Getting Thought Leadership Right: How to Create Credible Cybersecurity Research

NEVERHACK Estonia 31. okt. 2025

At the Nordic-Baltic Security Summit 2025, CyberCast host Ronnie Jaanhold sat down with Henry Rõigas, cybersecurity strategist, researcher, and founder of evisec.xyz, to discuss one of the most misunderstood topics in the cybersecurity industry: thought leadership.

In a marketplace overflowing with reports, whitepapers, and so-called data-driven insights, how can vendors stand out as credible voices instead of being just another marketing machine? Henry’s answer is simple and powerful: focus on evidence, context, and credibility.

Why Thought Leadership Matters
“Thought leadership is not marketing,” Henry says early in the conversation. “It’s a beacon that helps us through the noise.”

With thousands of vendors competing for attention, the cybersecurity space has become an information battlefield. Every company wants to appear innovative, insightful, and relevant. But true thought leadership is not about shouting louder. It is about providing clarity, value, and trust.

Henry’s firm, evisec.xyz, publishes the Cybersecurity Research Digest, a regular overview of data-led trends that filters marketing fluff from real insight. The publication’s mission is to identify which vendor reports truly add value and which are built on shaky survey questions or self-serving narratives.

The Origins of evisec and the Motivation Behind It
Before founding evisec, Henry worked as a researcher at NATO’s Cooperative Cyber Defence Centre of Excellence in Tallinn. There, he saw how difficult it was to find reliable, evidence-based cybersecurity information. Governments published very little, academia worked at a slow pace, and vendors, who had access to vast amounts of data, filled the gap.

But vendor-led research came with bias. Many reports were thinly disguised marketing campaigns. “I found myself reading these reports, realizing they were relevant but also full of spin,” Henry recalls. That experience led him to develop a “filtering method” to separate useful data from the noise.

Why do so many vendor reports fall short? The answer lies in motivation. Companies publish research to attract attention, boost credibility, and drive sales. “There’s always a marketing motive,” Henry says. “But that doesn’t mean the research can’t also be credible.”

The key is to align business goals with authenticity. Credible research doesn’t just inform the market, it informs the vendor itself. For instance, a managed security provider analyzing its incident response data can learn what’s working, where to improve, and which threats matter most. “Done properly,” Henry explains, “you can kill two birds with one stone by creating valuable content and improving your own strategy.”

The Pitfalls of Fear-Based Research
Henry is honest about the state of the industry. “The lion’s share is just fear-mongering,” he says. Many reports are built around leading questions and survey bias.

He gives an example: a startup focused on shadow IT commissions a survey asking, “Do you think shadow IT is a problem?” Unsurprisingly, 90 percent say yes. That statistic becomes the headline, “90 percent of companies see shadow IT as a threat,” followed by a call to buy their solution.

It is not wrong, but it is not useful either. “There’s no nuance,” Henry explains. “Good research puts problems into context and helps decision-makers prioritize.”

Why the Cybersecurity Market Is So Noisy
The cybersecurity vendor landscape is enormous, with thousands of companies all promising to solve a piece of the puzzle. This creates a hyper-competitive environment where everyone fights for attention. According to Henry, this intensity also explains the explosion of vendor research.

Buyers often make decisions based on trust, not just technical details. “Security is such a sensitive area,” he says. “Organizations prefer local or national players, and that creates small ecosystems in every country.”

This trust-based model fuels the demand for visibility and for research that signals authority. Unfortunately, the result is often a flood of content that sounds insightful but adds little substance.

What Makes Data Good
Henry defines good empirical data as unbiased, clearly sourced, and contextualized. “The worst thing you can do is write a report that only focuses on the problem you solve,” he warns. Decision-makers need perspective. They want to know not just that shadow IT or phishing is a problem, but how big that problem is compared to others.

Neutral, contextual reporting builds trust, and that trust pays off. “You need to eat your own dog food,” Henry says. “If you start believing your own marketing too much, you lose touch with reality.”

How to Detect Bad Research
In a memorable moment, Henry introduces his “BS checklist,” a practical way to evaluate the credibility of any cybersecurity report.

