<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/breaking-through-in-cybersecurity-marketing" rel="self" type="application/rss+xml"/>
    <title>Breaking Through in Cybersecurity Marketing</title>
    <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing</link>
    <language>en</language>
    <copyright>©2024 Cybersecurity Marketing Society 706761</copyright>
    <description>Cybersecurity marketer, we’ve got your back! Created by the Cybersecurity Marketing Society, the Breaking Through in Cybersecurity Marketing podcast shares the stories, successes, and failures of marketers in this fast-paced and constantly changing industry. Listen to learn, laugh, and improve your cybersecurity marketing game! New episodes every Wednesday. </description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/5f4a33dc-b63b-11ee-b7e0-c72278fd340d/image/BreakingThroughCover2000px.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Breaking Through in Cybersecurity Marketing</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Stand above the noise in cybersecurity marketing.</itunes:subtitle>
    <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
    <itunes:summary>Cybersecurity marketer, we’ve got your back! Created by the Cybersecurity Marketing Society, the Breaking Through in Cybersecurity Marketing podcast shares the stories, successes, and failures of marketers in this fast-paced and constantly changing industry. Listen to learn, laugh, and improve your cybersecurity marketing game! New episodes every Wednesday. </itunes:summary>
    <content:encoded>
      <![CDATA[<p>Cybersecurity marketer, we’ve got your back! Created by the <a href="https://d15-9j04.na1.hs-sales-engage.com/Ctc/DN+23284/d15-9J04/JkM2-6qcW6N1vHY6lZ3nNW7kH3mQ1PnqX4W1clzl_1DtYy0W3fMGbw94gqK6W3ZsJdS4wwbqKW8mK6Y62jnRxbW5twT7z5yj99vW2B-7lq6N6QZ-VVcvWN1NnRgkW2gkQHf3xXRV6W1cSsvR842mWMW3lk0Gt7CJ7t7W8gnTt-3DVWnFW76lf483WPHhcW4yQCqK5RwT11W55Hbgb5LFjVlN8kcLMc_81YCN4p2Nc4pyq9VW7Bx8KX7gjhmKN3fJP0HMxT_3W1jJYTB6G3YgTW69WYhp8mpQ7qW7cd58K5qMb7nf4B0vXl04">Cybersecurity Marketing Society</a>, the Breaking Through in Cybersecurity Marketing podcast shares the stories, successes, and failures of marketers in this fast-paced and constantly changing industry. Listen to learn, laugh, and improve your cybersecurity marketing game! New episodes every Wednesday. </p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>Cybersecurity Marketing Society</itunes:name>
      <itunes:email>producer@n2k.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/5f4a33dc-b63b-11ee-b7e0-c72278fd340d/image/BreakingThroughCover2000px.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Business">
      <itunes:category text="Marketing"/>
    </itunes:category>
    <item>
      <title>Alignment Episode: How Traci Byrne Works Across CISOs, Startups, and Partners</title>
      <link>https://www.thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/208/notes</link>
      <description>Episode Summary:

Traci Byrne has spent a lot of her time aligning CISOs, startups, and internal teams.

In this episode, she breaks down how she does that, starting with listening, understanding what each side is trying to do, and using that to guide decisions without forcing them.

That same approach shows up in disagreements. Instead of shutting ideas down, she asks questions that expose gaps and lets people work through them.

It shows up most in security, where risk, new tech, and competing priorities all collide. If your role depends on influence and not control, this one will feel very familiar! 

Chapters:

[00:00] Introduction to Cybersecurity Marketing and Guest Introduction

[03:49] Understanding Global Security Strategic Initiatives

[06:28] A Week in the Life of Tracy Byrne

[08:48] Navigating Startup and Enterprise Relationships

[11:34] Operational Resilience and Cybersecurity

[14:09] Influencing Without Authority in Cybersecurity

[16:25] Building Trust and Understanding Stakeholder Needs

[17:42] Healthy Conflict and Disagreement Management

[20:17] Company Culture and Collaboration at WWT

[22:30] Personal Aspirations and Future Goals



About Traci:

Traci Byrne was recently Head of Global Security Strategic Initiatives at World Wide Technology at the time of recording. She worked across enterprise teams and partners, supporting large strategic deals and helping organizations navigate complex security challenges.

She also advises startups on go-to-market and engaging with large enterprises, and hosts the Meet the Chief podcast.



Links &amp; Resources:

Traci Byrne on LinkedIn



Subscribe &amp; Review: 

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you on the next episode!</description>
      <pubDate>Wed, 22 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Alignment Episode: How Traci Byrne Works Across CISOs, Startups, and Partners</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>208</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Traci Byrne has spent a lot of her time aligning CISOs, startups, and internal teams.

In this episode, she breaks down how she does that, starting with listening, understanding what each side is trying to do, and using that to guide decisions without forcing them.

That same approach shows up in disagreements. Instead of shutting ideas down, she asks questions that expose gaps and lets people work through them.

It shows up most in security, where risk, new tech, and competing priorities all collide. If your role depends on influence and not control, this one will feel very familiar! 

Chapters:

[00:00] Introduction to Cybersecurity Marketing and Guest Introduction

[03:49] Understanding Global Security Strategic Initiatives

[06:28] A Week in the Life of Tracy Byrne

[08:48] Navigating Startup and Enterprise Relationships

[11:34] Operational Resilience and Cybersecurity

[14:09] Influencing Without Authority in Cybersecurity

[16:25] Building Trust and Understanding Stakeholder Needs

[17:42] Healthy Conflict and Disagreement Management

[20:17] Company Culture and Collaboration at WWT

[22:30] Personal Aspirations and Future Goals



About Traci:

Traci Byrne was recently Head of Global Security Strategic Initiatives at World Wide Technology at the time of recording. She worked across enterprise teams and partners, supporting large strategic deals and helping organizations navigate complex security challenges.

She also advises startups on go-to-market and engaging with large enterprises, and hosts the Meet the Chief podcast.



Links &amp; Resources:

Traci Byrne on LinkedIn



Subscribe &amp; Review: 

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you on the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Traci Byrne has spent a lot of her time aligning CISOs, startups, and internal teams.</p>
<p>In this episode, she breaks down how she does that, starting with listening, understanding what each side is trying to do, and using that to guide decisions without forcing them.</p>
<p>That same approach shows up in disagreements. Instead of shutting ideas down, she asks questions that expose gaps and lets people work through them.</p>
<p>It shows up most in security, where risk, new tech, and competing priorities all collide. If your role depends on influence and not control, this one will feel very familiar! </p>
<p><strong>Chapters:</strong></p>
<p>[00:00] Introduction to Cybersecurity Marketing and Guest Introduction</p>
<p>[03:49] Understanding Global Security Strategic Initiatives</p>
<p>[06:28] A Week in the Life of Tracy Byrne</p>
<p>[08:48] Navigating Startup and Enterprise Relationships</p>
<p>[11:34] Operational Resilience and Cybersecurity</p>
<p>[14:09] Influencing Without Authority in Cybersecurity</p>
<p>[16:25] Building Trust and Understanding Stakeholder Needs</p>
<p>[17:42] Healthy Conflict and Disagreement Management</p>
<p>[20:17] Company Culture and Collaboration at WWT</p>
<p>[22:30] Personal Aspirations and Future Goals</p>
<p><br></p>
<p><strong>About Traci:</strong></p>
<p>Traci Byrne was recently Head of Global Security Strategic Initiatives at World Wide Technology at the time of recording. She worked across enterprise teams and partners, supporting large strategic deals and helping organizations navigate complex security challenges.</p>
<p>She also advises startups on go-to-market and engaging with large enterprises, and hosts the <em>Meet the Chief</em> podcast.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<p>Traci Byrne on <a href="https://www.linkedin.com/in/tracisever/"><u>LinkedIn</u></a></p>
<p><br></p>
<p><strong>Subscribe &amp; Review: </strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Host:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p><br></p>
<p>See you on the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2031</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[78bce9d0-3a4c-11f1-8339-ffa6e7607325]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7246281447.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What Founders Get Wrong About Early Marketing with Merav Ben Avi, VP of Marketing at YL Ventures</title>
      <link>https://www.thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/207/notes</link>
      <description>Episode Summary:

Merav Ben Avi, VP of Marketing at YL Ventures, makes a strong case for something most security founders get wrong: marketing should not come later. It should be there from the start.

She explains why hiring too late creates messy positioning, weak launches, and marketers stuck fixing confusion instead of shaping the story. The first marketing hire is not there to run campaigns. They are there to define why the company exists while everything is still taking shape.

Merav also gets into why product marketing is not always the first hire, what founders miss when evaluating marketers, and why “AI solves everything” messaging is already wearing thin with CISOs.

If you're building or joining an early-stage security startup, this will challenge how you think about your first marketing hire!



Chapters:

00:00 Introduction to YL Ventures and Merav's Role

03:14 The Importance of Early Marketing in Cybersecurity Startups

06:05 Hiring Marketing Talent: Philosophy and Strategy

08:41 Navigating the AI Security Landscape

11:19 Building Trust Between Founders and Marketers

13:36 The Role of Marketing in Early Stage Startups

16:08 Finding the Right Marketing Candidates

18:55 Stealth Mode vs. Building in Public

21:37 Common Mistakes in Hiring Marketing

23:21 Conclusion and Contact Information



About Merav:

Merav Ben Avi is VP of Marketing at YL Ventures, where she works hands-on with early-stage cybersecurity startups on positioning, messaging, and go-to-market.

She partners closely with founders to shape how their companies show up from day one, while also leading marketing for YL Ventures.



Links &amp; Resources:


  
Merav Ben Avi on LinkedIn



  
YL Ventures website



  
Building Island’s Brand with Ari Yablok (referenced in this episode)



  
You Don’t Need a Budget—You Need a Hat: Orly Bar-Lev on Lasso’s GTM (referenced in this episode)




Subscribe &amp; Review: 

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you on the next episode!</description>
      <pubDate>Wed, 15 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>207</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Merav Ben Avi, VP of Marketing at YL Ventures, makes a strong case for something most security founders get wrong: marketing should not come later. It should be there from the start.

She explains why hiring too late creates messy positioning, weak launches, and marketers stuck fixing confusion instead of shaping the story. The first marketing hire is not there to run campaigns. They are there to define why the company exists while everything is still taking shape.

Merav also gets into why product marketing is not always the first hire, what founders miss when evaluating marketers, and why “AI solves everything” messaging is already wearing thin with CISOs.

If you're building or joining an early-stage security startup, this will challenge how you think about your first marketing hire!



Chapters:

00:00 Introduction to YL Ventures and Merav's Role

03:14 The Importance of Early Marketing in Cybersecurity Startups

06:05 Hiring Marketing Talent: Philosophy and Strategy

08:41 Navigating the AI Security Landscape

11:19 Building Trust Between Founders and Marketers

13:36 The Role of Marketing in Early Stage Startups

16:08 Finding the Right Marketing Candidates

18:55 Stealth Mode vs. Building in Public

21:37 Common Mistakes in Hiring Marketing

23:21 Conclusion and Contact Information



About Merav:

Merav Ben Avi is VP of Marketing at YL Ventures, where she works hands-on with early-stage cybersecurity startups on positioning, messaging, and go-to-market.

She partners closely with founders to shape how their companies show up from day one, while also leading marketing for YL Ventures.



Links &amp; Resources:


  
Merav Ben Avi on LinkedIn



  
YL Ventures website



  
Building Island’s Brand with Ari Yablok (referenced in this episode)



  
You Don’t Need a Budget—You Need a Hat: Orly Bar-Lev on Lasso’s GTM (referenced in this episode)




Subscribe &amp; Review: 

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you on the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Merav Ben Avi, VP of Marketing at YL Ventures, makes a strong case for something most security founders get wrong: marketing should not come later. It should be there from the start.</p>
<p>She explains why hiring too late creates messy positioning, weak launches, and marketers stuck fixing confusion instead of shaping the story. The first marketing hire is not there to run campaigns. They are there to define why the company exists while everything is still taking shape.</p>
<p>Merav also gets into why product marketing is not always the first hire, what founders miss when evaluating marketers, and why “AI solves everything” messaging is already wearing thin with CISOs.</p>
<p>If you're building or joining an early-stage security startup, this will challenge how you think about your first marketing hire!</p>
<p><br></p>
<p><strong>Chapters:</strong></p>
<p>00:00 Introduction to YL Ventures and Merav's Role</p>
<p>03:14 The Importance of Early Marketing in Cybersecurity Startups</p>
<p>06:05 Hiring Marketing Talent: Philosophy and Strategy</p>
<p>08:41 Navigating the AI Security Landscape</p>
<p>11:19 Building Trust Between Founders and Marketers</p>
<p>13:36 The Role of Marketing in Early Stage Startups</p>
<p>16:08 Finding the Right Marketing Candidates</p>
<p>18:55 Stealth Mode vs. Building in Public</p>
<p>21:37 Common Mistakes in Hiring Marketing</p>
<p>23:21 Conclusion and Contact Information</p>
<p><br></p>
<p><strong>About Merav:</strong></p>
<p>Merav Ben Avi is VP of Marketing at YL Ventures, where she works hands-on with early-stage cybersecurity startups on positioning, messaging, and go-to-market.</p>
<p>She partners closely with founders to shape how their companies show up from day one, while also leading marketing for YL Ventures.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<ul>
  <li>
<p>Merav Ben Avi on <a href="https://www.linkedin.com/in/merav-ben-avi-567219209/"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>YL Ventures <a href="https://www.ylventures.com/"><u>website</u></a></p>
</li>
  <li>
<p><a href="https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/113/notes"><u>Building Island’s Brand with Ari Yablok</u></a> (referenced in this episode)</p>
</li>
  <li>
<p><a href="https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/171/notes"><u>You Don’t Need a Budget—You Need a Hat: Orly Bar-Lev on Lasso’s GTM</u></a> (referenced in this episode<strong>)</strong></p>
</li>
</ul>
<p><strong>Subscribe &amp; Review: </strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Host:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p><br></p>
<p>See you on the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2043</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[34ce3706-3411-11f1-9c95-9306f8f95285]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3037098076.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping Product-Market Fit After an Acquisition with Kevin Bobowski</title>
      <link>https://www.thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/206/notes</link>
      <description>Episode Summary:

What changes when you go from a startup to a much bigger company after an acquisition? On today’s episode, Kevin Bobowski, now CMO of Archer, breaks down what that shift looks like based on his experience moving from Aware into Mimecast.

At Aware, staying close to the customer was built into the day-to-day. Conversations were constant, and product-market fit came from paying attention to what was working and cutting what wasn’t, even if it looked good on paper.

At Mimecast, that same instinct still mattered, but it became harder to maintain. There’s more data, more structure, and more distance from the customer if you’re not careful.

Kevin shares how that shift changed the way he thinks about product-market fit across segments, products, and teams, and why it’s something you have to keep reworking as markets evolve.

If you’re trying to stay grounded in what your buyers are really saying while everything around you scales, this one will resonate.



About Kevin: 

Kevin Bobowski is Chief Marketing Officer at Archer.

He previously led marketing at Aware, where he helped build the go-to-market motion that led to the company’s acquisition by Mimecast.

His experience spans startups and larger organizations, with a focus on product-market fit, segmentation, and scaling marketing teams.



Links &amp; Resources:

Kevin Bobowski on LinkedIn

Mimecast



Subscribe &amp; Review: 

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you on the next episode!</description>
      <pubDate>Wed, 08 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>Keeping Product-Market Fit After an Acquisition with Kevin Bobowski</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>206</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

What changes when you go from a startup to a much bigger company after an acquisition? On today’s episode, Kevin Bobowski, now CMO of Archer, breaks down what that shift looks like based on his experience moving from Aware into Mimecast.

At Aware, staying close to the customer was built into the day-to-day. Conversations were constant, and product-market fit came from paying attention to what was working and cutting what wasn’t, even if it looked good on paper.

At Mimecast, that same instinct still mattered, but it became harder to maintain. There’s more data, more structure, and more distance from the customer if you’re not careful.

Kevin shares how that shift changed the way he thinks about product-market fit across segments, products, and teams, and why it’s something you have to keep reworking as markets evolve.

If you’re trying to stay grounded in what your buyers are really saying while everything around you scales, this one will resonate.



About Kevin: 

Kevin Bobowski is Chief Marketing Officer at Archer.

He previously led marketing at Aware, where he helped build the go-to-market motion that led to the company’s acquisition by Mimecast.

His experience spans startups and larger organizations, with a focus on product-market fit, segmentation, and scaling marketing teams.



Links &amp; Resources:

Kevin Bobowski on LinkedIn

Mimecast



Subscribe &amp; Review: 

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you on the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>What changes when you go from a startup to a much bigger company after an acquisition? On today’s episode, Kevin Bobowski, now CMO of Archer, breaks down what that shift looks like based on his experience moving from Aware into Mimecast.</p>
<p>At Aware, staying close to the customer was built into the day-to-day. Conversations were constant, and product-market fit came from paying attention to what was working and cutting what wasn’t, even if it looked good on paper.</p>
<p>At Mimecast, that same instinct still mattered, but it became harder to maintain. There’s more data, more structure, and more distance from the customer if you’re not careful.</p>
<p>Kevin shares how that shift changed the way he thinks about product-market fit across segments, products, and teams, and why it’s something you have to keep reworking as markets evolve.</p>
<p>If you’re trying to stay grounded in what your buyers are really saying while everything around you scales, this one will resonate.</p>
<p><br></p>
<p><strong>About Kevin: </strong></p>
<p>Kevin Bobowski is Chief Marketing Officer at Archer.</p>
<p>He previously led marketing at Aware, where he helped build the go-to-market motion that led to the company’s acquisition by Mimecast.</p>
<p>His experience spans startups and larger organizations, with a focus on product-market fit, segmentation, and scaling marketing teams.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<p>Kevin Bobowski on <a href="https://www.linkedin.com/in/kevin-bobowski/"><u>LinkedIn</u></a></p>
<p><a href="https://www.mimecast.com/"><u>Mimecast</u></a></p>
<p><br></p>
<p><strong>Subscribe &amp; Review: </strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Host:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p><br></p>
<p>See you on the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2195</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4778d830-2e93-11f1-b476-0f204fe9b36d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6205877416.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> What a New Marketing Leader Fixes First with Christine Bartlett, CMO of Hack The Box. </title>
      <link>https://www.thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/205/notes</link>
      <description>Episode Summary:

Christine Bartlett, SVP of Marketing at Hack The Box, tackles one of the trickiest challenges in marketing leadership: how to come in, make meaningful changes, and still preserve the magic that was there before you arrived.

She gets into building a field marketing team, moving past last-touch attribution to create alignment amongst the business, and what it takes to get execs and the board on board. There’s also a good conversation around how Hack The Box balances a community model with enterprise, and why investing in early-career talent still pays off!



About Christine: Christine Bartlett is the SVP of Marketing at Hack The Box, where she leads global marketing across both community and enterprise.

She’s spent over a decade in cybersecurity marketing, with leadership roles at Cisco and SonicWall, focused on building teams and driving growth.



Links &amp; Resources:


  
Hack the Box 



  
Let's Defend



  
CyberMarketingCon 2026 



  
HubSpot 



  
LinkedIn 




Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you on the next episode!</description>
      <pubDate>Wed, 01 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title> What a New Marketing Leader Fixes First with Christine Bartlett, CMO of Hack The Box. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>205</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Christine Bartlett, SVP of Marketing at Hack The Box, tackles one of the trickiest challenges in marketing leadership: how to come in, make meaningful changes, and still preserve the magic that was there before you arrived.

She gets into building a field marketing team, moving past last-touch attribution to create alignment amongst the business, and what it takes to get execs and the board on board. There’s also a good conversation around how Hack The Box balances a community model with enterprise, and why investing in early-career talent still pays off!



About Christine: Christine Bartlett is the SVP of Marketing at Hack The Box, where she leads global marketing across both community and enterprise.

She’s spent over a decade in cybersecurity marketing, with leadership roles at Cisco and SonicWall, focused on building teams and driving growth.



Links &amp; Resources:


  
Hack the Box 



  
Let's Defend



  
CyberMarketingCon 2026 



  
HubSpot 



  
LinkedIn 




Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you on the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Christine Bartlett, SVP of Marketing at Hack The Box, tackles one of the trickiest challenges in marketing leadership: how to come in, make meaningful changes, and still preserve the magic that was there before you arrived.</p>
<p>She gets into building a field marketing team, moving past last-touch attribution to create alignment amongst the business, and what it takes to get execs and the board on board. There’s also a good conversation around how Hack The Box balances a community model with enterprise, and why investing in early-career talent still pays off!</p>
<p><br></p>
<p><strong>About Christine: </strong><a href="https://www.linkedin.com/in/christinebartlett-cmo/"><u>Christine Bartlett</u></a> is the SVP of Marketing at <a href="https://www.hackthebox.com"><u>Hack The Box</u></a>, where she leads global marketing across both community and enterprise.</p>
<p>She’s spent over a decade in cybersecurity marketing, with leadership roles at Cisco and SonicWall, focused on building teams and driving growth.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<ul>
  <li>
<p><a href="https://www.hackthebox.com"><u>Hack the Box </u></a></p>
</li>
  <li>
<p><a href="https://letsdefend.io/"><u>Let's Defend</u></a></p>
</li>
  <li>
<p><a href="https://www.cybermarketingconference.com/"><u>CyberMarketingCon 2026 </u></a></p>
</li>
  <li>
<p><a href="https://www.hubspot.com"><u>HubSpot</u></a> </p>
</li>
  <li>
<p><a href="https://www.linkedin.com"><u>LinkedIn </u></a></p>
</li>
</ul>
<p><strong>Subscribe &amp; Review: </strong>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Host:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you on the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1760</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[74f341dc-29b7-11f1-bf67-aff57fe13ec5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2546329380.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What It Takes to Rebrand a Cybersecurity Company</title>
      <link>https://www.thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/204/notes</link>
      <description>Episode Summary:

In this Cyber CMO Confidential episode, Netwrix CMO John Knightly joins Gianna and Charles to talk through the company’s recent rebrand and the thinking behind it.

After years of growth through acquisitions, Netwrix needed a clearer story. John shares how the team repositioned the company around data security that starts with identity, simplified its messaging, and rolled the new brand out across a global organization.

If you’re navigating brand evolution, product complexity, or internal buy-in, this episode offers a look at what it actually takes to pull off a cybersecurity rebrand.



About John:

John Knightly is the Chief Marketing Officer at Netwrix, where he leads the company’s global marketing organization. Before joining Netwrix, he held senior marketing leadership roles at Zscaler, BlueJeans by Verizon, Hewlett Packard Enterprise, and HP, bringing more than 20 years of experience in enterprise technology and cybersecurity marketing.



Links &amp; Resources:


  
John Knightly on LinkedIn



  
Netwrix




Subscribe &amp; Review:

 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn



  
Charles Gold on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 25 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>What It Takes to Rebrand a Cybersecurity Company</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>204</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

In this Cyber CMO Confidential episode, Netwrix CMO John Knightly joins Gianna and Charles to talk through the company’s recent rebrand and the thinking behind it.

After years of growth through acquisitions, Netwrix needed a clearer story. John shares how the team repositioned the company around data security that starts with identity, simplified its messaging, and rolled the new brand out across a global organization.

If you’re navigating brand evolution, product complexity, or internal buy-in, this episode offers a look at what it actually takes to pull off a cybersecurity rebrand.



About John:

John Knightly is the Chief Marketing Officer at Netwrix, where he leads the company’s global marketing organization. Before joining Netwrix, he held senior marketing leadership roles at Zscaler, BlueJeans by Verizon, Hewlett Packard Enterprise, and HP, bringing more than 20 years of experience in enterprise technology and cybersecurity marketing.



Links &amp; Resources:


  
John Knightly on LinkedIn



  
Netwrix




Subscribe &amp; Review:

 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn



  
Charles Gold on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>In this Cyber CMO Confidential episode, Netwrix CMO John Knightly joins Gianna and Charles to talk through the company’s recent rebrand and the thinking behind it.</p>
<p>After years of growth through acquisitions, Netwrix needed a clearer story. John shares how the team repositioned the company around data security that starts with identity, simplified its messaging, and rolled the new brand out across a global organization.</p>
<p>If you’re navigating brand evolution, product complexity, or internal buy-in, this episode offers a look at what it actually takes to pull off a cybersecurity rebrand.</p>
<p><br></p>
<p><strong>About John:</strong></p>
<p>John Knightly is the Chief Marketing Officer at Netwrix, where he leads the company’s global marketing organization. Before joining Netwrix, he held senior marketing leadership roles at Zscaler, BlueJeans by Verizon, Hewlett Packard Enterprise, and HP, bringing more than 20 years of experience in enterprise technology and cybersecurity marketing.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<ul>
  <li>
<p>John Knightly on <a href="https://www.linkedin.com/in/johnknightly/"><u>LinkedIn</u></a></p>
</li>
  <li>
<p><a href="https://netwrix.com/en/"><u>Netwrix</u></a></p>
</li>
</ul>
<p><strong>Subscribe &amp; Review:</strong></p>
<p><strong> </strong>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Host:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Charles Gold on LinkedIn</p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>1722</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c7415ba-2435-11f1-9080-4bd8765c9f75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4555837469.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Marketing Strategy Behind Vanta’s “Calm-pliance” Campaign</title>
      <link>https://www.thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/203/notes</link>
      <description>Episode Summary:

Vanta CMO Scott Holden joins Gianna to talk about how the company is expanding beyond automated SOC 2 compliance and positioning Vanta as an Agentic Trust Platform.

Scott shares his path from Salesforce to ThoughtSpot and Brex, why Vanta’s preventive security approach stood out, and how the team is evolving its messaging as it moves further into the enterprise.

Tune in to hear how Vanta is thinking about category positioning, CISOs, and the strategy behind its new “Calm-pliance” campaign.



About Scott:

Scott Holden is the Chief Marketing Officer at Vanta, where he leads marketing as the company expands beyond automated compliance into a broader trust platform. 

Before joining Vanta, he was CMO at Brex and spent more than eight years at ThoughtSpot in marketing leadership roles. Earlier in his career, Scott held several marketing roles at Salesforce.



Links &amp; Resources:


  
Follow Scott Holden on LinkedIn



  
Vanta




Subscribe &amp; Review:

 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 18 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>The Marketing Strategy Behind Vanta’s “Calm-pliance” Campaign</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>203</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Vanta CMO Scott Holden joins Gianna to talk about how the company is expanding beyond automated SOC 2 compliance and positioning Vanta as an Agentic Trust Platform.

Scott shares his path from Salesforce to ThoughtSpot and Brex, why Vanta’s preventive security approach stood out, and how the team is evolving its messaging as it moves further into the enterprise.

Tune in to hear how Vanta is thinking about category positioning, CISOs, and the strategy behind its new “Calm-pliance” campaign.



About Scott:

Scott Holden is the Chief Marketing Officer at Vanta, where he leads marketing as the company expands beyond automated compliance into a broader trust platform. 

Before joining Vanta, he was CMO at Brex and spent more than eight years at ThoughtSpot in marketing leadership roles. Earlier in his career, Scott held several marketing roles at Salesforce.



Links &amp; Resources:


  
Follow Scott Holden on LinkedIn



  
Vanta




Subscribe &amp; Review:

 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Vanta CMO Scott Holden joins Gianna to talk about how the company is expanding beyond automated SOC 2 compliance and positioning Vanta as an Agentic Trust Platform.</p>
<p>Scott shares his path from Salesforce to ThoughtSpot and Brex, why Vanta’s preventive security approach stood out, and how the team is evolving its messaging as it moves further into the enterprise.</p>
<p>Tune in to hear how Vanta is thinking about category positioning, CISOs, and the strategy behind its new “Calm-pliance” campaign.</p>
<p><br></p>
<p><strong>About Scott:</strong></p>
<p>Scott Holden is the Chief Marketing Officer at Vanta, where he leads marketing as the company expands beyond automated compliance into a broader trust platform. </p>
<p>Before joining Vanta, he was CMO at Brex and spent more than eight years at ThoughtSpot in marketing leadership roles. Earlier in his career, Scott held several marketing roles at Salesforce.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<ul>
  <li>
<p>Follow Scott Holden on <a href="https://www.linkedin.com/in/scottiholden/"><u>LinkedIn</u></a></p>
</li>
  <li>
<p><a href="https://www.vanta.com/"><u>Vanta</u></a></p>
</li>
</ul>
<p><strong>Subscribe &amp; Review:</strong></p>
<p><strong> </strong>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Host:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2186</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76c0cb2e-1eb3-11f1-ac05-377159416ff2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3235988472.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Cyber Work Became a Launchpad for the Next Generation of Cybersecurity Talent</title>
      <description>Episode Summary:

Chris Sienko spent six years hosting Cyber Work with Infosec, interviewing more than 300 cybersecurity professionals across every imaginable role. But the show wasn’t built for CISOs or executives. It was built for the people trying to get in.

In this conversation, Chris shares why he focused on students and early-career professionals, even though most cybersecurity marketing targets buyers, and how that decision shaped everything from guest research to episode structure to long-term growth.

If you’re building content inside a cybersecurity company and wondering who you’re actually serving, this episode will challenge you to think bigger than the buying committee.



About Chris: 

Chris Sienko is a podcast producer and former host of Cyber Work with Infosec, where he interviewed more than 300 cybersecurity professionals from 2019 to 2025. Over six years, he helped grow the show into a central resource for aspiring cybersecurity practitioners.

He previously served as Senior Acquisitions Manager for Infosec Resources, overseeing a large network of technical writers and contributing to the editorial direction of one of the industry’s most widely read cybersecurity education platforms.



Links &amp; Resources:


  
Connect with Chris on LinkedIn



  
Check out Infosec




Subscribe &amp; Review:

 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Tue, 10 Mar 2026 23:00:00 -0000</pubDate>
      <itunes:title>How Cyber Work Became a Launchpad for the Next Generation of Cybersecurity Talent</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>202</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Chris Sienko spent six years hosting Cyber Work with Infosec, interviewing more than 300 cybersecurity professionals across every imaginable role. But the show wasn’t built for CISOs or executives. It was built for the people trying to get in.

In this conversation, Chris shares why he focused on students and early-career professionals, even though most cybersecurity marketing targets buyers, and how that decision shaped everything from guest research to episode structure to long-term growth.

If you’re building content inside a cybersecurity company and wondering who you’re actually serving, this episode will challenge you to think bigger than the buying committee.



About Chris: 

Chris Sienko is a podcast producer and former host of Cyber Work with Infosec, where he interviewed more than 300 cybersecurity professionals from 2019 to 2025. Over six years, he helped grow the show into a central resource for aspiring cybersecurity practitioners.

He previously served as Senior Acquisitions Manager for Infosec Resources, overseeing a large network of technical writers and contributing to the editorial direction of one of the industry’s most widely read cybersecurity education platforms.



Links &amp; Resources:


  
Connect with Chris on LinkedIn



  
Check out Infosec




Subscribe &amp; Review:

 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Chris Sienko spent six years hosting <em>Cyber Work with Infosec</em>, interviewing more than 300 cybersecurity professionals across every imaginable role. But the show wasn’t built for CISOs or executives. It was built for the people trying to get in.</p>
<p>In this conversation, Chris shares why he focused on students and early-career professionals, even though most cybersecurity marketing targets buyers, and how that decision shaped everything from guest research to episode structure to long-term growth.</p>
<p>If you’re building content inside a cybersecurity company and wondering who you’re actually serving, this episode will challenge you to think bigger than the buying committee.</p>
<p><br></p>
<p><strong>About Chris: </strong></p>
<p>Chris Sienko is a podcast producer and former host of <em>Cyber Work with Infosec</em>, where he interviewed more than 300 cybersecurity professionals from 2019 to 2025. Over six years, he helped grow the show into a central resource for aspiring cybersecurity practitioners.</p>
<p>He previously served as Senior Acquisitions Manager for Infosec Resources, overseeing a large network of technical writers and contributing to the editorial direction of one of the industry’s most widely read cybersecurity education platforms.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<ul>
  <li>
<p>Connect with Chris on <a href="https://www.linkedin.com/in/cmsienko/"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Check out <a href="https://www.infosecinstitute.com"><u>Infosec</u></a></p>
</li>
</ul>
<p><strong>Subscribe &amp; Review:</strong></p>
<p><strong> </strong>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><strong>Follow the Host:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>1759</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d60bf302-193a-11f1-b243-436c4626d325]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4519858257.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>One-Person Marketing at a Cybersecurity Startup</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/201/notes</link>
      <description>Episode Summary:

In cybersecurity marketing, there’s constant pressure to keep pushing. More campaigns, more content, more pressure to show that something is working. You’re wearing multiple hats, adjusting on the fly, and trying to keep momentum. At a human level, that pace adds up. This conversation slows down to talk about the exhaustion behind it, the cost of always saying yes, and the shift that happens when you finally pause.

Rodrigo Leme, Marketing Director at Right-Hand Cybersecurity, joins Gianna to talk about what it’s like to be the only marketer at a growing security company. He reflects on constantly reassessing what’s worth doing, learning the hard way that saying yes to everything doesn’t mean doing good work, and what it’s been like working remotely for years.

Along the way, he shares what helped him stay grounded: routines, hobbies, and small shifts in his approach to work. It’s a reflection on what it takes to keep going without letting the job take over everything else in your life.



About Rodrigo: 

Rodrigo Leme is the Marketing Director at Right-Hand Cybersecurity, where he leads the company’s marketing efforts, including content, campaigns, and go-to-market support. He has worked in marketing for more than 20 years and has spent the past several years in cybersecurity.



Subscribe &amp; Review: 

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 04 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>One-Person Marketing at a Cybersecurity Startup</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>201</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

In cybersecurity marketing, there’s constant pressure to keep pushing. More campaigns, more content, more pressure to show that something is working. You’re wearing multiple hats, adjusting on the fly, and trying to keep momentum. At a human level, that pace adds up. This conversation slows down to talk about the exhaustion behind it, the cost of always saying yes, and the shift that happens when you finally pause.

Rodrigo Leme, Marketing Director at Right-Hand Cybersecurity, joins Gianna to talk about what it’s like to be the only marketer at a growing security company. He reflects on constantly reassessing what’s worth doing, learning the hard way that saying yes to everything doesn’t mean doing good work, and what it’s been like working remotely for years.

Along the way, he shares what helped him stay grounded: routines, hobbies, and small shifts in his approach to work. It’s a reflection on what it takes to keep going without letting the job take over everything else in your life.



About Rodrigo: 

Rodrigo Leme is the Marketing Director at Right-Hand Cybersecurity, where he leads the company’s marketing efforts, including content, campaigns, and go-to-market support. He has worked in marketing for more than 20 years and has spent the past several years in cybersecurity.



Subscribe &amp; Review: 

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>In cybersecurity marketing, there’s constant pressure to keep pushing. More campaigns, more content, more pressure to show that something is working. You’re wearing multiple hats, adjusting on the fly, and trying to keep momentum. At a human level, that pace adds up. This conversation slows down to talk about the exhaustion behind it, the cost of always saying yes, and the shift that happens when you finally pause.</p>
<p><a href="https://www.linkedin.com/in/rodrigoleme/"><u>Rodrigo Leme</u></a>, Marketing Director at <a href="https://right-hand.ai/"><u>Right-Hand Cybersecurity</u></a>, joins Gianna to talk about what it’s like to be the only marketer at a growing security company. He reflects on constantly reassessing what’s worth doing, learning the hard way that saying yes to everything doesn’t mean doing good work, and what it’s been like working remotely for years.</p>
<p>Along the way, he shares what helped him stay grounded: routines, hobbies, and small shifts in his approach to work. It’s a reflection on what it takes to keep going without letting the job take over everything else in your life.</p>
<p><br></p>
<p><strong>About Rodrigo: </strong></p>
<p><strong></strong><a href="https://www.linkedin.com/in/rodrigoleme/"><u>Rodrigo Leme</u></a> is the Marketing Director at <a href="https://right-hand.ai/"><u>Right-Hand Cybersecurity</u></a>, where he leads the company’s marketing efforts, including content, campaigns, and go-to-market support. He has worked in marketing for more than 20 years and has spent the past several years in cybersecurity.</p>
<p><br></p>
<p><strong>Subscribe &amp; Review: </strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2224</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[003b3ad6-13c6-11f1-9e6e-efaed55fca12]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7850144600.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How AI Is Influencing Security Buying Decisions: What Marketers Should Know</title>
      <description>Episode Summary:

AI is affecting how cybersecurity teams operate and how security vendors build products. 

In this episode, Steve Piper, Founder and CEO of CyberEdge Group and author of the Cyber Threat Defense Report, is here to talk about AI-powered spear phishing, deepfake fraud, and how generative and agentic AI are being integrated into security platforms.

Data from the 2025 Cyber Threat Defense Report shows:


  
82% of security professionals prefer tools with AI capabilities.



  
80% believe AI will reduce workforce needs in the coming years.



  
More respondents say security teams currently have the upper hand over threat actors.




For marketers, this clarifies something important: AI is influencing buyer expectations, product positioning, and hiring conversations across the industry.



About Steve:

Steve Piper is the Founder and CEO of CyberEdge Group, the largest marketing and research firm dedicated to serving cybersecurity marketing teams. He is also the Editor-in-Chief of Security Buzz, a leading cybersecurity news website.

Steve is a highly regarded author, analyst, instructor, and consultant with more than 30 years of tech industry experience. He holds a CISSP certification from ISC2 and has authored more than a dozen books on information security topics.



Links &amp; Resources:


  
Check out CyberEdge Group here. 



  
Security Buzz



  
2025 Cyberthreat Defense Report



  
Steve Piper on LinkedIn



  
Cyber Threat Defense Report Sponsorship Information:




  
View the Sponsor One-Sheet



  
CDR Sponsor Prospectus





Subscribe &amp; Review:

 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 25 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>200</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/200/notes</itunes:subtitle>
      <itunes:summary>Episode Summary:

AI is affecting how cybersecurity teams operate and how security vendors build products. 

In this episode, Steve Piper, Founder and CEO of CyberEdge Group and author of the Cyber Threat Defense Report, is here to talk about AI-powered spear phishing, deepfake fraud, and how generative and agentic AI are being integrated into security platforms.

Data from the 2025 Cyber Threat Defense Report shows:


  
82% of security professionals prefer tools with AI capabilities.



  
80% believe AI will reduce workforce needs in the coming years.



  
More respondents say security teams currently have the upper hand over threat actors.




For marketers, this clarifies something important: AI is influencing buyer expectations, product positioning, and hiring conversations across the industry.



About Steve:

Steve Piper is the Founder and CEO of CyberEdge Group, the largest marketing and research firm dedicated to serving cybersecurity marketing teams. He is also the Editor-in-Chief of Security Buzz, a leading cybersecurity news website.

Steve is a highly regarded author, analyst, instructor, and consultant with more than 30 years of tech industry experience. He holds a CISSP certification from ISC2 and has authored more than a dozen books on information security topics.



Links &amp; Resources:


  
Check out CyberEdge Group here. 



  
Security Buzz



  
2025 Cyberthreat Defense Report



  
Steve Piper on LinkedIn



  
Cyber Threat Defense Report Sponsorship Information:




  
View the Sponsor One-Sheet



  
CDR Sponsor Prospectus





Subscribe &amp; Review:

 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Host:


  
Gianna Whitver on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>AI is affecting how cybersecurity teams operate and how security vendors build products. </p>
<p>In this episode, Steve Piper, Founder and CEO of CyberEdge Group and author of the Cyber Threat Defense Report, is here to talk about AI-powered spear phishing, deepfake fraud, and how generative and agentic AI are being integrated into security platforms.</p>
<p>Data from the <a href="https://cyberedgegroup.com/resources/2024-cyberthreat-defense-report/"><u>2025 Cyber Threat Defense Report</u></a> shows:</p>
<ul>
  <li>
<p>82% of security professionals prefer tools with AI capabilities.</p>
</li>
  <li>
<p>80% believe AI will reduce workforce needs in the coming years.</p>
</li>
  <li>
<p>More respondents say security teams currently have the upper hand over threat actors.</p>
</li>
</ul>
<p>For marketers, this clarifies something important: AI is influencing buyer expectations, product positioning, and hiring conversations across the industry.</p>
<p><br></p>
<p><strong>About Steve:</strong></p>
<p>Steve Piper is the Founder and CEO of CyberEdge Group, the largest marketing and research firm dedicated to serving cybersecurity marketing teams. He is also the Editor-in-Chief of Security Buzz, a leading cybersecurity news website.</p>
<p>Steve is a highly regarded author, analyst, instructor, and consultant with more than 30 years of tech industry experience. He holds a CISSP certification from ISC2 and has authored more than a dozen books on information security topics.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<ul>
  <li>
<p>Check out CyberEdge Group <a href="https://cyberedgegroup.com/"><u>here</u></a>. </p>
</li>
  <li>
<p><a href="https://securitybuzz.com/"><u>Security Buzz</u></a></p>
</li>
  <li>
<p><a href="https://cyberedgegroup.com/cdr/"><u>2025 Cyberthreat Defense Report</u></a></p>
</li>
  <li>
<p><a href="https://www.linkedin.com/in/stevenrpiper/"><u>Steve Piper on LinkedIn</u></a></p>
</li>
  <li>
<p><strong>Cyber Threat Defense Report Sponsorship Information:</strong></p>
</li>
<ul>
  <li>
<p><a href="https://cyberedgegroup.com/sponsor-cdr/"><u>View the Sponsor One-Sheet</u></a></p>
</li>
  <li>
<p><a href="https://cyberedgegroup.com/cdr-prospectus/"><u>CDR Sponsor Prospectus</u></a></p>
</li>
</ul>
</ul>
<p><strong>Subscribe &amp; Review:</strong></p>
<p><strong> </strong>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><strong>Follow the Host:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2390</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9bc94ff8-0e33-11f1-b503-3798719b7c75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9215757919.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What AI Search Changed About the Cybersecurity Buying Journey</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/199/notes</link>
      <description>Episode Summary:

AI has changed how buyers do their research. By the time they land on your website, most of the education is already done. That is where many cybersecurity sites start to fall apart.

Suyog Deshpande, Co-Founder and CEO of Webless.ai, joins us to break down what this shift means for website strategy. He explains why today’s visitors are often deeper in the buying journey, how cybersecurity buying committees complicate the experience, and why education-first sites do not always serve buyers who are ready to act.

Gianna and Suyog also get into how on-site search behavior reveals real buyer intent and why more AI-generated content is not the answer.

If your website still assumes buyers are at the top of the funnel, this episode is for you!



About Suyog: 

Suyog Deshpande is the Co-Founder and CEO of Webless.ai, where he works on generative search and content discovery for B2B websites. Before starting Webless, he led product and technical marketing teams at Samsara, Salesforce, and Amplitude.

His work sits at the intersection of marketing, product, and how buyers actually find and use information.



Links &amp; Resources:

Follow Suyog on LinkedIn

Check out the Webless.ai 



Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 18 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>What AI Search Changed About the Cybersecurity Buying Journey</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>199</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

AI has changed how buyers do their research. By the time they land on your website, most of the education is already done. That is where many cybersecurity sites start to fall apart.

Suyog Deshpande, Co-Founder and CEO of Webless.ai, joins us to break down what this shift means for website strategy. He explains why today’s visitors are often deeper in the buying journey, how cybersecurity buying committees complicate the experience, and why education-first sites do not always serve buyers who are ready to act.

Gianna and Suyog also get into how on-site search behavior reveals real buyer intent and why more AI-generated content is not the answer.

If your website still assumes buyers are at the top of the funnel, this episode is for you!



About Suyog: 

Suyog Deshpande is the Co-Founder and CEO of Webless.ai, where he works on generative search and content discovery for B2B websites. Before starting Webless, he led product and technical marketing teams at Samsara, Salesforce, and Amplitude.

His work sits at the intersection of marketing, product, and how buyers actually find and use information.



Links &amp; Resources:

Follow Suyog on LinkedIn

Check out the Webless.ai 



Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>AI has changed how buyers do their research. By the time they land on your website, most of the education is already done. That is where many cybersecurity sites start to fall apart.</p>
<p>Suyog Deshpande, Co-Founder and CEO of Webless.ai, joins us to break down what this shift means for website strategy. He explains why today’s visitors are often deeper in the buying journey, how cybersecurity buying committees complicate the experience, and why education-first sites do not always serve buyers who are ready to act.</p>
<p>Gianna and Suyog also get into how on-site search behavior reveals real buyer intent and why more AI-generated content is not the answer.</p>
<p>If your website still assumes buyers are at the top of the funnel, this episode is for you!</p>
<p><br></p>
<p><strong>About Suyog: </strong></p>
<p>Suyog Deshpande is the Co-Founder and CEO of Webless.ai, where he works on generative search and content discovery for B2B websites. Before starting Webless, he led product and technical marketing teams at Samsara, Salesforce, and Amplitude.</p>
<p>His work sits at the intersection of marketing, product, and how buyers actually find and use information.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<p>Follow Suyog on<a href="https://www.linkedin.com/in/suyogdeshpande/"><u> LinkedIn</u></a></p>
<p>Check out the <a href="http://webless.ai"><u>Webless.ai</u></a> </p>
<p><br></p>
<p><strong>Subscribe &amp; Review: </strong>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p><br></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>1441</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[34dbde64-08b1-11f1-bd44-5b985e2ba4a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8664002915.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Slack Groups to Super-Users: Community-Led Growth in Cybersecurity</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/198/notes</link>
      <description>Episode Summary:

Community gets talked about a lot in cybersecurity; what’s less clear is what it’s supposed to actually look like. In this conversation, Avital Knoller, Head of Ecosystem, Community, and CXO Relationships at Orchid Security, walks through how she thinks about community when it’s tied directly to product and growth. 

She breaks down the difference between practitioner-led product communities and broader communities of interest, and why that distinction matters so much in security. Drawing on her experience building communities across nonprofit, startup, and cybersecurity environments, Avital shares how investing in community can create super-users, surface real product feedback, and support go-to-market efforts without feeling salesy or forced.

Tune in to hear about practical realities, platform choices, launch timing, engagement expectations, and how to think about ROI while keeping the focus on trust, peer learning, and long-term value.

About Avital:Avital (Avi) Knoller is the Head of Ecosystem, Community, and CXO Relationships at Orchid Security, where she leads practitioner community programs and ecosystem engagement for the company’s identity security platform.

Avital has experience building and running communities across nonprofit, startup, and cybersecurity environments, with a focus on practitioner engagement and product-focused communities inside security companies.



Links &amp; Resources:

Avital (Avi) Knoller on LinkedIn - https://www.linkedin.com/in/avital-knoller/

Orchid Security - https://www.orchid.security/



Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 11 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>From Slack Groups to Super-Users: Community-Led Growth in Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>198</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Community gets talked about a lot in cybersecurity; what’s less clear is what it’s supposed to actually look like. In this conversation, Avital Knoller, Head of Ecosystem, Community, and CXO Relationships at Orchid Security, walks through how she thinks about community when it’s tied directly to product and growth. 

She breaks down the difference between practitioner-led product communities and broader communities of interest, and why that distinction matters so much in security. Drawing on her experience building communities across nonprofit, startup, and cybersecurity environments, Avital shares how investing in community can create super-users, surface real product feedback, and support go-to-market efforts without feeling salesy or forced.

Tune in to hear about practical realities, platform choices, launch timing, engagement expectations, and how to think about ROI while keeping the focus on trust, peer learning, and long-term value.

About Avital:Avital (Avi) Knoller is the Head of Ecosystem, Community, and CXO Relationships at Orchid Security, where she leads practitioner community programs and ecosystem engagement for the company’s identity security platform.

Avital has experience building and running communities across nonprofit, startup, and cybersecurity environments, with a focus on practitioner engagement and product-focused communities inside security companies.



Links &amp; Resources:

Avital (Avi) Knoller on LinkedIn - https://www.linkedin.com/in/avital-knoller/

Orchid Security - https://www.orchid.security/



Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Community gets talked about a lot in cybersecurity; what’s less clear is what it’s supposed to actually look like. In this conversation, Avital Knoller, Head of Ecosystem, Community, and CXO Relationships at Orchid Security, walks through how she thinks about community when it’s tied directly to product and growth. </p>
<p>She breaks down the difference between practitioner-led product communities and broader communities of interest, and why that distinction matters so much in security. Drawing on her experience building communities across nonprofit, startup, and cybersecurity environments, Avital shares how investing in community can create super-users, surface real product feedback, and support go-to-market efforts without feeling salesy or forced.</p>
<p>Tune in to hear about practical realities, platform choices, launch timing, engagement expectations, and how to think about ROI while keeping the focus on trust, peer learning, and long-term value.</p>
<p><strong>About Avital:</strong>Avital (Avi) Knoller is the Head of Ecosystem, Community, and CXO Relationships at Orchid Security, where she leads practitioner community programs and ecosystem engagement for the company’s identity security platform.</p>
<p>Avital has experience building and running communities across nonprofit, startup, and cybersecurity environments, with a focus on practitioner engagement and product-focused communities inside security companies.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<p>Avital (Avi) Knoller on LinkedIn - <a href="https://www.linkedin.com/in/avital-knoller/"><u>https://www.linkedin.com/in/avital-knoller/</u></a></p>
<p>Orchid Security - <a href="https://www.orchid.security/"><u>https://www.orchid.security/</u></a></p>
<p><br></p>
<p><strong>Subscribe &amp; Review: </strong>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2633</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a50bde2c-0358-11f1-9f85-3fc5a51b01e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4018834170.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disinformation, Data, and... Romance Novels? A Conversation with Dan Lowden</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/197/notes</link>
      <description>Episode Summary:

Dan Lowden has a pretty incredible track record—12 startups and eight exits to count—so when he talks about building a marketing engine from scratch, people listen. In this CMO Confidential segment, Dan joins Gianna and Charles to talk about his latest challenge at Blackbird.ai: defining the "Narrative Intelligence" category and helping companies fight disinformation.

They get into the real-world grit of going from leading a 70-person team back to being a solo marketer. Dan shares his "punch above your weight" playbook, including why he hired a former CBS news reporter to lead content and how he landed NATO as a marquee customer.

Listen to this episode if you are looking to make a small startup feel like an industry giant, build deep analyst credibility without a "pay-to-play" budget, or understand the next big CISO blind spot in narrative intelligence.



About Dan: 

Dan Lowden is the CMO at Blackbird.ai and a seasoned leader with over 30 years of experience building brands in the tech and cybersecurity spaces. A veteran of 12 startups and eight successful exits, Dan has led marketing for companies such as HUMAN (formerly White Ops), Digital Shadows, and Invincea.

He is known for his "hands-on" approach to leadership, often joining as the first marketing hire to transform complex technology into a clear, compelling story. When he isn't defining new security categories like Narrative Intelligence, Dan is an author; he wrote and published the romance novel The Met Kiss during the pandemic.

Follow Dan on LinkedIn.



Links &amp; Resources:

Blackbird.ai: Learn more about narrative intelligence and disinformation security.

The Raven Blog: Where Dan’s team publishes primary research on narrative attacks.

The Met Kiss: Dan Lowden’s debut romance novel, written during the pandemic.



Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Charles Gold on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 04 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>Disinformation, Data, and... Romance Novels? A Conversation with Dan Lowden</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>197</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Dan Lowden has a pretty incredible track record—12 startups and eight exits to count—so when he talks about building a marketing engine from scratch, people listen. In this CMO Confidential segment, Dan joins Gianna and Charles to talk about his latest challenge at Blackbird.ai: defining the "Narrative Intelligence" category and helping companies fight disinformation.

They get into the real-world grit of going from leading a 70-person team back to being a solo marketer. Dan shares his "punch above your weight" playbook, including why he hired a former CBS news reporter to lead content and how he landed NATO as a marquee customer.

Listen to this episode if you are looking to make a small startup feel like an industry giant, build deep analyst credibility without a "pay-to-play" budget, or understand the next big CISO blind spot in narrative intelligence.



About Dan: 

Dan Lowden is the CMO at Blackbird.ai and a seasoned leader with over 30 years of experience building brands in the tech and cybersecurity spaces. A veteran of 12 startups and eight successful exits, Dan has led marketing for companies such as HUMAN (formerly White Ops), Digital Shadows, and Invincea.

He is known for his "hands-on" approach to leadership, often joining as the first marketing hire to transform complex technology into a clear, compelling story. When he isn't defining new security categories like Narrative Intelligence, Dan is an author; he wrote and published the romance novel The Met Kiss during the pandemic.

Follow Dan on LinkedIn.



Links &amp; Resources:

Blackbird.ai: Learn more about narrative intelligence and disinformation security.

The Raven Blog: Where Dan’s team publishes primary research on narrative attacks.

The Met Kiss: Dan Lowden’s debut romance novel, written during the pandemic.



Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Charles Gold on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Dan Lowden has a pretty incredible track record—12 startups and eight exits to count—so when he talks about building a marketing engine from scratch, people listen. In this CMO Confidential segment, Dan joins Gianna and Charles to talk about his latest challenge at Blackbird.ai: defining the "Narrative Intelligence" category and helping companies fight disinformation.</p>
<p>They get into the real-world grit of going from leading a 70-person team back to being a solo marketer. Dan shares his "punch above your weight" playbook, including why he hired a former CBS news reporter to lead content and how he landed NATO as a marquee customer.</p>
<p>Listen to this episode if you are looking to make a small startup feel like an industry giant, build deep analyst credibility without a "pay-to-play" budget, or understand the next big CISO blind spot in narrative intelligence.</p>
<p><br></p>
<p><strong>About Dan: </strong></p>
<p>Dan Lowden is the CMO at Blackbird.ai and a seasoned leader with over 30 years of experience building brands in the tech and cybersecurity spaces. A veteran of 12 startups and eight successful exits, Dan has led marketing for companies such as HUMAN (formerly White Ops), Digital Shadows, and Invincea.</p>
<p>He is known for his "hands-on" approach to leadership, often joining as the first marketing hire to transform complex technology into a clear, compelling story. When he isn't defining new security categories like Narrative Intelligence, Dan is an author; he wrote and published the romance novel <em>The Met Kiss</em> during the pandemic.</p>
<p>Follow Dan on<a href="https://www.linkedin.com/in/danlowden/"><u> LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<p><a href="https://www.blackbird.ai/"><u>Blackbird.ai</u></a>: Learn more about narrative intelligence and disinformation security.</p>
<p><a href="https://www.blackbird.ai/blog/"><u>The Raven Blog</u></a>: Where Dan’s team publishes primary research on narrative attacks.</p>
<p><a href="https://www.amazon.com/Met-Kiss-Daniel-Lowden-ebook/dp/B09YFXYYNT"><u>The Met Kiss</u></a>: Dan Lowden’s debut romance novel, written during the pandemic.</p>
<p><br></p>
<p><strong>Subscribe &amp; Review: </strong>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Charles Gold on <a href="https://www.linkedin.com/in/charlesgold/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>1593</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc47a3d6-fdbc-11f0-b401-231fda9632e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5936860368.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The ROI of Recognition: How DataGrail Built a Brand Engine Through Awards </title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/196/notes</link>
      <description>Episode Summary:

What happens when a "privacy freak" takes over customer advocacy? You get the DataGrail’s Data Privacy Awards Program, an industry staple that doubles as a masterclass in community building and product research.

In this episode, Ian Phippen, Head of Content and Community Marketing at DataGrail, joins Gianna and Maria to pull back the curtain on running a high-impact awards program. Ian shares how they transformed a standard advocacy play into a mission-driven brand engine that attracts hundreds of nominations, of which only 40% are customers.

Whether you're launching your first awards ceremony or looking for more human ways to connect with your technical audience, Ian’s insights offer a roadmap for marketing with integrity.



About Ian: 

Ian Phippen is the Head of Content and Community at DataGrail and the architect of the Data Privacy Hero Awards. 

A 2025 Marquee Award winner for Best New-to-Cyber Talent, they moved from a background in education and e-commerce marketing at companies like Recharge and Provi to become a dedicated "privacy freak" in the cybersecurity space. 

Ian specializes in building high-trust recognition programs that turn industry advocacy into deep market intelligence.

Follow Ian on LinkedIn. 



Links and Resources:

DataGrail: The data privacy platform leading the shift toward "human-centric" privacy.

2025 Data Privacy Heroes: The official announcement and profiles of the most recent award winners.

Sessionize: The event management tool mentioned for handling speaker and award calls.

Recharge &amp; Provi: Previous companies where Ian built their marketing and community foundation.



Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 28 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>The ROI of Recognition: How DataGrail Built a Brand Engine Through Awards </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>196</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

What happens when a "privacy freak" takes over customer advocacy? You get the DataGrail’s Data Privacy Awards Program, an industry staple that doubles as a masterclass in community building and product research.

In this episode, Ian Phippen, Head of Content and Community Marketing at DataGrail, joins Gianna and Maria to pull back the curtain on running a high-impact awards program. Ian shares how they transformed a standard advocacy play into a mission-driven brand engine that attracts hundreds of nominations, of which only 40% are customers.

Whether you're launching your first awards ceremony or looking for more human ways to connect with your technical audience, Ian’s insights offer a roadmap for marketing with integrity.



About Ian: 

Ian Phippen is the Head of Content and Community at DataGrail and the architect of the Data Privacy Hero Awards. 

A 2025 Marquee Award winner for Best New-to-Cyber Talent, they moved from a background in education and e-commerce marketing at companies like Recharge and Provi to become a dedicated "privacy freak" in the cybersecurity space. 

Ian specializes in building high-trust recognition programs that turn industry advocacy into deep market intelligence.

Follow Ian on LinkedIn. 



Links and Resources:

DataGrail: The data privacy platform leading the shift toward "human-centric" privacy.

2025 Data Privacy Heroes: The official announcement and profiles of the most recent award winners.

Sessionize: The event management tool mentioned for handling speaker and award calls.

Recharge &amp; Provi: Previous companies where Ian built their marketing and community foundation.



Subscribe &amp; Review: 👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>What happens when a "privacy freak" takes over customer advocacy? You get the DataGrail’s Data Privacy Awards Program, an industry staple that doubles as a masterclass in community building and product research.</p>
<p>In this episode, Ian Phippen, Head of Content and Community Marketing at DataGrail, joins Gianna and Maria to pull back the curtain on running a high-impact awards program. Ian shares how they transformed a standard advocacy play into a mission-driven brand engine that attracts hundreds of nominations, of which only 40% are customers.</p>
<p>Whether you're launching your first awards ceremony or looking for more human ways to connect with your technical audience, Ian’s insights offer a roadmap for marketing with integrity.</p>
<p><br></p>
<p><strong>About Ian: </strong></p>
<p>Ian Phippen is the Head of Content and Community at DataGrail and the architect of the Data Privacy Hero Awards. </p>
<p>A 2025 Marquee Award winner for Best New-to-Cyber Talent, they moved from a background in education and e-commerce marketing at companies like Recharge and Provi to become a dedicated "privacy freak" in the cybersecurity space. </p>
<p>Ian specializes in building high-trust recognition programs that turn industry advocacy into deep market intelligence.</p>
<p>Follow Ian on <a href="https://www.linkedin.com/in/ianmphippen/"><u>LinkedIn</u><strong>. </strong></a></p>
<p><br></p>
<p><strong>Links and Resources:</strong></p>
<p><a href="https://www.datagrail.io/"><u>DataGrail</u></a>: The data privacy platform leading the shift toward "human-centric" privacy.</p>
<p><a href="https://www.datagrail.io/blog/data-privacy/announcing-our-2025-data-privacy-heroes/"><u>2025 Data Privacy Heroes</u></a>: The official announcement and profiles of the most recent award winners.</p>
<p><a href="https://sessionize.com/"><u>Sessionize</u></a>: The event management tool mentioned for handling speaker and award calls.</p>
<p><a href="https://getrecharge.com/"><u>Recharge</u></a> &amp;<a href="https://www.provi.com/"> <u>Provi</u></a>: Previous companies where Ian built their marketing and community foundation.</p>
<p><br></p>
<p><strong>Subscribe &amp; Review: </strong>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf600dc8-f842-11f0-90fe-3b73ca0bb70a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9730355683.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Why Cybersecurity Marketers Are Prime Security Targets</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/195/notes</link>
      <description>Episode Summary:

Cat Allen, Senior Product Marketing Manager at SpyCloud, brings a rare mix of technical grounding and ethical clarity to cybersecurity marketing. Her path into the industry was unconventional, shaped by psychology, hands-on technical training, and a deep interest in privacy, surveillance, and responsible data use.

The conversation focuses on what it means to market security products responsibly, especially in an industry where marketers are frequent targets and data collection can quietly introduce risk. Cat shares how her technical background helps her bridge engineering and go-to-market teams while keeping trust, accuracy, and transparency at the center.

The episode also explores tougher questions about workplace ethics, the limits of compliance, personal responsibility for data privacy, and the broader implications of AI.



About Cat: 

Cat Allen is a Senior Product Marketing Manager at SpyCloud, working on product messaging, enablement, and go-to-market support for cybersecurity teams. She has held senior product marketing roles at Cloudflare and Everfox (formerly Forcepoint).

She is currently pursuing a Master’s degree in Cybersecurity and brings a technical foundation into her work, partnering closely with product, engineering, and revenue teams.

Follow her on LinkedIn. 



Links &amp; Resources:

SpyCloud

Signal (secure messaging)Proton Mail

DeleteMe1Password



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 21 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Why Cybersecurity Marketers Are Prime Security Targets</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>195</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Cat Allen, Senior Product Marketing Manager at SpyCloud, brings a rare mix of technical grounding and ethical clarity to cybersecurity marketing. Her path into the industry was unconventional, shaped by psychology, hands-on technical training, and a deep interest in privacy, surveillance, and responsible data use.

The conversation focuses on what it means to market security products responsibly, especially in an industry where marketers are frequent targets and data collection can quietly introduce risk. Cat shares how her technical background helps her bridge engineering and go-to-market teams while keeping trust, accuracy, and transparency at the center.

The episode also explores tougher questions about workplace ethics, the limits of compliance, personal responsibility for data privacy, and the broader implications of AI.



About Cat: 

Cat Allen is a Senior Product Marketing Manager at SpyCloud, working on product messaging, enablement, and go-to-market support for cybersecurity teams. She has held senior product marketing roles at Cloudflare and Everfox (formerly Forcepoint).

She is currently pursuing a Master’s degree in Cybersecurity and brings a technical foundation into her work, partnering closely with product, engineering, and revenue teams.

Follow her on LinkedIn. 



Links &amp; Resources:

SpyCloud

Signal (secure messaging)Proton Mail

DeleteMe1Password



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Cat Allen, Senior Product Marketing Manager at SpyCloud, brings a rare mix of technical grounding and ethical clarity to cybersecurity marketing. Her path into the industry was unconventional, shaped by psychology, hands-on technical training, and a deep interest in privacy, surveillance, and responsible data use.</p>
<p>The conversation focuses on what it means to market security products responsibly, especially in an industry where marketers are frequent targets and data collection can quietly introduce risk. Cat shares how her technical background helps her bridge engineering and go-to-market teams while keeping trust, accuracy, and transparency at the center.</p>
<p>The episode also explores tougher questions about workplace ethics, the limits of compliance, personal responsibility for data privacy, and the broader implications of AI.</p>
<p><br></p>
<p><strong>About Cat:</strong> </p>
<p>Cat Allen is a Senior Product Marketing Manager at SpyCloud, working on product messaging, enablement, and go-to-market support for cybersecurity teams. She has held senior product marketing roles at Cloudflare and Everfox (formerly Forcepoint).</p>
<p>She is currently pursuing a Master’s degree in Cybersecurity and brings a technical foundation into her work, partnering closely with product, engineering, and revenue teams.</p>
<p>Follow her on <a href="https://www.linkedin.com/in/cat-allen/"><u>LinkedIn</u></a>. </p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<p><a href="https://spycloud.com/"><u>SpyCloud</u></a></p>
<p><a href="https://signal.org/"><u>Signal</u></a> (secure messaging)<a href="https://proton.me/mail"><u>Proton Mail</u></a></p>
<p><a href="https://joindeleteme.com/"><u>DeleteMe</u></a><a href="https://1password.com/"><u>1Password</u></a></p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>1380</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c62146d0-f2cb-11f0-bfbe-9f9eddc02349]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9350280012.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Cybersecurity Buyers Decide Before the Sales Conversation Begins</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/194/notes</link>
      <description>Episode Summary:

Maria and Gianna are joined this week by Tyler Lessard, Chief Marketing Officer at TechnologyAdvice, for a grounded look at how cybersecurity and B2B buying behavior are shifting and what that means for marketers trying to break through the noise.

The conversation centers on preference marketing and why buyers are forming vendor shortlists earlier than ever, often before any formal evaluation begins. Tyler shares insights from TechnologyAdvice’s research on how younger buying committees, particularly Millennial and Gen Z decision-makers, rely less on legacy analyst models and more on trusted external channels like creators, newsletters, niche communities, Reddit, and peer-driven influence.

The discussion wraps with a takeaway for marketers planning: TechnologyAdvice’s Cybersecurity Marketing Handbook, built to help teams identify where influence actually lives and how to show up there with intent.



About Tyler

Tyler Lessard is the Chief Marketing Officer at TechnologyAdvice, where he focuses on research-led perspectives on buyer behavior and helping cybersecurity and B2B marketers navigate how influence and trust are formed today. 

He works closely with marketing teams across the industry, drawing on TechnologyAdvice’s portfolio of enterprise IT and cybersecurity media brands to identify where buyers research, who they trust, and how preferences are shaped before formal evaluations begin.

Follow Tyler on LinkedIn. 



Links &amp; Resources:

3 Trends that will Redefine B2B Marketing in 2026

Cybersecurity Marketing Handbook

TechnologyAdvice



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 14 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>How Cybersecurity Buyers Decide Before the Sales Conversation Begins</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>194</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Maria and Gianna are joined this week by Tyler Lessard, Chief Marketing Officer at TechnologyAdvice, for a grounded look at how cybersecurity and B2B buying behavior are shifting and what that means for marketers trying to break through the noise.

The conversation centers on preference marketing and why buyers are forming vendor shortlists earlier than ever, often before any formal evaluation begins. Tyler shares insights from TechnologyAdvice’s research on how younger buying committees, particularly Millennial and Gen Z decision-makers, rely less on legacy analyst models and more on trusted external channels like creators, newsletters, niche communities, Reddit, and peer-driven influence.

The discussion wraps with a takeaway for marketers planning: TechnologyAdvice’s Cybersecurity Marketing Handbook, built to help teams identify where influence actually lives and how to show up there with intent.



About Tyler

Tyler Lessard is the Chief Marketing Officer at TechnologyAdvice, where he focuses on research-led perspectives on buyer behavior and helping cybersecurity and B2B marketers navigate how influence and trust are formed today. 

He works closely with marketing teams across the industry, drawing on TechnologyAdvice’s portfolio of enterprise IT and cybersecurity media brands to identify where buyers research, who they trust, and how preferences are shaped before formal evaluations begin.

Follow Tyler on LinkedIn. 



Links &amp; Resources:

3 Trends that will Redefine B2B Marketing in 2026

Cybersecurity Marketing Handbook

TechnologyAdvice



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Maria and Gianna are joined this week by Tyler Lessard, Chief Marketing Officer at TechnologyAdvice, for a grounded look at how cybersecurity and B2B buying behavior are shifting and what that means for marketers trying to break through the noise.</p>
<p>The conversation centers on preference marketing and why buyers are forming vendor shortlists earlier than ever, often before any formal evaluation begins. Tyler shares insights from TechnologyAdvice’s research on how younger buying committees, particularly Millennial and Gen Z decision-makers, rely less on legacy analyst models and more on trusted external channels like creators, newsletters, niche communities, Reddit, and peer-driven influence.</p>
<p>The discussion wraps with a takeaway for marketers planning: TechnologyAdvice’s <a href="https://info.technologyadvice.com/cybersecurity-marketing-handbook"><u>Cybersecurity Marketing Handbook</u></a>, built to help teams identify where influence actually lives and how to show up there with intent.</p>
<p><br></p>
<p><strong>About Tyler</strong></p>
<p>Tyler Lessard is the Chief Marketing Officer at TechnologyAdvice, where he focuses on research-led perspectives on buyer behavior and helping cybersecurity and B2B marketers navigate how influence and trust are formed today. </p>
<p>He works closely with marketing teams across the industry, drawing on TechnologyAdvice’s portfolio of enterprise IT and cybersecurity media brands to identify where buyers research, who they trust, and how preferences are shaped before formal evaluations begin.</p>
<p>Follow Tyler on <a href="https://www.linkedin.com/in/tylerlessard/"><u>LinkedIn</u></a>. </p>
<p><br></p>
<p><strong>Links &amp; Resources:</strong></p>
<p><a href="https://solutions.technologyadvice.com/blog/3-trends-that-will-redefine-b2b-marketing-and-demand-generation-in-2026/"><u>3 Trends that will Redefine B2B Marketing in 2026</u></a></p>
<p><a href="https://info.technologyadvice.com/cybersecurity-marketing-handbook"><u>Cybersecurity Marketing Handbook</u></a></p>
<p><a href="https://solutions.technologyadvice.com/"><u>TechnologyAdvice</u></a></p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2455</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[751cfb82-ed51-11f0-bce3-43ed2b75ac17]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4836706145.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Rebrand Reality Check: Inside Silverfort’s Identity Overhaul</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/193/notes</link>
      <description>Episode Summary:

We’re starting 2026 with a topic every marketer claims to love until they’re actually in it: rebrands. Gianna sits down with Alicia Di Vittorio, Head of Brand &amp; Corporate Marketing at Silverfort, to talk through what a real rebrand looks like when you’re doing it inside a fast-moving cybersecurity startup.

They get into the actual messy parts: getting execs aligned on positioning, figuring out who’s allowed to give input (and who isn’t), redesigning a logo way later than anyone wants to admit, and trying to keep the team creative while the production backlog is eating everyone alive. It’s honest, funny, and painfully relatable for anyone who’s ever opened a RACI chart in desperation.

If you’re planning a rebrand this year, this episode will either make you feel seen… or slightly afraid. Both are useful.



About Alicia: 

Alicia Di Vittorio is the Head of Brand &amp; Corporate Marketing at Silverfort, where she leads the company’s brand, communications, AR/PR, content, and creative strategy. Before Silverfort, she drove corporate marketing at DataGrail and helped launch Stairwell out of stealth as Interim CMO. She’s led multiple rebrands across fast-moving cybersecurity startups and has the scars (and wisdom) to prove it.



Follow Alicia on LinkedIn. 



🔗 Links &amp; Resources:

Silverfort – Identity Security Platform

https://www.silverfort.com



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 07 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>The Rebrand Reality Check: Inside Silverfort’s Identity Overhaul</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>193</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

We’re starting 2026 with a topic every marketer claims to love until they’re actually in it: rebrands. Gianna sits down with Alicia Di Vittorio, Head of Brand &amp; Corporate Marketing at Silverfort, to talk through what a real rebrand looks like when you’re doing it inside a fast-moving cybersecurity startup.

They get into the actual messy parts: getting execs aligned on positioning, figuring out who’s allowed to give input (and who isn’t), redesigning a logo way later than anyone wants to admit, and trying to keep the team creative while the production backlog is eating everyone alive. It’s honest, funny, and painfully relatable for anyone who’s ever opened a RACI chart in desperation.

If you’re planning a rebrand this year, this episode will either make you feel seen… or slightly afraid. Both are useful.



About Alicia: 

Alicia Di Vittorio is the Head of Brand &amp; Corporate Marketing at Silverfort, where she leads the company’s brand, communications, AR/PR, content, and creative strategy. Before Silverfort, she drove corporate marketing at DataGrail and helped launch Stairwell out of stealth as Interim CMO. She’s led multiple rebrands across fast-moving cybersecurity startups and has the scars (and wisdom) to prove it.



Follow Alicia on LinkedIn. 



🔗 Links &amp; Resources:

Silverfort – Identity Security Platform

https://www.silverfort.com



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>We’re starting 2026 with a topic every marketer claims to love until they’re actually in it: rebrands. Gianna sits down with Alicia Di Vittorio, Head of Brand &amp; Corporate Marketing at Silverfort, to talk through what a real rebrand looks like when you’re doing it inside a fast-moving cybersecurity startup.</p>
<p>They get into the actual messy parts: getting execs aligned on positioning, figuring out who’s allowed to give input (and who isn’t), redesigning a logo way later than anyone wants to admit, and trying to keep the team creative while the production backlog is eating everyone alive. It’s honest, funny, and painfully relatable for anyone who’s ever opened a RACI chart in desperation.</p>
<p>If you’re planning a rebrand this year, this episode will either make you feel seen… or slightly afraid. Both are useful.</p>
<p><br></p>
<p><strong>About Alicia: </strong></p>
<p>Alicia Di Vittorio is the Head of Brand &amp; Corporate Marketing at Silverfort, where she leads the company’s brand, communications, AR/PR, content, and creative strategy. Before Silverfort, she drove corporate marketing at DataGrail and helped launch Stairwell out of stealth as Interim CMO. She’s led multiple rebrands across fast-moving cybersecurity startups and has the scars (and wisdom) to prove it.</p>
<p><br></p>
<p>Follow Alicia on <a href="https://www.linkedin.com/in/alicia-divittorio/">LinkedIn</a>. </p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<p><strong>Silverfort – Identity Security Platform</strong></p>
<p><a href="https://www.silverfort.com">https://www.silverfort.com</a></p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, our <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1754</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9d1fb16-caab-11f0-99fb-d3d38cb851fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3173978191.mp3?updated=1767623770" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ENCORE EPISODE: The RevOps Whisperer: How Joe Aurilia Fixes the Stuff No One Wants to Touch</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/156/notes</link>
      <description>As we take a brief end-of-year pause for CyberMarketingCon and holiday chaos, we’re bringing back one of 2025’s most replayed and requested episodes. Consider this your chance to revisit the insights you loved or catch an episode you might’ve missed.
Episode Summary:

This week, we’ve got an extra special guest, Joe Aurilia, Jr., SVP of Operations at Cyware. Joining Gianna and Maria to talk more about the art of scaling, automating, and just plain getting stuff done. Joe takes us on a ride from being Cyware’s first U.S. hire (aka "the guinea pig") to building and overseeing every corner of operations from legal and IT to rev ops and marketing ops. 

We chat about how to spot and fix the messiest processes, why RevOps is the unsung hero of the GTM engine, and what happens when contracts, people, and data collide. Joe also drops gems on internal sales/marketing for change management, and we close out with his dream career as an ice cream shop owner.

Plus: purple dashboards, auctioneer aspirations, and a serious stance on free sprinkles.

🔗Links &amp; Resources Mentioned:


  Cyware

  Asana

  Cybersecurity Marketing Society

  
CyberMarketingCon25



🔔 Subscribe &amp; Review:

If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!

📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:

👉 Gianna Whitver

👉 Maria Velasquez

Thanks for tuning in. Remember, every Wednesday, we drop a new episode guaranteed to knock your SOCs off. 😎</description>
      <pubDate>Wed, 31 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>ENCORE EPISODE: The RevOps Whisperer: How Joe Aurilia Fixes the Stuff No One Wants to Touch</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As we take a brief end-of-year pause for CyberMarketingCon and holiday chaos, we’re bringing back one of 2025’s most replayed and requested episodes. Consider this your chance to revisit the insights you loved or catch an episode you might’ve missed.
Episode Summary:

This week, we’ve got an extra special guest, Joe Aurilia, Jr., SVP of Operations at Cyware. Joining Gianna and Maria to talk more about the art of scaling, automating, and just plain getting stuff done. Joe takes us on a ride from being Cyware’s first U.S. hire (aka "the guinea pig") to building and overseeing every corner of operations from legal and IT to rev ops and marketing ops. 

We chat about how to spot and fix the messiest processes, why RevOps is the unsung hero of the GTM engine, and what happens when contracts, people, and data collide. Joe also drops gems on internal sales/marketing for change management, and we close out with his dream career as an ice cream shop owner.

Plus: purple dashboards, auctioneer aspirations, and a serious stance on free sprinkles.

🔗Links &amp; Resources Mentioned:


  Cyware

  Asana

  Cybersecurity Marketing Society

  
CyberMarketingCon25



🔔 Subscribe &amp; Review:

If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!

📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:

👉 Gianna Whitver

👉 Maria Velasquez

Thanks for tuning in. Remember, every Wednesday, we drop a new episode guaranteed to knock your SOCs off. 😎</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As we take a brief end-of-year pause for CyberMarketingCon and holiday chaos, we’re bringing back one of 2025’s most replayed and requested episodes. Consider this your chance to revisit the insights you loved or catch an episode you might’ve missed.<br><strong>
Episode Summary:</strong></p>
<p>This week, we’ve got an extra special guest, <a href="https://www.linkedin.com/in/josephauriliajr/">Joe Aurilia, Jr</a>., SVP of Operations at <a href="https://www.linkedin.com/company/cyware/">Cyware</a>. Joining Gianna and Maria to talk more about the art of scaling, automating, and just plain getting stuff done. Joe takes us on a ride from being Cyware’s first U.S. hire (aka "the guinea pig") to building and overseeing every corner of operations from legal and IT to rev ops and marketing ops. </p>
<p>We chat about how to spot and fix the messiest processes, why RevOps is the unsung hero of the GTM engine, and what happens when contracts, people, and data collide. Joe also drops gems on internal sales/marketing for change management, and we close out with his dream career as an ice cream shop owner.<br></p>
<p>Plus: purple dashboards, auctioneer aspirations, and a serious stance on free sprinkles.<br></p>
<p>🔗<strong>Links &amp; Resources Mentioned:</strong></p>
<ul>
  <li><a href="https://www.cyware.com/">Cyware</a></li>
  <li><a href="https://asana.com/">Asana</a></li>
  <li><a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a></li>
  <li>
<a href="https://www.cybermarketingconference.com/">CyberMarketingCon25</a><br>
</li>
</ul>
<p>🔔<strong> Subscribe &amp; Review:</strong></p>
<p>If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!</p>
<p>📩 Got feedback or want to be on the show? Email us at <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> <br></p>
<p><strong>Be sure also to follow our hosts on LinkedIn:</strong></p>
<p>👉<a href="https://www.linkedin.com/in/giannawhitver"> Gianna Whitver</a></p>
<p>👉<a href="https://www.linkedin.com/in/maria-velasquez"> Maria Velasquez</a></p>
<p>Thanks for tuning in. Remember, <strong>every Wednesday</strong>, we drop a new episode guaranteed to knock your SOCs off. 😎</p>]]>
      </content:encoded>
      <itunes:duration>2099</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5a4e178-c9db-11f0-8af8-9f5380f76e75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6910610133.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ENCORE EPISODE: Inside Tom Wentworth’s AI Stack: How to Automate the Stuff Marketers Hate </title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/166/notes</link>
      <description>As we take a brief end-of-year pause for CyberMarketingCon and holiday chaos, we’re bringing back one of 2025’s most replayed and requested episodes. Consider this your chance to revisit the insights you loved or catch an episode you might’ve missed.
Episode Summary:

Tom Wentworth, CMO at Incident.io, got tired of doing the same stuff over and over, so he built AI agents to do it for him. Sales call summaries? Automated. Blog posts from discovery calls? Done in minutes. Battle cards? They update themselves.

