Wayne Schepens - Weebly
  • Blog
  • About
Wayne Schepens currently serves as Commercial Strategic Consultant and Managing Director of WayneWright Strategy. In this role, Mr. Schepens specializes in competitive analysis, product launches, and product marketing. One of Wayne Schepens’ most notable accomplishments with the firm has been his work with a Baltimore software company. WayneWright Strategy was able to take this firm from the idea stage to the market, attracting investment opportunities and accolades as the company saw unprecedented growth and profit. 
Read More

CyberShark Pitch Competition Selects Finalists

7/29/2025

0 Comments

 
Picture
​LaunchTech Communications’ CyberShark Pitch Competition announced that it selected two finalists to compete in the Black Hat Week USA 2025 competition in the fall. The competition involved firms pitching their ideas to chief information security officers (CISOs). In 2025, RapidFort and Dropzone AI were the two first-round finalists who will compete against others during the Black Hat competition.

This specific competition offers companies in the cybersecurity space an opportunity to pitch their ideas to a panel of CISO judges. This competition took place during the RSA Conference. In this event, CISOs from various industries, including insurance, food and beverages, manufacturing, financial services, and technology, converged to vote on which business idea conveyed the clearest message and had distinct value. Those who entered the competition received feedback, which included actionable steps to improve their messaging, positioning, and product-market fit, all within a supportive environment. 

Finalist Dropzone AI is an autonomous cybersecurity platform that functions as a virtual security operations center (SOC) analyst, utilizing large language models (LLMs). This platform empowers cybersecurity teams to investigate alerts without requiring human input, playbooks, or code. 

The company’s standout offerings include its autonomous alert messaging, which acts as a Tier 1 triage center, providing analysis from AWS GuardDuty, Microsoft Defender, and CrowdStrike. Its AI Interviewer is another feature that automates user interviews from sources such as Slack. This feature reduces the platform’s repetitive tasks while also accelerating investigations. The platform can also mimic the behavior of human analysts through context-aware reasoning. This feature utilizes integrated tools to gather information and employs an organizational chart to make conclusions. The pre-trained platform operates efficiently and can quickly adapt to its environment. This company offers SOC solutions that work alongside humans and is especially helpful for teams experiencing alert fatigue or those without the resources to implement 24-hour monitoring. 

RapidFort, the other finalist, is a cloud-based cybersecurity platform. The company’s offerings enable businesses to secure and optimize their containerized applications, helping businesses remove as much as 95 percent of their software vulnerabilities. The platform’s features include curated common vulnerabilities and exposure container images updated daily to meet industry compliance standards. Its DevTime Protection Tools help companies identify components that are dormant and those that are in use, allowing teams to prioritize which components to repair. Finally, the platform features runtime protection tools that automatically secure dormant tools, reducing surface software attacks by up to 90 percent. This company’s product is best suited for businesses that need to accelerate their compliance frameworks. 

According to a May 2025 Business Wire article, the competition was an exciting display of technological innovation. During the judging segment, CISOs focused on delivering a clear problem statement and discussing product integration with other systems and the larger landscape. They also addressed the use of each product in real-world scenarios. All these areas are elements of delivering a strong pitch to companies. The finalists of this event will compete with finalists in the Black Hat event. Those companies that were not finalists can compete during the Black Hat event.

Dustin Sacks, Chief Technologist and Senior Director of Programs at the CyberRisk Collaborative stated that the competition provided an opportunity to identify game changers and invest in innovation. Wayne Schepens, Chief Cyber Market Analyst of CyberRisk Alliance, added that the competition enables vendors to gather valuable information, identify champions, validate their brand message, and test their solutions. Vendors benefit from being able to test their pitch before CISOs in a competitive environment, and buyers influence the direction of innovation.

LaunchTech, founded by Wayne Schepens in 2015, is a PR and communications company that serves cybersecurity and emerging technology companies. The competition is part of the company’s mission of laying the groundwork for brand visibility and recognition. For more information about the competition, please visit golaunchtech.com/.

Wayne Schepens, LaunchTech

Shop
0 Comments

Before the Pitch - How Founders Prepare for CyberShark-Style Scrutiny

7/11/2025

0 Comments

 
Picture
​The 2025 CyberShark Pitch Competition recently named its first-round finalists. For cybersecurity startups, the event signals a sharper test. These forums compress scrutiny into minutes and demand fluency in the language of business. Evaluators assess each product through presence, precision, and persuasion.

Pitch competitions create conditions that few early-stage teams experience in product development. Startups must address multiple stakeholders, including investors, analysts, and potential partners, each with distinct expectations — few timed minutes substitute for years of planning. In that window, clarity either builds traction or limits the path forward.

Strong teams recognize that delivery shapes perception. Turning complex tools into business-ready value requires preparation. Stakeholders listen for outcomes: what the solution solves, how it integrates, and whether it fits. Framing those answers demands more than technical fluency. It requires strategic positioning.

For many teams, pitch events offer the first unfiltered view of external perception. Judges and attendees test assumptions, surface gaps, and challenge framing. Internal certainty meets public interpretation. Pressure creates a mirror that reveals where messaging resonates and where it falters.

Structured preparation shifts outcomes. Cybersecurity accelerators like MACH37 offer guided preparation, helping founders rehearse investor pitches, refine delivery, and anticipate stakeholder questions before stepping on stage. Communication specialists help adjust tone, pacing, and stakeholder awareness. Instead of improvising, participants build flexibility into their delivery through practice.

Firms such as LaunchTech Communications support this effort. Specializing in cybersecurity PR, they help startups craft language that preserves technical integrity while connecting with decision-makers. Training extends across investors, analysts, and media channels. This ensures that message consistency holds even without slides or demos.

The high stakes of pitch forums extend into trust. Cybersecurity buyers and investors operate in risk-averse environments where credibility can outweigh new or unproven ideas. When founders communicate with transparency and coherence, they show command of their solution and awareness of the broader trust landscape. This credibility, once earned, opens conversations that purely technical claims cannot.

Each audience filters information differently. A venture partner might prioritize scale and traction. A security buyer may focus on integration. A compliance officer listens for mitigation strategy. Startups that adapt their framing while staying anchored to core value signal cross-sector alignment.

The process reinforces more than public presentation. Internal discussions sharpen as teams refine definitions, trim vague phrasing, and reassess positioning. Communication becomes a shared framework that supports decisions across functions.

Live events introduce real-time challenges: unexpected questions, skepticism, and visible reactions. The way a team responds in these moments, through clear language and cohesive delivery, often informs more than scoring. Observers read tone and tempo and note how unified responses define collective insight.

That fluency continues beyond the stage. Briefings, interviews, and follow-ups demand the same control in new formats. Teams that build range early navigate these shifts with less friction. Their message remains steady from the pitch floor to the stakeholder room.

Mentors working with cyber-focused ventures note how these events accelerate more than presentation skills. They expose how leadership translates vision under scrutiny.

Winning a pitch may bring visibility or awards, but the greater value is internal. Preparing for that moment builds habits around clarity, alignment, and adaptability. These habits strengthen leadership well before product-market fit is in place. For cybersecurity startups, that foundation becomes an enduring advantage.

Wayne Schepens, LaunchTech

Shop
0 Comments

Thought Leadership in the Cybersecurity Space

6/25/2025

0 Comments

 
Picture
​Even the best technical solutions can get lost in the noise of today's crowded cybersecurity marketplace. Providers are everywhere, all vying for the attention of businesses and consumers. Cybersecurity firms must embrace thought leadership to break through this noise, gain trust, and build authority.

Thought leadership in cybersecurity means sharing expert insights, strategic vision, and fresh solutions for new threats. Genuine thought leaders have deep technical knowledge and often seek to advance the field. This approach has become one of the few ways to rise above the crowd. When an expert voice brings something new, solves real problems, and shows expertise, it differs greatly from flashy marketing. But there is a problem with how some experts and cybersecurity companies approach thought leadership.

Many cybersecurity firms today outsource their thought leadership. While recognizing its value, these firms depend too much on public relations (PR) teams, marketing departments, or outside agencies to create "expert" content. The risk is that the content becomes over-polished, too cautious, and similar to what competitors produce. Sometimes it will feel generic and lack the authentic voice of true experts. Articles might have perfect grammar and industry buzzwords, but lack personality. When tech CEOs publish content that clearly didn't come from them, it backfires. Instead of building trust, it damages it.

Cybersecurity professionals can easily detect what is not authentic. Security experts, in particular, are trained to be skeptical and can spot a thought leadership piece that fakes expertise or that someone with more marketing background than security depth has written. Companies that outsource their thought leadership face another risk, too. Their executives and PR teams get caught off guard when reporters ask unscripted questions they can't answer.

Cybersecurity companies should encourage their internal experts to lead thought leadership efforts. Doing so doesn't mean these professionals must write every blog post or do every interview - it means their real views should drive the content. Companies can let strong writers and communicators do some of the work, but only with guidance from the actual thought leaders. Companies should find people who are skilled in analysis and teach them to share insights clearly. Training matters because many good analysts might not have technical backgrounds, but they bring the critical thinking and communication skills key to shaping public discussion and educating customers.

Today's cybersecurity crisis makes thought leadership more critical than ever. Cyber threats change too fast for companies to rely on old analyses and solutions. Customers now need help with AI-powered threats that create fake media and automate phishing attacks. Thought leaders can also address cloud identity abuse, where attackers exploit weak spots in cloud systems to gain access, change data, or disrupt operations.

Building a reputation as a cybersecurity thought leader takes time and effort. Executives and experts wanting to raise their company's profile can start by creating articles that educate the public. For example, they could analyze a new threat trend or write about the need for better cybersecurity training now that remote work is common. Speaking at conferences and panels about new issues and best practices helps establish credibility as a thought leader. Regardless of the platform, these experts should back their insights with data-driven perspectives to help security professionals understand new risks. They should also challenge old cybersecurity ideas and push for new approaches.

Authentic, authoritative, and engaging thought leadership can convince key players in the cybersecurity field and influence how buyers make decisions. This approach differs from flashy marketing or campaigns that only chase traffic and engagements. Prudent buyers often verify claims against independent reports. True thought leadership talks with people - not at them - and gives recommendations to the audience after carefully analyzing a new cyber threat or issue affecting the industry. The result is that customers reward authenticity, as many will want to engage with a brand that teaches them something new and valuable.

Wayne Schepens, LaunchTech

Shop
0 Comments

How Public Speaking Contributes to Brand Success

6/6/2025

0 Comments

 
Picture
​Ensuring a digital presence, prioritizing customers, and adopting a market strategy are effective ways to boost personal and corporate brand awareness. However, companies should also prioritize public speaking, as it shapes how the public views the brand.

Public speaking can range from giving a keynote address to product launch presentations, webinars, or media chats and interviews. Each one helps establish a connection between the audience and the brand, giving it a human face and voice.

In many ways, public speaking helps to control the narrative around the brand. Speakers can tell the brand’s story directly to the audience, rather than letting competitors, the public, or the media tell it. For example, when controversy arises, releasing a comprehensive speech can clear up misconceptions and help emphasize the brand’s values, vision, and mission to the public. A compelling public speech can correct a damaged reputation far better than a statement released online.

Public speaking also helps humanize the brand. Consumers trust brands that they can associate with a name and a face, which makes appointing a representative a critical decision. Trust often translates into increased patronage and loyalty. For instance, Steve Jobs’ engaging and confident approach to public speaking contributed to many people perceiving Apple as a trustworthy brand.

Moreover, public speaking establishes thought leadership and authority. When brand representatives speak at lead seminars, industry conferences, and industry panels, they help position the brand as an expert in that particular field. Thought leaders obtain more media attention, enhance trust, and foster credibility. For instance, a budding fashion brand can establish its commitment to ethical values and expertise by having a representative speak about ethical manufacturing at an environmental summit.

In addition, public speaking can shape a strong internal culture. When leaders communicate clearly and passionately, they inspire employees, boost morale, and bring teams together around shared goals. A workplace where people feel motivated and connected often reflects positively on the outside world, turning employees into natural ambassadors for the brand.

Internal events, such as company-wide meetings, leadership retreats, and team town halls, all offer opportunities for leaders to set the tone through engaging and authentic communication. A well-delivered speech during these moments can energize teams, strengthen a sense of purpose, and encourage collaboration across departments. When employees feel seen, heard, and valued, it builds loyalty that extends far beyond the office walls.

Stories create a lasting impact; they are what truly stick. Great public speakers understand how to weave storytelling into their message, sharing personal anecdotes, customer experiences, or the company’s founding journey to create emotional resonance. By using relatable language and speaking from the heart, leaders can leave audiences with a genuine, memorable connection to the brand, helping to foster both loyalty and enthusiasm.

Lastly, as the commercial space gets increasingly competitive, brands need more than just clever marketing. They need genuine voices that truly connect with people. Public speaking plays a crucial role in humanizing brands, shaping their stories, building trust and authority, and creating emotional bonds with audiences and teams.

Wayne Schepens, LaunchTech

Shop
0 Comments

Recognizing and Avoiding Common Cyber Threats

5/19/2025

0 Comments

 
Picture
​Cyber threats are constantly evolving, becoming more sophisticated, and posing significant risks to both individuals and organizations. Gaining a basic understanding of these threats will help you take proactive steps to safeguard your finances, data, and privacy.

Phishing attacks are some of the most common cybersecurity attacks. In the process of carrying out the phishing attack, the threat actor impersonates legitimate individuals or institutions via text, email, fake websites, and messages. They do this to trick the user or individual into divulging sensitive information like credit card numbers, login credentials, and passwords. During phishing attacks, the threat actors often use urgent language, threatening to take drastic actions if you do not make certain immediate decisions. Also, they make use of suspicious email addresses and URLs.

To protect yourself from phishing attacks, you should never click links or download attachments that you deem to be suspicious. Also, before clicking a link or opening an attachment, you should verify the email address and double-check URLs. You can also make use of email filtering solutions and tools.

Malware refers to malicious software designed to steal data, exploit vulnerabilities, and damage computer systems and networks. It includes types such as spyware, viruses, worms, and trojans. Once malware infiltrates a system, it slows down performance, steals information, and grants hackers remote access. Signs of malware include unauthorized software installations and frequent pop-up ads. To protect against malware, install and regularly update antivirus software, avoid pirated software, and refrain from opening attachments from unknown sources.

Ransomware attacks refer to attacks on a victim’s entire system and a payment demand, most of the time in the form of digital currency, before exchanging the decryption key. This type of attack usually results in data loss, financial damage, and operational downtime. Ransomware attacks are usually carried out via malicious attachments, taking advantage of system vulnerabilities, and through infected software downloads. To protect yourself from ransomware attacks, you should regularly back up important files and ensure that your software and operating systems are up to date.

Man-in-the-middle (MitM) attacks occur when a cybercriminal secretly intercepts communication between two parties to steal sensitive information or insert malicious content. These attacks are particularly common on unsecured public Wi-Fi networks, where hackers can set up fake hotspots or hijack browser sessions to eavesdrop without your knowledge. In some cases, they even spoof HTTPS connections to make their actions appear legitimate. To protect yourself, avoid accessing sensitive accounts on public Wi-Fi unless absolutely necessary. When you do need to connect, use a VPN (Virtual Private Network) to encrypt your data. Always check that the websites you visit use HTTPS.

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks aim to overwhelm a server, website, or network by flooding it with massive amounts of traffic. While a DoS attack originates from a single source, a DDoS attack uses multiple compromised devices to create an even more powerful disruption. The goal is to crash systems, interrupt services, or render websites inaccessible. These types of attacks commonly target online stores, financial services, and government platforms.

Organizations can guard against such threats by implementing DDoS protection tools, using firewalls, and closely monitoring network traffic for unusual spikes or anomalies. Building redundancy into infrastructure and using load balancing can also help systems stay resilient under pressure. With the right measures in place, it’s possible to minimize the damage and maintain availability during an attack.

Wayne Schepens, LaunchTech

Shop
0 Comments

The Power of Placement: Why Media Relations Matter for Tech Companies

2/12/2025

0 Comments

 
Picture
​For technology companies, especially new ones, securing a place in the public eye can be a significant challenge. While innovative products and groundbreaking solutions are the lifeblood of tech companies, navigating the crowded media waters requires a strategic approach. This is where media relations play a significant role, establishing a positive and consistent dialogue between a tech company and media outlets.

Through relationships with journalists and publications, companies can secure valuable placements that not only increase brand awareness but also influence audience perception. Positive media coverage can act as a powerful endorsement, boosting credibility and trust among potential customers and investors.

Furthermore, well-cultivated media relations provide a platform for tech companies to shape the narrative around their brand and innovations. Through strategically placed articles and interviews, companies can ensure that their target audience understands the value proposition of their solutions. Targeted outreach, as opposed to generic advertising, can lead to a more engaged and qualified customer base.

The benefits extend beyond brand-building. Media relations can also act as a valuable tool for crisis management. In an industry prone to rapid shifts and potential security concerns, proactively building relationships with the media allows for a faster and more controlled response to negative situations. A trust relationship with journalists facilitates clear and timely communication, potentially mitigating damage to the company's reputation.

Neglecting media relations can leave a tech company struggling to be heard amid the din of industry noise. By fostering strong media partnerships, companies can effectively navigate the complex media landscape, shaping brand perception, attracting new customers, and ensuring that they remain at the forefront of the ever-evolving tech world.

Wayne Schepens, LaunchTech

Shop
0 Comments

Advantages of a Social Media Presence for Tech Companies

1/23/2025

0 Comments

 
Picture
​In today's rapidly evolving digital landscape, a robust social media presence has become indispensable for tech companies. This powerful tool offers a multifaceted approach to enhancing brand visibility, fostering customer relationships, and driving innovation.

Social media platforms provide tech firms with unparalleled opportunities to showcase their expertise and establish thought leadership. By sharing insightful content and industry analyses, companies can position themselves as authoritative voices in their respective niches. This approach not only attracts potential clients but also helps in recruiting top talent in a competitive market.

Moreover, social media platforms serve as invaluable channels for real-time customer engagement and support. Tech companies can leverage social media to address queries promptly, gather feedback, and nurture a sense of community among users. This direct line of communication grows trust and loyalty, crucial in the fast-paced tech sector.

For B2B tech firms, platforms like LinkedIn offer targeted networking opportunities, facilitating meaningful connections with decision-makers and industry peers. Meanwhile, visual platforms such as Instagram and YouTube enable companies to demystify complex technologies through engaging, accessible content.

Ultimately, a strategic social media presence allows tech companies to stay agile, responsive, and connected in an industry where innovation and communication are paramount. By harnessing these digital tools effectively, tech firms can amplify their market presence and drive sustainable growth in an increasingly connected world.

Wayne Schepens, LaunchTech

Shop
0 Comments

The Cybersecurity Skills Gap - Causes and Solutions for Organizations

12/26/2024

0 Comments

 
Picture
​The ever-evolving cybersecurity landscape poses a significant challenge for organizations of all sizes. While cyberattacks are becoming more sophisticated, the pool of qualified cybersecurity professionals is struggling to keep pace. The widening cybersecurity skills gap is a growing concern for many businesses, leaving them vulnerable to data breaches and operational disruptions.

Several factors contribute to this gap. The rapid development of new technologies creates a constant demand for professionals with specialized skills in areas like cloud security, threat intelligence, and incident response. Traditional educational paths often struggle to adapt quickly enough to these new demands. Additionally, a lack of awareness about cybersecurity careers, particularly among younger generations, can limit the talent pool.

Organizations face severe consequences if they fail to address this skills gap. Unfilled cybersecurity positions leave critical systems and data exposed. The ISC2 Cybersecurity Workforce Report underscores the need for a robust and well-trained cybersecurity workforce.

So, what can organizations do to bridge this gap? One strategy involves investing in upskilling and reskilling existing employees. By providing training programs that focus on in-demand skills, organizations can empower their current workforce to address evolving cybersecurity threats. Additionally, fostering a culture of cybersecurity awareness within the organization can help employees identify and report suspicious activity.

Partnerships with educational institutions can also be a valuable tool. Collaborative efforts can help develop curricula that align with the latest cybersecurity needs, preparing future generations for a career in this critical field.

Moreover, promoting cybersecurity careers as a viable and rewarding option is essential. By showcasing the diverse range of roles available within the field and the positive impact cybersecurity professionals have on organizational resilience, companies can attract a wider range of talent.

Wayne Schepens, LaunchTech

Shop
0 Comments

Trends in Cybersecurity Workforce Training

12/9/2024

0 Comments

 
Picture
​The cybersecurity landscape is constantly evolving, with new threats emerging alongside innovative technologies. To stay ahead of this curve, organizations are increasingly emphasizing training and development for their cybersecurity professionals. This focus has led to several key trends shaping the way the cybersecurity workforce is being equipped.

One significant trend is the rise of specialization. Traditional, broad cybersecurity certifications are still valuable, but a deeper understanding of specific areas like cloud security, incident response, and threat intelligence is becoming crucial. Online courses and micro-credentials are allowing professionals to gain expertise in these focused domains, catering to the growing need for well-rounded teams with diverse skillsets.

Hands-on learning is also gaining traction. While theoretical knowledge is essential, real-world experience is critical for effective defense. Training programs are incorporating simulations, gamification, and practical exercises to provide a more immersive learning environment. This equips security professionals to handle specific scenarios with greater confidence and efficiency.

Furthermore, the accessibility of training is expanding. Online platforms and flexible learning options are making training more available to geographically dispersed teams and those with busy schedules. This allows for continuous upskilling and reskilling, ensuring that the workforce remains updated on the latest threats and solutions.

There's also a growing emphasis on soft skills development. Cybersecurity professionals need strong communication, collaboration, and problem-solving skills to effectively work with other teams and stakeholders. Training programs are incorporating these aspects to create a well-rounded workforce capable of bridging the gap between technical knowledge and practical implementation.

Finally, organizations are shifting towards a culture of security awareness across teams and departments. Training programs are no longer solely aimed at technical professionals. Phishing simulations and security-awareness campaigns are educating the entire workforce on cyber threats. This fosters a more collaborative security posture where everyone plays a role in protecting organizational data.

By embracing these trends in training and development, organizations can build a more resilient and adaptable cybersecurity workforce with the capability to counter the ever-evolving landscape of cyber threats.

Wayne Schepens, LaunchTech

Shop
0 Comments

TAC Panel Explores Workforce Gap in Cybersecurity and Solutions to It

10/22/2024

0 Comments

 
Picture
​The Technology Advancement Center (TAC), a nonprofit focused on fostering collaboration between industry and academia, recently hosted a panel discussion titled "Expert Insights on Workforce Development & Mission-Oriented Cybersecurity Training." Moderated by Wayne Schepens of the CyberRisk Alliance, the discussion addressed the growing need for cybersecurity professionals with specialized skills and explored strategies for closing this workforce gap.

Panelists, representing industry leaders and academic institutions, highlighted the increasing sophistication of cyber threats and the critical shortage of qualified personnel to address them. Traditional cybersecurity training, they argued, often focuses on broad technical knowledge rather than mission-specific skills tailored to address the unique challenges faced by individual organizations. This mismatch between training and real-world needs creates a significant barrier to effective cybersecurity.

The discussion explored several potential solutions to bridge this gap. Collaboration between industry and academia was identified as a key factor. Universities can integrate industry expertise into their curricula, ensuring that graduates possess the relevant skillsets required in the workforce. Additionally, industry organizations can provide internship and mentorship opportunities, allowing students to gain practical experience.

The panel also emphasized the need for continuous learning and upskilling. As cyber threats evolve rapidly, cybersecurity professionals must remain current with the latest techniques and tools. Educational institutions and industry partners can offer ongoing training programs to equip professionals with the skills to stay ahead of the curve.

By fostering collaboration and prioritizing mission-oriented training, the cybersecurity community can bridge the workforce gap and build a more robust defense against increasingly sophisticated cyber threats.

Wayne Schepens, LaunchTech

Shop
0 Comments
<<Previous

    Author

    Managing Director At LaunchTech Communications.

    Archives

    June 2024
    May 2024
    April 2024
    March 2024
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    October 2018

    Categories

    All
    Business
    Wayne Schepens

    RSS Feed

Powered by Create your own unique website with customizable templates.
  • Blog
  • About