Siobhan Gorman

Partner, Washington, D.C. Brunswick Group

  • Washington DC

Siobhan Gorman concentrates on crisis, cybersecurity, public affairs, and media relations.

Contact

Brunswick Group

View more experts managed by Brunswick Group

Spotlight

2 min

Cybersecurity introduction

This is a business imperative, not a tech issue, says Brunswick’s Cybersecurity and Privacy team Cyber threats are generating some scary statistics: $400 billion a year in losses from attacks, with some larger businesses experiencing more than 12,000 attacks each year. But there is also good news. Companies are recognizing that cybersecurity is not a technology concern but rather a critical business issue and one they are preparing to deal with. To address the significant business and reputational risks involved, companies are using a cross-functional, top-to-bottom approach, one that treats cybersecurity as a business imperative. Many companies are beginning to strengthen their “human firewall,” creating a business culture where every employee sees cybersecurity as their responsibility. People, not software, are often the weakest link in a security system and that is a problem no software patch will solve. Regulation is growing increasingly complex and governments’ expectations differ from those of companies and consumers. The rules are murky and lag far behind the technology – and the threat. To deal with competing and at times conflicting requirements, some companies are moving beyond the minimum demanded of them, and aiming for a higher standard. To be effective, a company’s cybersecurity program needs to weave these threads into its underlying business plan. Cybersecurity is more than just a strong defense, more than compliance. It must be a part of corporate culture. It represents an opportunity to differentiate yourself from your competitors, increase the efficiency of your operations and earn a greater level of trust from customers, shareholders and the community.

Siobhan GormanMark Seifert

2 min

Data Breach Debrief

Under Armour’s response to a cyber attack achieved the seemingly impossible: Rather than fueling outrage, it actually drew praise. Brunswick’s Siobhan Gorman reports. In late March last year, Under Armour learned that its MyFitnessPal app, which tracks diet and exercise, had a data breach that affected 150 million users. It’s not uncommon for companies to take several weeks—or even months—to publicly announce a cyber attack of that scale. Under Armour did so in four days. Tokë Vandervoort on What Made The Difference 1. Relationships External relationships are how we found out about the breach, and they’re how we knew which advisers and expertise to bring on board right away. We had those in place and had put a lot of effort into maintaining them and keeping them up to date. Internally, the trust we’d built allowed us to move as quickly as we did. Both paid huge dividends. 2. Preparedness I don’t know anybody whose incident response team meets every other week, but ours does. Sometimes we’re just shooting the breeze, but other times we’re asking: “What’s going on in the business? What are you hearing? What’s happening?” We enjoy a great relationship with the product team, the engineering team, the IT security team, the IT team ... It’s not just sharing information, but also getting to know one another, which ties back to the importance of relationships—knowing what’s going on and who to call. 3. Practice We do a table top every year for a data incident. I’ve heard people say table tops are too expensive—we make up our own. Security and privacy get together and create a twoor three-hour game. One year it’ll be a supply chain issue, another year it’ll be a data event. We invite decision-makers from across the organization so that people then have a sense of what it feels like to make decisions without full information and to have to do so under a lot of pressure. People appreciate not just how hard these decisions are, but they know who the other people are, and the issues that they’re confronted with. The companies that have the most confident response are the ones where everybody knows their roles—not some giant team of people who have never worked together. When you have complete clarity of purpose, focus and leadership, you can get anything done.

Siobhan Gorman

8 min

Social media as a weapon

Best-selling author Peter Singer talks with the Brunswick Review about winning the increasingly crowded and contentious war for attention What do Isis and Taylor Swift have in common? According to author and digital-security strategist Peter Singer, both the terrorist organization and pop star are fighting for your attention online and employing similar tactics to try and win it. ISIS kicked off its 2014 invasion of Mosul with the hashtag, “#AllEyesonISIS.” More recently, the terror group posted photos of its members holding cute cats in an effort to make them more relatable – tactics familiar to most celebrities and online marketers around the world. These online battles, the rules governing them, and their real-world impact are the focus of Mr. Singer’s latest book, LikeWar, which he coauthored with Emerson T. Brooking, at the time a research fellow with the Council of Foreign Relations. “A generation ago people talked about the emergence of cyber war, the hacking of networks. A ‘LikeWar’ is the flip side: the hacking of people and ideas on those networks. Power in this conflict is the command of attention,” says Mr. Singer, who in addition to his writing is also a strategist and Senior Fellow at the New America Foundation. Pretty much everyone who posts online – from governments to marketers to reality TV stars – is a combatant in this fight for virality, according to Mr. Singer. Triumph in a “LikeWar” and you command attention to your product or propaganda or personality. Lose and you cede control of the spotlight and the agenda. Mr. Singer recently spoke with Brunswick’s Siobhan Gorman about the trends he’s seeing in LikeWars around the world, and what companies can do to avoid being on the losing end. What were you most surprised by in researching LikeWar? One of the more interesting characters in the book was at one time voted TV’s greatest villain: Spencer Pratt, a reality TV star on MTV’s “The Hills.” He’s basically one of these people who became famous almost for nothing. But what Pratt figured out really early was the power of narrative, which allowed him to become famous through, as he put it, “manipulating the media.” In the same week, I interviewed both Pratt and the person at the US State Department who’s in charge of the US government’s efforts to battle ISIS online. And Pratt, this California bro who’s talking about how to manipulate the media to get attention, understood more of what was playing out online than the person at the State Department. Spencer Pratt, a reality TV star… understood more of what was playing out online than the person at the State Department.” How much have online conflicts changed the rules in the last few years? First, the internet has left adolescence. It’s only just now starting to flex its muscles and deal with some of its responsibilities. The structure of the network changes how these battles play out. So, it’s this contest of both psychological but also algorithmic manipulation. What you see go across your screen on social media is not always decided by you. The rule makers of this global fight are a handful of Silicon Valley engineers. Another aspect of it is that social media has effectively rendered secrets of any consequence almost impossible to keep. As one CIA person put it to us, “secrets now come with a half-life.” Virality matters more than veracity; the truth doesn’t always win out. In fact, the truth can be buried underneath a sea of lies and likes. And the last part is that we’re all part of it. All of our decisions as individuals shape which side gets attention, and therefore which side wins out. But you highlight that this is playing out differently in China. Exactly. There are two different models shaping the internet, and shaping people’s behavior through the internet, playing out in the West and in China. Essentially, internet activity in China is all combined. Look at WeChat, which is used for everything from social media to mobile payment; it’s Amazon meets Facebook meets Pizza Hut delivery. And you combine that with an authoritarian government that’s had a multi-decade plan for building out surveillance, and you get the social credit system, which is like Orwellian surveillance crossed with marketing. The social credit system allows both companies and the government to mine and combine all the different points of information that an online citizen in China reveals of themselves, and then use that to create a single score – think of it as your financial credit score of your “trustworthiness.” For example, if you buy diapers your score goes up, because that indicates you’re a parent and a good parent. If you play video games for longer than an hour your score goes down because you’re wasting time online. And it’s all networked. Your friends and family know your score. It creates a soft form of collective censorship; if your brother posts something that’s critical of the government, you’re the one who goes to him and says, “Knock it off ’cause you’re hurting my score.” And you do that because the score has real consequences. Already it’s being used for everything from seating on trains and job applications to online dating. Your score literally shapes your romantic prospects. So, you have this massive global competition between Chinese tech companies and other global tech companies not only for access to markets, but also for whose vision of the internet is going to win out. How can companies win a “LikeWar”? Everyone’s wondering: What are the best ways to drive your message out there and have it triumph over others? The best companies I’ve seen create a narrative, have a story and have emotion – in particular, they have emotion that provokes a reaction of some kind. It’s all about planned authenticity. That sounds like a contradiction, but it’s about acting in ways that are genuine, but are also tailored because you’re aware that the world is watching you. A good comparison here is Wendy’s versus Hillary Clinton. Wendy’s is a hamburger chain – not a real person – but it acts and comes across as “authentic” online and has developed a massive following. They’re funny, irreverent. Yet Hillary Clinton – a very real person – never felt very authentic in her online messaging. And that’s because it involved a large number of people – by one account, 11 different people – all weighing in on what should be tweeted out. Inundation and experimentation are also key. Throwing not just one message out there, but massive amounts of them. Treating each message as both a kind of weapon, but also an experiment that allows you to then learn, refine, do it again, do it again, do it again. How do you measure and gauge battles online now? Is it just volume? It all depends on what your battle is, what your end goal is. Is it driving sales? Is it getting people to vote for you, to show up to your conference? This is what the US gets wrong about Russian propaganda and its disinformation campaigns. We think they’re designed to make people love or trust a government. From its very start back in the 1920s, the goal of propaganda coming from the Soviet Union, and today Russia, has been instead to make you distrust – distrust everything, disbelieve everything. And we can see it’s been incredibly effective for them. First, we need to recognize that we’re a part of the battle. In fact, we’re a target of most of the battles. How effective have disinformation campaigns actually been in the US? What can be done? One of the scariest and maybe saddest things we discovered is that the US is now the story that other nations point to as the example of what you don’t want to have happen. There’s no silver bullet, of course. But one example was something called the Active Measures Working Group, a Cold War organization that brought together the intelligence community, diplomats and communicators to identify incoming KGB disinformation campaigns and then develop responses to them. We’re dealing with the modern, way more effective online version of something similar, and we haven’t got anything like that. There are also digital literacy programs. I find it stunning that the US supports education programs to help citizens and kids in Ukraine learn about what to do and how to think about online disinformation, but we don’t do that for our own students. What can people like you or me do? First, we need to recognize that we’re a part of the battle. In fact, we’re a target of most of the battles. And we need to better understand how the platforms work that we use all the time. A majority of people actually still don’t understand how social media companies make money. The other is to seek out the truth. How do we do that? And the best way is to remember the ancient parable of the blind man and the elephant – don’t just rely on one source, pull from multiple different sources. That’s been proven in a series of academic studies as the best way to find the facts online. It’s not exactly new, but it’s effective. Where will the next online war be fought? The cell phone in your pocket, or if we’re being futuristic, the augmented reality glasses that you wear as you walk down the street. It’ll come from the keepsake videos that you play on them. If you want to know what comes next in the internet there have always been two places to go: university research labs and the porn industry. That’s been the case with webcams, chat rooms and so on. What we’re seeing playing out now are called “deep fakes,” which use artificial intelligence to create hyper-realistic videos and images. There’s also “madcoms,” which are hyper-realistic chat bots that make it seem like you’re talking to another person online. Combine the two, and the voices, the images, the information that we’ll increasingly see online might be fake, but hyper-realistic. The tools that militaries and tech companies are using to fight back against the AI-created deep fakes are other AI. So, the future of online conflict looks like it’ll be two AIs battling back and forth. Let me give you a historic parallel, because we’ve been dealing with these issues for a very long time. The first newspaper came when a German printer figured out a way to monetize his press’s downtime by publishing a weekly collection of news and advice. And in publishing the first newspaper, he created an entire industry, a new profession that sold information itself. And it created a market for something that had never before existed – but in creating that market, truth has often fallen by the wayside. One of the very first newspapers in America about a century later was called the New England Courant. It published a series of letters by a woman named Mrs. Silence Do-good. The actual writer of the letters was a 16-year-old apprentice at the newspaper named Benjamin Franklin, making him the founding father of fake news in America. In some sense it’s always been there, using deception and marketing to persuade people to your view.

