Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementCybersecurity News

Using Marketing Techniques to Accelerate Cyber Progress

By Matthew Doan
cyber meeting
July 2, 2019

To ensure security programs produce maximum impact and gain support from enterprise stakeholders, cyber leaders should adopt proven marketing methods.

For most organizations, putting great cybersecurity in place requires a massive uphill trek. Many forms of change are required – technology, process, talent, and more. Here, cyber leaders focus inward, working to get capabilities in place and reduce identified risks. But fundamentally, you need externally-driven change too, where other enterprise leaders (and key partners outside of your business) believe in the cyber mission so deeply that they can’t live without it. Since cybersecurity can’t be successful in a vacuum, these external people are necessarily your adopters, your supporters, your financiers, and your potential enemies. If we want to get them “on board” and affect meaningful change for the business and beyond, cybersecurity organizations require a new capability that you won’t find in today’s leading standards and frameworks: cyber marketing.

Simply said, as a cyber leader, you have customers and you’re here to solve their problems. Marketing greatly enables this. Engaging your customer base requires patience, perseverance and empathy. You’re working to build trust with them, as it's essential to your success. This goes well beyond internal communications. Through targeted marketing, you’ll knock down walls that currently prevent you from delivering the best possible cybersecurity. As you build trust, you’ll see the all-too-prevalent “us and them” mentality fade away. In fact, it’s just “us” – you’re in it together.

What Cyber Marketing Does for You

Forget marketing in the typical advertising sense; we’re not living in a Mad Men-esque era, working to subconsciously trick people into wanting things that they don’t need. No, marketing for cybersecurity is genuine and important, and message tailoring is vital. To CEOs and board members, they’ll sit up straight when you talk to them about long-term business health. A CFO wants to improve return on investment. Product development and manufacturing leaders will feel comforted knowing that cyber incidents won’t knock their plans off course. And supply chain and customer service personnel will sleep better knowing they can securely work with third parties in the sprawling, interconnected business ecosystem.

Cyber marketing is highly-concentrated and honed for the purposes of making your ideas for cybersecurity spread amongst your exact target audience. You’re saying, “trust us to help make your lives better.” People want that. A sincere, targeted and empathetic approach will get you there.

Your strategy needs to be expertly-nuanced for the specific people you seek to influence, and your storytelling needs to be persistent, consistent, and incentive-laden. Your job is to earn their trust, attention, and action. Through this form of expert marketing, they’ll deeply desire the value you can deliver to them, and in turn, they’ll feel it’s worth their time and resources to put skin in the game with you. This is how great culture develops. And as Seth Godin says in This is Marketing: “culture beats strategy…so much that culture is strategy.”  Cybersecurity is a “team of teams” sport, and you’ll need a well-tuned marketing capability to get all the right players on the field and in sync.

What cyber marketing is not: blasting blanket messages to the masses. It’s not about computer-based training and “be secure” posters – that serves a different purpose, often focused on end user behaviors. Especially in today’s highly-fragmented and super-niche world, you need to enrapture your most key stakeholders (e.g., board members and c-suite executives) by first understanding them and then making calculated offers. There’s no easy button; it takes hard work.

How to Do It

Just like in traditional marketing, in cyber marketing, ideas that spread, win. You’re working to gain trust, attention and action amongst a small set of important individuals that will cascade to massive progress.

To generate proper returns, cyber marketing must be installed as an enduring capability within the security program. It’s not about a one-time or one-way messaging campaign. It’s bigger and more important than that. Here’s how a cyber marketing capability can materialize and work:

  1. Blend atypical talent into your program. We’re getting better as a community at injecting diversity into security efforts. In this case, bringing in professionals with marketing, communications, organizational psychology, or cultural anthropology backgrounds can ignite the spark you need to creatively jumpstart your cyber marketing capability. Have them map and analyze stakeholders across the business ecosystem and devise an initial engagement approach for the smallest viable audience – start with those that really matter. Get them comfortable with “owning” the long-term marketing capability for the program.
  2. Seek out and empathize with your unique customers. Once you know who really matters, get to know them. You can work this inside-out or outside-in. The former is simple: meet for coffee (or through another informal way) with your target audience and get them talking. Listen deeply. Understand their pressures, targets, insecurities, and desires. Be human with them; feel what it’s like to be in their shoes and create a sincere connection. To complement this approach, conduct outside-in analysis. Human-centered design approaches and journey mapping are example ways that you can understand your customers. Emulate user experience (UX) design processes and develop a rich understanding of individual customers, keeping the total number of personas under ten. From there, pull back and elevate to connect the dots among customers. What commonalities and intersections are you seeing? This gives you important inputs for tweaking security capability (e.g., more flexibility in the cloud) based on your stakeholder needs and it gives you the fuel for developing nuanced marketing messages regarding the promise you’re offering.
  3. Crystalize your idea of “better”. Now that you understand your audience, it’s time to align that with your cyber strategy. You might have a data-centric security philosophy, or a viewpoint on robust security for DevOps. Keep that to yourself – at least the pieces that matter only to you. Your external audience isn’t so interested in that. Instead, your task is to translate the relevant aspects of your strategy into appealing messages that pull in your customer base. You want them gravitating toward you, so establish messages that articulate your promise of a better world, where security is seamlessly infused across the business and everyone is better off for it. Mostly importantly, highlight specific benefits that will uniquely appeal to each of your target audiences, and use their language. Appeal to hearts and minds in a way they’d never expect from a cyber professional.
  4. Show up regularly and put in the emotional work. Once you’ve ramped up, you can start to engage and make subtle (indirect) asks. Talk to each customer, sharing tailored stories of your promise for a better, more cyber-secure future. Using their lingo and priorities as a guide, engage them (and their teams) to obtain feedback on your strategy. Bring to life the vision of how everyone is better off and get them excited. As you build relationships, your customers will offer help. Remember, you absolutely need them. Once the bond is mature, and the walls crumble to the ground, you can gently reveal how they can participate in the success (resources, process changes, etc.). Understand: you must earn this right. Your strategy and stories need to map to the value system, hopes, wants, and dreams of your customers.
  5. Measure progress. Everything is measurable. Since you’re developing a cyber marketing capability, you’ll want to understand the delta between where you are and where you want to be. Clearly describe your aspirational state. Develop metrics and source measures that tell you how mature your capability is, and most importantly, how well it’s performing in shaping the beliefs and actions of your target audience. Drive towards understanding return on investment (ROI) and be proud in communicating what you’re doing upward.

The human-to-human nature of good cybersecurity isn’t going away anytime soon. Our need for deep connection, empathy and comradery is now more important than ever. It might not seem like it, but your customers are waiting for you; hoping that you’ll deliver something awesome. Something that’ll excite them and instill calmness. To unify, accelerate, and force-multiply your security efforts, investing in great cyber marketing is a strong choice.

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

 

KEYWORDS: cyber incident cybersecurity marketing return on security investment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Matthew doan

Matthew Doan (@MDecoder1) is a cyber and digital strategist at BCG Platinion, where he consults to top companies across the world. He’s also a Cybersecurity Policy Fellow at New America. His passion is for solving problems at the intersection of technology and human dynamics.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • digital-cyber

    Orchestrating Cybersecurity Across the Business Ecosystem

    See More
  • Target to Accelerate Chip-Enabled Smart Card Program

    See More
  • Cybersecurity Leadership Images

    Five Typical Cyber Attack Techniques Used Against Business Travelers

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing