{"id":33735,"date":"2022-03-17T14:35:49","date_gmt":"2022-03-17T03:35:49","guid":{"rendered":"https:\/\/www.institutedata.com\/?p=33735"},"modified":"2022-03-17T18:26:34","modified_gmt":"2022-03-17T07:26:34","slug":"why-storytelling-techniques-are-important-in-cyber-security","status":"publish","type":"post","link":"https:\/\/www.institutedata.com\/us\/blog\/why-storytelling-techniques-are-important-in-cyber-security\/","title":{"rendered":"Why storytelling techniques are important in cyber security"},"content":{"rendered":"<h2><span style=\"font-weight: 400;\">What do effective storytelling techniques and cyber attacks have in common?<\/span><\/h2>\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"\/\/www.youtube.com\/embed\/g7sQW2zWwEE\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><span style=\"font-weight: 400;\">Have you considered how crafting a compelling story impacts the cyber security industry? According to best-selling Cyber Security author <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=g7sQW2zWwEE&amp;feature=youtu.be\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Chirag Joshi<\/span><\/a><span style=\"font-weight: 400;\">, storytelling inspires key actions and behaviors that <\/span><a href=\"https:\/\/www.institutedata.com\/blog\/cybersec-industry-experts-share-what-businesses-and-cyber-freshers-need-to-know\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">influence cyber security outcomes<\/span><\/a><span style=\"font-weight: 400;\"> in our personal and professional lives. Consider how creative analogies can create compelling stories to influence best practices in cyber security.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What do effective storytelling techniques and cyber attacks have in common? Have you considered how crafting a compelling story impacts the cyber security industry? According to best-selling Cyber Security author Chirag Joshi, storytelling inspires key actions and behaviors that influence cyber security outcomes in our personal and professional lives. Consider how creative analogies can create&hellip;<\/p>\n","protected":false},"author":1,"featured_media":35301,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[528,529],"tags":[],"class_list":["post-33735","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-cybersecuritytechnology"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/33735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=33735"}],"version-history":[{"count":0,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/33735\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media\/35301"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=33735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/categories?post=33735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=33735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}