Big ValleyBig ValleyBig ValleyBig Valley
  • ABOUT
  • SERVICES
    • Brand Strategy
    • Marketing Strategy
    • Content Marketing
    • Corporate Communications
    • Digital and Social Marketing
    • Market Intelligence
  • CASE STUDIES
  • CULTURE
  • RESOURCES
    • Big Valley Marketing Blog
    • Pressing Matters Podcasts
    • Top Conversations in Tech
    • AI Research
  • CONTACT

Cybersecurity Lessons from Karen Burke’s 20+ Years

    Home Story + Content Cybersecurity Lessons from Karen Burke’s 20+ Years
    NextPrevious

    Cybersecurity Lessons from Karen Burke’s 20+ Years

    By Andy Shane | Story + Content | Comments are Closed | 30 October, 2023 | 0

    This blog was co-authored by Joshua Swarz and Andy Shane.

    Over the past 20 years, cybersecurity has made its way into the public sphere of conversation. The days of companies ignoring cyberattacks are gone. Ransomware attacks against private companies have become commonplace and the government even has a department, the Cybersecurity and Infrastructure Security Agency (CISA), dedicated to protecting the nation against cyber threats.

    At Big Valley, we are fortunate enough to have Karen Burke on our team. As Cybersecurity Story + Content lead, Karen helps Big Valley clients develop comprehensive content strategies and programs, and execute them across channels . Many of our client bylines published in outlets like Dark Reading, SC Magazine, Solutions Review and others are ghost-written by Karen, who brings more than 20 years experience in senior communications leadership roles for cybersecurity companies. 

    We were able to sit down with Karen, as she reflects on what has changed and how far we’ve come since the early days of cybersecurity. Here’s what she had to say. 

    What first got you interested in cybersecurity?

    In 1995, I relocated to Silicon Valley from the East Coast with my family. The next year, I joined Simon/McGarry, a division of Weber Shandwick, as a senior account executive. One of my first clients was a cybersecurity firm. At that time, I didn’t know that I would spend the next 20+ years working in comms in the cybersecurity industry, both in-house and at agencies. I just knew that I loved working with the reporters, analysts, and experts in this business and wanted to build on and grow those relationships.     

    What has been the biggest change in the industry since you started?

    Transparency.

    In the early days, security vendors were very reluctant to publicly attribute cyberattacks to certain nation-states. Today, both vendors and the federal government regularly publish advisories, reports and other intelligence that attribute state-sponsored attacks to Russia, North Korea, Iran and China. 

    We have also seen threat intelligence sharing among competitors in vertical markets, from FS-ISAC to RH-ISAC and, due to increased breach disclosure laws, more companies revealing when and how they have been breached. 

    Earlier this year UK’s National Cyber Security Centre (NCSC) and the Information Commissioner’s Office collaborated on a blogpost, “Why more transparency around cyber attacks is a good thing for everyone.” 

    Data breaches can have a very painful, costly impact on the victim organizations, their employees and users, and even the Internet at large. Yet greater transparency about today’s cyberattacks and their impact on their victims provide an opportunity for all of us to improve our security postures.        

    What has been the biggest surprise?

    The agility and persistence of the adversaries.

    For example, last month the FBI issued a warning about two ransomware trends, which included multiple ransomware attacks on the same victim and new data destruction tactics in ransomware attacks. Regarding the latter, the FBI writes, “In early 2022, multiple ransomware groups increased use of custom data theft, wiper tools, and malware to pressure victims to negotiate. In some cases, new code was added to known data theft tools to prevent detection. In other cases in 2022, malware containing data wipers remained dormant until a set time, then executed to corrupt data in alternating intervals.” 

    Adversaries are constantly adjusting their TTPs to remain persistent and accomplish their goals. Security vendors, in partnership with the customers they serve, must continue to innovate to thwart and stay ahead of these attacks. 

    What do you enjoy the most about cybersecurity? What has kept you in the industry all these years?

    I think most of us want to make a difference in our job, no matter what we choose to do. In the cybersecurity field, everyone – regardless whether you are in the SOC, in comms, HR, legal or another position – plays an important role in the mission to reduce cyber risk for their fellow Internet users.  I’m here for the mission and the great people who work hard to achieve it.      

    Is there anything you would’ve done differently?

    Early in my tech PR career, I worked primarily for agencies – Shandwick, Corman Communications, Merritt Group, WE Communications. From a comms perspective, I initially focused my efforts solely on proactive PR – getting the next clip for our clients in a crowded, competitive market. I loved pitching the media so that became my primary focus. 

    Yet when I finally moved in-house to do corporate comms, I quickly discovered that PR was a small piece of the job. Looking back, I wish I had gone in-house earlier – there, I gained invaluable experience in building customer relationships, managing agencies, executing crisis communications, and building a brand. At Big Valley, I am able to draw from both in-house and agency experiences to help our clients, with their customers, partners and other key third-parties, tell impactful stories that both inform and build awareness for their brand. 

    AI is really starting to show its impact in cybersecurity, what do you foresee happening with AI + security over the next 5 to 10 years?

    AI is clearly a disruptive force, not just for cybersecurity but across other fields as well. I’ll leave predictions to the cybersecurity experts, but cybersecurity comms teams should get smart, quick, on the technology’s potential, good and bad. 


    While Cybersecurity Awareness Month is a great opportunity to bring the need to ensure proper cyber hygiene to the forefront,  we also believe that we cannot relegate this initiative to ‘just one month.’ Big Valley Marketing will continue reporting on various aspects of cybersecurity throughout the year and will do our part to ensure we bring you the latest perspective from reporters like AJ.

    To learn more about how we can help your organization, contact Josh Swarz at jswarz@bigvalley.co.

    cyber, cybersecurity, security

    Andy Shane

    Andy helps Big Valley and its clients define and develop earned media strategies and influencer relations that build brand and drive business. Andy’s clients at Big Valley include leaders in cybersecurity, artificial intelligence and SaaS.

    More posts by Andy Shane

    Related Post

    • Key Takeaways From Content Marketing World 2025

      By Michael Weiss | Comments are Closed

      Last week at Content Marketing World in San Diego, I had the privilege of speaking about what I call the “five feet of fear”,  that brief but daunting walk from your seat to the stage.Read more

    • Top Conversations in Tech: June 2025 Trends

      By Taylor Voges | Comments are Closed

      The Architecture of AI Welcome to Top Conversations in Tech, where we isolate the hottest trends, falling stars and shifting market dynamics to help technology marketers maximize their relevance. This month’s data reflects news andRead more

    • Top Conversations in Tech: May 2025 Trends

      By Taylor Voges | Comments are Closed

      Infrastructure Access and the Diversification of AI Welcome to Top Conversations in Tech, where we isolate the hottest trends, falling stars and shifting market dynamics to help technology marketers maximize their relevance. This month’s dataRead more

    • Top Conversations in Tech: April 2025 Trends

      By Taylor Voges | Comments are Closed

      Supply Chain in the Spotlight Welcome to Top Conversations in Tech, where we isolate the hottest trends, falling stars and shifting market dynamics to help technology marketers maximize their relevance. This month’s data reflects newsRead more

    • Is a Journalism Degree Still Worth It in 2025? Insights from Lehigh University’s Professor Brian Creech

      By Karen Burke | Comments are Closed

      A conversation with Professor Brian Creech (Chair of the Department of Journalism and Communication at Lehigh University) By Karen Burke (Cybersecurity Story + Content Lead at Big Valley Marketing)  When I graduated from Lehigh UniversityRead more

    NextPrevious

    Helping technology companies for ten years
    to grow, win, and lead through effective,
    expert-driven marketing and communications.

    Connect

    I want to hire Big Valley

    hireus@bigvalley.co


    I want to work for Big Valley

    workwithus@bigvalley.co

    Follow us
    • LinkedIn

    Recent Posts

    • New Social Platforms Series: Can B2Bs Ignore Reddit’s Front Page of the Internet Vibes?

      By Arianna Crawford, The Social Media Explorer The Big Valley Marketing New

      8 October, 2025
    • Outputs vs. Outcomes: Why We Confuse Activity with Impact

      Dashboards are shiny. They make us feel productive, even strategic: charts tilting

      6 October, 2025
    • Key Takeaways From Content Marketing World 2025

      Last week at Content Marketing World in San Diego, I had the

      25 September, 2025
    Copyright 2024 Big Valley Marketing | All Rights Reserved
    • ABOUT
    • SERVICES
      • Brand Strategy
      • Marketing Strategy
      • Content Marketing
      • Corporate Communications
      • Digital and Social Marketing
      • Market Intelligence
    • CASE STUDIES
    • CULTURE
    • RESOURCES
      • Big Valley Marketing Blog
      • Pressing Matters Podcasts
      • Top Conversations in Tech
      • AI Research
    • CONTACT
    Big Valley