Discernible

@Discernible@infosec.exchange
133 Followers
29 Following
298 Posts

Communication advisors helping security and privacy teams grow political capital and influence beyond reporting lines.


#SecurityCommunications #PrivacyCommunications

Websitehttps://DiscernibleInc.com
Newsletterhttps://discernibleinc.com/newsletter-signup
Weekly IR Comms Drillsdiscernibleinc.com/drills
LinkedInhttps://www.linkedin.com/company/discernible/
Ethicshttps://discernibleinc.com/ethics

🎉 It’s time for another Discernible Experience mini challenge!

A security researcher emails you directly — not through your bug bounty portal — claiming they found a critical authentication bypass in your production API. They say they’ve already written a draft blog post and will publish in 48 hours unless they hear back from “someone who actually has authority.”

The challenge: You don’t know if this person is a legitimate researcher, an extortionist, or someone who already exploited the vulnerability. How you respond in the next two hours sets the tone for the entire relationship.

What’s your first move — and who do you loop in before you reply?

FYI — Discernible Experience is off this week. Our next scenario will be a new web3 incident on March 18.

See you then!

If you’re not already subscribed to our weekly simulations, you can join at DiscernibleInc.com/Experience

One of the hardest challenges in incident response is vendor accountability.

When the root cause is outside your control but you still own the customer impact, you face a specific set of tensions that tabletop exercises rarely address:

• How do you communicate ownership without shifting blame?
• When your customers are technically literate enough to know when you're hedging, what does honest look like?
• How do an organization's engineering and legal instincts pull in opposite directions — and how do you resolve that in real-time?
• What does credible recovery communication look like after a pattern of failure, not just a single incident?

This week's Discernible Experience was built around these challenges to practice drafting internal situation briefs, navigating cross-functional disagreements about transparency, and developing key messages that resonate with a technically sophisticated customer base.

Discernible Experiences are weekly, 60-minute scenario-based simulations for security professionals to give you communication practice grounded in our real incident experience. Starting at $12.50/drill.

Subscribe at DiscernibleInc.com/experience

In this week’s brand new Discernible Experience we’ll practice critical communication decisions during an active insider threat investigation, including:

→ Who needs to know, and who knowing too early would blow the entire investigation?

→ How do you manage normal organizational processes (like an exec asking questions) without lying, tipping off the subject, or impacting the investigation?

→ When law enforcement tells you to hold, how do you brief executives without triggering action (& should you always hold)?

These skills are almost never practiced before the moment they’re needed. So, we built this scenario for security practitioners who want to get sharpen their organizational and communication discipline.

Subscribe to join our weekly Experience: DiscernibleInc.com/Experience

Most incident response training focuses on what to do technically. But what happens when the incident itself undermines your credibility to lead the response?

This week’s Discernible Experience explores a scenario many security professionals dread: managing stakeholder communication when your own expertise is being questioned during an active incident.

We’ll practice:

→ Coordinating response when you have expertise but not final authority over customer communications, legal strategy, or business decisions

→ Calibrating technical transparency — deciding what details help stakeholders protect themselves vs. what creates additional risk

→ Protecting credibility when the incident itself makes people question whether they should listen to your guidance

→ Influencing incident response decisions across legal, executive, and customer-facing teams with competing priorities and timelines

Subscribe to join this week: DiscernibleInc.com/Experience

💡 The hardest part of coordinating a vulnerability disclosure isn't the technical fix; it's navigating the people.

In our new Discernible Experience this week you'll practice key communication skills in a bug bounty context:

→ Negotiating timelines without dismissing security community norms
→ Aligning engineering, legal, and customer success on competing priorities
→ Managing researcher relationships when you need their cooperation

You'll rotate through three roles: triage engineer, bug bounty PM, and CISO -- same incident, different communication challenges at each level.

Subscribe to join our weekly sessions: https://discernibleinc.com/experience

When you’re legally allowed to stay quiet about a security incident… should you?

No regulatory triggers or legal requirements. Just a room full of executives with competing priorities.

In our new Discernible Experince this week, subscribers will practice building decision frameworks for voluntary disclosure.

Perfect for: Security engineers, incident commanders, CISOs, privacy professionals, or anyone who needs to make high-stakes communication decisions without clear regulatory guardrails.

Ready to practice making the hard calls?

Subscribe to get this simulation + a new scenario every week: DiscernibleInc.com/experience

This week's new Discernible Experience tackles how to coordinate incident response communications when different customer segments have completely different needs, exposure, and risk tolerance for downtime?

We'll practice:
✅ Segment-specific messaging
✅ Aligning internal teams on what gets send when under pressure

Subscribe to join our weekly scenarios at: DiscernibleInc.com/experience

We've written extensively about how companies fumble bug bounty communications. But researchers have communication patterns that undermine their own effectiveness too -- and we're seeing the same three mistakes repeatedly sabotage otherwise brilliant technical work.

Check out this new post from CEO @Wednesday about the researcher side of disclosure 👇

https://discernibleinc.com/blog/3-counterproductive-communication-patterns-holding-back-security-researchers

3 Counterproductive Communication Patterns Holding Back Security Researchers  — Discernible Inc

Even technically brilliant security researchers can undermine their own bug bounty success through communication missteps that create adversarial relationships instead of productive partnerships. Here are three common patterns that damage disclosure outcomes and how to avoid them.

Discernible Inc

💫 New Discernible Experience!

OpenAI announced ChatGPT can now analyze health data and track symptoms. Users are already sharing mental health struggles and personal health information with the AI.

However, ChatGPT has weaker privacy protections than your doctor’s office.

This week’s Discernible Experience simulation explores the communication challenges when consumer health AI tools face a privacy breach.

Inspired by privacy advocates’ concerns about ChatGPT’s health features and the regulatory gray zone where AI health tools operate.

Subscribe to join: https://discernibleinc.com/experience