Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Now is the time to prioritize your organization’s security communications strategy

By Dana Simberkoff
communications-freepik1170x658.jpg

Image via Freepik

December 14, 2022

In the wake of major attacks like SolarWinds and Codecov, it is clear that prioritizing security across your entire organization has never been more critical and that all eyes are on security teams to ramp up measures to protect sensitive data. Without a doubt, we are living in a data-driven society of globalizing economies, constant data transfer and ubiquitous access to everything from everywhere.


Data is like water — it is rising all around us and flows not only through our organizations, but between both companies and vendors, as well as consumers and their devices. In today’s hybrid work environment, data is continuously flowing and widely shared, causing supply chain weaknesses to become an increasing liability to organizations. 


To bolster the success of your organization’s security strategy, devising a detailed communications plan will improve the way information is shared internally and externally, foster trust with your customers, and help your team stay ahead of evolving threats. With this, I’ve outlined considerations to keep in mind when devising a successful communications strategy that underpins your organization’s security practices and reaches key stakeholders where they are.  

 

Start from the Inside Out — Assess Your Current Systems from Top to Bottom 

First, it is essential to take stock of current systems and security measures. Because an organization is made up of people, you need to start by ensuring that collaboration and shared data is secured. For employees working from home, and with bring your own device (BYOD) policies, identity is the new perimeter. You must remove assumptions and remember that employees and the people we know may be our weakest links, even if unintentionally. 


For example, implementing a zero trust architecture provides an opportunity to mitigate some of the risk of lateral movements and cross-supply chain issues. When you gain deeper insight into current security measures and where vulnerabilities may lie, your team can better define external messaging to stay one step ahead of potential threats.  

 

Ignorance is not Bliss in Security 

Next, it’s critical to establish a clear vulnerability reporting policy for your customers, to communicate associated risks and protocols in case of an exploitable vulnerability that must be addressed. Providing proactive communications that assess and report your platform’s vulnerabilities creates transparency with your customer community and helps establish a higher level of information security. Giving customers straightforward guidelines to report security vulnerabilities not only helps identify and track areas of risk, but also furthers your organization’s commitment to security for customers. 


Outside of content that communicates policies or responds to threats, it’s important to weave in content that touches on best practices and relevant security topics. Whether this comes in the form of blog posts, podcasts, or whitepapers — producing original content to have your organization’s message heard is key to supporting your overarching communications strategy. 

 

Establish Trust with Public Sector Customers 

When designing a communications strategy, it’s critical to consider both customer and external stakeholder needs. To inspire trust and confidence, make sure your organization is meeting contractual, regulatory and statutory obligations. As a software vendor, prioritizing certifications like FedRAMP, ISO, CSA, and SOC II provide third-party reviews that demonstrate commitment to your security practice. Although they are rigorous processes, these authorizations establish confidence in your solutions and ensure that they are up-to-speed when it comes to meeting more stringent federal standards. 


Additionally, in the wake of President Biden’s executive order, your organization should consider developing a Software Bill of Materials (SBOM). Including this as part of your communications strategy not only helps prevent the destructive consequences of undetected vulnerabilities, supply chain and data loss, but also goes one step further in ensuring that your solutions are secure and compliant for the public sector. 


With cyber threats and intelligent hackers evolving every day, now is the time to improve how your organization interacts with your customer community and stakeholders surrounding these issues. With the average data breach costing an organization around $4.35 Million in 2022, these threats are not only detrimental to customers’ sensitive data but can cost your organization its reputation.


Moving forward, shaping up your security communications strategy not only helps control how key information is shared, but establishes critical trust with customers amidst a challenging security landscape. Not sure where to begin when it comes to building an external communication strategy? Your team can start by ensuring that content and messaging abides by the “three C’s” of communications — clear, concise and consistent. Proactively establishing digestible and cohesive messaging that is carried throughout your content ensures that key ideas are heard loud and clear. 


As external stakeholders demand more information and insight into your organization’s security practices and protocols, a comprehensive security communications strategy must be implemented. Devising a detailed communications plan will improve how information is shared, foster trust with your customers, and help your team stay ahead of evolving threats. 

KEYWORDS: cyber security information security risk management security communications

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dana Simberkoff is Chief Risk, Privacy and Information Security Officer at AvePoint.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • employee at computer

    Now is the time to prioritize cybersecurity

    See More
  • physical security technology systems migration to the cloud

    Now is the time to move your physical security to the cloud

    See More
  • data-security-freepik1170.jpg

    Data security is critical to your organization’s reputation strategy

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • January 14, 2026

    Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

    The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing