CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Mar 18, 2026

Clear Communication: The Missing Link in Cybersecurity Success

Dark Reading Archived Mar 18, 2026 ✓ Full text saved

When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups.

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBERSECURITY OPERATIONS CYBERSECURITY CAREERS NEWS Clear Communication: The Missing Link in Cybersecurity Success When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups. Kristina Beek,Associate Editor,Dark Reading March 17, 2026 3 Min Read SOURCE: ARCHIVALSURVIVAL VIA ALAMY STOCK PHOTO Time and time again in cybersecurity, effective communication is the obstacle to technical and non-technical teams being able to truly collaborate. Diverse working groups, while essential for coming up with effective cybersecurity strategies and ideas, can be brought to a standstill when communication isn't rooted in trust. At this year's RSAC Conference, husband and wife duo Rebecca Grapsy and Kevin Grapsy are set to deliver a talk on this subject. And for them, it's personal. Technical Brilliance Doesn't Equal Clear Communication Rebecca, a communications professional, and Kevin, with a deep technical background, have experienced firsthand the friction that can arise when technical brilliance meets the need for clear, actionable communication. Their collaboration isn't just corporate theory but a personal matter that draws from lived experiences. "[Kevin is] one of those people who has this really unique or rare ability to talk really succinctly about technical items," says Rebecca. "There are a lot of people who are technically brilliant but aren't necessarily good at translating that." Related:Why Stryker's Outage Is a Disaster Recovery Wake-Up Call With that in mind, an idea was born to share their combined expertise and knowledge and talk about the gap between technical and nontechnical teams. For Kevin, knowing how to effectively and clearly communicate, especially with leadership, can prove to be the biggest payoff in someone's career. "You have to be able to tell them essentials of what's happening on the factory floor," he says, referring to what it means to discuss cybersecurity problems with leadership. "They don't care about the firewall; they care about the factory floor." Building Bridges Through Shared Goals To meet their audience, who likely experience these workplace communication issues themselves, where they're at, the duo came up with what they refer to as "The Five Points of Friction Framework." One of the points the pair identifies is misaligned goals. Friction comes from the separate goals of the technical team and the non-technical team. In this situation, Rebecca says they ask everyone to find a shared North Star, meaning at least one goal that everyone can align with. This goal should be in plain language. "It shouldn't be hard to explain," she says. "I should be able to call my dad and explain it to him on the phone. It should make sense to everyone involved." This, in turn, is what creates a joint sense of accomplishment and creates opportunities for these teams of varying backgrounds and purpose to celebrate together. Related:White House Cyber Strategy Prioritizes Offense Another one of the five points of friction is trust. This means setting boundaries and establishing a safe environment to communicate without opening others to risk. This can involve setting up a baseline of expressing that people can speak openly with one another without trusted information being shared elsewhere. And within the technical or intelligence sphere, this can also mean answering with a simple "I don't know," which, according to Kevin, is a perfectly valid answer. Ultimately the purpose of sharing these likely sticking points is to show people how they can address friction in their own careers to build trust and communication with different stakeholders and their own teams. And effectively communicating and overcoming this friction can further a career, protect an organization, and ensure technical work continues to have lasting impact. "When you can't translate those really cool technical ideas, or that technical knowledge to the people who are making decisions, to leadership, to the boardroom, it can kind of get lost," says Rachel. "And that's what we’re trying to avoid here. We're trying to build a bridge." RSAC Conference MAR 23, 2026 TO MAR 26, 2026 Join thousands of your peers at RSAC™ 2026 Conference in San Francisco from March 23–26. Discover new strategies, explore bold technologies, and connect with peers who share your challenges and ambitions. Don’t just attend the Conference—be part of the community that defines what’s next. SECURE YOUR SPOT About the Author Kristina Beek Associate Editor, Dark Reading Kristina Beek is an associate editor at Dark Reading, where she covers a wide range of cybersecurity topics and spearheads video-related content. She is the creator and host of the Heard It From a CISO video series, where she interviews CISOs, directors, and other industry strategists to provide insights into the ever-evolving cybersecurity landscape. In addition to her editorial work, Kristina manages Dark Reading's social media channels and contributes to the platform's video coverage. Kristina graduated from North Carolina State University in 2021 with a degree in Political Science, concentrating in law and justice, and a minor in English. During her time at NC State, she honed her writing skills by contributing opinion pieces to the university's newspaper. After graduation, she began her career as a content editor before joining Dark Reading. Currently based in Washington, DC, you can find Kristina reading, taking walks in Georgetown, and wandering the museums surrounding the National Mall. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Cybersecurity Forecast 2026 The ROI of AI in Security ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like CYBERSECURITY OPERATIONS County Pays $600K to Wrongfully Jailed Pen Testers by Nate Nelson, Contributing Writer FEB 02, 2026 CYBERSECURITY OPERATIONS Women Who 'Hacked the Status Quo' Aim to Inspire Security Careers by Elizabeth Montalbano, Contributing Writer JUL 16, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 CYBERSECURITY OPERATIONS Dogged by Trump, Chris Krebs Resigns From SentinelOne by Nate Nelson, Contributing Writer APR 17, 2025 Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ CYBER RISK What Orgs Can Learn From Olympics, World Cup IR Plans byTara Seals MAR 12, 2026 THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Mar 18, 2026
    Archived
    Mar 18, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