Elevating Cybersecurity Messaging After Black Hat 2025 - FleishmanHillard

Compatibilité
Sauvegarder(0)
partager

Skip to content

Article

August 27, 2025

By Miranda Sanders

Las Vegas was sweltering for Black Hat 2025, and so were the conversations on the show floor. AI led to much of the discussion as both a powerful tool for defense and a fresh attack vector. For example, there was news on major advances in cloud and endpoint security and rising concern among experts about rising supply chain and infrastructure-targeted threats.

But what stood out to us this year wasn’t just the tech. It was how the conversation around security itself is evolving, raising the bar for communicators everywhere.

The news isn’t gone. It’s just different.

If you felt this year’s coverage was somewhat muted, you’re not alone. Gone are the days when Black Hat was the moment, a guaranteed headline in every tier-one business publication. Instead, the coverage that mattered most came from a handful of reporters, probably with deep, longstanding relationships in the Cyber space. Those publications included The Verge, VentureBeat, Wired, ZDNet or Network World. These reporters already have a clear understanding of a brand’s enterprise security business strategy. They can dive deep to better understand the industry implications from product news, from Google’s move towards better supply chain security, to SentinelOne’s managed services expansion, Microsoft’s “Project Sentinel AI”, Cisco’s quantum-resilient encryption and more.

The threat intel has hit home.

Five years ago, a single research report could dominate the news cycle, with dozens of stories written by security media during Black Hat. Now it takes more. The bar is higher, and editors want hard evidence that connects to real-world risk.

Outlets like Reuters and Bloomberg focused on threats with tangible implications for infrastructure and public safety. For example, Reuters covered activity around APT41 and Iranian cyber espionage. At the same time, Politico discussed the news’ geopolitical implications and potential policy responses.

Bloomberg reported on credible threats to electrical grids and potential impacts on critical infrastructure. The common theme? If threat intelligence impacts – or has a real, credible threat to impact – people’s lives, then it’s worth covering.

Former NYT reporter Nicole Perlroth’s keynote put it bluntly: the human impact of cyber risk is no longer hypothetical. It is today’s reality, and it’s only going to get more devastating. For communicators, translating technical findings into stories about people and policy is now essential.

Reporters want to experience, not just observe.

Several reporters on site said that the things they enjoyed most this year were moments set up by brands where they could place themselves in the shoes of security professionals on the front line of today’s biggest threats – whether during panels, sessions or dedicated private events. Several tier-one media outlets attended a Cisco Talos tabletop exercise. In this hour-long immersive session, they played a Dungeons and Dragons-like game to understand how an incident may play out in real life.

As communicators, prioritizing these immersive opportunities can turn complex topics into compelling stories.

What does this mean for security communicators?

If Black Hat was any indication, media are looking for clear, authoritative voices who can cut through the technical noise and connect security stories to business, policy and human impact. Here’s how to best do that for the most relevant themes we saw come out of Black Hat this year:

  • AI Dominance: Position spokespeople to discuss both the promise and risks of AI in cybersecurity, using clear, non-technical language.
  • Supply Chain Risk: Share concrete examples or data on how your organization addresses third-party and supply chain vulnerabilities.
  • Quantum Security: Media are looking for thought leadership and educational content if your brand is working on quantum-resilient security solutions.
  • Cloud & Zero Trust: Highlight practical business benefits of zero trust and cloud-native security in your messaging.
  • Critical Infrastructure & IoT: Prepare proactive statements around your efforts to protect critical infrastructure and IoT.
  • Real-World Impact: Emphasize how your solutions or research address current, active threats with clear, actionable outcomes.
  • Geopolitical Context: Be ready with expert commentary connecting cybersecurity developments to broader policy and international issues.

The pace of change in security and security communications isn’t going to slow down. As the landscape evolves, so does our approach to telling the stories that matter.

Stay tuned for more insights into security communications from us in the coming months.

See what else is happening

You might also like

  • Expertise

    The Answer Engine Era Is Here

    August 20, 2025

  • Expertise

    A New Approach to Modern Comms: What It Takes to Win in a World Defined by Uncertainty

    August 19, 2025

  • Expertise

    Tariffs, Trust and Transparency: How to Communicate Price Increases Without Losing Stakeholder Confidence

    August 13, 2025

  • Expertise

    Why Primary Research is the Power Source for AI That Works 

    August 11, 2025

  • Expertise

    The Real Reason Your AI Rollout is Stalling

    July 30, 2025

  • Expertise

    What America’s AI Action Plan Means for Leaders Now

    July 24, 2025

  • Expertise

    The Friends You Never Knew You Needed: Why IT and Communications Must Team Up

    July 24, 2025

  • Expertise

    Closing the Innovation Gap With FH Fusion, Our Data and AI-Powered Solutions Suite

    July 14, 2025

  • Expertise

    As Seen at Cannes Lions: To Break Through, You Have to Earn It

    June 26, 2025

Coordonnées
Annette Wells-Saur