course 8 – PUT IT TO WORK: PREPARE FOR CYBERSECURITY JOBS

Module 3: Communicate Effectively to Influence Stakeholders 

GOOGLE ADVANCED DATA ANALYTICS PROFESSIONAL CERTIFICATE

Complete Coursera Study Guide

INTRODUCTION – Communicate Effectively to Influence Stakeholders

In this comprehensive overview, participants will delve into the intricacies of stakeholder engagement in the realm of cybersecurity. The module initiates an exploration of key stakeholders, identifying their crucial roles in the cybersecurity landscape. Learners will gain insights into the diverse stakeholders involved in incident response and management, understanding their distinct interests, concerns, and contributions.

As the module progresses, participants will actively cultivate the essential skill of crafting clear and concise communications tailored to various stakeholders. Emphasis will be placed on effective communication strategies that enable cybersecurity professionals to convey complex information in an accessible manner. By the conclusion of this segment, learners will have honed their ability to engage with stakeholders, fostering transparent and productive communication that enhances the overall effectiveness of cybersecurity initiatives.

Learning Objectives

  • Define stakeholders and describe their security roles.
  • Communicate sensitive information with care and confidentiality.
  • Determine the information that needs to be communicated to stakeholders.
  • Examine how to create a dashboard to communicate essential information to stakeholders.

TEST YOUR KNOWLEDGE: COMMUNICATE FOR IMPACT

1. Which of the following are stakeholder communication best practices? Select all that apply.

  • They should be urgent in order to gain the stakeholders’ attention.
  • They should be precise (CORRECT)
  • They should have a clear purpose (CORRECT)
  • They should avoid unnecessary jargon (CORRECT)

Communications with stakeholders should be precise, avoid unnecessary technical terms, and have a clear purpose.

2. Fill in the blank: Information that is communicated to stakeholders is _____.

  • classified
  • trivial
  • public knowledge
  • sensitive (CORRECT)

Information that is communicated to stakeholders is sensitive. It is important to be cautious when exchanging emails with stakeholders. Always make sure you are sending emails to the correct address.

3. What actions can a security analyst take to learn what matters to the stakeholders they communicate with?

  • Send emails to the same stakeholder throughout the day to learn which email the stakeholder responds to.
  • Wait for the stakeholders to provide information about what matters to them.
  • Ask stakeholders questions about the data and assets they are responsible for protecting. (CORRECT)
  • Reach out to the stakeholders’ immediate supervisor for better clarity on the needs of the stakeholders.

Asking stakeholders questions about the data and assets they are responsible for protecting is a great way to learn what matters most to them. Directly asking the stakeholders what data and assets they are responsible for protecting gives more personal insight into their technological needs and prompts a more immediate response from them.

4. Fill in the blank: Graphs, charts, videos, and dashboards are examples of _____ communications that are created to provide and compare important data and metrics with stakeholders.

  • cybersecurity
  • audio
  • technical
  • visual (CORRECT)

Graphs, charts, videos, and dashboards are examples of visual communications. Visual communications are helpful in situations where various numbers and data sets are being compared or reviewed.

5. Which of the following are concise, effective communication methods for conveying key details to stakeholders? Select two answers.

  • An email (CORRECT)
  • A visual presentation (CORRECT)
  • A written data report
  • Hand-written notes

Visual presentations and emails can be used to effectively convey key details to stakeholders.

TEST YOUR KNOWLEDGE: COMMUNICATE EFFECTIVELY WITH STAKEHOLDERS

1. Which of the following should a security analyst do before communicating the results of a vulnerability test to stakeholders? Select three answers.

  • Use visual aids (CORRECT)
  • Choose an appropriate communications medium (CORRECT)
  • Use highly technical details
  • Consider the nature of the information that is being communicated (CORRECT)

A security analyst should choose an appropriate communications medium, consider the nature of the information that is being communicated, and use visual aids before communicating the results of a vulnerability test to stakeholders.

2. If a stakeholder fails to respond to an email in a timely manner, which communication steps are the next best options? Select two answers.

  • Send an instant message (CORRECT)
  • Complain to human resources (HR)
  • Make a phone call (CORRECT)
  • Report to the organization’s Chief Information Security Officer (CISO)

Sometimes an instant message or phone call can help move a situation forward. Direct communication is often better than waiting too long for an email response to a situation that needs immediate attention.

