Veteran CISO Jeffrey Brown shares a practical security communications playbook - BLUF, metrics with a job, and a non-judgmental report-button culture that changes behavior.
Security leaders don’t need more slides - they need messages that move budgets, influence behavior, and reduce risk.
In this episode, host Eliot Baker sits down with CISO and author Jeffrey Brown to unpack a practical security communications playbook: metrics with a job, and how to build a report-button culture without blame.
What you’ll learn in this episode:
Timestamps:
Resources:
Host links:
In this episode of All Things Human Risk Management, host Eliot Baker sits down with veteran CISO and author Jeffrey W. Brown to unpack a practical playbook for communicating security so it actually influences behavior, budgets, and board decisions.
Security is a business issue and CISOs must communicate across every audience - from admins to the board. Keep messages at the right altitude for who’s in the room.
“Connect at the level your audience needs - resist the tech deep-dive.”
Lead with the decision/request, then the why. BLUF shortens exec conversations and speeds outcomes.
“Put the bottom line up front - sometimes that’s all they need.”
Boards understand risk - credit, market, operational. Frame cyber as operational risk with concrete impact (e.g., dollars per minute if a claims system is down).
“Translate ‘patch CVE’ into ‘avoid fines and downtime in system X.’”
Use simple metaphors to explain layered controls (brakes = prevention, airbags = mitigation, recalls = incident response). It’s memorable and non-technical.
“Metaphors make security relatable and sticky.”
Psychological safety beats punishment. Reward the right behavior and make reporting a social norm (even trophies or recognition).
“Job well done isn’t deleting the phish - it’s reporting it.”
Design communications that build a report-button habit and close the loop fast with user feedback on real threats.
“Reinforce the behavior in the moment it happens.”
Send messages that match actual risks (tie to IR data) and repeat core points 7-14 times to make them stick.
“Simple, repeatable, relevant beats one big October blast.”
Use visuals and concise language; mix depth for mixed audiences but avoid unnecessary detail.
“Right message, right medium, right amount.”
Close the loop with short surveys and qualitative input; perception is reality, use it to refine.
“Bad feedback beats no feedback - iterate the message.”
Have a tested IR plan, speak only to facts, and avoid speculation under pressure.
“Tabletop before the breach; in the breach, stick to verifiable facts.”
Ditch vanity counts (“5B blocks”). Give each metric a purpose: tell progress, drive behavior, or inform a decision - paired with a narrative.
“If you can’t answer ‘so what?,’ it’s the wrong metric or the wrong story.”
Drastically improve your security awareness & phishing training metrics while automating the training lifecycle.