When it goes well, explaining security concepts to coworkers, friends, and family is one of the best parts of being in the security industry. It helps others make more risk-aware decisions, reduces ‘inarticulate tech geek’ stereotypes, and enhances soft-skills.
Unfortunately, explanations do not always go well. Audiences need to be in the right state of mind to receive information, and even then, being overly technical or longwinded will quickly turn them into conversation captives looking for an escape route.
The following three analogies are the most powerful tools I’ve found for maintaining listener interest when explaining security concepts.
In healthcare, the most successful treatment plans are tailored to an individual’s diet, environment, genetics, and personality. Similarly, the most effective security programs are tailored to a company’s resources (diet), industry (environment), processes (genetics), and culture (personality). This makes healthcare analogies a great way to explain:
- How maintaining a healthy security program helps avoid catastrophic events
- How to approach incident/emergency response processes
- How a solution for one company may not be as effective at another company
- How security responsibilities are defined across an organization
Housing protects our privacy, possessions, and psyche. Whether owned or rented, we customize our spaces to protect our family and to address day-to-day needs as efficiently as possible. Because of this, housing is a fantastic way to describe:
- How access controls and at-rest encryption work to protect assets
- How to best prioritize security projects
- How to approach on-site vs. off-site decisions
- How security measures and adverse events impact cyber-insurance
Trains, planes, ships, and automobiles get people from point A to point B, and most of us are familiar with the various rules and laws that protect us when traveling. Similarly, a core function of IT environments is to securely move data from place to place, making it a terrific way to illustrate:
- How in-flight encryption, proxies and DLP work to protect assets
- How endpoint security measures interact with network security measures
- How tradeoffs between speed and security work for projects, data, and processes
- How some controls reduce risk, while others are little more than security theater
I’ve found the above analogies to be my most powerful tools for explaining security concepts in a broadly applicable, highly relatable, memorable, and succinct way. Weave them into your explanations to help turn former conversation captives into security champions.
Author: Rick Yocum
Rick’s independence, curiosity, and sense of humor have always driven him to explore. As a baby, exploration meant breaking out of any crib that had the audacity to try to cage him. As an adolescent, exploration meant remotely accessing classmates’ computers in order to pass notes and perpetrate pranks. But the real value of exploration is not in discovery—it’s in the application of discovered knowledge. Therefore, as an adult, Rick is passionate about helping organizations explore how technology and behavioral economics can be leveraged to reduce risk and improve operations. Rick is eternally grateful to the teachers and mentors who have allowed him to explore (and have sometimes even paid him to do it).