Where Do I Point the Camera?



blog.knowbe4.comhubfssocial-suggested-imagesblog.knowbe4.comhubfsSocial Image RepositoryEvangelist Blog Social GraphicsEvangelists-Javvad Malik-1.It's October 10th, 2024, and I've just stepped out of KB4-CON EMEA, my head buzzing with insights and my notebook filled with scribbles.

I walk down the familiar streets around Liverpool Street station, I can't help but feel a sense of nostalgia - this is where my career in cybersecurity began, after all.

The conference was a whirlwind of brilliance, even with our CEO, Stu Sjouwerman, joining us virtually. From Tony Pepper's visionary keynote on human risk management to Greg Kras's roadmap reveal and Martin Kraemer's AI deep dive, it was a true cybersecurity masterclass.

But it was Geoff White, author and journalist extraordinaire, who really got my gears turning. He shared an anecdote about the Grenfell Tower tragedy that struck a chord. The media, he explained, struggled to cover the potential fire risk before the disaster because, well, how do you visually represent a risk that hasn't happened yet? "You can't just point the camera at a building and say there's a risk of a fire," he said.

And it dawned on me that this is the challenge cybersecurity professionals face every single day.

Think about it. We're constantly trying to convince people of invisible threats. Probably sounding like Chicken Little saying the sky is falling. Sure, we can point to the data, the patterns, the potential for disaster, but without something tangible to show, it often feels like we're shouting into the void.

So, what's a cybersecurity pro to do? How do we make the invisible visible? How do we paint a picture of risk that's so vivid, so compelling, that people can't help but take notice?

The answer, I believe, lies in storytelling. We need to become the directors of our own cybersecurity scripts. Instead of dry reports and technical jargon, we need to craft narratives that bring these risks to life. We need to turn data into characters, threats into plot twists, and security measures into heroic actions. Well, maybe not literally that, but you get the idea. 

Of course, we can't rely on Hollywood magic alone. We need tools that can help us translate complex data into compelling narratives. That's where tools like SmartRisk Agent and Risk Score v2 come in. They're not just about crunching numbers - they're about giving us the raw material for our stories. They help us identify the characters (high-risk users), set the scene (your organization's unique risk landscape), and plot the narrative arc (how risks evolve over time).

The next time you're struggling to convey the importance of a security measure or the urgency of a potential threat, ask yourself: "Where do I point the camera?" What's the story you're trying to tell? How can you make the invisible visible?


The world's largest library of security awareness training content is now just a click away!

In your fight against phishing and social engineering you can now deploy the best-in-class simulated phishing platform combined with the world's largest library of security awareness training content; including 1000+ interactive modules, videos, games, posters and newsletters.

You can now get access to our new ModStore Preview Portal to see our full library of security awareness content; you can browse, search by title, category, language or content topics.

ModStore01-1The ModStore Preview includes:

  • Interactive training modules
  • Videos
  • Trivia Games
  • Posters and Artwork
  • Newsletters and more!

Start Your Preview

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/training-preview



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews