even scatter plots depending on your data and desired message.
- Add Contextual Elements: Include data labels, annotations, or even trendlines to enrich your story.
- Remember the Audience: Tailor your visuals and explanations to resonate with your stakeholders’ level of technical understanding.
The Impact of Visual Storytelling:
By using Google Sheets to create compelling visual security stories, you:
- Transform complex data into easily digestible narratives.
- Engage stakeholders and capture their attention.
- Facilitate informed decision-making and proactive risk mitigation.
Become a master storyteller, not just a data analyst. Embrace the power of visual communication and watch your security insights become catalysts for positive change!
Ready to dive deeper? Explore these additional resources:
- Google Sheets Tutorial: https://support.google.com/a/users/answer/9282959?hl=en
- Data Visualization Best Practices: https://help.tableau.com/current/blueprint/en-us/bp_visual_best_practices.htm
- Security Storytelling Examples: https://www.axonius.com/blog/storytelling-in-cybersecurity
Remember, the power to inform and inspire lies within your data. Unleash it through visual storytelling and see your security expertise shine!
There are many instances where a member of a cybersecurity team will need to create a visual dashboard to communicate impactful data and metrics to stakeholders. Which of the following programs can be used to create visual dashboards that can communicate impactful data and metrics to stakeholders? Select all that apply.
Apache OpenOffice, Google Sheets
Apache OpenOffice and Google Sheets are no cost options that allow users to create spreadsheets and other visual presentations.
In this video,
we’re going to have a bit of fun! We’ll create a visual security story. Here’s the scenario: The operations manager, one of the
stakeholders we previously discussed, has been informed that the Chief Information
Security Officer, also known as the CISO, wants to know how many employees
are often clicking on phishing emails. The goal is to identify which five
departments click on those emails most often. An investigation reveals that the five
departments that most frequently click on phishing emails are: human
resources, customer service, global security, media relations,
and professional development. Based on this information,
the security team can create a visual representation of the data to share with
the operations manager and the CISO. Those stakeholders and the security team can then work together
to determine how to address the issue. There are many different platforms
available that can be used to create and share visual stories of data. Apache OpenOffice is a free, open-source
office suite that allows users to create spreadsheets and
other visual representations. Another no cost option is Google Sheets. Today, we’ll enter our
data into Google Sheets. Then, we’ll create a bar chart
visualization to develop the data story. If you don’t have a Google account,
you’ll need to create one. Let’s start by demonstrating
how to create an account. First, go to Google.com And click on: Sign in Click: Create account And select: For my personal use Then, complete each step to
create your personal account. Now that you’ve created your
Google account, it’s time for us to begin creating our Google Sheets
bar chart visualization. Click: the dots menu in
the top right corner Click: the Sheets icon Click: Blank to start a new spreadsheet Select: Cell A1,
Type: Department Select: Cell B1,
Type: # of clicked phishing emails Select: Cell A2,
Type: Human Resources Select: Cell B2,
Type: 30 Select: Cell A3,
Type: Customer Service Select: Cell B3,
Type: 18 Select: Cell A4,
Type: Global Security Select: Cell B4,
Type: 10 Select: Cell A5,
Type: Media Relations Select: Cell B5,
Type: 40 Select: Cell A6,
Type: Professional Development Select: Cell B6,
Type: 27 Then, select: the rows and
columns containing headers, department names, and data. Click: Insert at the top of the sheet Select: Chart In the Chart editor menu,
click: Chart type drop-down menu, scroll down to the bar chart options. Then, select: the first bar chart In the Chart editor menu,
click: Customize Then, click on the: Chart & axis
titles section. Now, update the title to read something
like: Clicked phishing emails by department, or
another title related to the data. Then, Click on the: x icon at the top of
the chart editor to close the editor menu. Great job creating your
first visual security story! Creating visual stories of data allow
security team members to convey essential information to stakeholders, so issues can be communicated in
a meaningful and understandable way. These data stories can also help promote
a better understanding of issues that exist within an organization and
allow decision makers to determine how to address security issues that
put the organization at risk.
Reading: Juliana’s story: Effective communication
Reading
Throughout this course, you’ve been following the story of Juliana Soto. Juliana was recently hired as a cybersecurity analyst by Right-On-Time Payment Solutions, a payment processing company that handles sensitive customer information. In the reading about attention to detail, Juliana had to deal with two different types of security incidents, and she used her company’s escalation policy to properly escalate the two incidents. Now you will review how Juliana handled communication with stakeholders after escalating the incidents.
Communicating with stakeholders after an incident
Days after escalating the two incidents, Juliana’s manager asks her to communicate information about the incidents to stakeholders.
Communicating about incident #1
One of the incidents dealt with an employee being locked out of their account due to multiple failed login attempts. Juliana’s manager was recently asked to provide a report that reviews how many departments have experienced locked employee accounts due to failed login attempts over the last month. The security team shared data that details the number of locked employee accounts due to multiple failed login attempts from five different departments.
Juliana’s manager will report the information to the senior executives of each of the five departments. The manager asks Juliana to display the data in a way that communicates the incident clearly to these stakeholders. For this task, Juliana decides to put together a visual dashboard to represent the data because the communication is primarily focused on numbers. Her dashboard will use charts and graphs to relay important information, like the number of employees who have been locked out of their accounts in the last month. Juliana’s visual dashboard makes it easier for the high-level stakeholders to review incident #1 and determine a course of action.
