cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... source: verizon’s...
TRANSCRIPT
![Page 1: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/1.jpg)
Cybersecurity Now it’s a people’s business
![Page 2: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/2.jpg)
What’s the market like
![Page 3: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/3.jpg)
It’s human nature to fear the unknown. And today that fear is more valid than ever before.
1. Fear of the unknown
![Page 4: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/4.jpg)
Technology drives innovation, and some people exploit the opportunities this provides.
1. Fear of the unknown
![Page 5: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/5.jpg)
As the relationship between technology and industry deepens, security threats increasingly influence and impact everyday lives.
2. Everyone is affected
![Page 6: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/6.jpg)
2. Everyone is affected
It’s an issue faced by everyone. Governments Companies Communities Individuals
![Page 7: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/7.jpg)
There’s a tendency within the industry to make grandiose claims, but these overstatements are not credible or useful.
3. Exploiting fear and saving the day
![Page 8: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/8.jpg)
They’re unprovable and undifferentiated.
3. Exploiting fear and saving the day
“Making the world a safer and better place”
“We are here to save the world”
![Page 9: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/9.jpg)
It’s important to understand the reality of cybersecurity threats, and how these impact businesses and jobs. But how should you do this without throwing fuel on the fire?
![Page 10: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/10.jpg)
There is an opportunity to foster an environment that’s not fear-driven. To stand out by being positive, credible and personal.
![Page 11: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/11.jpg)
Where to start?
![Page 12: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/12.jpg)
Understand your audience, and understand the threat.
![Page 13: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/13.jpg)
Understand the threat
![Page 14: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/14.jpg)
We often forget that hackers are people
The threat
![Page 15: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/15.jpg)
Hackers exploit predictable human nature: • 95% of breaches fall within the
same nine types of attacks Hackers are driven by human motivations: • 89% of attacks have a financial
or espionage motive
The threat
Source: Verizon’s Data Breach Investigations Report 2016
![Page 16: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/16.jpg)
Understand your audience
![Page 17: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/17.jpg)
Businesses face tough security challenges, and therefore seek partners that understand and respond to their specific needs.
Your audience
![Page 18: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/18.jpg)
74% of small organisations reported a security breach in the last year
Source: Deloitte Labs
Your audience: SMEs need protection
![Page 19: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/19.jpg)
Your audience: Businesses need trust
In 2015, 44.5% of hackers are malicious insiders – compared to 31.5% in 2014
Source: IBM 2016 Cyber Security Intelligence Index
![Page 20: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/20.jpg)
The number one cause of security incidents is ‘miscellaneous errors’ from people inside an organisation Source: Verizon 2016 Data Breach Investigations Report
Your audience: Employees need education
![Page 21: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/21.jpg)
78% of CISO spend time with business leaders who think cyber risk is a technical problem or a compliance exercise Source: Deloitte Labs
Your audience: CISOs need support
![Page 22: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/22.jpg)
So how can cybersecurity firms – particularly small or new ones -
humanise themselves?
![Page 23: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/23.jpg)
What to do Three steps to building a deeper connection with your audience
![Page 24: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/24.jpg)
1. Be positive There are too many scaremongers around. Stand apart by being supportive and constructive.
![Page 25: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/25.jpg)
Make your brand synonymous with trust and reassurance
1. Be positive
![Page 26: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/26.jpg)
2. Be credible In a market of extravagant promises, a little understated confidence goes a long way.
![Page 27: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/27.jpg)
“You can’t stop risk; you can only hope to contain it” - Gartner
2. Be credible
![Page 28: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/28.jpg)
3. Be personal Cybercrime affects everyone. It doesn’t care who people are. But you should. Show you understand people’s concerns and needs.
![Page 29: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/29.jpg)
Provide relatable, considered solutions, not a one-size-fits-all
3. Be personal
![Page 30: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/30.jpg)
How to do it
![Page 31: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/31.jpg)
You need to define what makes you different. Your truth is the core of who you are and the foundation of everything you do. And we’re here to help you uncover it. bbpagency.com
Relevant brand experience:
![Page 32: Cybersecurity - bbpagency.com€¦ · of cybersecurity threats, and how ... Source: Verizon’s Data Breach Investigations Report 2016 . Understand your audience. Businesses face](https://reader034.vdocuments.mx/reader034/viewer/2022052518/5f03c4ce7e708231d40aad6e/html5/thumbnails/32.jpg)
If you require further information, please contact:
Peter Brocklebank E [email protected]
M +44 (0) 7980 893 444 T +44 (0) 20 3137 7034
Unit 101, Clerkenwell Workshops
27-31 Clerkenwell Close London, EC1R 0AT