  1. Who’s behind it?
    Identify the author and their motivation. Is the research meant to inform or to sell?

  2. What’s the data source?
    Look for evidence-based data, such as product telemetry, incident response cases, or financial losses, not just survey opinions.

  3. Are the methods clear?
    Good research defines its terms. If a survey asks, “Have you had a security incident?” but never defines what that means, the results are meaningless.

  4. Can you cross-verify it?
    Check whether other sources support the same insight. If not, question the finding.

  5. Is it actionable?
    The best reports help decision-makers take clear next steps. If it’s just noise or fearmongering, it’s not useful.

It’s a lighthearted list, but Henry’s advice is serious. “Apply common sense,” he says. “Trust but verify.”

Examples of Credible Research
Not all vendor reports are bad. Henry highlights several that get it right.
Incident response analyses by managed security service providers use real-world cases to extract lessons.
Crypto analysis reports track ransomware payments with clear, factual, and data-driven insights.
Long-running studies like Verizon’s DBIR or IBM’s annual security reports are respected because they offer consistent, comparable data over time.
Cyber insurance insights are also valuable because they are objective and financially grounded, based on claims, losses, and risk calculations.

These examples share a common thread: they are solution-agnostic, empirical, and transparent about their data.

A Call to Common Sense
As the session wraps up, Henry leaves listeners with a simple but powerful message: “Trust but verify, and use common sense.”

In a field where hype often outweighs honesty, that might be the most valuable cybersecurity advice of all. For CISOs, analysts, marketers, and anyone shaping cybersecurity narratives, this episode is essential. It breaks down how to approach vendor research critically, design credible studies, and understand the motivations behind every chart and statistic.

Listeners walk away with:

  • A clear framework for evaluating cybersecurity reports

  • An understanding of what makes research credible and impactful

  • Real-world examples of data-led studies that inform rather than sell

  • Practical tips for building trust and reputation through transparency

In an age of information overload, credibility is currency. Henry Rõigas shows us how to earn it.

Listen now on CyberCast and learn how to get thought leadership right.

Jaga

Märksõnad

Märksõnad

Jaga

Viimased postitused

21. mai 2026

Ronnie Jaanhold: tehisaru ja pärisaru koostöös kasvab turvalisus

Tehnoloogia areneb kiiremini, kui regulatsioonid ja inimeste teadmised järele jõuavad. Pettused muutuvad usutavamaks, tööriistad võimsamaks ja nende kasutamisega kaasnev mugavus kasvab samuti kiiresti, kirjutab Ronnie Jaanhold. Arst kuulab patsienti, keskendub ja küsib täpsustavaid küsimusi. Ta ei kirjuta midagi üles, sest vestlus salvestatakse ning tehisintellekt koostab sellest ise haigusloo. Arstil jääb nüüd rohkem aega patsiendi jaoks, […]

Loe edasi
18. mai 2026

NEVERHACK Eesti juht Jürgen Erm: elame andmelekete kuldajastul

NEVERHACK Eesti juht Jürgen Erm rääkis Algorütmi podcastis ettevõtte algusaastatest, müügitehingu telgitagustest prantslastele ning mida kujutab endast tänapäevane turvaseire teenus. Ermi sõnul võib NEVERHACKi turvaseiret lihtsustatult võrrelda digitaalse turvamehega, kelle ülesanne on märgata ohtlikku tegevust enne, kui sellest kasvab suurem intsident.. Pikemalt räägiti ka sellest, mida NEVERHACKi turvaseire teenus tegelikult tähendab. Erm kirjeldab seda lihtsustatult […]

Loe edasi
11. mai 2026

Aleksei Zjabkin: „Kui midagi ei juhtu, siis oled oma tööd hästi teinud“

Küberturvalisuse maailmas räägitakse sageli rünnakutest, kriisidest ja miljarditesse ulatuvatest kahjudest. Vähem on aga juttu  inimestest, kes töötavad selle nimel, et midagi ei juhtukski. Aleksei Zjabkin on üks neist inimestest. Täna juhib ta Neverhacki SOC-i (Security Operations Center) ehk turvaseire keskust, mis töötab ööpäevaringselt, jälgides, analüüsides ja reageerides klientide turvaohtudele. Aleksei teekond küberturvalisusse ei alanud aga [...]

Loe edasi