2026-05-06 –, Workshops May 6th (C1.02.05)
You've identified the vulnerability, tested the exploit, and written the report. But they just don’t see the urgency. Now what? This 4-hour, hands-on workshop bridges the gap between technical mastery and boardroom influence. We'll move beyond simply reporting risks to crafting compelling narratives, quantifying value, and building the relationships necessary to drive meaningful security improvements.
This isn't your typical "compliance" training. We'll delve into the psychology of decision-making, explore adversarial communication tactics (used against you), and arm you with practical strategies to become a trusted advisor who can effectively advocate for security and get things done.
You've identified the vulnerability, tested the exploit, and written the report. But they just don’t see the urgency. Now what? This 4-hour, hands-on workshop bridges the gap between technical mastery and boardroom influence. We'll move beyond simply reporting risks to crafting compelling narratives, quantifying value, and building the relationships necessary to drive meaningful security improvements.
This isn't your typical "compliance" training. We'll delve into the psychology of decision-making, explore adversarial communication tactics (used against you), and arm you with practical strategies to become a trusted advisor who can effectively advocate for security and get things done.
Target Audience:
Security professionals of all levels (penetration testers, security engineers, analysts, red teamers, etc.) who want to improve their communication and persuasion skills to influence stakeholders and drive security initiatives.
Workshop Objectives:
Participants will be able to:
• Identify and analyze key stakeholders, influencers, and decision makers within their organizations.
• Translate technical findings or concepts, such as security by design, into business-centric language.
• Tailor your message to your stakeholders and influence them to make better decisions (social engineering for good!).
• Articulate the ROI of security investments.
• Effectively counter common objections and adversarial tactics.
• Develop a practical method for ongoing stakeholder engagement.
• Practice communicating complex security issues to non-technical audiences.
• Build trust and credibility with diverse stakeholders.
• Overcome their own fears and perceived limitations when dealing with key business decision makers.
Daniela Parker has sat on the other side of the table — as a Chief Risk Officer and Chief Operating Officer — making the tough calls on budgets, priorities, and competing initiatives. She knows exactly what happens in the executive huddle after the security team leaves the room.
As the founder of Parker Solutions, Daniela helps organizations turn risk and security from technical conversations into strategic business decisions. She has led enterprise risk programs, technology transformations, regulatory initiatives, and operational strategy — and she’s had to decide where resources go and why.
Her superpower? Teaching security professionals how to speak the language executives actually use.
Her style is direct, practical, and real. No theory for theory’s sake. Just executive-level insight into how decisions actually get made — and how to influence them.
Because when you understand how executives think, security doesn’t just get acknowledged.
It gets prioritized.
Glen Sorensen is a Recovering CISO/vCISO-Type and is presently a Solutions Engineer with DeleteMe. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership, including leading the security program for a credit union and for smaller organizations in a fractional role. He currently focuses on how exposed information and OSINT are weaponized in conjunction with AI toward social engineering attacks, and how that factors into greater enterprise cyber risk.
Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 20+ years, depending on how much misspent youth you count. He is a privacy geek and a sucker for a good tabletop exercise, and also serves as an Incident Master for HackBack Gaming, which puts his countless hours of roleplaying game experience to work teaching people about cybersecurity and incident response.