3. Fill in the blank: The use of _____ to tell a security story can help security analysts communicate impactful data and metrics.

  • visuals (CORRECT)
  • direct phone calls
  • cross-site scripting
  • instant messages

The use of visuals to tell a security story can help security analysts communicate impactful data and metrics. Charts and graphs are particularly effective because they can be used to compare data points or show small parts of a larger issue.

4. Which software programs can be used as tools for sharing and telling a visual story about data? Select all that apply.

  • Linux
  • Google Docs
  • Apache OpenOffice (CORRECT)
  • Google Sheets (CORRECT)

Google Sheets and Apache OpenOffice are both platforms that can be used to create and share visual stories of data.

5. There are many instances where a member of a cybersecurity team will need to create a visual dashboard to communicate impactful data and metrics to stakeholders. Which of the following programs can be used to create visual dashboards that can communicate impactful data and metrics to stakeholders? Select all that apply.

  • User Datagram Protocol (UDP)
  • Linux
  • Google Sheets (CORRECT)
  • Apache OpenOffice (CORRECT)

Apache OpenOffice and Google Sheets are no cost options that allow users to create spreadsheets and other visual presentations.

WEEKLY CHALLENGE 3

1. Which of the following are stakeholders interested in having knowledge of? Select two answers.

  • The decisions of their organization’s leadership (CORRECT)
  • The activities of their organization (CORRECT)
  • The online reviews for their organization
  • Social media reviews for their competitor’s organization

2. Which individuals are considered security stakeholders? Select three answers.

  • Risk managers (CORRECT)
  • Chief Information Security Officers (CISOs) (CORRECT)
  • Help desk analysts
  • Operations Managers (CORRECT)

3. Fill in the blank: Security operations managers are primarily responsible for helping to identify and safeguard an organization from _____.

  • negative social media reviews
  • security threats (CORRECT)
  • equipment failures
  • failed tax audits

4. Which of the following statements best describes the information that is communicated to stakeholders?

  • It is proprietary.
  • It is publicly available.
  • It is sensitive. (CORRECT)
  • It is shareable to the entire organization.

5. Which of the following guidelines can help security analysts improve stakeholder communications? Select two answers.

  • Be precise (CORRECT)
  • Include as many topics as possible
  • Use technical security terms as much as possible
  • Avoid unnecessary technical terms (CORRECT)

6. Which potential security challenges should a security analyst communicate to security stakeholders?

  • Lack of employee retention
  • Negative social media reviews
  • Negative publicity about non-security related issues that has been posted on the internet
  • Malicious code detected in logs (CORRECT)

7. Fill in the blank: Creating ____ communications allows a security stakeholder to view representations of what is being explained using graphs and charts.

  • visual (CORRECT)
  • audio
  • simple
  • complex

8. Why is it important for analysts to use visuals to tell a security story?

  • Visuals can help an analyst determine which tool to use to solve a security challenge.
  • Visuals can help an analyst identify which details are most important for different stakeholders.
  • Visuals can help an analyst communicate impactful metrics and data. (CORRECT)
  • Visuals can help an analyst prioritize which incidents need to be escalated with more or less urgency.

9. Fill in the blank: In the field of security, ______should always be communicated with care.

  • leave requests
  • publicly available information
  • sensitive information (CORRECT)
  • nonsensitive information

10. Stakeholders have many responsibilities, so they might miss an email or fail to respond promptly. If an analyst needs to reach a stakeholder right away, what might be a better option for stakeholder communication?

  • A follow-up investigation
  • An email to the CISO
  • A phone call (CORRECT)
  • A follow-up email to the stakeholder’s supervisor

11. What is a stakeholder?

  • An individual or a group that manages the public relations crisis for an organization
  • An individual or a group that has an interest in any decision or activity of an organization (CORRECT)
  • The security professionals who manage the SOC operations for an organization
  • A customer who depends on an organization to protect their sensitive financial and medical data

12. Fill in the blank: Communications with stakeholders should always be precise, avoid unnecessary technical terms, and _____.

