Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

7 trends shaping cybersecurity communications in 2022

As cybersecurity communications evolve, so does the threat landscape

By Ted Birkhahn
communications-freepik1170x658.jpg

Image via Freepik

January 20, 2022

As high-profile cyberattacks continue with increasing frequency, one of the biggest challenges facing cybersecurity communications professionals in the next year is the speed at which companies will be forced to respond during a cyberattack. There has been a rapid acceleration of media coverage and public panic in response to the latest high-profile attacks, which will place increased pressure on communications teams to prepare, gather information and orchestrate a meaningful response without exacerbating the crisis at hand.


It’s no longer sufficient for communications professionals to simply monitor social media for keywords and hashtags or rely on law enforcement agencies for official statements. The responsibility of responding with information has shifted from external communicators to internal crisis managers and their teams. This shift has been happening over the past three years, but it will continue to accelerate in the next few years as we see more cyberattacks that cause widespread disruption within a community or industry.


All eyes are on communications professionals as they coordinate their teams to craft content that is transparent and accurate while also addressing the interests and privacy concerns of consumers, employees, shareholders and business partners. They must also help shape the organization’s message so that it resonates with a variety of people using different channels — and all within seconds.

As threats like ransomware become more sophisticated, communications experts need to anticipate the ways these threats will evolve — and prepare for them accordingly. 


Here are seven predictions on what we will see in cyber communications in 2022: 


  1. The best communications offense is a good defense: The proliferation of devices and channels — from mobile to voice, video, email and social media — has made customers more demanding in the way they want to be communicated with, and threat actors are using these same channels to monitor and possibly engage with customers. In 2022, communications teams will consider how to use communications tools, including social media, to gain insights into the motives, methods and vulnerabilities of threat actors, so they can better defend their organizations against them. 
  2. Communications could be weaponized, and threat actors will be more brazen: We’ll see more communications leaks than ever before in the year ahead. Cyber communications leaders must act as if all communications to employees will be read by threat actors, and assume that threat actors will communicate directly with customers and other stakeholders in an effort to undermine the company’s position and further damage its reputation.
  3. Companies will invest in communications channel redundancy: Competitive pressures will drive companies to invest in redundancy, including backup communications tools and platforms that arm their teams with the ability to communicate when their primary platforms, such as email or instant messaging, are down during a cyberattack.
  4. Communications teams may be caught in the middle: Negotiations with threat actors will weigh heavily on communications teams, who will be torn between their conflicting responsibilities to be as transparent as possible with stakeholders while still managing their responsibility to protect the company’s reputation. In every cyberattack situation, communications leaders will need to be prepared to counsel the company C-suite on the pros and cons of paying ransoms, how to communicate news of the attack to key stakeholders and the public, and how to report details to law enforcement as needed.
  5. Cyber communications planning could become a requirement: Expect new regulations around communications management because cybersecurity incidents have become such a significant economic detriment both quantitatively and qualitatively. New requirements may focus on incident management processes, communication plans, metrics, documentation and reporting processes, and allocation of internal resources (including both personnel and budget).
  6. Cyber communications will become integrated: Truly effective cybersecurity communications programs will be integrated into an organization’s public relations plan as part of a broader approach to risk management and crisis communication. At present, cybersecurity communications is not yet widely accepted as a practice or discipline for many organizations, but that will change as demonstrated need increases and legal requirements emerge.
  7. Cyber communications will become a team sport: In 2022, we can expect more open communication surrounding cybersecurity, and increased collaboration between different communications operators and vendors. Users will increasingly demand greater use of digital tools for remote work, shopping, streaming and learning, which will increase their exposure to cyber threats, but will also create more opportunities to educate them about how to protect themselves from data breaches. Companies will spend more time educating networks of employees, customers and vendors on cybersecurity preparedness, and chief information officers will share post-breach information and playbooks with each other more readily, all in an effort to combat future attacks.


Cybersecurity is no longer just a technology issue; communications now play a central role in preparing for and responding to cyberattacks. As more companies face the reality that these events are inevitable, we expect more investment and attention to be paid to the communications function and its preparedness to respond to future breaches. It’s up to communicators now to make sure we’re ready for it.

KEYWORDS: communications security cyber security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ted Birkhahn is President of HPL Cyber, a brand, marketing and communications firm that specializes in helping cybersecurity companies grow.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security-officer-freepik1170x658x5.jpg

    7 trends that will impact the security and identity industry in 2022

    See More
  • artificial intelligence

    Three top-of-mind cybersecurity trends in 2022

    See More
  • c-suite-freepik-security.jpg

    Toss your standard crisis communications plan for cyberattacks. Five questions to ensure your company’s preparedness

    See More

Related Products

See More Products
  • Physical Layer Security in Wireless Communications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing