Clear Communication: The Missing Link in Cybersecurity Success
Dark ReadingArchived Mar 18, 2026✓ Full text saved
When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups.
Full text archived locally
✦ AI Summary· Claude Sonnet
CYBERSECURITY OPERATIONS
CYBERSECURITY CAREERS
NEWS
Clear Communication: The Missing Link in Cybersecurity Success
When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups.
Kristina Beek,Associate Editor,Dark Reading
March 17, 2026
3 Min Read
SOURCE: ARCHIVALSURVIVAL VIA ALAMY STOCK PHOTO
Time and time again in cybersecurity, effective communication is the obstacle to technical and non-technical teams being able to truly collaborate. Diverse working groups, while essential for coming up with effective cybersecurity strategies and ideas, can be brought to a standstill when communication isn't rooted in trust. At this year's RSAC Conference, husband and wife duo Rebecca Grapsy and Kevin Grapsy are set to deliver a talk on this subject. And for them, it's personal.
Technical Brilliance Doesn't Equal Clear Communication
Rebecca, a communications professional, and Kevin, with a deep technical background, have experienced firsthand the friction that can arise when technical brilliance meets the need for clear, actionable communication. Their collaboration isn't just corporate theory but a personal matter that draws from lived experiences.
"[Kevin is] one of those people who has this really unique or rare ability to talk really succinctly about technical items," says Rebecca. "There are a lot of people who are technically brilliant but aren't necessarily good at translating that."
Related:Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
With that in mind, an idea was born to share their combined expertise and knowledge and talk about the gap between technical and nontechnical teams.
For Kevin, knowing how to effectively and clearly communicate, especially with leadership, can prove to be the biggest payoff in someone's career.
"You have to be able to tell them essentials of what's happening on the factory floor," he says, referring to what it means to discuss cybersecurity problems with leadership. "They don't care about the firewall; they care about the factory floor."
Building Bridges Through Shared Goals
To meet their audience, who likely experience these workplace communication issues themselves, where they're at, the duo came up with what they refer to as "The Five Points of Friction Framework."
One of the points the pair identifies is misaligned goals. Friction comes from the separate goals of the technical team and the non-technical team.
In this situation, Rebecca says they ask everyone to find a shared North Star, meaning at least one goal that everyone can align with. This goal should be in plain language. "It shouldn't be hard to explain," she says. "I should be able to call my dad and explain it to him on the phone. It should make sense to everyone involved."
This, in turn, is what creates a joint sense of accomplishment and creates opportunities for these teams of varying backgrounds and purpose to celebrate together.
Related:White House Cyber Strategy Prioritizes Offense
Another one of the five points of friction is trust. This means setting boundaries and establishing a safe environment to communicate without opening others to risk.
This can involve setting up a baseline of expressing that people can speak openly with one another without trusted information being shared elsewhere. And within the technical or intelligence sphere, this can also mean answering with a simple "I don't know," which, according to Kevin, is a perfectly valid answer.
Ultimately the purpose of sharing these likely sticking points is to show people how they can address friction in their own careers to build trust and communication with different stakeholders and their own teams. And effectively communicating and overcoming this friction can further a career, protect an organization, and ensure technical work continues to have lasting impact.
"When you can't translate those really cool technical ideas, or that technical knowledge to the people who are making decisions, to leadership, to the boardroom, it can kind of get lost," says Rachel. "And that's what we’re trying to avoid here. We're trying to build a bridge."
RSAC Conference
MAR 23, 2026 TO MAR 26, 2026
Join thousands of your peers at RSAC™ 2026 Conference in San Francisco from March 23–26. Discover new strategies, explore bold technologies, and connect with peers who share your challenges and ambitions. Don’t just attend the Conference—be part of the community that defines what’s next.
SECURE YOUR SPOT
About the Author
Kristina Beek
Associate Editor, Dark Reading
Kristina Beek is an associate editor at Dark Reading, where she covers a wide range of cybersecurity topics and spearheads video-related content. She is the creator and host of the Heard It From a CISO video series, where she interviews CISOs, directors, and other industry strategists to provide insights into the ever-evolving cybersecurity landscape. In addition to her editorial work, Kristina manages Dark Reading's social media channels and contributes to the platform's video coverage.
Kristina graduated from North Carolina State University in 2021 with a degree in Political Science, concentrating in law and justice, and a minor in English. During her time at NC State, she honed her writing skills by contributing opinion pieces to the university's newspaper. After graduation, she began her career as a content editor before joining Dark Reading.
Currently based in Washington, DC, you can find Kristina reading, taking walks in Georgetown, and wandering the museums surrounding the National Mall.
More Insights
Industry Reports
Frost Radar™: Non-human Identity Solutions
2026 CISO AI Risk Report
Cybersecurity Forecast 2026
The ROI of AI in Security
ThreatLabz 2025 Ransomware Report
Access More Research
Webinars
Building a Robust SOC in a Post-AI World
Retail Security: Protecting Customer Data and Payment Systems
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
Securing Remote and Hybrid Work Forecast: Beyond the VPN
AI-Powered Threat Detection: Beyond Traditional Security Models
More Webinars
You May Also Like
CYBERSECURITY OPERATIONS
County Pays $600K to Wrongfully Jailed Pen Testers
by Nate Nelson, Contributing Writer
FEB 02, 2026
CYBERSECURITY OPERATIONS
Women Who 'Hacked the Status Quo' Aim to Inspire Security Careers
by Elizabeth Montalbano, Contributing Writer
JUL 16, 2025
CYBERATTACKS & DATA BREACHES
DeepSeek Breach Opens Floodgates to Dark Web
by Emma Zaballos
APR 22, 2025
CYBERSECURITY OPERATIONS
Dogged by Trump, Chris Krebs Resigns From SentinelOne
by Nate Nelson, Contributing Writer
APR 17, 2025
Editor's Choice
CYBERSECURITY OPERATIONS
Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
byJai Vijayan
MAR 12, 2026
5 MIN READ
CYBER RISK
What Orgs Can Learn From Olympics, World Cup IR Plans
byTara Seals
MAR 12, 2026
THREAT INTELLIGENCE
Commercial Spyware Opponents Fear US Policy Shifting
byRob Wright
MAR 12, 2026
9 MIN READ
Want more Dark Reading stories in your Google search results?
2026 Security Trends & Outlooks
THREAT INTELLIGENCE
Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats
JAN 2, 2026
CYBER RISK
Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult
JAN 12, 2026
ENDPOINT SECURITY
CISOs Face a Tighter Insurance Market in 2026
JAN 5, 2026
THREAT INTELLIGENCE
2026: The Year Agentic AI Becomes the Attack-Surface Poster Child
JAN 30, 2026
Download the Collection
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
SUBSCRIBE
Webinars
Building a Robust SOC in a Post-AI World
THURS, MARCH 19, 2026 AT 1PM EST
Retail Security: Protecting Customer Data and Payment Systems
THURS, APRIL 2, 2026 AT 1PM EST
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
WED, APRIL 1, 2026 AT 1PM EST
Securing Remote and Hybrid Work Forecast: Beyond the VPN
TUES, MARCH 10, 2026 AT 1PM EST
AI-Powered Threat Detection: Beyond Traditional Security Models
WED, MARCH 25, 2026 AT 1PM EST
More Webinars
White Papers
Autonomous Pentesting at Machine Speed, Without False Positives
Fixing Organizations' Identity Security Posture
Best practices for incident response planning
Industry Report: AI, SOC, and Modernizing Cybersecurity
The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks.
Explore More White Papers
GISEC GLOBAL 2026
GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills.
📌 BOOK YOUR SPACE