  • have a clear purpose (CORRECT)
  • have various purposes to maximize time
  • tell an elaborate story to ensure your point is made
  • include numerous security questions

13. Fill in the blank: Visual communications to stakeholders can be used to convey key details in the form of ____.

  • graphs and charts (CORRECT)
  • logs and alerts
  • text-filled documents and graphs
  • text messages and charts

14. An analyst finishes an incident review. Next, they want to clearly communicate meaningful data from their findings. What action can they take to share this information?

  • Ask stakeholders to report their findings
  • Use visuals to tell a security story (CORRECT)
  • Collaborate with the publicity team to develop a communication strategy
  • Request that the Chief Technology Officer (CTO) sends a summary email

15. Fill in the blank: For security purposes, it is important to communicate sensitive information with _____.

  • graphs and charts
  • supervision
  • a low level of urgency
  • care (CORRECT)

16. What term is used to define an individual or a group that has an interest in the decisions or activities of an organization?

  • Audit specialist
  • Incident response manager
  • Stakeholder (CORRECT)
  • Decision-making manager

17. A security operations manager often works directly with a security analyst as the first line of defense to protect an organization from what challenges? Select two answers.

  • Risks (CORRECT)
  • Vulnerabilities (CORRECT)
  • The use of social media on work devices
  • A lack of an employee consortium

18. Fill in the blank: Information that is communicated to ____ is considered sensitive.

  • an organization’s competitors
  • the general public
  • stakeholders (CORRECT)
  • employees regarding social events

19. You are alerted that a malicious actor has gained unauthorized access to one of your organization’s manufacturing applications. You need to inform the operations manager as soon as possible. What is the best way to communicate this information?

  • With a corporate-wide email
  • With a letter to HR
  • With a dashboard visualization
  • Clearly, concisely, and quickly (CORRECT)

20. Fill in the blank: Creating ____ communications allows a security stakeholder to view representations of what is being explained using graphs and charts.

  • complex
  • audio
  • simple
  • visual (CORRECT)

21. You have recently been hired as a security analyst for an organization. You’ve been asked by a security stakeholder to provide information on how often the employees from various departments are clicking on simulated phishing emails. What action can you take to best communicate this information?

  • Use visuals, such as charts and graphs, to tell the security story (CORRECT)
  • Call the stakeholder and directly update them
  • Ask your supervisor to report your findings because you are new
  • Send an email that explains the necessary information

22. What is the best way to follow-up with a stakeholder who has not immediately responded to your email? Select two answers.

  • Send them an instant message (CORRECT)
  • File a complaint with human resources
  • Report the issue to your supervisor
  • Call them on the phone (CORRECT)

24. Which of the following is an example of a security event that should be communicated to a stakeholder?

  • Malicious code detected in logs (CORRECT)
  • The resignation of a human resources employee
  • Incorrect office hours posted on social media
  • A tax audit

25. Handling the daily maintenance of security operations is the general responsibility for which security stakeholder?

  • Operations manager (CORRECT)
  • Chief Information Security Officer (CISO)
  • Chief Financial Security Officer (CFO)
  • Entry-level security analyst

26. Which security stakeholder helps recognize risks and manage the response to security incidents?

  • Chief Financial Security Officer (CFO)
  • Risk manager (CORRECT)
  • Operations manager
  • Chief Information Security Officer (CISO)

27. Which of the following options is the best way to handle the detection of malicious code in logs?

  • Wait until a more experienced team member notices it
  • Report the incident directly to the CISO
  • Communicate the incident to a security stakeholder (CORRECT)
  • Handle the incident using your Linux knowledge

CONCLUSION – Communicate Effectively to Influence Stakeholders

In conclusion, this comprehensive journey through the diverse realms of cybersecurity has equipped participants with a multifaceted skill set essential for navigating the complexities of the digital landscape. From foundational knowledge in network security and operating systems to the intricacies of incident detection, response, and stakeholder communication, learners have gained valuable insights and practical expertise.

The emphasis on hands-on experiences, real-world applications, and engagement with cutting-edge tools ensures that participants not only comprehend theoretical concepts but also develop the proficiency to address the dynamic challenges of cybersecurity in professional settings. As they embark on applying these acquired skills, participants are well-positioned to contribute effectively to the ever-evolving field of cybersecurity.