Communicating about incident #2
Juliana’s manager has also been informed that the Chief Information Security Officer (CISO) wants more information about what took place during the second incident, which involved an attacker almost compromising a system that stores customers’ private data. This communication will include a more detailed report that establishes what processes and procedures worked well during attackers’ attempts to compromise the system and what processes and procedures might need to be revised. Because this is a more detailed communication, Juliana decides to put together a detailed document with timelines that clearly explain what happened. The document also includes her thoughts on what the security team, data owners, and data processors could have done differently to protect the system in question. She shares the report with her manager so they can review it.
Key takeaways
Communications for stakeholders should always be focused on what matters to them most. Some stakeholders will be more focused on the data and numbers, and other stakeholders will be more focused on how policies and procedures are working to prevent cyber attacks. Recognizing what’s important to each stakeholder will help an analyst decide what method of communication is best to use.
Practice Quiz: Test your knowledge: Communicate effectively with stakeholders
Which of the following should a security analyst do before communicating the results of a vulnerability test to stakeholders? Select three answers.
- Choose an appropriate communications medium
- Consider the nature of the information that is being communicated
- Use visual aids
A security analyst should choose an appropriate communications medium, consider the nature of the information that is being communicated, and use visual aids before communicating the results of a vulnerability test to stakeholders.
If a stakeholder fails to respond to an email in a timely manner, which communication steps are the next best options? Select two answers.
Make a phone call. Send an instant message
Sometimes an instant message or phone call can help move a situation forward. Direct communication is often better than waiting too long for an email response to a situation that needs immediate attention.
Fill in the blank: The use of _____ to tell a security story can help security analysts communicate impactful data and metrics.
visuals
The use of visuals to tell a security story can help security analysts communicate impactful data and metrics. Charts and graphs are particularly effective because they can be used to compare data points or show small parts of a larger issue.
Which software programs can be used as tools for sharing and telling a visual story about data? Select all that apply.
Apache OpenOffice. Google Sheets
Google Sheets and Apache OpenOffice are both platforms that can be used to create and share visual stories of data.
Review: Communicate effectively to influence stakeholders
Video: Wrap-up
The summary emphasizes the crucial role of effective communication with stakeholders in a security professional’s career. Key points include:
- Stakeholder roles and information sensitivity: Recognizing stakeholders’ importance in security, while emphasizing confidentiality and discretion in information sharing.
- Concise and relevant communication: Only sharing essential information that stakeholders need to know, avoiding unnecessary details.
- Effective communication strategies: Utilizing channels like emails, phone calls, and visual dashboards to engage stakeholders.
- Storytelling for impact: Presenting security issues and solutions clearly and meaningfully, like a storyteller, to gain stakeholder understanding.
- Building transferable skills: Combining technical expertise with communication skills to stand out in the field.
By understanding and implementing these strategies, security professionals can build strong relationships with stakeholders, contribute to organizational security, and advance their careers.
You’ve had an opportunity to learn about the important role stakeholders play
and different ways to communicate with them. Let’s review what we covered. We started by
defining stakeholders and their roles in
protecting an organization. We also explored the sensitive nature
of communications with stakeholders and the
importance of sharing that information with
care and confidentiality. Then, we discussed
information that needs to be communicated
to stakeholders. After all, stakeholders
are extremely busy, so we only want to share relevant information that
they need to be aware of. We ended our discussion by introducing various
communications strategies, including emails, phone
calls, and visual dashboards. Understanding who
the stakeholders are within your
organization and how to communicate with them,
will help you throughout your career as a
security professional. Be intentional about
the strategies you use to communicate. Remove unnecessary details from your communications, and be specific and precise when relaying information
to stakeholders. Stakeholders are
depending on you, as a story-teller, to tell
them the security story, or the potential issues and solutions, in a way
that makes sense. The communication strategies we discussed will
help you stand out as someone who has
a combination of technical and
transferable skills. Coming up, your instructor for the final sections of
this course, Emily, will discuss a few
ways to engage with the security
community and how to find and apply for jobs
in the security field.
Reading: Glossary terms from module 3
Terms and definitions from Course 8, Module 3
Stakeholder: An individual or a group that has an interest in any decision or activity of an organization
Visual dashboard: A way of displaying various types of data quickly in one place
Quiz: Weekly challenge 3
What is a stakeholder?
An individual or a group that has an interest in any decision or activity of an organization
Which security stakeholder helps recognize risks and manage the response to security incidents?
Risk manager
Handling the daily maintenance of security operations is the general responsibility for which security stakeholder?
Operations manager
An analyst sends an email to stakeholders about a recent security breach. While writing the email, the analyst is mindful about what they say and which stakeholders they communicate the information to. Why does the analyst take this approach?
Information that is communicated to stakeholders is sensitive.
You are alerted that a malicious actor has gained unauthorized access to one of your organization’s manufacturing applications. You need to inform the operations manager as soon as possible. What is the best way to communicate this information?
Clearly, concisely, and quickly
Which of the following options is the best way to handle the detection of malicious code in logs?
Communicate the incident to a security stakeholder
Graphs and charts can be used to create which form of stakeholder report?
Visual communications
You have recently been hired as a security analyst for an organization. You’ve been asked by a security stakeholder to provide information on how often the employees from various departments are clicking on simulated phishing emails. What action can you take to best communicate this information?
Use visuals, such as charts and graphs, to tell the security story
Fill in the blank: In the field of security, it is important to communicate _____ with care.
sensitive information
Stakeholders have many responsibilities, so they might miss an email or fail to respond promptly. If an analyst needs to reach a stakeholder right away, what might be a better option for stakeholder communication?
A phone call