Siobhan Gorman
Show More +

Answers

How to recover from a security breach?
Siobhan Gorman

Check out this video of Siobhan telling us how you can recover from a security breach:https://play.vidyard.com/At1Vikz1jjkGDVeH8bHnVL.jpg?

Top 10 cyber crisis PR failures
Siobhan Gorman

Saying too much too soonSaying too little too lateStepping in it on social mediaThe tone-deaf CEOForcing affected individuals to waive their rights to sue Overpromising and failing to deliverThe appearance—or actuality—of insider trading prior to incident announcementCareless internal communication without legal privilegeMinimizing the impactAllowing vendors to speak for your organizationThere are no do-overs in a crisis, and the best prevention is preparation. One audience member noted: You can handle 90% of what hits you when using appropriate incident response processes. Very true, which is why employee education and preparation is so critical. We should take abroad view of cyber safety awareness, from tips on how to create a useful password and identifying phishing emails to adherence to media policies. It’s also important to take care in how you communicate electronically in an incident—it’s likely you don’t know the full details and propagating inaccurate information can lead to confusion. As Tanya said, “Don’t put anything in writing that you wouldn’t want in Times Square.”Ultimately, internal coordination is key to any incident response. Another audience member emphasized the importance of having a process for escalating a cyber incident internally so the right internal players are at the table from the outset—including communications and legal leaders. Small organizations and large corporations alike are forced to handle cyber incidents in the current environment. Those that handle the response without committing major PR #Fails will avoid the harsh public spotlight, maintain control of their narrative, and sometimes even get credit for a well-run response.

How can cybersecurity put your merger at risk?
Siobhan Gorman

M&A deals expose companies to significantly heightened cyber risk, as the target company’s technology infrastructure is an important part of the package. If that infrastructure is infiltrated, or the intellectual property has been stolen, the acquirer takes over those problems.The best way to mitigate cyber risk in an M&A transaction is to reduce the potential for surprise by uncovering and addressing cyber issues before they’re uncovered for you – and ensuring a quick and capable response. Tailored cyber insurance can help manage the financial risk by guarding against a steep drop in valuation.To safeguard both companies’ reputations, contingency plans should be developed to guide their public responses in the event that a breach is uncovered. After the deal closes, the combined company should assemble a response playbook in the event of different types of cyber incidents. Such a playbook has the added benefit of helping the newly combined leadership team identify and work through strategies, roles and responsibilities.

Social

Biography

Siobhan Gorman is a Partner in the Washington, D.C. office of the Brunswick Group, where she concentrates on crisis, cybersecurity, public affairs, and media relations. Siobhan has worked on corporate crisis across a range of industries, including financial services, healthcare, defense, entertainment, technology, and automotive.

Siobhan has also led a range of cybersecurity, public affairs, litigation, and corporate reputation projects in the financial, retail, airline, and technology sectors. Tapping her longtime journalism experience, she regularly advises clients on media relations issues and conducts media training for executives.

Siobhan is a member of the Senior Advisory Group for Harvard University’s Defending Digital Democracy Project, which is focused on preventing and mitigating cyberattacks on the election process. She is also member of the Advisory Committee for Brown University's Executive Master in Cybersecurity.

Prior to joining Brunswick, Siobhan had a successful 17-year career as a reporter, most recently at The Wall Street Journal. At The Journal, she covered a range of national security and law enforcement topics, including counterterrorism, intelligence, and cybersecurity. Prior to joining The Journal in 2007, Siobhan was a Washington correspondent for The Baltimore Sun covering intelligence and security. From 1998 to 2005, she was a staff correspondent for National Journal covering similar issues. She began her career as a researcher for a columnist at The Washington Post.

Siobhan won the 2006 Sigma Delta Chi Award for Washington Correspondence for her coverage of the National Security Agency and in 2000 received a special citation in national magazine writing from the Education Writers Association. She has been nominated three times for the Pulitzer Prize and is a graduate of Dartmouth College.

Siobhan was featured in Cybersecurity Venture's Women Know Cyber: 100 Fascinating Females Fighting Cybercrime, released in 2019.

Areas of Expertise

Cyber Security
Cyberattacks
National Security
Litigation
Media Relations
International Relations
Intelligence and Counter Intelligence

Accomplishments

Sigma Delta Chi Award, Society of Professional Journalists

For Washington Correspondence of her coverage of the National Security Agency (2006).

Nominated for Pulitzer Prize, Columbia University

3-time nominee

Education

Dartmouth College

B.A.

Government

1997

Affiliations

  • The Wall Street Journal
  • Brown School of Professional Studies
  • The Baltimore Sun
  • National Journal

Media Appearances

Coronavirus: Tempted By Shut-In Bargain Deals? Be Mindful Before You Click

CBS New York  

2020-03-31

CBS2’s Charlie Cooper took a look at what shoppers should know before taking advantage of bargains, some not hard to find. “People may feel like they have a lot of free time because you’re still imagining what your life is like when you’re operating solely from home,” said Gorman. “I think people may quickly find that they actually fill that time, so you don’t necessarily want to find yourself with all these things that you can’t manage.”.

View More

Articles

Hackers Exploit the Pandemic

| Brunswick Group Perspectives (2020)

Within weeks of the COVID-19 outbreak, hackers have already commandeered the virus to unleash cyberattacks, sending emails purporting to provide coronavirus guidance laced with cyberattack software. In one more alarming case, they appear to have attacked a hospital and forced it to cancel operations and take key systems offline.

View more

Data Breach Debrief

| Brunswick Group Perspectives (2019)

In late March last year, Under Armour learned that its MyFitnessPal app, which tracks diet and exercise, had a data breach that affected 150 million users. It’s not uncommon for companies to take several weeks—or even months—to publicly announce a cyber attack of that scale.

View more

Social media as a weapon

| Brunswick Group Perspectives (2018)

What do Isis and Taylor Swift have in common? According to author and digital-security strategist Peter Singer, both the terrorist organization and pop star are fighting for your attention online and employing similar tactics to try and win it.

View more