• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Risk Management

CISO, boost your cybersecurity leadership with Storytelling

Learn how storytelling and war stories can improve strategic discussion and adhesion about cybersecurity matter.

Gert Van de VenbyGert Van de Ven
December 1, 2022
in Articles, Cybersecurity, Risk Management
0
CISO, boost your cybersecurity leadership with Storytelling

Even if cybersecurity is more and more discussed among organization top executives, CISO still struggle to push their agenda. Common problem are the knowledge and understanding gap between chief cybersecurity expert and the C-suite. Storytelling is a very powerful communication techniques that is mastered by marketing and influencers. CISO should embrace this techniques as their role is now less technical and more about convincing and building strong relationship inside the organization they protect.

Cybersecurity Storytelling

humans have always been innately capable of learning through storytelling, and it remains one of the most effective forms of communication. Corporate life frequently overwhelm our natural instincts with data and analysis. Our job as security leaders, however, is increasingly about producing and strengthening relationships.

To tell a tale well is an excellent way to accomplish several positive outcomes. As a result, listeners are able to recollect more details and facts, and they listen longer and more attentively. A tale can be used to dress up boring messages in an eye-catching package. It slows down thinking and establishes credibility and trust, and it can establish emotional bonds that draw people in and inspire positive thoughts and choices.

Cybersecurity tales connect problems, asks, and positive outcomes.

Turn your rationale to an emotional journey

Make certain that the audience, whether interns or board members, understands that this tale relates to them and is worthy of their attention. To do so, many narrative presentations begin with an audience interaction, such as ‘How many of you X ?’. By immediately establishing a collective concord on a crucial aspect of the story, you establish a strong foundation for your scenario.

Since decisions are based on emotions, which are inspired by tales, we should appeal to the audience’s emotions. The hero’s journey, or monomyth theory, is one option, but a down-on-his-luck character will similarly draw sympathy. Despite their seniority, listeners will be more drawn to a human narrative than a corporate one, so create characters who are relatable. The narrative structure is the same that any writer or scenarist will use in entertainment production:

  • The status quo: you depict the normal life and the context or your narrative world.
  • The catalyst: trouble arise and a disruptive event put your story in motion and push your persona to got out the comfort zone.
  • The rising action: the hero jump for trouble to solution, keeping some mystery to build the momentum.
  • Down the rabbit hole: everything seems out of control, unsolvable, the complete chaos with no shinny horizon.
  • The resolution: The persona solved the problem, and the initial status quo comes back but better, improved.
  • Lesson learned: just like at the end of children tales, key lessons are made explicit to strike your point.

9 Story Structures to Plot Your Next Novel - Bookfox

Comparison of narrative structure for cybersecurity storytelling (source).

What you want to do is describe the world as it is today in addition to how it might be, using pictures to support your point. Tie this to the characters in your story to make it seem real and relatable. It is important to emphasize how your solution will create a positive change in the world by making it clear.

The tale should portray how your solution is logical, how it addresses and combats the issues you’ve raised, and how it will result in a positive ending.

Proper time to use a cybersecurity story

CISO don’t always have a lot of time to express their point. They may also suffer from stereotype, someone that is doing virtual stuff only bound to boring automata logic. Hence, using a story is not always what is expected, and it is not a silver-bullet. You have to use it in proper time and accurate situation

Awareness, best practices and cultural change

The perfect momentum to use cybersecurity storytelling is when the CISO is facing the monstrous human factor. When you tell a story about danger and cyber-consequences, and then offer an alternative path, you can create a dominating learning opportunity—especially when you corroborate that tale with real-life examples.

People will unconsciously copy characters they can relate to. Used during awareness session, pay attention to build a story that your audience can relate with and a character that represent them.

Transmit complex situation to the senior management

According to cognitive psychologist Jerome Bruner, a fact is 22 times more likely to be remembered if it is wrapped in a story. When explaining complex problem or situation to the board or to top executives, the storytelling will make it more easy digest and remember. Using cherrypicked analogies and metaphor, you can close the knowledge gap. More importantly, you make it rememberable and explainable for your audience that will be able to assimilate and propagate your story.

Weighting on strategic decision

The purpose of employing narrative as a hook to influence business decisions is to ensure that employees across all levels of seniority can remember and relate to the rationale for change. Safeguard an initiative from diversion or defunding. Tell a story in your top-level presentation. Then describe it as a summary of why you made the decision and what it is.

If your point is memorable, you will gain supporter that will propagate your point to other stakeholder. From a cost-center manager, you will turn your role to a key pillar for any strategic decision.

Build your leadership

Leadership is about accessibility, trust and credibility. You can turn into someone that is able to explain to anyone very complex situation. To be the mirror any executive needs to reflect and take smart decision. This will build your relationship network inside and across the organization.

Awesome cybersecurity leaders concentrate on protecting and enabling enterprise priorities. Not securing computer. In order to be effective in their increasingly multifaceted role, they must have a range of capabilities and competencies. Storytelling and influence is definitely one of them.

Tags: Best PracticesCollaborationCyber StrategyexecutiveLeadershipSecurity CultureStorytellingTraining & Awareness

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}