He’s wiring together Slack, Notion, Zapier, Gong, and ChatGPT in ways that help his team move faster without adding headcount or complexity. There are no big declarations, just real systems that save time and don’t annoy people.

We talk about what’s working, what’s breaking, and how far you can push things without sounding like a robot. Also: cold plunges, prompt rage, and the Notion doc that’s 90 pages long.

🎧 Press play to hear how Tom stretches modern marketing ops with the right automation setup.

Links &amp; Resources Mentioned:


  ⁠Incident.io⁠

  ⁠Gong⁠

  ⁠Zapier⁠

  ⁠ChatGPT⁠

  ⁠Notion⁠

  ⁠Slack⁠

  ⁠Common Room⁠

  ⁠Sanity CMS⁠

  
⁠11Labs (Voice AI)⁠



About Tom:

Tom is a high-growth SaaS marketing leader with experience across enterprise GTM and product-led models. He writes occasionally about tech marketing at⁠ tomwentworth.com⁠ and previously hosted the Scaleup Marketing podcast.

Follow Tom on ⁠LinkedIn⁠

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: ⁠podcast@cybersecuritymarketingsociety.com⁠ 

Follow the Hosts:


  Gianna Whitver on ⁠LinkedIn⁠


  Charles Gold on ⁠LinkedIn⁠ 



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on ⁠our website⁠, main ⁠LinkedIn page⁠, ⁠Instagram⁠ page, or podcast ⁠LinkedIn⁠ page. 

See you in the next episode!</description>
      <pubDate>Wed, 24 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>ENCORE EPISODE: Inside Tom Wentworth’s AI Stack: How to Automate the Stuff Marketers Hate </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>166</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As we take a brief end-of-year pause for CyberMarketingCon and holiday chaos, we’re bringing back one of 2025’s most replayed and requested episodes. Consider this your chance to revisit the insights you loved or catch an episode you might’ve missed.
Episode Summary:

Tom Wentworth, CMO at Incident.io, got tired of doing the same stuff over and over, so he built AI agents to do it for him. Sales call summaries? Automated. Blog posts from discovery calls? Done in minutes. Battle cards? They update themselves.

He’s wiring together Slack, Notion, Zapier, Gong, and ChatGPT in ways that help his team move faster without adding headcount or complexity. There are no big declarations, just real systems that save time and don’t annoy people.

We talk about what’s working, what’s breaking, and how far you can push things without sounding like a robot. Also: cold plunges, prompt rage, and the Notion doc that’s 90 pages long.

🎧 Press play to hear how Tom stretches modern marketing ops with the right automation setup.

Links &amp; Resources Mentioned:


  ⁠Incident.io⁠

  ⁠Gong⁠

  ⁠Zapier⁠

  ⁠ChatGPT⁠

  ⁠Notion⁠

  ⁠Slack⁠

  ⁠Common Room⁠

  ⁠Sanity CMS⁠

  
⁠11Labs (Voice AI)⁠



About Tom:

Tom is a high-growth SaaS marketing leader with experience across enterprise GTM and product-led models. He writes occasionally about tech marketing at⁠ tomwentworth.com⁠ and previously hosted the Scaleup Marketing podcast.

Follow Tom on ⁠LinkedIn⁠

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: ⁠podcast@cybersecuritymarketingsociety.com⁠ 

Follow the Hosts:


  Gianna Whitver on ⁠LinkedIn⁠


  Charles Gold on ⁠LinkedIn⁠ 



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on ⁠our website⁠, main ⁠LinkedIn page⁠, ⁠Instagram⁠ page, or podcast ⁠LinkedIn⁠ page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As we take a brief end-of-year pause for CyberMarketingCon and holiday chaos, we’re bringing back one of 2025’s most replayed and requested episodes. Consider this your chance to revisit the insights you loved or catch an episode you might’ve missed.<br><strong>
Episode Summary:</strong></p>
<p>Tom Wentworth, CMO at Incident.io, got tired of doing the same stuff over and over, so he built AI agents to do it for him. Sales call summaries? Automated. Blog posts from discovery calls? Done in minutes. Battle cards? They update themselves.</p>
<p>He’s wiring together Slack, Notion, Zapier, Gong, and ChatGPT in ways that help his team move faster without adding headcount or complexity. There are no big declarations, just real systems that save time and don’t annoy people.</p>
<p>We talk about what’s working, what’s breaking, and how far you can push things without sounding like a robot. Also: cold plunges, prompt rage, and the Notion doc that’s 90 pages long.<br></p>
<p>🎧 Press play to hear how Tom stretches modern marketing ops with the right automation setup.<br></p>
<p><strong>Links &amp; Resources Mentioned:</strong></p>
<ul>
  <li><a href="https://incident.io/">⁠Incident.io⁠</a></li>
  <li><a href="https://www.gong.io/">⁠Gong⁠</a></li>
  <li><a href="https://zapier.com/">⁠Zapier⁠</a></li>
  <li><a href="https://chat.openai.com/">⁠ChatGPT⁠</a></li>
  <li><a href="https://www.notion.so/">⁠Notion⁠</a></li>
  <li><a href="https://slack.com/">⁠Slack⁠</a></li>
  <li><a href="https://www.commonroom.io/">⁠Common Room⁠</a></li>
  <li><a href="https://www.sanity.io/">⁠Sanity CMS⁠</a></li>
  <li>
<a href="https://www.elevenlabs.io/">⁠11Labs (Voice AI)⁠</a><br>
</li>
</ul>
<p><strong>About Tom:</strong></p>
<p>Tom is a high-growth SaaS marketing leader with experience across enterprise GTM and product-led models. He writes occasionally about tech marketing at<a href="https://tomwentworth.com/">⁠ tomwentworth.com⁠</a> and previously hosted the Scaleup Marketing podcast.</p>
<p>Follow Tom on <a href="https://www.linkedin.com/in/twentworth/">⁠LinkedIn⁠</a><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">⁠podcast@cybersecuritymarketingsociety.com⁠</a> <br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">⁠LinkedIn⁠</a>
</li>
  <li>Charles Gold on <a href="https://www.linkedin.com/in/charlesgold/">⁠LinkedIn⁠</a> <br>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">⁠our website⁠</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">⁠LinkedIn page⁠</a>, <a href="https://www.instagram.com/cybermsociety/">⁠Instagram⁠</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">⁠LinkedIn⁠</a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec7575a0-c9da-11f0-a226-17a8a7f2b652]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5986191796.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ENCORE EPISODE: How VCs Spot GTM Red Flags (and the Marketer Hires That Actually Work)</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/160/notes</link>
      <description>As we take a brief end-of-year pause for CyberMarketingCon and holiday chaos, we’re bringing back one of 2025’s most replayed and requested episodes. Consider this your chance to revisit the insights you loved or catch an episode you might’ve missed.

Episode Summary:

What do VCs think about your GTM strategy? This week, Gianna and Maria chat with Asad Khaliq and Mark Kraynak, two of Acrew Capital's founding members, about what it takes to build or break a go-to-market motion at an early-stage cyber startup.

Asad and Mark share how Acrew was founded, why they’re so focused on cyber and data, and what they’ve learned from backing some of the most well-known names in the industry. From hiring your first salesperson to avoiding “we stop threats” messaging, they’ve seen it all and they’re sharing the good, the bad, and the surprisingly funny.

About the guest: 

Follow Asad on LinkedIn.

Follow Mark on LinkedIn. 

Follow Acrew Capital on LinkedIn or the website. 

💌 Feedback or Wanna Be on the Show? Email: podcast@cybersecuritymarketingsociety.com 

Follow your hosts on LinkedIn:

👉Gianna Whitver👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 17 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>ENCORE EPISODE: How VCs Spot GTM Red Flags (and the Marketer Hires That Actually Work)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As we take a brief end-of-year pause for CyberMarketingCon and holiday chaos, we’re bringing back one of 2025’s most replayed and requested episodes. Consider this your chance to revisit the insights you loved or catch an episode you might’ve missed.

Episode Summary:

What do VCs think about your GTM strategy? This week, Gianna and Maria chat with Asad Khaliq and Mark Kraynak, two of Acrew Capital's founding members, about what it takes to build or break a go-to-market motion at an early-stage cyber startup.

Asad and Mark share how Acrew was founded, why they’re so focused on cyber and data, and what they’ve learned from backing some of the most well-known names in the industry. From hiring your first salesperson to avoiding “we stop threats” messaging, they’ve seen it all and they’re sharing the good, the bad, and the surprisingly funny.

About the guest: 

Follow Asad on LinkedIn.

Follow Mark on LinkedIn. 

Follow Acrew Capital on LinkedIn or the website. 

💌 Feedback or Wanna Be on the Show? Email: podcast@cybersecuritymarketingsociety.com 

Follow your hosts on LinkedIn:

👉Gianna Whitver👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As we take a brief end-of-year pause for CyberMarketingCon and holiday chaos, we’re bringing back one of 2025’s most replayed and requested episodes. Consider this your chance to revisit the insights you loved or catch an episode you might’ve missed.<br></p>
<p><strong>Episode Summary:</strong></p>
<p>What do VCs think about your GTM strategy? This week, Gianna and Maria chat with Asad Khaliq and Mark Kraynak, two of Acrew Capital's founding members, about what it takes to build or break a go-to-market motion at an early-stage cyber startup.</p>
<p>Asad and Mark share how Acrew was founded, why they’re so focused on cyber and data, and what they’ve learned from backing some of the most well-known names in the industry. From hiring your first salesperson to avoiding “we stop threats” messaging, they’ve seen it all and they’re sharing the good, the bad, and the surprisingly funny.<br></p>
<p><strong>About the guest: </strong></p>
<p>Follow Asad on <a href="https://www.linkedin.com/in/asadkhaliq/">LinkedIn</a>.</p>
<p>Follow Mark on <a href="https://www.linkedin.com/in/mark-kraynak/">LinkedIn</a>. </p>
<p>Follow Acrew Capital on <a href="https://www.linkedin.com/company/acrew-capital/">LinkedIn</a> or the <a href="https://www.acrewcapital.com/">website</a>. <br></p>
<p>💌<strong> Feedback or Wanna Be on the Show?</strong><br> Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> <br></p>
<p><strong>Follow your hosts on LinkedIn:</strong></p>
<p>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver<br></a>👉<a href="https://www.linkedin.com/in/mariavelasquez1/">Maria Velasquez</a></p>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
<p>See you in the next episode!</p>
<p><br></p>
<p><br></p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2763</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[63ad47f8-c9d9-11f0-8eae-6f51238aec2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7915057173.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ManageEngine in Vegas, Part 2: Where AI Anxiety Meets Real-World Wisdom</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/192/notes</link>
      <description>Episode Summary:

We’re back in Las Vegas for Part 2 of our live series from the ManageEngine User Conference, this time shifting from the conference floor to the hallways, lobby couches, and those slightly delirious late-night conversations fueled entirely by hotel coffee.

Part 1 focused on how ManageEngine builds trust from the inside. Part 2 flips the perspective outward, bringing in three very different voices: an AI governance advisor, an innovation leader, and a veteran tech journalist, all wrestling with how AI, security, and trust are colliding across the industry.

It’s a grounded, candid look at what people are really thinking about AI right now, far beyond the keynote slides and vendor hype.

(And yes, all three guests happen to be named Alex. I promise we didn’t plan that.)

Have a listen — this one hits a different part of the conversation.



About Guests: 

Alex Sharpe — Board Advisor &amp; Cyber Governance Expert (Sharpe LLC)
Alex works at the intersection of business strategy, cyber governance, and operational resilience. He’s advised Fortune 100 boards, taught resilience at NYU, and helped companies navigate everything from AI risk to major M&amp;A events. 



Alex Goryachev — WSJ Bestselling Author &amp; AI Innovation Exec
Alex helps companies make sense of AI, build innovation programs that actually work, and navigate the cultural side of transformation. He’s led AI and innovation efforts at Cisco, Dell, Amgen, and the California State University system. In this episode, he breaks down trust, safety, and why employees quietly automate half their jobs.



Alex Williams — Founder &amp; Publisher, The New Stack

Alex is a veteran tech journalist and the founder of The New Stack, where he covers how modern software gets built and operated at scale. Before that, he wrote about cloud and enterprise tech at ReadWriteWeb and TechCrunch.



🔗 Links &amp; Resources:

Attend the ManageEngine User Conference
The New Stack — Alex Williams’ publication: https://thenewstack.io

Alex Goryachev — AI &amp; innovation keynote site: https://alexgoryachev.com 



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 10 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>ManageEngine in Vegas, Part 2: Where AI Anxiety Meets Real-World Wisdom</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>192</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

We’re back in Las Vegas for Part 2 of our live series from the ManageEngine User Conference, this time shifting from the conference floor to the hallways, lobby couches, and those slightly delirious late-night conversations fueled entirely by hotel coffee.

Part 1 focused on how ManageEngine builds trust from the inside. Part 2 flips the perspective outward, bringing in three very different voices: an AI governance advisor, an innovation leader, and a veteran tech journalist, all wrestling with how AI, security, and trust are colliding across the industry.

It’s a grounded, candid look at what people are really thinking about AI right now, far beyond the keynote slides and vendor hype.

(And yes, all three guests happen to be named Alex. I promise we didn’t plan that.)

Have a listen — this one hits a different part of the conversation.



About Guests: 

Alex Sharpe — Board Advisor &amp; Cyber Governance Expert (Sharpe LLC)
Alex works at the intersection of business strategy, cyber governance, and operational resilience. He’s advised Fortune 100 boards, taught resilience at NYU, and helped companies navigate everything from AI risk to major M&amp;A events. 



Alex Goryachev — WSJ Bestselling Author &amp; AI Innovation Exec
Alex helps companies make sense of AI, build innovation programs that actually work, and navigate the cultural side of transformation. He’s led AI and innovation efforts at Cisco, Dell, Amgen, and the California State University system. In this episode, he breaks down trust, safety, and why employees quietly automate half their jobs.



Alex Williams — Founder &amp; Publisher, The New Stack

Alex is a veteran tech journalist and the founder of The New Stack, where he covers how modern software gets built and operated at scale. Before that, he wrote about cloud and enterprise tech at ReadWriteWeb and TechCrunch.



🔗 Links &amp; Resources:

Attend the ManageEngine User Conference
The New Stack — Alex Williams’ publication: https://thenewstack.io

Alex Goryachev — AI &amp; innovation keynote site: https://alexgoryachev.com 



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>We’re back in Las Vegas for Part 2 of our live series from the ManageEngine User Conference, this time shifting from the conference floor to the hallways, lobby couches, and those slightly delirious late-night conversations fueled entirely by hotel coffee.</p>
<p>Part 1 focused on how ManageEngine builds trust from the inside. <strong>Part 2 flips the perspective outward</strong>, bringing in three very different voices: an AI governance advisor, an innovation leader, and a veteran tech journalist, all wrestling with how AI, security, and trust are colliding across the industry.</p>
<p>It’s a grounded, candid look at what people are really thinking about AI right now, far beyond the keynote slides and vendor hype.</p>
<p>(And yes, all three guests happen to be named Alex. I promise we didn’t plan that.)</p>
<p><strong>Have a listen — this one hits a different part of the conversation.</strong></p>
<p><br></p>
<p><strong>About Guests: </strong></p>
<p><a href="https://www.linkedin.com/in/alex-sharpe-3rd/"><strong>Alex Sharpe</strong></a><strong> — Board Advisor &amp; Cyber Governance Expert (Sharpe LLC)</strong><br>
Alex works at the intersection of business strategy, cyber governance, and operational resilience. He’s advised Fortune 100 boards, taught resilience at NYU, and helped companies navigate everything from AI risk to major M&amp;A events. </p>
<p><br></p>
<p><a href="https://www.linkedin.com/in/alexgoryachev/"><strong>Alex Goryachev</strong></a><strong> — WSJ Bestselling Author &amp; AI Innovation Exec</strong>
Alex helps companies make sense of AI, build innovation programs that actually work, and navigate the cultural side of transformation. He’s led AI and innovation efforts at Cisco, Dell, Amgen, and the California State University system. In this episode, he breaks down trust, safety, and why employees quietly automate half their jobs.</p>
<p><br></p>
<p><a href="https://www.linkedin.com/in/alexhwilliams4/"><strong>Alex Williams</strong></a><strong> — Founder &amp; Publisher, The New Stack</strong></p>
<p>Alex is a veteran tech journalist and the founder of <em>The New Stack</em>, where he covers how modern software gets built and operated at scale. Before that, he wrote about cloud and enterprise tech at ReadWriteWeb and TechCrunch.</p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<p>Attend the <a href="https://www.manageengine.com/">ManageEngine </a>User Conference<br>
The New Stack — Alex Williams’ publication:<a href="https://thenewstack.io/"> https://thenewstack.io</a></p>
<p>Alex Goryachev — AI &amp; innovation keynote site: <a href="https://alexgoryachev.com/">https://alexgoryachev.com</a> </p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, our <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>
<p><br></p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>1860</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0919a3ca-c936-11f0-86fc-83f73755ccc7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1080357555.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Episode 1: ManageEngine - Live interviews from ManageEngine Userconf in Las Vegas, NV </title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/191/notes</link>
      <description>Episode Summary:

We took the podcast on the road for this one. Gianna spent two days roaming the ManageEngine User Conference in Las Vegas,  mic in hand, slightly over-caffeinated, talking with the people who actually keep this massive IT management ecosystem running.

This episode brings together conversations with the CMO, the team leading North America operations and partnerships, and one of ManageEngine’s longtime global channel partners. Different roles, different vantage points, but everyone came back to the same theme: trust. Not the buzzword version, the real kind, where meeting someone face-to-face finally puts a human behind the support ticket.

And yes, Part 2 is on the way. We’ve got more interviews from the conference floor, including late-night influencer conversations and a studio-recorded session with the VP of Product. Think of this episode as the first half of the full story.

About Guests: 

Ajay Kumar — Head of Global Marketing, ManageEngine (a division of Zoho Corp.)Ajay leads global marketing across the entire ManageEngine portfolio.



Haja Moideen — Head of North America Business, Operations &amp; Strategic Channel Partnerships; Official Spokesperson for ManageEngineHaja runs the operations and partner ecosystem across the U.S. and Canada.



Mohamed Abdelhay — Co-Founder &amp; Business Development Director, SanaTech Global Solutions (ManageEngine Partner)Mohamed has been deploying, integrating, and selling ManageEngine products for well over a decade. He started in Egypt, grew his customer base one implementation at a time, and now runs SanaTech’s business development efforts from Los Angeles.



🔗 Links &amp; Resources:

ManageEngine User Conference (Las Vegas)ManageEngine product documents — full list of features, use cases, and technical specs. 



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn





Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 03 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Episode 1: ManageEngine - Live interviews from ManageEngine Userconf in Las Vegas, NV </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>191</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

We took the podcast on the road for this one. Gianna spent two days roaming the ManageEngine User Conference in Las Vegas,  mic in hand, slightly over-caffeinated, talking with the people who actually keep this massive IT management ecosystem running.

This episode brings together conversations with the CMO, the team leading North America operations and partnerships, and one of ManageEngine’s longtime global channel partners. Different roles, different vantage points, but everyone came back to the same theme: trust. Not the buzzword version, the real kind, where meeting someone face-to-face finally puts a human behind the support ticket.

And yes, Part 2 is on the way. We’ve got more interviews from the conference floor, including late-night influencer conversations and a studio-recorded session with the VP of Product. Think of this episode as the first half of the full story.

About Guests: 

Ajay Kumar — Head of Global Marketing, ManageEngine (a division of Zoho Corp.)Ajay leads global marketing across the entire ManageEngine portfolio.



Haja Moideen — Head of North America Business, Operations &amp; Strategic Channel Partnerships; Official Spokesperson for ManageEngineHaja runs the operations and partner ecosystem across the U.S. and Canada.



Mohamed Abdelhay — Co-Founder &amp; Business Development Director, SanaTech Global Solutions (ManageEngine Partner)Mohamed has been deploying, integrating, and selling ManageEngine products for well over a decade. He started in Egypt, grew his customer base one implementation at a time, and now runs SanaTech’s business development efforts from Los Angeles.



🔗 Links &amp; Resources:

ManageEngine User Conference (Las Vegas)ManageEngine product documents — full list of features, use cases, and technical specs. 



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn





Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>We took the podcast on the road for this one. Gianna spent two days roaming the ManageEngine User Conference in Las Vegas,  mic in hand, slightly over-caffeinated, talking with the people who actually keep this massive IT management ecosystem running.</p>
<p>This episode brings together conversations with the CMO, the team leading North America operations and partnerships, and one of ManageEngine’s longtime global channel partners. Different roles, different vantage points, but everyone came back to the same theme: trust. Not the buzzword version, the real kind, where meeting someone face-to-face finally puts a human behind the support ticket.</p>
<p>And yes, Part 2 is on the way. We’ve got more interviews from the conference floor, including late-night influencer conversations and a studio-recorded session with the VP of Product. Think of this episode as the first half of the full story.<br></p>
<p><strong>About Guests: </strong></p>
<p><a href="https://www.linkedin.com/in/ajaykumarkg/?originalSubdomain=in"><strong>Ajay Kumar</strong></a><strong> — Head of Global Marketing, ManageEngine (a division of Zoho Corp.)</strong><br>Ajay leads global marketing across the entire ManageEngine portfolio.</p>
<p><br></p>
<p><a href="https://www.linkedin.com/in/hajamoideen/"><strong>Haja Moideen</strong></a><strong> — Head of North America Business, Operations &amp; Strategic Channel Partnerships; Official Spokesperson for ManageEngine</strong><br>Haja runs the operations and partner ecosystem across the U.S. and Canada.</p>
<p><br></p>
<p><a href="https://www.linkedin.com/in/mohamed-abdelhay-b022447/"><strong>Mohamed Abdelhay</strong></a><strong> — Co-Founder &amp; Business Development Director, SanaTech Global Solutions (ManageEngine Partner)</strong><br>Mohamed has been deploying, integrating, and selling ManageEngine products for well over a decade. He started in Egypt, grew his customer base one implementation at a time, and now runs SanaTech’s business development efforts from Los Angeles.</p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<p><a href="https://www.manageengine.com/events.html?userconf-las-vegas-2025">ManageEngine User Conference</a> (Las Vegas)<br><a href="https://www.manageengine.com/productdocument.html">ManageEngine product documents</a> — full list of features, use cases, and technical specs.<a href="https://www.manageengine.com/productdocument.html?utm_source=chatgpt.com"> </a></p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p>
<p><br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p><br></p>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, our <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8629bf6-c933-11f0-96b0-03646c4f4247]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8847217676.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Cracking the Code Marketing to Cybersecurity's Elusive Buyers CyberMarketingCon 2025</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/190/notes</link>
      <description>Episode Summary:

This week, we’re sharing a special crossover episode originally recorded for ITSP Magazine. Gianna and Maria join hosts Sean Martin and Marco Ciappelli for an on-location conversation about how the Cybersecurity Marketing Society got started, why our industry’s buyers behave the way they do, and what makes cybersecurity marketing fundamentally different from every other field.

They discuss trust, burnout, AI buzzwords, why buyers dislike being sold to, and how marketing teams can effectively demonstrate value in a saturated, hyper-technical market. You’ll also hear what to expect at CyberMarketingCon 2025, from hands-on AI workshops to a marketer-only CTF, and why the event has become a reunion for practitioners across the ecosystem.

If you want a grounded conversation about real marketing challenges (minus the fluffy vendor vibes), this one’s worth your time.

About Sean and Marco:

Sean Martin, CISSP, is Co-Founder and Editor-in-Chief at ITSP Magazine, a multimedia platform exploring the intersection of technology, cybersecurity, and society. He hosts their “On Location” podcast series and several other shows, blending deep cybersecurity insights with human-scale storytelling.

Marco Ciappelli is Co-Founder and Creative Director at ITSP Magazine, host of its podcasts, and lead for their “At the Intersection” story platform. He brings branding, media, and societal insight to the conversation about cybersecurity’s broader role.



🔗 Links &amp; Resources:

ITSP Magazine 

ITSP Magazine On-Location Podcast Series 



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn





Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 26 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title> Cracking the Code Marketing to Cybersecurity's Elusive Buyers CyberMarketingCon 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>190</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

This week, we’re sharing a special crossover episode originally recorded for ITSP Magazine. Gianna and Maria join hosts Sean Martin and Marco Ciappelli for an on-location conversation about how the Cybersecurity Marketing Society got started, why our industry’s buyers behave the way they do, and what makes cybersecurity marketing fundamentally different from every other field.

They discuss trust, burnout, AI buzzwords, why buyers dislike being sold to, and how marketing teams can effectively demonstrate value in a saturated, hyper-technical market. You’ll also hear what to expect at CyberMarketingCon 2025, from hands-on AI workshops to a marketer-only CTF, and why the event has become a reunion for practitioners across the ecosystem.

If you want a grounded conversation about real marketing challenges (minus the fluffy vendor vibes), this one’s worth your time.

About Sean and Marco:

Sean Martin, CISSP, is Co-Founder and Editor-in-Chief at ITSP Magazine, a multimedia platform exploring the intersection of technology, cybersecurity, and society. He hosts their “On Location” podcast series and several other shows, blending deep cybersecurity insights with human-scale storytelling.

Marco Ciappelli is Co-Founder and Creative Director at ITSP Magazine, host of its podcasts, and lead for their “At the Intersection” story platform. He brings branding, media, and societal insight to the conversation about cybersecurity’s broader role.



🔗 Links &amp; Resources:

ITSP Magazine 

ITSP Magazine On-Location Podcast Series 



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn





Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, our Instagram page, or our podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>This week, we’re sharing a special crossover episode originally recorded for ITSP Magazine. Gianna and Maria join hosts <strong>Sean Martin</strong> and <strong>Marco Ciappelli</strong> for an on-location conversation about how the Cybersecurity Marketing Society got started, why our industry’s buyers behave the way they do, and what makes cybersecurity marketing fundamentally different from every other field.</p>
<p>They discuss trust, burnout, AI buzzwords, why buyers dislike being sold to, and how marketing teams can effectively demonstrate value in a saturated, hyper-technical market. You’ll also hear what to expect at CyberMarketingCon 2025, from hands-on AI workshops to a marketer-only CTF, and why the event has become a reunion for practitioners across the ecosystem.</p>
<p>If you want a grounded conversation about real marketing challenges (minus the fluffy vendor vibes), this one’s worth your time.<br></p>
<p><strong>About Sean and Marco:</strong></p>
<p><a href="https://www.linkedin.com/in/imsmartin/"><strong>Sean Martin</strong></a><strong>, CISSP,</strong> is Co-Founder and Editor-in-Chief at ITSP Magazine, a multimedia platform exploring the intersection of technology, cybersecurity, and society. He hosts their “On Location” podcast series and several other shows, blending deep cybersecurity insights with human-scale storytelling.</p>
<p><a href="https://www.linkedin.com/in/marco-ciappelli/"><strong>Marco Ciappelli</strong></a> is Co-Founder and Creative Director at ITSP Magazine, host of its podcasts, and lead for their “At the Intersection” story platform. He brings branding, media, and societal insight to the conversation about cybersecurity’s broader role.</p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<p><a href="https://www.itspmagazine.com/"><strong>ITSP Magazine</strong></a> </p>
<p><a href="https://www.itspmagazine.com/on-location"><strong>ITSP Magazine On-Location Podcast Series</strong> </a></p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> <br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p><br></p>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">our Instagram</a> page, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1990</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f57dce6-c6d9-11f0-b827-375bc155f0b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6777269195.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From 30 Percent to 78 Percent: Bricklayer AI’s Q2 2025 Conversion Jump</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/189/notes</link>
      <description>Episode Summary:

Gianna sits down and talks with Adam Vincent, founder and CEO of Bricklayer AI, about selling first and letting the market shape your message. After bootstrapping and shipping an MVP in summer 2023, Adam called (literally phone called) his way into product clarity and pipeline, then watched curiosity turn into urgency in Q2 2025. They get practical on where agents help today, so security teams finally use the tools they already pay for.



You’ll hear:


  The words that make buyers lean in.

  Agents that handle alert triage, weekly intel briefs, and vulnerability prioritization.

  Meeting to SQO rising from about 30% (Q1 2025) to about 78% (Q2 2025).


If you’re looking for buyer-tested phrasing, three practical agent workflows, and a simple outreach pattern you can run tomorrow, this episode is for you.



About Adam:

Adam Vincent is the Founder and CEO of Bricklayer AI. He’s spent his career building software that helps security analysts do their jobs better and has worn the hats: QA, engineering, and CTO. Early at Layer 7 Technologies, he built the federal practice across sales, marketing, and tech. 



In his last startup, he says the team grew revenue from zero to $30M ARR. He founded Bricklayer AI, bootstrapped for about a year, launched an MVP in summer 2023, and runs founder-led sales while standing up marketing and sales leadership.

Follow Adam on LinkedIn



🔗 Links &amp; Resources:

Bricklayer AI 

ThreatConnect 

Layer 7 (now Broadcom Layer7 API Management)



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 19 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>From 30 Percent to 78 Percent: Bricklayer AI’s Q2 2025 Conversion Jump</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>189</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Gianna sits down and talks with Adam Vincent, founder and CEO of Bricklayer AI, about selling first and letting the market shape your message. After bootstrapping and shipping an MVP in summer 2023, Adam called (literally phone called) his way into product clarity and pipeline, then watched curiosity turn into urgency in Q2 2025. They get practical on where agents help today, so security teams finally use the tools they already pay for.



You’ll hear:


  The words that make buyers lean in.

  Agents that handle alert triage, weekly intel briefs, and vulnerability prioritization.

  Meeting to SQO rising from about 30% (Q1 2025) to about 78% (Q2 2025).


If you’re looking for buyer-tested phrasing, three practical agent workflows, and a simple outreach pattern you can run tomorrow, this episode is for you.



About Adam:

Adam Vincent is the Founder and CEO of Bricklayer AI. He’s spent his career building software that helps security analysts do their jobs better and has worn the hats: QA, engineering, and CTO. Early at Layer 7 Technologies, he built the federal practice across sales, marketing, and tech. 



In his last startup, he says the team grew revenue from zero to $30M ARR. He founded Bricklayer AI, bootstrapped for about a year, launched an MVP in summer 2023, and runs founder-led sales while standing up marketing and sales leadership.

Follow Adam on LinkedIn



🔗 Links &amp; Resources:

Bricklayer AI 

ThreatConnect 

Layer 7 (now Broadcom Layer7 API Management)



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Gianna sits down and talks with Adam Vincent, founder and CEO of Bricklayer AI, about selling first and letting the market shape your message. After bootstrapping and shipping an MVP in summer 2023, Adam called (literally phone called) his way into product clarity and pipeline, then watched curiosity turn into urgency in Q2 2025. They get practical on where agents help today, so security teams finally use the tools they already pay for.</p>
<p><br></p>
<p><strong>You’ll hear:</strong></p>
<ul>
  <li>The words that make buyers lean in.</li>
  <li>Agents that handle alert triage, weekly intel briefs, and vulnerability prioritization.</li>
  <li>Meeting to SQO rising from about <strong>30% (Q1 2025)</strong> to about <strong>78% (Q2 2025)</strong>.</li>
</ul>
<p>If you’re looking for buyer-tested phrasing, three practical agent workflows, and a simple outreach pattern you can run tomorrow, this episode is for you.</p>
<p><br></p>
<p><strong>About Adam:</strong></p>
<p>Adam Vincent is the Founder and CEO of Bricklayer AI. He’s spent his career building software that helps security analysts do their jobs better and has worn the hats: QA, engineering, and CTO. Early at Layer 7 Technologies, he built the federal practice across sales, marketing, and tech. </p>
<p><br></p>
<p>In his last startup, he says the team grew revenue from zero to $30M ARR. He founded Bricklayer AI, bootstrapped for about a year, launched an MVP in summer 2023, and runs founder-led sales while standing up marketing and sales leadership.</p>
<p>Follow Adam on <a href="https://www.linkedin.com/in/adamvincent/">LinkedIn</a></p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<p><a href="https://www.bricklayer.ai/">Bricklayer AI</a> </p>
<p><a href="https://threatconnect.com/">ThreatConnect</a> </p>
<p><a href="http://broadcom.com/products/software/layer7-api-security">Layer 7</a> (now Broadcom Layer7 API Management)</p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p><br></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> <br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.<br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1864</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ac6d7be-b040-11f0-83cd-27d3bac93643]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1704219303.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Zero Trust to Breach Containment: How Illumio Reframed Its Story (and the Cybersecurity Conversation)</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/188/notes</link>
      <description>Episode Summary:

We’re back with another round of Cyber CMO Confidential, where Gianna and Charles ask the questions every cybersecurity marketer wishes they could ask their CMO.



This time, Karl Van den Bergh, Illumio’s CMO, shares why he dropped the “ing” and became a Chief Market Officer. He unpacks Illumio’s shift from zero trust segmentation to breach containment, the fine line between AI innovation and AI nonsense, and why marketers need to stop selling and start representing the market.



🎧 Listen to the full episode for Karl’s take on authenticity, AI hype, and what it really means to market the market.



About Karl: 

Karl Van den Bergh is the Chief Market Officer at Illumio, where he leads global marketing for the company’s breach containment and Zero Trust Segmentation platform. With over two decades in enterprise software and cybersecurity, he’s known for transforming complex technology brands into clear, market-driven stories.



Before joining Illumio, Karl served as CMO at Gigamon and DataStax, where he helped reposition both companies for modern, security-focused growth. His work centers on connecting product strategy to real market needs and building brands that lead with clarity, not jargon.



Follow Karl on LinkedIn. 



🔗 Links &amp; Resources:

Illumio – Learn more about the company’s breach containment and Zero Trust Segmentation platform.



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 12 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>From Zero Trust to Breach Containment: How Illumio Reframed Its Story (and the Cybersecurity Conversation)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>188</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

We’re back with another round of Cyber CMO Confidential, where Gianna and Charles ask the questions every cybersecurity marketer wishes they could ask their CMO.



This time, Karl Van den Bergh, Illumio’s CMO, shares why he dropped the “ing” and became a Chief Market Officer. He unpacks Illumio’s shift from zero trust segmentation to breach containment, the fine line between AI innovation and AI nonsense, and why marketers need to stop selling and start representing the market.



🎧 Listen to the full episode for Karl’s take on authenticity, AI hype, and what it really means to market the market.



About Karl: 

Karl Van den Bergh is the Chief Market Officer at Illumio, where he leads global marketing for the company’s breach containment and Zero Trust Segmentation platform. With over two decades in enterprise software and cybersecurity, he’s known for transforming complex technology brands into clear, market-driven stories.



Before joining Illumio, Karl served as CMO at Gigamon and DataStax, where he helped reposition both companies for modern, security-focused growth. His work centers on connecting product strategy to real market needs and building brands that lead with clarity, not jargon.



Follow Karl on LinkedIn. 



🔗 Links &amp; Resources:

Illumio – Learn more about the company’s breach containment and Zero Trust Segmentation platform.



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>We’re back with another round of <strong>Cyber CMO Confidential</strong>, where Gianna and Charles ask the questions every cybersecurity marketer wishes they could ask their CMO.</p>
<p><br></p>
<p>This time, <strong>Karl Van den Bergh</strong>, <strong>Illumio’s CMO</strong>, shares why he dropped the “ing” and became a <em>Chief Market Officer.</em> He unpacks Illumio’s shift from zero trust segmentation to breach containment, the fine line between AI innovation and AI nonsense, and why marketers need to stop selling and start representing the market.</p>
<p><br></p>
<p>🎧 <em>Listen to the full episode for Karl’s take on authenticity, AI hype, and what it really means to market the market.</em></p>
<p><br></p>
<p><strong>About Karl: </strong></p>
<p><strong>Karl Van den Bergh</strong> is the <strong>Chief Market Officer at Illumio</strong>, where he leads global marketing for the company’s breach containment and Zero Trust Segmentation platform. With over two decades in enterprise software and cybersecurity, he’s known for transforming complex technology brands into clear, market-driven stories.</p>
<p><br></p>
<p>Before joining Illumio, Karl served as CMO at <strong>Gigamon</strong> and <strong>DataStax</strong>, where he helped reposition both companies for modern, security-focused growth. His work centers on connecting product strategy to real market needs and building brands that lead with clarity, not jargon.</p>
<p><br></p>
<p>Follow Karl on <a href="https://www.linkedin.com/in/karlvandenbergh">LinkedIn</a>. </p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<p><a href="https://www.illumio.com/">Illumio</a> – Learn more about the company’s breach containment and Zero Trust Segmentation platform.</p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p><br></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> <br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.<br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1942</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a42adae-b03f-11f0-934d-0f6d4411bd0f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3927004522.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your Guide to CyberMarketingCon 2025: Workshops, Wrestling, and What’s New in Austin</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/187/notes</link>
      <description>Episode Summary:

Gianna and Maria take a break from guest interviews to share what’s ahead at CyberMarketingCon 2025, coming December 7–10 in Austin, TX, and streaming online. From building your first AI agent or tackling a marketer’s CTF, to designing sharper content in Canva, this year’s workshops go hands-on fast.



They walk through new summits for CMOs, founders, and sales teams, introduce fresh AI-driven sponsors, and preview Austin’s most unexpected highlight, a cybersecurity-themed wrestling show. It’s a glimpse at how the community keeps growing, connecting, and having fun.



👉 Listen to the full episode for insider updates, practical tips, and a few behind-the-scenes laughs from the team bringing CyberMarketingCon to life.

About the hosts:

Gianna Whitver and Maria Velasquez are the co-founders of the Cybersecurity Marketing Society and organizers of CyberMarketingCon, the annual conference for security marketers, founders, and GTM leaders to connect, learn, and grow together.

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 05 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Your Guide to CyberMarketingCon 2025: Workshops, Wrestling, and What’s New in Austin</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>187</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Gianna and Maria take a break from guest interviews to share what’s ahead at CyberMarketingCon 2025, coming December 7–10 in Austin, TX, and streaming online. From building your first AI agent or tackling a marketer’s CTF, to designing sharper content in Canva, this year’s workshops go hands-on fast.



They walk through new summits for CMOs, founders, and sales teams, introduce fresh AI-driven sponsors, and preview Austin’s most unexpected highlight, a cybersecurity-themed wrestling show. It’s a glimpse at how the community keeps growing, connecting, and having fun.



👉 Listen to the full episode for insider updates, practical tips, and a few behind-the-scenes laughs from the team bringing CyberMarketingCon to life.

About the hosts:

Gianna Whitver and Maria Velasquez are the co-founders of the Cybersecurity Marketing Society and organizers of CyberMarketingCon, the annual conference for security marketers, founders, and GTM leaders to connect, learn, and grow together.

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Gianna and Maria take a break from guest interviews to share what’s ahead at CyberMarketingCon 2025, coming December 7–10 in Austin, TX, and streaming online. From building your first AI agent or tackling a marketer’s CTF, to designing sharper content in Canva, this year’s workshops go hands-on fast.</p>
<p><br></p>
<p>They walk through new summits for CMOs, founders, and sales teams, introduce fresh AI-driven sponsors, and preview Austin’s most unexpected highlight, a cybersecurity-themed wrestling show. It’s a glimpse at how the community keeps growing, connecting, and having fun.</p>
<p><br></p>
<p>👉 <strong>Listen to the full episode</strong> for insider updates, practical tips, and a few behind-the-scenes laughs from the team bringing CyberMarketingCon to life.<br></p>
<p><strong>About the hosts:</strong></p>
<p>Gianna Whitver and Maria Velasquez are the co-founders of the Cybersecurity Marketing Society and organizers of CyberMarketingCon, the annual conference for security marketers, founders, and GTM leaders to connect, learn, and grow together.<br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.<br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p><br></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1611</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b18678a0-b03e-11f0-9be3-1b7a7388026a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9225334296.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Communicate Like an Executive—Lessons from Varonis CMO Rob Sobers</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/186/notes</link>
      <description>Episode Summary:

Most marketers learn executive communication the hard way. Rob Sobers, CMO at Varonis, joins Gianna and Charles to share what he’s figured out along the way, how to lead with the answer, give data real context, and know when to stop talking.

He explains how to tailor communication for CEOs, boards, and peers, and why too much detail can make you sound less senior, not more informed. The conversation also covers the habits that build trust over time: using templates for consistency, setting clear values so teams can move without micromanagement, and preparing for the “most obvious objections” before they’re raised.



👉 Listen to the full episode for practical examples, career lessons, and Rob’s take on the one buzzword he’d retire from cybersecurity marketing for good.

About Rob:

Rob Sobers is the Chief Marketing Officer at Varonis, a leader in data security. He began his career as a software engineer before moving into marketing, giving him a unique perspective on how technical and business teams communicate. At Varonis, Rob leads global marketing strategy and focuses on helping organizations understand and reduce data risk.

He’s also the co-author of Learn Ruby the Hard Way and a longtime advocate for practical, transparent communication inside complex organizations.

Follow Rob Sobers on LinkedIn



🔗 Links &amp; Resources:

Varonis: varonis.com 

Dave Kellogg’s Blog (Kellblog): kellblog.com 

Carilu Dietrich’s Post on Executive Communication: LinkedIn article 



Elevate Your Marketing Dashboard: How to Impress the CEO, CRO, and CFO — Carilu Dietrich (Substack)



Wes Kao’s “15 Principles for Managing Up”: weskao.com 



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 29 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>How to Communicate Like an Executive—Lessons from Varonis CMO Rob Sobers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>186</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Most marketers learn executive communication the hard way. Rob Sobers, CMO at Varonis, joins Gianna and Charles to share what he’s figured out along the way, how to lead with the answer, give data real context, and know when to stop talking.

He explains how to tailor communication for CEOs, boards, and peers, and why too much detail can make you sound less senior, not more informed. The conversation also covers the habits that build trust over time: using templates for consistency, setting clear values so teams can move without micromanagement, and preparing for the “most obvious objections” before they’re raised.



👉 Listen to the full episode for practical examples, career lessons, and Rob’s take on the one buzzword he’d retire from cybersecurity marketing for good.

About Rob:

Rob Sobers is the Chief Marketing Officer at Varonis, a leader in data security. He began his career as a software engineer before moving into marketing, giving him a unique perspective on how technical and business teams communicate. At Varonis, Rob leads global marketing strategy and focuses on helping organizations understand and reduce data risk.

He’s also the co-author of Learn Ruby the Hard Way and a longtime advocate for practical, transparent communication inside complex organizations.

Follow Rob Sobers on LinkedIn



🔗 Links &amp; Resources:

Varonis: varonis.com 

Dave Kellogg’s Blog (Kellblog): kellblog.com 

Carilu Dietrich’s Post on Executive Communication: LinkedIn article 



Elevate Your Marketing Dashboard: How to Impress the CEO, CRO, and CFO — Carilu Dietrich (Substack)



Wes Kao’s “15 Principles for Managing Up”: weskao.com 



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Most marketers learn executive communication the hard way. <strong>Rob Sobers, CMO at Varonis</strong>, joins <strong>Gianna and Charles</strong> to share what he’s figured out along the way, how to lead with the answer, give data real context, and know when to stop talking.</p>
<p>He explains how to tailor communication for CEOs, boards, and peers, and why too much detail can make you sound less senior, not more informed. The conversation also covers the habits that build trust over time: using templates for consistency, setting clear values so teams can move without micromanagement, and preparing for the “most obvious objections” before they’re raised.</p>
<p><br></p>
<p>👉 <strong>Listen to the full episode</strong> for practical examples, career lessons, and Rob’s take on the one buzzword he’d retire from cybersecurity marketing for good.</p>
<p><br><strong>About Rob:</strong></p>
<p><strong>Rob Sobers</strong> is the Chief Marketing Officer at <strong>Varonis</strong>, a leader in data security. He began his career as a software engineer before moving into marketing, giving him a unique perspective on how technical and business teams communicate. At Varonis, Rob leads global marketing strategy and focuses on helping organizations understand and reduce data risk.</p>
<p>He’s also the co-author of <em>Learn Ruby the Hard Way</em> and a longtime advocate for practical, transparent communication inside complex organizations.</p>
<p>Follow Rob Sobers on<a href="https://www.linkedin.com/in/rsobers/"> LinkedIn</a></p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<p>Varonis: <a href="http://varonis.com/">varonis.com</a> <br></p>
<p>Dave Kellogg’s Blog (Kellblog): <a href="http://kellblog.com/">kellblog.com</a> <br></p>
<p>Carilu Dietrich’s Post on Executive Communication:<a href="https://6sense.com/revenue-makers/the-art-of-executive-communication/"> LinkedIn article </a></p>
<p><br></p>
<p><a href="https://www.carilu.com/p/elevate-your-marketing-dashboard">Elevate Your Marketing Dashboard</a>: How to Impress the CEO, CRO, and CFO — Carilu Dietrich (Substack)</p>
<p><br></p>
<p>Wes Kao’s “15 Principles for Managing Up”: <a href="http://weskao.com/">weskao.com</a> </p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p><br></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p>
<p><br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2181</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05e10a74-b03e-11f0-aaae-b3ad7ff5a619]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7149649402.mp3?updated=1761842071" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your Cybersecurity Marketing Community Awaits — CyberMarketingCon 2025 Preview</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/185/notes</link>
      <description>Episode Summary:

What started as two marketers looking for support has grown into a 4,000-member community and CyberMarketingCon, the go-to conference for anyone driving go-to-market in security.

In this replay from Chris Hughes’ Resilient Cyber show, Gianna and Maria share what makes the Society different, why the event feels more like a reunion than a conference, and what’s waiting in Austin this December (or online if that’s easier): hands-on workshops, founder + investor sessions, and this year’s theme — the Marketing Time Machine.

Make sure you get your ticket today: https://www.cybermarketingconference.com/ 



About:

Chris Hughes is the host of Resilient Cyber and the President and CEO of Aquia, where he helps organizations securely adopt cloud and modern software practices. His show brings practitioners, builders, and leaders together to talk openly about the challenges and opportunities in cybersecurity.



Follow Chris on LinkedIn



Gianna Whitver is Co-Founder and CEO of the Cybersecurity Marketing Society, and Maria Velasquez is Co-Founder and Chief Growth Officer. 

They started the Society in 2020 to build a community for cyber marketers, now 4,000+ strong. They also run CyberMarketingCon, the go-to industry conference for anyone working in go-to-market.



🔗 Links &amp; Resources:


  Chris Hughes’ Resilient Cyber show 

  Get your ticket for CyberMarketingCon 2025 

  Cybersecurity Marketing Society

  
Resilient Cyber podcast: resilientcyber.io 


Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 22 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Your Cybersecurity Marketing Community Awaits — CyberMarketingCon 2025 Preview</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>185</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

What started as two marketers looking for support has grown into a 4,000-member community and CyberMarketingCon, the go-to conference for anyone driving go-to-market in security.

In this replay from Chris Hughes’ Resilient Cyber show, Gianna and Maria share what makes the Society different, why the event feels more like a reunion than a conference, and what’s waiting in Austin this December (or online if that’s easier): hands-on workshops, founder + investor sessions, and this year’s theme — the Marketing Time Machine.

Make sure you get your ticket today: https://www.cybermarketingconference.com/ 



About:

Chris Hughes is the host of Resilient Cyber and the President and CEO of Aquia, where he helps organizations securely adopt cloud and modern software practices. His show brings practitioners, builders, and leaders together to talk openly about the challenges and opportunities in cybersecurity.



Follow Chris on LinkedIn



Gianna Whitver is Co-Founder and CEO of the Cybersecurity Marketing Society, and Maria Velasquez is Co-Founder and Chief Growth Officer. 

They started the Society in 2020 to build a community for cyber marketers, now 4,000+ strong. They also run CyberMarketingCon, the go-to industry conference for anyone working in go-to-market.



🔗 Links &amp; Resources:


  Chris Hughes’ Resilient Cyber show 

  Get your ticket for CyberMarketingCon 2025 

  Cybersecurity Marketing Society

  
Resilient Cyber podcast: resilientcyber.io 


Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>What started as two marketers looking for support has grown into a 4,000-member community and CyberMarketingCon, the go-to conference for anyone driving go-to-market in security.</p>
<p>In this replay from Chris Hughes’ <em>Resilient Cyber</em> show, Gianna and Maria share what makes the Society different, why the event feels more like a reunion than a conference, and what’s waiting in Austin this December (or online if that’s easier): hands-on workshops, founder + investor sessions, and this year’s theme — the <strong>Marketing Time Machine</strong>.</p>
<p>Make sure you get your ticket today: <a href="https://www.cybermarketingconference.com/">https://www.cybermarketingconference.com/</a> </p>
<p><br></p>
<p><strong>About:</strong></p>
<p>Chris Hughes is the host of <em>Resilient Cyber</em> and <strong>the President and CEO of Aquia</strong>, where he helps organizations securely adopt cloud and modern software practices. His show brings practitioners, builders, and leaders together to talk openly about the challenges and opportunities in cybersecurity.</p>
<p><br></p>
<p>Follow Chris on <a href="https://www.linkedin.com/in/resilientcyber/">LinkedIn</a></p>
<p><br></p>
<p>Gianna Whitver is Co-Founder and CEO of the Cybersecurity Marketing Society, and Maria Velasquez is Co-Founder and Chief Growth Officer. </p>
<p>They started the Society in 2020 to build a community for cyber marketers, now 4,000+ strong. They also run CyberMarketingCon, the go-to industry conference for anyone working in go-to-market.</p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<ul>
  <li>Chris Hughes’ <a href="https://podcasts.apple.com/us/podcast/resilient-cyber-w-gianna-maria-the-state/id1555928024?i=1000723751956"><em>Resilient Cyber</em> show</a> </li>
  <li>Get your ticket for <a href="http://cybermarketingconference.com/">CyberMarketingCon 2025</a> </li>
  <li><a href="http://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a></li>
  <li>
<em>Resilient Cyber</em> podcast: <a href="http://resilientcyber.io/">resilientcyber.io</a> </li>
</ul>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p><br></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> <br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1162</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6038c4e2-ab77-11f0-924a-13f177aa9b05]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9928983813.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside RSAC’s Next Chapter: Community, Research, and a $5M Bet on Startups</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/184/notes</link>
      <description>Episode Summary:

RSAC has officially expanded its research team with 11 new hires, plus another major research release is dropping this October. Guests Ben Waring and Jessica Porter join us to break down what the expansion means for the industry and how RSAC is stepping into year-round thought leadership.

They also take us inside the new RSAC digital community, where AI-powered tools, curated news briefs, and private peer groups keep cybersecurity pros connected long after the conference floor closes.

On the startup side, it’s the 20th anniversary of Innovation Sandbox with submissions up nearly 40% and a new $5M investment fueling each finalist’s growth. Plus, for anyone eyeing the RSAC 2026 stage, Ben and Jessica share what makes a Call for Speakers submission stand out and what gets it cut.

Listen to this episode before your next submission, pitch, or conference plan; you’ll thank yourself later.

About guests:

Ben Waring is the Director of Global PR and Communications at RSAC. He leads the global public relations strategy for the conference and its year-round community platform, managing media engagement, high-profile speaker press, and live event communications.

Follow Ben on LinkedIn.

Jessica Porter is Senior Director of Marketing at RSAC, where she has worked since 2017. She drives go-to-market strategy, targeted attendance, and community engagement, building RSAC into a year-round hub for cybersecurity learning. Previously, Jessica held integrated marketing roles at RSA Security.

Follow Jessica on LinkedIn .



🔗 Links &amp; Resources:

RSAC Membership overview (launch blog)

RSAC Membership platform demo (video)

RSAC Cybersecurity Atlas (interactive tool) 

RSAC Innovation Sandbox (program)

Innovation Sandbox — How it Works (submission details)

RSAC Launch Pad (program)

RSAC Call for Submissions (Closed) 

RSAC Research (report landing example)

Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn





Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 15 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Inside RSAC’s Next Chapter: Community, Research, and a $5M Bet on Startups</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>184</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

RSAC has officially expanded its research team with 11 new hires, plus another major research release is dropping this October. Guests Ben Waring and Jessica Porter join us to break down what the expansion means for the industry and how RSAC is stepping into year-round thought leadership.

They also take us inside the new RSAC digital community, where AI-powered tools, curated news briefs, and private peer groups keep cybersecurity pros connected long after the conference floor closes.

On the startup side, it’s the 20th anniversary of Innovation Sandbox with submissions up nearly 40% and a new $5M investment fueling each finalist’s growth. Plus, for anyone eyeing the RSAC 2026 stage, Ben and Jessica share what makes a Call for Speakers submission stand out and what gets it cut.

Listen to this episode before your next submission, pitch, or conference plan; you’ll thank yourself later.

About guests:

Ben Waring is the Director of Global PR and Communications at RSAC. He leads the global public relations strategy for the conference and its year-round community platform, managing media engagement, high-profile speaker press, and live event communications.

Follow Ben on LinkedIn.

Jessica Porter is Senior Director of Marketing at RSAC, where she has worked since 2017. She drives go-to-market strategy, targeted attendance, and community engagement, building RSAC into a year-round hub for cybersecurity learning. Previously, Jessica held integrated marketing roles at RSA Security.

Follow Jessica on LinkedIn .



🔗 Links &amp; Resources:

RSAC Membership overview (launch blog)

RSAC Membership platform demo (video)

RSAC Cybersecurity Atlas (interactive tool) 

RSAC Innovation Sandbox (program)

Innovation Sandbox — How it Works (submission details)

RSAC Launch Pad (program)

RSAC Call for Submissions (Closed) 

RSAC Research (report landing example)

Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.



📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn





Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>RSAC has officially expanded its research team with 11 new hires, plus another major research release is dropping this October. Guests Ben Waring and Jessica Porter join us to break down what the expansion means for the industry and how RSAC is stepping into year-round thought leadership.</p>
<p>They also take us inside the new RSAC digital community, where AI-powered tools, curated news briefs, and private peer groups keep cybersecurity pros connected long after the conference floor closes.</p>
<p>On the startup side, it’s the 20th anniversary of Innovation Sandbox with submissions up nearly 40% and a new $5M investment fueling each finalist’s growth. Plus, for anyone eyeing the RSAC 2026 stage, Ben and Jessica share what makes a Call for Speakers submission stand out and what gets it cut.</p>
<p>Listen to this episode before your next submission, pitch, or conference plan; you’ll thank yourself later.<br></p>
<p><strong>About guests:</strong></p>
<p><strong>Ben Waring</strong> is the Director of Global PR and Communications at RSAC. He leads the global public relations strategy for the conference and its year-round community platform, managing media engagement, high-profile speaker press, and live event communications.</p>
<p>Follow Ben on <a href="https://www.linkedin.com/in/bwaring/">LinkedIn</a>.</p>
<p><strong>Jessica Porter</strong> is Senior Director of Marketing at RSAC, where she has worked since 2017. She drives go-to-market strategy, targeted attendance, and community engagement, building RSAC into a year-round hub for cybersecurity learning. Previously, Jessica held integrated marketing roles at RSA Security.</p>
<p>Follow Jessica on <a href="https://www.linkedin.com/in/jessica-porter-jdp/">LinkedIn</a> .</p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<p>RSAC Membership overview <a href="https://www.rsaconference.com/library/blog/the-next-chapter-of-rsac-our-new-membership-offering">(launch blog)</a></p>
<p>RSAC Membership platform demo <a href="https://www.rsaconference.com/library/video/rsac-membership-product-demo">(video)</a></p>
<p>RSAC Cybersecurity Atlas <a href="https://www.rsaconference.com/library/tool/atlas-tool">(interactive tool) </a></p>
<p>RSAC Innovation Sandbox <a href="https://www.rsaconference.com/usa/programs/innovation-sandbox">(program)</a></p>
<p>Innovation Sandbox — <a href="https://www.rsaconference.com/usa/programs/innovation-sandbox/how-it-works">How it Works (submission details)</a></p>
<p>RSAC Launch Pad <a href="https://www.rsaconference.com/usa/programs/launch-pad">(program)</a></p>
<p>RSAC Call for Submissions <a href="https://www.rsaconference.com/usa/call-for-submissions">(Closed)</a> </p>
<p>RSAC Research <a href="https://www.rsaconference.com/library/research/rsac-cybersecurity-insights-futures-the-cybersecurity-communitys-top-topics">(report landing example)</a><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p><br></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> <br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.<br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p><br></p>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2043</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4ea37a8-a5e4-11f0-a341-73999a8965cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8552371806.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vibe Coding for Marketers: How to Build What You Wish Existed</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/183/notes</link>
      <description>Episode Summary:

Joseph Barringhaus didn’t set out to become a part-time app builder. He was tired of doing budgets in Google Sheets and decided to see if one of those new AI coding tools could do it better. It turned out it could, and that one experiment snowballed into a whole new way of working he calls vibe coding.

In this conversation, Joseph and Gianna get into what vibe coding looks like in practice: quick tools that make a sales call easier, event games that buyers actually remember, and rough-and-ready prototypes that speed up work with designers. They also talk honestly about the risks (where AI still breaks), the temptation to chase too many shiny tools, and why Joseph swears by his “three bets” rule to keep marketing focused.

👉 Tune in to the full episode to hear Joseph’s stories firsthand from the budgeting app that started it all to the bold bets shaping how he runs marketing today.

About Joseph: 

Joseph Barringhaus is the Vice President of Marketing at Maze.Before Maze, he was the Vice President of Marketing at Tamnoon, driving demand generation, product–market fit, messaging, and revenue alignment. With nearly a decade in cybersecurity, IT services, and SaaS, he’s helped generate over $900M in pipeline and raised conversion rates across multiple companies.Joseph also held senior marketing roles at Sonrai Security and Progress, and earlier worked in content and digital marketing across industries from sports to IT. He has a BBA in Marketing with a minor in Communication from Wichita State University, and today, he also serves as an advisor at Warmly.

Follow Joseph on LinkedIn 

🔗 Links &amp; Resources:


  Learn more about Tamnoon: tamnoon.io 


  v0 by Vercel


  Lovable

  Base 44

  
Claude Code (referred to as “Cloud Code” in the episode)


Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 08 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Vibe Coding for Marketers: How to Build What You Wish Existed</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>183</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Joseph Barringhaus didn’t set out to become a part-time app builder. He was tired of doing budgets in Google Sheets and decided to see if one of those new AI coding tools could do it better. It turned out it could, and that one experiment snowballed into a whole new way of working he calls vibe coding.

In this conversation, Joseph and Gianna get into what vibe coding looks like in practice: quick tools that make a sales call easier, event games that buyers actually remember, and rough-and-ready prototypes that speed up work with designers. They also talk honestly about the risks (where AI still breaks), the temptation to chase too many shiny tools, and why Joseph swears by his “three bets” rule to keep marketing focused.

👉 Tune in to the full episode to hear Joseph’s stories firsthand from the budgeting app that started it all to the bold bets shaping how he runs marketing today.

About Joseph: 

Joseph Barringhaus is the Vice President of Marketing at Maze.Before Maze, he was the Vice President of Marketing at Tamnoon, driving demand generation, product–market fit, messaging, and revenue alignment. With nearly a decade in cybersecurity, IT services, and SaaS, he’s helped generate over $900M in pipeline and raised conversion rates across multiple companies.Joseph also held senior marketing roles at Sonrai Security and Progress, and earlier worked in content and digital marketing across industries from sports to IT. He has a BBA in Marketing with a minor in Communication from Wichita State University, and today, he also serves as an advisor at Warmly.

Follow Joseph on LinkedIn 

🔗 Links &amp; Resources:


  Learn more about Tamnoon: tamnoon.io 


  v0 by Vercel


  Lovable

  Base 44

  
Claude Code (referred to as “Cloud Code” in the episode)


Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Joseph Barringhaus didn’t set out to become a part-time app builder. He was tired of doing budgets in Google Sheets and decided to see if one of those new AI coding tools could do it better. It turned out it could, and that one experiment snowballed into a whole new way of working he calls vibe coding.</p>
<p>In this conversation, Joseph and Gianna get into what vibe coding looks like in practice: quick tools that make a sales call easier, event games that buyers actually remember, and rough-and-ready prototypes that speed up work with designers. They also talk honestly about the risks (where AI still breaks), the temptation to chase too many shiny tools, and why Joseph swears by his “three bets” rule to keep marketing focused.</p>
<p>👉 Tune in to the full episode to hear Joseph’s stories firsthand from the budgeting app that started it all to the bold bets shaping how he runs marketing today.</p>
<p><strong>About Joseph: </strong></p>
<p>Joseph Barringhaus is the Vice President of Marketing at Maze.<br>Before Maze, he was the Vice President of Marketing at Tamnoon, driving demand generation, product–market fit, messaging, and revenue alignment. With nearly a decade in cybersecurity, IT services, and SaaS, he’s helped generate over $900M in pipeline and raised conversion rates across multiple companies.<br>Joseph also held senior marketing roles at Sonrai Security and Progress, and earlier worked in content and digital marketing across industries from sports to IT. He has a BBA in Marketing with a minor in Communication from Wichita State University, and today, he also serves as an advisor at Warmly.</p>
<p>Follow Joseph on <a href="https://www.linkedin.com/in/josephbarringhaus/">LinkedIn </a></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<ul>
  <li>Learn more about Tamnoon:<a href="https://tamnoon.io/"> tamnoon.io </a>
</li>
  <li>v0 by <a href="https://v0.app/">Vercel</a>
</li>
  <li><a href="https://lovable.dev/">Lovable</a></li>
  <li><a href="https://base44.com/">Base 44</a></li>
  <li>
<a href="https://www.anthropic.com/news/claude-code">Claude Code</a> (referred to as “Cloud Code” in the episode)</li>
</ul>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1786</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3522f16a-a041-11f0-84ac-aba52d33bb06]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6585172528.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Torq Turned Characters Into a Cybersecurity Marketing Universe</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/182/notes</link>
      <description>Episode Summary:

Step inside the Torq Universe, a marketing world where the Big Hat isn’t just swag, it’s a storyline; the Sock Goblin explains why your SOC is drowning in false positives; and a falcon named Robert Girdle might swoop into the next conference booth.

In this episode, Gianna teams up with Tessa The (Senior Field Marketing Manager at Torq) and Brittney Wittfeldt-Zec (Senior Social Media Manager at Torq) to unpack how Torq turned characters and inside jokes into a real growth engine: from 4K to 29K+ LinkedIn followers, cybersecurity pros cosplaying their merch, and a community that actually asks for more lore.

Why does it matter? This isn’t marketing theater; it’s proof that buyers connect faster and deeper when your brand lives in a world they want to join.

👉 Tune in to hear how Torq bridges field and social, measures what sticks, and keeps expanding a universe that cybersecurity folks can’t stop talking about.

About guests: 

Tessa The is Senior Field Marketing Manager at Torq, where she brings campaigns and characters into the real world through conferences, field programs, and the now-legendary Big Hat. She focuses on creating in-person experiences that tie seamlessly back to Torq’s brand universe.

Follow Tessa on LinkedIn

Brittney Wittfeldt-Zec is Senior Social Media Manager at Torq, leading the charge on building community and engagement across digital channels. From launching the Sock Goblin to scaling Torq’s LinkedIn following past 29K, she shows how storytelling and social media can fuel measurable growth.

Follow Brittney on LinkedIn



About Torq: Torq is a security automation platform that helps teams cut noise, streamline response, and focus on what matters most by turning workflows into a connected, automated system.

🔗 Links &amp; Resources:

Learn more about Torq

The Big Hat Conspiracy video on LinkedIn



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 01 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>How Torq Turned Characters Into a Cybersecurity Marketing Universe</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>182</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Step inside the Torq Universe, a marketing world where the Big Hat isn’t just swag, it’s a storyline; the Sock Goblin explains why your SOC is drowning in false positives; and a falcon named Robert Girdle might swoop into the next conference booth.

In this episode, Gianna teams up with Tessa The (Senior Field Marketing Manager at Torq) and Brittney Wittfeldt-Zec (Senior Social Media Manager at Torq) to unpack how Torq turned characters and inside jokes into a real growth engine: from 4K to 29K+ LinkedIn followers, cybersecurity pros cosplaying their merch, and a community that actually asks for more lore.

Why does it matter? This isn’t marketing theater; it’s proof that buyers connect faster and deeper when your brand lives in a world they want to join.

👉 Tune in to hear how Torq bridges field and social, measures what sticks, and keeps expanding a universe that cybersecurity folks can’t stop talking about.

About guests: 

Tessa The is Senior Field Marketing Manager at Torq, where she brings campaigns and characters into the real world through conferences, field programs, and the now-legendary Big Hat. She focuses on creating in-person experiences that tie seamlessly back to Torq’s brand universe.

Follow Tessa on LinkedIn

Brittney Wittfeldt-Zec is Senior Social Media Manager at Torq, leading the charge on building community and engagement across digital channels. From launching the Sock Goblin to scaling Torq’s LinkedIn following past 29K, she shows how storytelling and social media can fuel measurable growth.

Follow Brittney on LinkedIn



About Torq: Torq is a security automation platform that helps teams cut noise, streamline response, and focus on what matters most by turning workflows into a connected, automated system.

🔗 Links &amp; Resources:

Learn more about Torq

The Big Hat Conspiracy video on LinkedIn



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Step inside the <em>Torq Universe</em>, a marketing world where the Big Hat isn’t just swag, it’s a storyline; the Sock Goblin explains why your SOC is drowning in false positives; and a falcon named Robert Girdle might swoop into the next conference booth.</p>
<p>In this episode, Gianna teams up with Tessa The (Senior Field Marketing Manager at Torq) and Brittney Wittfeldt-Zec (Senior Social Media Manager at Torq) to unpack how Torq turned characters and inside jokes into a real growth engine: from 4K to 29K+ LinkedIn followers, cybersecurity pros cosplaying their merch, and a community that actually <em>asks for more lore</em>.</p>
<p>Why does it matter? This isn’t marketing theater; it’s proof that buyers connect faster and deeper when your brand lives in a world they want to join.</p>
<p>👉 Tune in to hear how Torq bridges field and social, measures what sticks, and keeps expanding a universe that cybersecurity folks can’t stop talking about.<br></p>
<p><strong>About guests: </strong></p>
<p><strong>Tessa The</strong> is Senior Field Marketing Manager at <strong>Torq</strong>, where she brings campaigns and characters into the real world through conferences, field programs, and the now-legendary Big Hat. She focuses on creating in-person experiences that tie seamlessly back to Torq’s brand universe.</p>
<p>Follow Tessa on <a href="https://www.linkedin.com/in/tessakthe/">LinkedIn</a></p>
<p><strong>Brittney Wittfeldt-Zec</strong> is Senior Social Media Manager at <strong>Torq</strong>, leading the charge on building community and engagement across digital channels. From launching the Sock Goblin to scaling Torq’s LinkedIn following past 29K, she shows how storytelling and social media can fuel measurable growth.</p>
<p>Follow Brittney on <a href="https://www.linkedin.com/in/brittney-wittfeldt-zec-475a9b7b/">LinkedIn</a></p>
<p><br></p>
<p><strong>About Torq:</strong> Torq is a security automation platform that helps teams cut noise, streamline response, and focus on what matters most by turning workflows into a connected, automated system.<br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<p>Learn more about <a href="https://torq.io/">Torq</a></p>
<p><a href="https://www.linkedin.com/posts/torqio_the-big-hat-conspiracy-activity-7331665421705588736-0a4H/">The Big Hat Conspiracy </a>video on LinkedIn</p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p>
<p><br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.<br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1380</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7e84d0ca-9aac-11f0-8feb-5f0891e46e93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3563803631.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bots, Brands, and Big Mergers: Sarah Acker on HUMAN Security’s Marketing Playbook</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/181/notes</link>
      <description>Episode Summary:

Ask Sarah Acker about her team at HUMAN Security, and you won’t just hear “brand” or “demand gen.” You’ll hear humans, cyborgs, and bots. That playful framing comes straight from how she describes the groups on her team, showing her mix of structure and creativity in cybersecurity marketing.



In this conversation, Sarah walks us through HUMAN Security’s transformation from White Ops into a cybersecurity company, the realities of merging with PerimeterX, and why she believes the best marketing is equal parts “pretty” and “gritty.” Along the way, we cover FBI investigations, a Halloween parade float, and the persistence of old logos that still turn up on invoices years after a rebrand.

If you’ve faced the challenges of rebrands, mergers, or balancing creativity with effectiveness in cybersecurity marketing, Sarah’s stories offer a clear look at what it takes to make it work. 

About Sarah:

Sarah Acker is the SVP, Global Head of Marketing at HUMAN Security. She joined the company when it was still known as White Ops and has been part of its evolution into cybersecurity, including the acquisition and integration of PerimeterX.



Before HUMAN Security, Sarah was Head of Brand Experience and Partnerships at iCrossing, a Hearst-owned digital agency, and Director of Marketing at ALTZ Investment Strategies LLC. Earlier in her career, she worked across industries, including health and wellness, beauty, fashion, fintech, real estate, and media, before moving into cybersecurity.

Follow Sarah on LinkedIn

🔗 Links &amp; Resources:


  Check out HUMAN Security’s website


  HUMAN Security: 3ve: The Long Game


  The Hunt for 3ve (White Paper) 


  Dark Reading Coverage: Google, White Ops, and Industry Players Dismantle 3ve


  HUMAN Security Press Release: BADBOX 2.0 Scheme Exposed 


  HUMAN Security Blog: BADBOX 2.0 Disruption Report 


  SecurityWeek: BadBox Botnet Powered by 1 Million Android Devices Disrupted



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 24 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Bots, Brands, and Big Mergers: Sarah Acker on HUMAN Security’s Marketing Playbook</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>181</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Ask Sarah Acker about her team at HUMAN Security, and you won’t just hear “brand” or “demand gen.” You’ll hear humans, cyborgs, and bots. That playful framing comes straight from how she describes the groups on her team, showing her mix of structure and creativity in cybersecurity marketing.



In this conversation, Sarah walks us through HUMAN Security’s transformation from White Ops into a cybersecurity company, the realities of merging with PerimeterX, and why she believes the best marketing is equal parts “pretty” and “gritty.” Along the way, we cover FBI investigations, a Halloween parade float, and the persistence of old logos that still turn up on invoices years after a rebrand.

If you’ve faced the challenges of rebrands, mergers, or balancing creativity with effectiveness in cybersecurity marketing, Sarah’s stories offer a clear look at what it takes to make it work. 

About Sarah:

Sarah Acker is the SVP, Global Head of Marketing at HUMAN Security. She joined the company when it was still known as White Ops and has been part of its evolution into cybersecurity, including the acquisition and integration of PerimeterX.



Before HUMAN Security, Sarah was Head of Brand Experience and Partnerships at iCrossing, a Hearst-owned digital agency, and Director of Marketing at ALTZ Investment Strategies LLC. Earlier in her career, she worked across industries, including health and wellness, beauty, fashion, fintech, real estate, and media, before moving into cybersecurity.

Follow Sarah on LinkedIn

🔗 Links &amp; Resources:


  Check out HUMAN Security’s website


  HUMAN Security: 3ve: The Long Game


  The Hunt for 3ve (White Paper) 


  Dark Reading Coverage: Google, White Ops, and Industry Players Dismantle 3ve


  HUMAN Security Press Release: BADBOX 2.0 Scheme Exposed 


  HUMAN Security Blog: BADBOX 2.0 Disruption Report 


  SecurityWeek: BadBox Botnet Powered by 1 Million Android Devices Disrupted



Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Ask Sarah Acker about her team at HUMAN Security, and you won’t just hear “brand” or “demand gen.” You’ll hear humans, cyborgs, and bots. That playful framing comes straight from how she describes the groups on her team, showing her mix of structure and creativity in cybersecurity marketing.</p>
<p><br></p>
<p>In this conversation, Sarah walks us through HUMAN Security’s transformation from White Ops into a cybersecurity company, the realities of merging with PerimeterX, and why she believes the best marketing is equal parts “pretty” and “gritty.” Along the way, we cover FBI investigations, a Halloween parade float, and the persistence of old logos that still turn up on invoices years after a rebrand.</p>
<p>If you’ve faced the challenges of rebrands, mergers, or balancing creativity with effectiveness in cybersecurity marketing, Sarah’s stories offer a clear look at what it takes to make it work. <br></p>
<p><strong>About Sarah:</strong></p>
<p>Sarah Acker is the SVP, Global Head of Marketing at HUMAN Security. She joined the company when it was still known as White Ops and has been part of its evolution into cybersecurity, including the acquisition and integration of PerimeterX.</p>
<p><br></p>
<p>Before HUMAN Security, Sarah was Head of Brand Experience and Partnerships at iCrossing, a Hearst-owned digital agency, and Director of Marketing at ALTZ Investment Strategies LLC. Earlier in her career, she worked across industries, including health and wellness, beauty, fashion, fintech, real estate, and media, before moving into cybersecurity.</p>
<p>Follow Sarah on <a href="https://www.linkedin.com/in/sarahmaxwellacker/">LinkedIn</a><br></p>
<p>🔗<strong> Links &amp; Resources:</strong></p>
<ul>
  <li>Check out HUMAN Security’s <a href="https://www.humansecurity.com/">website</a>
</li>
  <li>HUMAN Security: 3ve: <a href="https://www.humansecurity.com/learn/blog/3ve-the-long-game/">The Long Game</a>
</li>
  <li>The Hunt for 3ve <a href="https://www.humansecurity.com/wp-content/uploads/HUMAN_Report_The-Hunt-for-3ve-2.pdf">(White Paper) </a>
</li>
  <li>Dark Reading Coverage: <a href="https://www.darkreading.com/threat-intelligence/google-white-ops-industry-players-dismantle-3ve-ad-fraud-operation">Google, White Ops, and Industry Players Dismantle 3ve</a>
</li>
  <li>HUMAN Security Press Release: <a href="https://www.humansecurity.com/newsroom/human-exposes-badbox-2-0-scheme/">BADBOX 2.0 Scheme Exposed </a>
</li>
  <li>HUMAN Security Blog: <a href="https://www.humansecurity.com/learn/blog/satori-threat-intelligence-disruption-badbox-2-0/">BADBOX 2.0 Disruption Report </a>
</li>
  <li>SecurityWeek: <a href="https://www.securityweek.com/badbox-botnet-powered-by-1-million-android-devices-disrupted/">BadBox Botnet Powered by 1 Million Android Devices Disrupted</a><br>
</li>
</ul>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> <br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> Snag your ticket now!</a></p>
<p>See you in Austin, where the insights and vibes are hotter.<br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2406</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8ff7b2e8-9555-11f0-bc18-832a306195c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9540907556.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The 30/60/90 Day Plan for Customer Marketing in Cybersecurity with Antu Buck</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/180/notes</link>
      <description>Episode Summary:

Antu Buck didn’t plan to end up in customer marketing. She started in sales, carrying a bag as a BDR and enterprise rep, before realizing the part she loved most was building customer relationships. That path led her to McAfee, Intel Security, and now Gigamon, where she’s the Senior Director of Customer Marketing &amp; Community.

In this episode, Antu explains customer marketing, how it grew from “reference calls” into a core pillar of modern marketing, and why advocacy, community, and lifecycle programs all matter. We also discuss the common mistakes companies make when they treat community as a checkbox, how to prove ROI in a low-disclosure industry, and what it takes to turn a happy customer into a true superfan.

Listen in as Antu previews her 30/60/90-day playbook for building a customer marketing program and catch the full plan live at CyberMarketingCon.

About Antu: 

Antu Buck is the Senior Director of Customer Marketing &amp; Community at Gigamon, where she leads customer advocacy, engagement programs, and lifecycle marketing initiatives.

Before Gigamon, she built and ran customer marketing programs at McAfee and Intel Security, including customer reference programs, executive briefings, and advocacy initiatives. Her career began in sales as a BDR and enterprise rep, which gave her a customer-first perspective that still shapes her approach today.

Connect with Antu on LinkedIn

🔗 Links &amp; Resources:

Learn more about Gigamon

Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 17 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>180</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Antu Buck didn’t plan to end up in customer marketing. She started in sales, carrying a bag as a BDR and enterprise rep, before realizing the part she loved most was building customer relationships. That path led her to McAfee, Intel Security, and now Gigamon, where she’s the Senior Director of Customer Marketing &amp; Community.

In this episode, Antu explains customer marketing, how it grew from “reference calls” into a core pillar of modern marketing, and why advocacy, community, and lifecycle programs all matter. We also discuss the common mistakes companies make when they treat community as a checkbox, how to prove ROI in a low-disclosure industry, and what it takes to turn a happy customer into a true superfan.

Listen in as Antu previews her 30/60/90-day playbook for building a customer marketing program and catch the full plan live at CyberMarketingCon.

About Antu: 

Antu Buck is the Senior Director of Customer Marketing &amp; Community at Gigamon, where she leads customer advocacy, engagement programs, and lifecycle marketing initiatives.

Before Gigamon, she built and ran customer marketing programs at McAfee and Intel Security, including customer reference programs, executive briefings, and advocacy initiatives. Her career began in sales as a BDR and enterprise rep, which gave her a customer-first perspective that still shapes her approach today.

Connect with Antu on LinkedIn

🔗 Links &amp; Resources:

Learn more about Gigamon

Subscribe &amp; Review:

👉 Enjoyed this one? Drop us a quick ⭐ rating or review, it helps more cyber marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Meet us at CyberMarketingCon 2025!

Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  Gianna Whitver on LinkedIn


  Maria Velasquez on LinkedIn



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Antu Buck didn’t plan to end up in customer marketing. She started in sales, carrying a bag as a BDR and enterprise rep, before realizing the part she loved most was building customer relationships. That path led her to McAfee, Intel Security, and now Gigamon, where she’s the Senior Director of Customer Marketing &amp; Community.</p>
<p>In this episode, Antu explains customer marketing, how it grew from “reference calls” into a core pillar of modern marketing, and why advocacy, community, and lifecycle programs all matter. We also discuss the common mistakes companies make when they treat community as a checkbox, how to prove ROI in a low-disclosure industry, and what it takes to turn a happy customer into a true superfan.</p>
<p>Listen in as Antu previews her 30/60/90-day playbook for building a customer marketing program and catch the full plan live at <a href="https://www.cybermarketingconference.com/">CyberMarketingCon</a>.<br></p>
<p><strong>About Antu: </strong></p>
<p>Antu Buck is the Senior Director of Customer Marketing &amp; Community at Gigamon, where she leads customer advocacy, engagement programs, and lifecycle marketing initiatives.</p>
<p>Before Gigamon, she built and ran customer marketing programs at McAfee and Intel Security, including customer reference programs, executive briefings, and advocacy initiatives. Her career began in sales as a BDR and enterprise rep, which gave her a customer-first perspective that still shapes her approach today.</p>
<p>Connect with Antu on<a href="https://www.linkedin.com/in/antu-buck/"> LinkedIn</a><br></p>
<p>🔗 <strong>Links &amp; Resources:</strong></p>
<p>Learn more about <a href="https://www.gigamon.com/">Gigamon</a><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>👉 <em>Enjoyed this one? Drop us a quick </em>⭐<em> rating or review, it helps more cyber marketers find the show.</em></p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> <br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want to level up your cybersecurity marketing? Join us Dec 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"> <strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.<br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">LinkedIn</a>
</li>
  <li>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, <a href="https://www.instagram.com/cybermsociety/">Instagram</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2025</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89ae8a4e-8fdb-11f0-9ff5-53728c66b67d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3935180453.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beyond the CISO: How Founders Should Pitch Security Buyers</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/179/notes</link>
      <description>Episode Summary:

CISOs get all the cold emails, but they’re not always the ones who decide if your product lives or dies. In this episode, Rob Solomon (CrowdStrike) and Jennifer Reed (Amazon Web Services, AWS) join hosts Gianna and Maria to explain why the real buying power often sits with solution architects and security engineers.

They take us inside the AWS-CrowdStrike-NVIDIA Cyber Accelerator Program (Gianna is a mentor for the program), share how joint launches like Falcon for AWS Security Incident Response come together, and spell out what startups get wrong when pitching technical buyers. You will hear how to move past fear-based messaging, make adoption seamless, and why internal marketing matters as much as the external splash.



About the Guests

Rob Solomon is a Senior Cloud Solutions Architect – Alliances at CrowdStrike, where he designs and advises on secure, scalable cloud architectures and helps partners integrate CrowdStrike technologies into joint solutions. Follow on LinkedIn

Jenn Reed is a Principal Security Partner Solutions Architect at Amazon Web Services (AWS) and a former Chief Information Security Officer. She works with AWS partners and customers on cloud-native security, compliance, and technical strategy, bringing firsthand experience of what resonates (and fails) when pitching security leaders. Follow on LinkedIn



🔗 Links &amp; Resources:


  
CrowdStrike Press Release | Falcon for AWS Security Incident Response 





  
Forbes | CrowdStrike and AWS Simplify Security Incident Response 





  
AWS re Inforce 2025 | Best practices to securing AI with AWS and CrowdStrike (DAP203)





  
AWS Workshop | Hybrid Environments with IAM Roles Anywhere



  
CrowdStrike 



  
AWS 




Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</description>
      <pubDate>Wed, 10 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Beyond the CISO: How Founders Should Pitch Security Buyers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>179</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

CISOs get all the cold emails, but they’re not always the ones who decide if your product lives or dies. In this episode, Rob Solomon (CrowdStrike) and Jennifer Reed (Amazon Web Services, AWS) join hosts Gianna and Maria to explain why the real buying power often sits with solution architects and security engineers.

They take us inside the AWS-CrowdStrike-NVIDIA Cyber Accelerator Program (Gianna is a mentor for the program), share how joint launches like Falcon for AWS Security Incident Response come together, and spell out what startups get wrong when pitching technical buyers. You will hear how to move past fear-based messaging, make adoption seamless, and why internal marketing matters as much as the external splash.



About the Guests

Rob Solomon is a Senior Cloud Solutions Architect – Alliances at CrowdStrike, where he designs and advises on secure, scalable cloud architectures and helps partners integrate CrowdStrike technologies into joint solutions. Follow on LinkedIn

Jenn Reed is a Principal Security Partner Solutions Architect at Amazon Web Services (AWS) and a former Chief Information Security Officer. She works with AWS partners and customers on cloud-native security, compliance, and technical strategy, bringing firsthand experience of what resonates (and fails) when pitching security leaders. Follow on LinkedIn



🔗 Links &amp; Resources:


  
CrowdStrike Press Release | Falcon for AWS Security Incident Response 





  
Forbes | CrowdStrike and AWS Simplify Security Incident Response 





  
AWS re Inforce 2025 | Best practices to securing AI with AWS and CrowdStrike (DAP203)





  
AWS Workshop | Hybrid Environments with IAM Roles Anywhere



  
CrowdStrike 



  
AWS 




Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 



See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>CISOs get all the cold emails, but they’re not always the ones who decide if your product lives or dies. In this episode, Rob Solomon (CrowdStrike) and Jennifer Reed (Amazon Web Services, AWS) join hosts Gianna and Maria to explain why the real buying power often sits with solution architects and security engineers.</p>
<p>They take us inside the <strong>AWS-CrowdStrike-NVIDIA Cyber Accelerator Program </strong>(Gianna is a mentor for the program), share how joint launches like <strong>Falcon for AWS Security Incident Response</strong> come together, and spell out what startups get wrong when pitching technical buyers. You will hear how to move past fear-based messaging, make adoption seamless, and why internal marketing matters as much as the external splash.</p>
<p><br></p>
<p><strong>About the Guests</strong></p>
<p>Rob Solomon is a <strong>Senior Cloud Solutions Architect – Alliances at CrowdStrike</strong>, where he designs and advises on secure, scalable cloud architectures and helps partners integrate CrowdStrike technologies into joint solutions. Follow on <a href="https://www.linkedin.com/in/solorob33/"><u>LinkedIn</u></a></p>
<p>Jenn Reed is a <strong>Principal Security Partner Solutions Architect at Amazon Web Services (AWS) </strong>and a former Chief Information Security Officer. She works with AWS partners and customers on cloud-native security, compliance, and technical strategy, bringing firsthand experience of what resonates (and fails) when pitching security leaders. Follow on <a href="https://www.linkedin.com/in/jennsreed/"><u>LinkedIn</u></a></p>
<p><br></p>
<p>🔗 <strong>Links &amp; Resources:</strong></p>
<ul>
  <li>
<p>CrowdStrike Press Release | <a href="https://www.crowdstrike.com/en-us/press-releases/crowdstrike-falcon-for-aws-security-incident-response/"><u>Falcon for AWS Security Incident Response </u></a></p>
</li>
</ul>
<ul>
  <li>
<p>Forbes | <a href="https://www.forbes.com/sites/tonybradley/2025/06/16/crowdstrike-and-aws-join-forces-to-simplify-security-incident-response/"><u>CrowdStrike and AWS Simplify Security Incident Response </u></a></p>
</li>
</ul>
<ul>
  <li>
<p>AWS re Inforce 2025 |<a href="https://www.youtube.com/watch?v=WTpqSk3rWNI"><u> Best practices to securing AI with AWS and CrowdStrike (DAP203)</u></a></p>
</li>
</ul>
<ul>
  <li>
<p>AWS Workshop | <a href="https://catalog.workshops.aws/hybrid-environments-with-iamra/en-US"><u>Hybrid Environments with IAM Roles Anywhere</u></a></p>
</li>
  <li>
<p><a href="https://www.crowdstrike.com/en-us/"><u>CrowdStrike </u></a></p>
</li>
  <li>
<p><a href="https://aws.amazon.com/"><u>AWS</u></a> </p>
</li>
</ul>
<p><br><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"><u> </u><strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p><br></p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2410</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f3d1519a-89a0-11f0-accc-2f4b9e6662b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1680270932.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building Impact &amp; Cyber Community with Debbie Sallis of the Cyber Guild</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/178/notes</link>
      <description>Episode Summary:

The Cyber Guild is built on community, helping people use technology to their advantage and ensuring that no one is left behind in the digital age.

In this episode, Executive Director Debbie Sallis joins Gianna to share how that mission comes to life: through three targeted events helping people professionally develop in the cyber world. They host Uniting Women in Cyber, a flagship event that feels more like an experience than a conference; Cyber Connect, which pivoted in response to federal layoffs to support professionals in transition; and RISE, a mentorship program connecting seasoned leaders with those just starting their cybersecurity careers.

With only four staff and a dedicated group of volunteers, Debbie shows how impact isn’t about scale or budget, it’s about showing up, creating space, and meeting the moment together.

This episode is about how community, not scale, drives change in cybersecurity and how you can be part of it.

About Debbie

Debbie Sallis is the executive director of The Cyber Guild, a nonprofit community advancing sustainable cybersecurity and inclusive leadership. Since 2021, she has led the Guild’s flagship programs — Uniting Women in Cyber, Cyber Connect, and RISE — building initiatives that give professionals at every stage of their careers a place to connect, grow, and lead.

In addition to her role at The Cyber Guild, Debbie contributes her expertise as an Advisory Board Member with the Technology Advancement Center (TAC), which supports open-source innovation for U.S. national security and the intelligence community, and with Evans &amp; Chambers Technology, a D.C.-based firm that delivers secure, agile software solutions for defense and intelligence missions.

Follow Debbie on LinkedIn. 

🔗 Links &amp; Resources:

The Cyber Guild – Learn more about the nonprofit, its mission, and programs.

Uniting Women in Cyber – October 9, 2024 (Amazon HQ, Crystal City, Arlington) – Event details and registration.



Sponsorship Opportunities – Ways to support and get involved.

Subscribe &amp; Review:Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you next Wednesday with a new episode!</description>
      <pubDate>Wed, 03 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Building Impact &amp; Cyber Community with Debbie Sallis of the Cyber Guild</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>178</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

The Cyber Guild is built on community, helping people use technology to their advantage and ensuring that no one is left behind in the digital age.

In this episode, Executive Director Debbie Sallis joins Gianna to share how that mission comes to life: through three targeted events helping people professionally develop in the cyber world. They host Uniting Women in Cyber, a flagship event that feels more like an experience than a conference; Cyber Connect, which pivoted in response to federal layoffs to support professionals in transition; and RISE, a mentorship program connecting seasoned leaders with those just starting their cybersecurity careers.

With only four staff and a dedicated group of volunteers, Debbie shows how impact isn’t about scale or budget, it’s about showing up, creating space, and meeting the moment together.

This episode is about how community, not scale, drives change in cybersecurity and how you can be part of it.

About Debbie

Debbie Sallis is the executive director of The Cyber Guild, a nonprofit community advancing sustainable cybersecurity and inclusive leadership. Since 2021, she has led the Guild’s flagship programs — Uniting Women in Cyber, Cyber Connect, and RISE — building initiatives that give professionals at every stage of their careers a place to connect, grow, and lead.

In addition to her role at The Cyber Guild, Debbie contributes her expertise as an Advisory Board Member with the Technology Advancement Center (TAC), which supports open-source innovation for U.S. national security and the intelligence community, and with Evans &amp; Chambers Technology, a D.C.-based firm that delivers secure, agile software solutions for defense and intelligence missions.

Follow Debbie on LinkedIn. 

🔗 Links &amp; Resources:

The Cyber Guild – Learn more about the nonprofit, its mission, and programs.

Uniting Women in Cyber – October 9, 2024 (Amazon HQ, Crystal City, Arlington) – Event details and registration.



Sponsorship Opportunities – Ways to support and get involved.

Subscribe &amp; Review:Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you next Wednesday with a new episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>The Cyber Guild is built on community, helping people use technology to their advantage and ensuring that no one is left behind in the digital age.</p>
<p>In this episode, Executive Director Debbie Sallis joins Gianna to share how that mission comes to life: through three targeted events helping people professionally develop in the cyber world. They host Uniting Women in Cyber, a flagship event that feels more like an experience than a conference; Cyber Connect, which pivoted in response to federal layoffs to support professionals in transition; and RISE, a mentorship program connecting seasoned leaders with those just starting their cybersecurity careers.</p>
<p>With only four staff and a dedicated group of volunteers, Debbie shows how impact isn’t about scale or budget, it’s about showing up, creating space, and meeting the moment together.</p>
<p>This episode is about how community, not scale, drives change in cybersecurity and how you can be part of it.</p>
<p><br><strong>About Debbie</strong></p>
<p>Debbie Sallis is the executive director of The Cyber Guild, a nonprofit community advancing sustainable cybersecurity and inclusive leadership. Since 2021, she has led the Guild’s flagship programs — <em>Uniting Women in Cyber</em>, <em>Cyber Connect</em>, and <em>RISE</em> — building initiatives that give professionals at every stage of their careers a place to connect, grow, and lead.</p>
<p>In addition to her role at The Cyber Guild, Debbie contributes her expertise as an Advisory Board Member with the Technology Advancement Center (TAC), which supports open-source innovation for U.S. national security and the intelligence community, and with Evans &amp; Chambers Technology, a D.C.-based firm that delivers secure, agile software solutions for defense and intelligence missions.</p>
<p>Follow Debbie on <a href="https://www.linkedin.com/in/debbiesallis/"><u>LinkedIn</u></a>. </p>
<p><br>🔗 <strong>Links &amp; Resources:</strong></p>
<p><a href="https://thecyberguild.org"><u>The Cyber Guild</u></a> – Learn more about the nonprofit, its mission, and programs.<br></p>
<p><a href="https://thecyberguild.org/uwic/"><u>Uniting Women in Cyber – October 9, 2024 (Amazon HQ, Crystal City, Arlington)</u></a> – Event details and registration.</p>
<p><br></p>
<p><a href="https://thecyberguild.org/partners/"><u>Sponsorship Opportunities</u></a> – Ways to support and get involved.</p>
<p><br><strong>Subscribe &amp; Review:</strong><br>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"><u> </u><strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you next Wednesday with a new episode!</p>]]>
      </content:encoded>
      <itunes:duration>1337</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[740d172a-84bc-11f0-bf10-7f61193990bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2651157947.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building ‘Herd Immunity’ in Cybersecurity (Without Big Budgets)</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/177/notes</link>
      <description>Episode Summary:

For Brandon Min, building Herd Security has meant tackling two challenges at once: helping companies create a culture of security while also figuring out how to market a startup on a scrappy budget.

In this episode, he shares how Herd rethinks security awareness with micro-training that employees finish, why 90% of cyberattacks start with users, and what it takes to build “herd immunity” inside organizations. On the marketing side, Brandon walks us through testing ideas before building, finding overlooked SEO wins, and how, in his experience, a $50 guerrilla stunt brought in more leads than a trade show booth that cost 500x more.

It’s a rare look at the crossroads of security culture and startup marketing, and it offers plenty of lessons for anyone trying to build attention and trust in cybersecurity.

About Brandon: 

Brandon Min is the Founder &amp; CEO of Herd Security, a Los Angeles-based startup helping organizations build “herd immunity” against social‑engineering and AI‑driven threats through micro-training, workflow automation, and targeted simulations that engage employees.

Herd Security’s platform also addresses emerging deepfake risk with tools, including voice deepfake detection. This is part of its broader training and awareness suite and aims at a modern, user‑centric security culture.

Before launching, Brandon worked at Duo Security, supporting secure‑access deployments and bringing a hands‑on technical perspective that informs his product and go‑to‑market decisions. 



Connect with Brandon on LinkedIn. 



🔗 Links &amp; Resources:


  
Learn more about Herd Security



  
WePay’s Ice Block Stunt at PayPal’s Conference -  guerrilla marketing done right!




Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 27 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Building ‘Herd Immunity’ in Cybersecurity (Without Big Budgets)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>177</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

For Brandon Min, building Herd Security has meant tackling two challenges at once: helping companies create a culture of security while also figuring out how to market a startup on a scrappy budget.

In this episode, he shares how Herd rethinks security awareness with micro-training that employees finish, why 90% of cyberattacks start with users, and what it takes to build “herd immunity” inside organizations. On the marketing side, Brandon walks us through testing ideas before building, finding overlooked SEO wins, and how, in his experience, a $50 guerrilla stunt brought in more leads than a trade show booth that cost 500x more.

It’s a rare look at the crossroads of security culture and startup marketing, and it offers plenty of lessons for anyone trying to build attention and trust in cybersecurity.

About Brandon: 

Brandon Min is the Founder &amp; CEO of Herd Security, a Los Angeles-based startup helping organizations build “herd immunity” against social‑engineering and AI‑driven threats through micro-training, workflow automation, and targeted simulations that engage employees.

Herd Security’s platform also addresses emerging deepfake risk with tools, including voice deepfake detection. This is part of its broader training and awareness suite and aims at a modern, user‑centric security culture.

Before launching, Brandon worked at Duo Security, supporting secure‑access deployments and bringing a hands‑on technical perspective that informs his product and go‑to‑market decisions. 



Connect with Brandon on LinkedIn. 



🔗 Links &amp; Resources:


  
Learn more about Herd Security



  
WePay’s Ice Block Stunt at PayPal’s Conference -  guerrilla marketing done right!




Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>For Brandon Min, building Herd Security has meant tackling two challenges at once: helping companies create a culture of security while also figuring out how to market a startup on a scrappy budget.</p>
<p>In this episode, he shares how Herd rethinks security awareness with micro-training that employees finish, why 90% of cyberattacks start with users, and what it takes to build “herd immunity” inside organizations. On the marketing side, Brandon walks us through testing ideas before building, finding overlooked SEO wins, and how, in his experience, a $50 guerrilla stunt brought in more leads than a trade show booth that cost 500x more.</p>
<p>It’s a rare look at the crossroads of security culture and startup marketing, and it offers plenty of lessons for anyone trying to build attention and trust in cybersecurity.</p>
<p><br><strong>About Brandon: </strong></p>
<p>Brandon Min is the Founder &amp; CEO of<a href="https://www.herdsecurity.io/"> <u>Herd Security</u></a>, a Los Angeles-based startup helping organizations build “herd immunity” against social‑engineering and AI‑driven threats through micro-training, workflow automation, and targeted simulations that engage employees.</p>
<p>Herd Security’s platform also addresses emerging deepfake risk with tools, including voice deepfake detection. This is part of its broader training and awareness suite and aims at a modern, user‑centric security culture.</p>
<p>Before launching, Brandon worked at Duo Security, supporting secure‑access deployments and bringing a hands‑on technical perspective that informs his product and go‑to‑market decisions. </p>
<p><br></p>
<p><strong>Connect with Brandon on</strong><a href="https://www.linkedin.com/in/brandon-min-356ab290/"><strong> LinkedIn</strong></a><strong>. </strong></p>
<p><br></p>
<p>🔗 <strong>Links &amp; Resources:</strong></p>
<ul>
  <li>
<p>Learn more about <a href="https://www.herdsecurity.io/"><u>Herd Security</u></a></p>
</li>
  <li>
<p><a href="https://techcrunch.com/2010/10/26/wepay-ice-paypal/"><u>WePay’s Ice Block Stunt at PayPal’s Conference</u></a> -  guerrilla marketing done right!</p>
</li>
</ul>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"><u> </u><strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2110</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5633da44-7f4f-11f0-a4f6-4f619cfc8ba3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6025353653.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Cisco to Startups: Leadership Lessons That Last with Sri Sundaralingam</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/176/notes</link>
      <description>Episode Summary:

Sri Sundaralingam has led teams at global enterprises and multiple startups in cybersecurity and enterprise software. He is now the CMO at Xage Security and has held leadership positions at Cisco, Symantec, ExtraHop, Shape Security, Mojo Networks, and Endace. He breaks down what carries over between big-company and early-stage environments and what you must relearn.

In the episode, we explore hiring for creativity vs. experience, how to test a move from individual contributor (IC) to manager before you commit, and practical ways to handle politics while keeping work moving. Sri also shares how he frames Zero Trust and other technical concepts so buyers understand the value.

Listen if you’re deciding between startup and enterprise, weighing IC vs. management, or want concrete hiring and communication tactics you can use this quarter.



About Sri: 

Sri Sundaralingam is Chief Marketing Officer at Xage Security, a global leader in zero trust access, especially for critical infrastructure. His experience spans leadership roles in high-growth startups and international firms, including ExtraHop, Symantec, Shape Security, Endace, Cisco, Mojo Networks, and Juniper Networks. With a technical engineering foundation, Sri has guided teams across product management, product marketing, and corporate marketing. He’s also credited as an inventor on wireless security technology pioneered at Mojo Networks.

🔗 Links &amp; Resources:

Follow Sri Sundaralingam on LinkedIn 

Xage Security – Official Website



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 20 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>From Cisco to Startups: Leadership Lessons That Last with Sri Sundaralingam</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>176</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Sri Sundaralingam has led teams at global enterprises and multiple startups in cybersecurity and enterprise software. He is now the CMO at Xage Security and has held leadership positions at Cisco, Symantec, ExtraHop, Shape Security, Mojo Networks, and Endace. He breaks down what carries over between big-company and early-stage environments and what you must relearn.

In the episode, we explore hiring for creativity vs. experience, how to test a move from individual contributor (IC) to manager before you commit, and practical ways to handle politics while keeping work moving. Sri also shares how he frames Zero Trust and other technical concepts so buyers understand the value.

Listen if you’re deciding between startup and enterprise, weighing IC vs. management, or want concrete hiring and communication tactics you can use this quarter.



About Sri: 

Sri Sundaralingam is Chief Marketing Officer at Xage Security, a global leader in zero trust access, especially for critical infrastructure. His experience spans leadership roles in high-growth startups and international firms, including ExtraHop, Symantec, Shape Security, Endace, Cisco, Mojo Networks, and Juniper Networks. With a technical engineering foundation, Sri has guided teams across product management, product marketing, and corporate marketing. He’s also credited as an inventor on wireless security technology pioneered at Mojo Networks.

🔗 Links &amp; Resources:

Follow Sri Sundaralingam on LinkedIn 

Xage Security – Official Website



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Sri Sundaralingam has led teams at global enterprises and multiple startups in cybersecurity and enterprise software. He is now the CMO at Xage Security and has held leadership positions at Cisco, Symantec, ExtraHop, Shape Security, Mojo Networks, and Endace. He breaks down what carries over between big-company and early-stage environments and what you must relearn.</p>
<p>In the episode, we explore hiring for creativity vs. experience, how to test a move from individual contributor (IC) to manager before you commit, and practical ways to handle politics while keeping work moving. Sri also shares how he frames Zero Trust and other technical concepts so buyers understand the value.</p>
<p>Listen if you’re deciding between startup and enterprise, weighing IC vs. management, or want concrete hiring and communication tactics you can use this quarter.</p>
<p><br></p>
<p><strong>About Sri: </strong></p>
<p>Sri Sundaralingam is Chief Marketing Officer at Xage Security, a global leader in zero trust access, especially for critical infrastructure. His experience spans leadership roles in high-growth startups and international firms, including ExtraHop, Symantec, Shape Security, Endace, Cisco, Mojo Networks, and Juniper Networks. With a technical engineering foundation, Sri has guided teams across product management, product marketing, and corporate marketing. He’s also credited as an inventor on wireless security technology pioneered at Mojo Networks.</p>
<p><br>🔗 <strong>Links &amp; Resources:</strong></p>
<p>Follow Sri Sundaralingam on <a href="https://www.linkedin.com/in/srisunda/"><u>LinkedIn </u></a></p>
<p>Xage Security –<a href="https://xage.com/"><u> Official Website</u></a></p>
<p><br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"><u> </u><strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>1866</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a54cc56a-7c2e-11f0-8db3-1380aaaa3480]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8108676870.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside the Ransomware Economy with Dr. Diane Janosek</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/175/notes</link>
      <description>Episode Summary:

Ransomware has evolved from one-off attacks to a fully operational criminal economy. Today, cybercrime groups operate with defined roles, shared infrastructure, and a growing reliance on AI to speed up intrusion, encryption, and extortion. Our guest this episode unveils insights from tracking the fraudulent side of the internet.

Dr. Diane Janosek, CEO of Janos LLC and former senior executive at the National Security Agency (NSA), joins Gianna to unpack the structure and strategy behind ransomware-as-a-service. Drawing on her background in law, compliance, and national security, including her leadership at the National Cryptologic School, she breaks down how these syndicates function, what most companies get wrong in their response, and why even well-maintained backups aren’t the safety net they once were.

We also explore how AI is accelerating the criminal kill chain, the real stats behind ransom payments (and regrets), and why ransomware is increasingly a tool of geopolitical disruption, not just financial gain. 

🎬 The trailer for the film is included in this episode with permission. Courtesy of the Bold Stroke. All rights reserved. Dawn of Cyberwarfare – Produced by the Bold Stroke – Directed by Alisha Merkle &amp; Fabrizio Dublino



🔗 Links &amp; Resources:

The Cyber Effect by Dr. Mary Aiken

Chip War by Chris Miller

Elon Musk by Walter Isaacson

Darknet Diaries podcast: darknetdiaries.com Recommended episode: Episode 24 – Operation BayonetArticle on King Charles’ Canada visit

More about the film here!

Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

About Dr. Diane: 

Dr. Diane Janosek is a national security leader, cybersecurity compliance expert, and CEO of Janos LLC. With over a decade at the National Security Agency, she served as Deputy Director of Compliance, Commandant of the National Cryptologic School, and senior legal and policy advisor across the intelligence community.

She holds a Ph.D. in cybersecurity law, a J.D., and a master’s in strategic intelligence, and has worked at the intersection of law, cyber, privacy, and geopolitics throughout her career. Diane has trained thousands of cyber professionals globally, written extensively on cyber ethics and space security, and remains a leading voice on the risks posed by AI-accelerated threats and criminal enterprise models like ransomware-as-a-service.

Learn more at dianejanosek.com

Follow her on LinkedIn

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 13 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Inside the Ransomware Economy with Dr. Diane Janosek</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>175</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Ransomware has evolved from one-off attacks to a fully operational criminal economy. Today, cybercrime groups operate with defined roles, shared infrastructure, and a growing reliance on AI to speed up intrusion, encryption, and extortion. Our guest this episode unveils insights from tracking the fraudulent side of the internet.

Dr. Diane Janosek, CEO of Janos LLC and former senior executive at the National Security Agency (NSA), joins Gianna to unpack the structure and strategy behind ransomware-as-a-service. Drawing on her background in law, compliance, and national security, including her leadership at the National Cryptologic School, she breaks down how these syndicates function, what most companies get wrong in their response, and why even well-maintained backups aren’t the safety net they once were.

We also explore how AI is accelerating the criminal kill chain, the real stats behind ransom payments (and regrets), and why ransomware is increasingly a tool of geopolitical disruption, not just financial gain. 

🎬 The trailer for the film is included in this episode with permission. Courtesy of the Bold Stroke. All rights reserved. Dawn of Cyberwarfare – Produced by the Bold Stroke – Directed by Alisha Merkle &amp; Fabrizio Dublino



🔗 Links &amp; Resources:

The Cyber Effect by Dr. Mary Aiken

Chip War by Chris Miller

Elon Musk by Walter Isaacson

Darknet Diaries podcast: darknetdiaries.com Recommended episode: Episode 24 – Operation BayonetArticle on King Charles’ Canada visit

More about the film here!

Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

About Dr. Diane: 

Dr. Diane Janosek is a national security leader, cybersecurity compliance expert, and CEO of Janos LLC. With over a decade at the National Security Agency, she served as Deputy Director of Compliance, Commandant of the National Cryptologic School, and senior legal and policy advisor across the intelligence community.

She holds a Ph.D. in cybersecurity law, a J.D., and a master’s in strategic intelligence, and has worked at the intersection of law, cyber, privacy, and geopolitics throughout her career. Diane has trained thousands of cyber professionals globally, written extensively on cyber ethics and space security, and remains a leading voice on the risks posed by AI-accelerated threats and criminal enterprise models like ransomware-as-a-service.

Learn more at dianejanosek.com

Follow her on LinkedIn

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Ransomware has evolved from one-off attacks to a fully operational criminal economy. Today, cybercrime groups operate with defined roles, shared infrastructure, and a growing reliance on AI to speed up intrusion, encryption, and extortion. Our guest this episode unveils insights from tracking the fraudulent side of the internet.</p>
<p>Dr. Diane Janosek, CEO of Janos LLC and former senior executive at the National Security Agency (NSA), joins Gianna to unpack the structure and strategy behind ransomware-as-a-service. Drawing on her background in law, compliance, and national security, including her leadership at the National Cryptologic School, she breaks down how these syndicates function, what most companies get wrong in their response, and why even well-maintained backups aren’t the safety net they once were.</p>
<p>We also explore how AI is accelerating the criminal kill chain, the real stats behind ransom payments (and regrets), and why ransomware is increasingly a tool of geopolitical disruption, not just financial gain. </p>
<p>🎬 <strong>The trailer for the film is included in this episode with permission. Courtesy of the Bold Stroke. All rights reserved. </strong><em>Dawn of Cyberwarfare – Produced by the Bold Stroke – Directed by Alisha Merkle &amp; Fabrizio Dublino</em></p>
<p><br></p>
<p>🔗 <strong>Links &amp; Resources:</strong></p>
<p>The Cyber Effect by<a href="https://www.maryaiken.com/the-cyber-effect"><u> Dr. Mary Aiken</u></a></p>
<p>Chip War by <a href="https://www.simonandschuster.com/books/Chip-War/Chris-Miller/9781982172008"><u>Chris Miller</u></a></p>
<p>Elon Musk by <a href="https://www.simonandschuster.com/books/Elon-Musk/Walter-Isaacson/9781982181284"><u>Walter Isaacson</u></a></p>
<p>Darknet Diaries podcast: <a href="http://darknetdiaries.com"><u>darknetdiaries.com</u></a> Recommended episode: <a href="https://darknetdiaries.com/episode/24/"><u>Episode 24 – Operation Bayonet</u></a>Article on <a href="https://www.pbs.org/newshour/world/why-king-charles-iii-is-visiting-canada-to-deliver-a-rare-speech-from-the-throne"><u>King Charles’ Canada visit</u></a></p>
<p>More about the film<a href="https://theboldstroke.com/project/dawn-of-cyberwarfare-documentary/"><u> here!</u></a></p>
<p><br><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"><u> </u><strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br><strong>About Dr. Diane: </strong></p>
<p><strong>Dr. Diane Janosek</strong> is a national security leader, cybersecurity compliance expert, and CEO of Janos LLC. With over a decade at the National Security Agency, she served as Deputy Director of Compliance, Commandant of the National Cryptologic School, and senior legal and policy advisor across the intelligence community.</p>
<p>She holds a Ph.D. in cybersecurity law, a J.D., and a master’s in strategic intelligence, and has worked at the intersection of law, cyber, privacy, and geopolitics throughout her career. Diane has trained thousands of cyber professionals globally, written extensively on cyber ethics and space security, and remains a leading voice on the risks posed by AI-accelerated threats and criminal enterprise models like ransomware-as-a-service.</p>
<p>Learn more at<a href="https://www.dianejanosek.com"><u> </u></a><a href="http://dianejanosek.com"><u>dianejanosek.com</u></a></p>
<p>Follow her on <a href="https://www.linkedin.com/in/diane-janosek-abc/"><u>LinkedIn</u></a></p>
<p><br><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2169</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c3c95550-7457-11f0-986a-9bd336a07955]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8641003552.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Different Is Good: Why Standing Out &gt; Being Perfect on Social</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/174/notes</link>
      <description>Episode Summary:

You can’t copy Maya Doron. Not just because she’ll notice (and yes, she has receipts), but because everything she does on social at Wiz is built on something AI can’t touch: chaos, specificity, and a running list of what we’re calling Maya-isms.

As Growth Marketing Manager at Wiz, Maya helps shape one of the most original brands in cybersecurity — from viral puppies and cloud cornflakes to musicals, memes, and “what’s in your tabs?” CISO interviews. In this episode, she joins Gianna to talk through what makes content real, what makes it work, and why going viral is never the goal.

They get into the problems with AI-generated blandness, the return of photos on LinkedIn, how sensory marketing taps into memory even more deeply than visuals, and what it takes to build a brand people don’t just notice — they respect. 

🎧 Hit play to hear how Maya builds scroll-stopping social in the most copy-paste-prone industry online.



🔗 Links &amp; Resources:

Watch the Wiz Puppies Campaign – yes, there are actual puppies!

Watch the Wiz April Fool’s Musical – yes, it’s a full musical!

Learn more about Wiz

Timestamps:

00:00 – Welcome and intro to Maya Deone from Wiz
01:08 – What Maya does as Growth Marketing Manager
02:36 – Social platforms, TikTok strategy, and reaching the next wave
04:06 – Filming CISOs, creating content at events, and AI tools for editing
05:49 – Maya’s favorite brand accounts: Surreal Cornflakes &amp; Duolingo
07:59 – Wiz Easter eggs and sensory marketing tricks
09:32 – How Wiz uses AI tools like ChatGPT and Claude
10:42 – The sameness problem on LinkedIn and keeping your voice
13:27 – Making content digestible for CISOs and why shorter wins
14:33 – What performs best on social: booths, themes, and research
17:17 – The viral puppy campaign and ungated content strategy
19:24 – Creating trailer-style content and staying positive in cyber
22:21 – Social media trends to skip — and what’s working now
24:43 – The rise of raw, behind-the-scenes, and handwritten posts
25:26 – “Don’t optimize for viral, optimize for real”
27:00 – Building brand trust through consistency and giveaways
28:39 – Maya’s mantra: “Don’t post what a competitor could copy”
30:12 – What is sensory marketing? And why it sticks
33:08 – Sound, food, and April Fool’s musicals
34:13 – Where to find Maya and final thoughts
34:54 – Come to CyberMarketingCon 2025 in Austin!



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

About Maya:

Maya Doron joined the Wiz team in September 2023 as the growth marketing manager. In her role, she leads the company’s social and video content strategy across platforms like YouTube, LinkedIn, and X, turning playful and bold ideas (think puppies, booth cornflakes, and musicals) into impactful campaigns that stand out in cybersecurity marketing. 

Previously, Maya held digital and influencer marketing roles at companies like Vesttoo and Percepto International and brings a creative, fast-moving mindset to everything she works on.

Follow Maya on LinkedIn. 

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 06 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Different Is Good: Why Standing Out &gt; Being Perfect on Social</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>174</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

You can’t copy Maya Doron. Not just because she’ll notice (and yes, she has receipts), but because everything she does on social at Wiz is built on something AI can’t touch: chaos, specificity, and a running list of what we’re calling Maya-isms.

As Growth Marketing Manager at Wiz, Maya helps shape one of the most original brands in cybersecurity — from viral puppies and cloud cornflakes to musicals, memes, and “what’s in your tabs?” CISO interviews. In this episode, she joins Gianna to talk through what makes content real, what makes it work, and why going viral is never the goal.

They get into the problems with AI-generated blandness, the return of photos on LinkedIn, how sensory marketing taps into memory even more deeply than visuals, and what it takes to build a brand people don’t just notice — they respect. 

🎧 Hit play to hear how Maya builds scroll-stopping social in the most copy-paste-prone industry online.



🔗 Links &amp; Resources:

Watch the Wiz Puppies Campaign – yes, there are actual puppies!

Watch the Wiz April Fool’s Musical – yes, it’s a full musical!

Learn more about Wiz

Timestamps:

00:00 – Welcome and intro to Maya Deone from Wiz
01:08 – What Maya does as Growth Marketing Manager
02:36 – Social platforms, TikTok strategy, and reaching the next wave
04:06 – Filming CISOs, creating content at events, and AI tools for editing
05:49 – Maya’s favorite brand accounts: Surreal Cornflakes &amp; Duolingo
07:59 – Wiz Easter eggs and sensory marketing tricks
09:32 – How Wiz uses AI tools like ChatGPT and Claude
10:42 – The sameness problem on LinkedIn and keeping your voice
13:27 – Making content digestible for CISOs and why shorter wins
14:33 – What performs best on social: booths, themes, and research
17:17 – The viral puppy campaign and ungated content strategy
19:24 – Creating trailer-style content and staying positive in cyber
22:21 – Social media trends to skip — and what’s working now
24:43 – The rise of raw, behind-the-scenes, and handwritten posts
25:26 – “Don’t optimize for viral, optimize for real”
27:00 – Building brand trust through consistency and giveaways
28:39 – Maya’s mantra: “Don’t post what a competitor could copy”
30:12 – What is sensory marketing? And why it sticks
33:08 – Sound, food, and April Fool’s musicals
34:13 – Where to find Maya and final thoughts
34:54 – Come to CyberMarketingCon 2025 in Austin!



Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

About Maya:

Maya Doron joined the Wiz team in September 2023 as the growth marketing manager. In her role, she leads the company’s social and video content strategy across platforms like YouTube, LinkedIn, and X, turning playful and bold ideas (think puppies, booth cornflakes, and musicals) into impactful campaigns that stand out in cybersecurity marketing. 

Previously, Maya held digital and influencer marketing roles at companies like Vesttoo and Percepto International and brings a creative, fast-moving mindset to everything she works on.

Follow Maya on LinkedIn. 

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>You can’t copy Maya Doron. Not just because she’ll notice (and yes, she has receipts), but because everything she does on social at Wiz is built on something AI can’t touch: chaos, specificity, and a running list of what we’re calling Maya-isms.</p>
<p>As Growth Marketing Manager at Wiz, Maya helps shape one of the most original brands in cybersecurity — from viral puppies and cloud cornflakes to musicals, memes, and “what’s in your tabs?” CISO interviews. In this episode, she joins Gianna to talk through what makes content real, what makes it work, and why going viral is never the goal.</p>
<p>They get into the problems with AI-generated blandness, the return of photos on LinkedIn, how sensory marketing taps into memory even more deeply than visuals, and what it takes to build a brand people don’t just notice — they respect. </p>
<p>🎧 <strong>Hit play to hear how Maya builds scroll-stopping social in the most copy-paste-prone industry online.</strong></p>
<p><br></p>
<p>🔗 <strong>Links &amp; Resources:</strong></p>
<p><a href="https://www.linkedin.com/posts/wizsecurity_learn-cloud-security-with-puppies-activity-7285700780387356674-_KT-/"><u>Watch the Wiz Puppies Campaign</u></a> – yes, there are actual puppies!</p>
<p><a href="https://www.cisomusical.com/"><u>Watch the Wiz April Fool’s Musical</u></a> – yes, it’s a full musical!</p>
<p>Learn more about <a href="https://www.wiz.io/"><u>Wiz</u></a></p>
<p><br><strong>Timestamps:</strong></p>
<p>00:00 – Welcome and intro to Maya Deone from Wiz
01:08 – What Maya does as Growth Marketing Manager
02:36 – Social platforms, TikTok strategy, and reaching the next wave
04:06 – Filming CISOs, creating content at events, and AI tools for editing
05:49 – Maya’s favorite brand accounts: Surreal Cornflakes &amp; Duolingo
07:59 – Wiz Easter eggs and sensory marketing tricks
09:32 – How Wiz uses AI tools like ChatGPT and Claude
10:42 – The sameness problem on LinkedIn and keeping your voice
13:27 – Making content digestible for CISOs and why shorter wins
14:33 – What performs best on social: booths, themes, and research
17:17 – The viral puppy campaign and ungated content strategy
19:24 – Creating trailer-style content and staying positive in cyber
22:21 – Social media trends to skip — and what’s working now
24:43 – The rise of raw, behind-the-scenes, and handwritten posts
25:26 – “Don’t optimize for viral, optimize for real”
27:00 – Building brand trust through consistency and giveaways
28:39 – Maya’s mantra: “Don’t post what a competitor could copy”
30:12 – What is sensory marketing? And why it sticks
33:08 – Sound, food, and April Fool’s musicals
34:13 – Where to find Maya and final thoughts
34:54 – Come to CyberMarketingCon 2025 in Austin!</p>
<p><br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"><u> </u><strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br><strong>About Maya:</strong></p>
<p>Maya Doron joined the Wiz team in September 2023 as the growth marketing manager. In her role, she leads the company’s social and video content strategy across platforms like YouTube, LinkedIn, and X, turning playful and bold ideas (think puppies, booth cornflakes, and musicals) into impactful campaigns that stand out in cybersecurity marketing.<a href="https://theorg.com/org/wiz/org-chart/maya-doron?utm_source=chatgpt.com"> </a></p>
<p>Previously, Maya held digital and influencer marketing roles at companies like Vesttoo and Percepto International and brings a creative, fast-moving mindset to everything she works on.</p>
<p>Follow Maya on <a href="https://www.linkedin.com/in/maya-doron/"><u>LinkedIn</u></a>. </p>
<p><br><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. <br></p>
<p>See you in the next episode!</p>
<p><br></p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2241</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c4a6acc8-6ecd-11f0-a5e2-dba8dda557b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7932393436.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>You Can’t Cold Call the SOC: GTM Lessons from ArmorText with Matt Calligan</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/173/notes</link>
      <description>Episode Summary:

Matt Calligan, Director of Revenue Operations at ArmorText, joins us from Iceland to talk about what it takes to build a sales motion from scratch in cybersecurity when your product is built for moments nobody wants to think about.

As the company’s first salesperson, Matt shares how he helped ArmorText find early traction through ISACs, why the government wasn’t the buyer they expected, and how private-sector incident response teams became their core market. We dig into go-to-market lessons around timing and trust, and why most traditional sales tactics don’t work when the use case is crisis-driven.

We also discuss selling through distributors without a formal channel program, supporting marketing without a full-time team, and what happens when converting at 80% but only if the right people have heard of you.

🔗 Links &amp; Resources:


    

Matt Calligan on LinkedIn



    

ArmorText

  Learn more about ISACs: National Council of ISACs






Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



About Matt:

Matt Calligan is the Director of Revenue Operations at ArmorText, where he works closely with critical infrastructure organizations to support secure, out-of-band communications for cybersecurity incidents and threat sharing.

As the company’s first salesperson, Matt helped shape ArmorText’s early go-to-market motion—building traction through partnerships with ISACs and navigating complex sales cycles in highly regulated industries. He also leads strategy across sales, marketing, and channel efforts, helping the team scale without traditional org structures.

Matt brings two decades of enterprise sales experience and advises other cybersecurity startups on finding product-market fit, building revenue engines, and selling in trust-first environments.



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 30 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>173</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Matt Calligan, Director of Revenue Operations at ArmorText, joins us from Iceland to talk about what it takes to build a sales motion from scratch in cybersecurity when your product is built for moments nobody wants to think about.

As the company’s first salesperson, Matt shares how he helped ArmorText find early traction through ISACs, why the government wasn’t the buyer they expected, and how private-sector incident response teams became their core market. We dig into go-to-market lessons around timing and trust, and why most traditional sales tactics don’t work when the use case is crisis-driven.

We also discuss selling through distributors without a formal channel program, supporting marketing without a full-time team, and what happens when converting at 80% but only if the right people have heard of you.

🔗 Links &amp; Resources:


    

Matt Calligan on LinkedIn



    

ArmorText

  Learn more about ISACs: National Council of ISACs






Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.



About Matt:

Matt Calligan is the Director of Revenue Operations at ArmorText, where he works closely with critical infrastructure organizations to support secure, out-of-band communications for cybersecurity incidents and threat sharing.

As the company’s first salesperson, Matt helped shape ArmorText’s early go-to-market motion—building traction through partnerships with ISACs and navigating complex sales cycles in highly regulated industries. He also leads strategy across sales, marketing, and channel efforts, helping the team scale without traditional org structures.

Matt brings two decades of enterprise sales experience and advises other cybersecurity startups on finding product-market fit, building revenue engines, and selling in trust-first environments.



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Matt Calligan, Director of Revenue Operations at ArmorText, joins us from Iceland to talk about what it takes to build a sales motion from scratch in cybersecurity when your product is built for moments nobody wants to think about.</p>
<p>As the company’s first salesperson, Matt shares how he helped ArmorText find early traction through ISACs, why the government wasn’t the buyer they expected, and how private-sector incident response teams became their core market. We dig into go-to-market lessons around timing and trust, and why most traditional sales tactics don’t work when the use case is crisis-driven.</p>
<p>We also discuss selling through distributors without a formal channel program, supporting marketing without a full-time team, and what happens when converting at 80% but only if the right people have heard of you.</p>
<p>🔗 <strong>Links &amp; Resources:</strong></p>
<ul>
  <li>  </li>
<li>Matt Calligan on <a href="https://www.linkedin.com/in/mattcalligan/"><u>LinkedIn</u></a>
</li>

  <li>  </li>
<li><a href="https://armortext.com/"><u>ArmorText</u></a></li>
  <li>Learn more about ISACs: <a href="https://www.nationalisacs.org/"><u>National Council of ISACs</u></a>
</li>

</ul>
<p><br></p>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"><u> </u><strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><br></p>
<p><strong>About Matt:</strong></p>
<p>Matt Calligan is the Director of Revenue Operations at ArmorText, where he works closely with critical infrastructure organizations to support secure, out-of-band communications for cybersecurity incidents and threat sharing.</p>
<p>As the company’s first salesperson, Matt helped shape ArmorText’s early go-to-market motion—building traction through partnerships with ISACs and navigating complex sales cycles in highly regulated industries. He also leads strategy across sales, marketing, and channel efforts, helping the team scale without traditional org structures.</p>
<p>Matt brings two decades of enterprise sales experience and advises other cybersecurity startups on finding product-market fit, building revenue engines, and selling in trust-first environments.</p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2444</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[623fb1cc-693e-11f0-b893-0f7cc56bdd26]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5853780459.mp3?updated=1753928508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nobody Cares About Your Launch (Yet): How to Fix Your PR Game</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/172/notes</link>
      <description>Episode Summary:

Carmen Harris is the person you call when no one wants to cover your product, and she’ll tell you exactly why. Founder and CEO of Signal and Noise, she joins Gianna to break down what’s changed in cybersecurity PR and how to get attention in 2025.

We get into why the adage “product news is dead” isn’t totally true, how founders should build their brand before launch, and what makes an editor hit delete on your pitch in two seconds flat. Carmen also shares how to use the summer slowdown to reset your comms strategy, why you need to calendar-stalk your competitors, and how to get real face time with execs (even if you have to bully your way into the room).

Listen in for real-world tips you can use on your next launch or media push.

🔗 Links &amp; Resources:

Connect with Carmen:


  
Carmen Harris on LinkedIn



  
Signal and Noise




Companies we mentioned:


  
Wiz – the standard for comms that lands



  
incident.io – a great example of product-led thought leadership



  
Torq – RSAC monster truck champions




Newsletters Carmen swears by:


  
Return on Security by Mike Privette



  
Resilient Cyber



  
Richard Stiennon on Substack




Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

About Carmen:

Carmen Harris is the founder and CEO of Signal &amp; Noise, a boutique comms firm for cybersecurity and AI companies that want to be understood. She’s built a career helping technical founders translate their work into stories that land with reporters, analysts, and buyers.

She’s the one who gets the “can-you-fix-this” call mid-crisis and the “we’re-about-to-launch” call mid-chaos, and she loves both. Carmen’s not about gimmicks. She helps companies understand their market, dig into what matters, and build comms strategies that work in the real world.

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 23 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>172</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Carmen Harris is the person you call when no one wants to cover your product, and she’ll tell you exactly why. Founder and CEO of Signal and Noise, she joins Gianna to break down what’s changed in cybersecurity PR and how to get attention in 2025.

We get into why the adage “product news is dead” isn’t totally true, how founders should build their brand before launch, and what makes an editor hit delete on your pitch in two seconds flat. Carmen also shares how to use the summer slowdown to reset your comms strategy, why you need to calendar-stalk your competitors, and how to get real face time with execs (even if you have to bully your way into the room).

Listen in for real-world tips you can use on your next launch or media push.

🔗 Links &amp; Resources:

Connect with Carmen:


  
Carmen Harris on LinkedIn



  
Signal and Noise




Companies we mentioned:


  
Wiz – the standard for comms that lands



  
incident.io – a great example of product-led thought leadership



  
Torq – RSAC monster truck champions




Newsletters Carmen swears by:


  
Return on Security by Mike Privette



  
Resilient Cyber



  
Richard Stiennon on Substack




Meet us at CyberMarketingCon 2025!

Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.

👉 Snag your ticket now!

See you in Austin, where the insights and vibes are hotter.

About Carmen:

Carmen Harris is the founder and CEO of Signal &amp; Noise, a boutique comms firm for cybersecurity and AI companies that want to be understood. She’s built a career helping technical founders translate their work into stories that land with reporters, analysts, and buyers.

She’s the one who gets the “can-you-fix-this” call mid-crisis and the “we’re-about-to-launch” call mid-chaos, and she loves both. Carmen’s not about gimmicks. She helps companies understand their market, dig into what matters, and build comms strategies that work in the real world.

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Carmen Harris is the person you call when no one wants to cover your product, and she’ll tell you exactly why. Founder and CEO of Signal and Noise, she joins Gianna to break down what’s changed in cybersecurity PR and how to get attention in 2025.</p>
<p>We get into why the adage “product news is dead” isn’t totally true, how founders should build their brand <em>before</em> launch, and what makes an editor hit delete on your pitch in two seconds flat. Carmen also shares how to use the summer slowdown to reset your comms strategy, why you need to calendar-stalk your competitors, and how to get real face time with execs (even if you have to bully your way into the room).</p>
<p>Listen in for real-world tips you can use on your next launch or media push.</p>
<p>🔗 <strong>Links &amp; Resources:</strong></p>
<p><strong>Connect with Carmen:</strong></p>
<ul>
  <li>
<p><a href="https://www.linkedin.com/in/carmenharris/"><u>Carmen Harris on LinkedIn</u></a></p>
</li>
  <li>
<p><a href="https://www.linkedin.com/company/commsbreakthrough/"><u>Signal and Noise</u></a></p>
</li>
</ul>
<p><strong>Companies we mentioned:</strong></p>
<ul>
  <li>
<p><a href="https://www.wiz.io/"><u>Wiz</u></a> – the standard for comms that lands</p>
</li>
  <li>
<p><a href="https://incident.io/"><u>incident.io</u></a> – a great example of product-led thought leadership</p>
</li>
  <li>
<p><a href="https://www.torq.io/"><u>Torq</u></a> – RSAC monster truck champions</p>
</li>
</ul>
<p><strong>Newsletters Carmen swears by:</strong></p>
<ul>
  <li>
<p><a href="https://www.returnonsecurity.com/"><u>Return on Security</u></a> by Mike Privette</p>
</li>
  <li>
<p><a href="https://www.resilientcyber.io/"><u>Resilient Cyber</u></a></p>
</li>
  <li>
<p>Richard Stiennon on <a href="https://stiennon.substack.com/"><u>Substack</u></a></p>
</li>
</ul>
<p><strong>Meet us at CyberMarketingCon 2025!</strong></p>
<p>Want the insider secrets cybersecurity marketers use? Join us December 7–10 in Austin, TX, for four days of zero-fluff workshops, real-deal networking, and maybe the best BBQ meetup you’ll ever have.</p>
<p>👉<a href="https://www.cybermarketingconference.com/"><u> </u><strong>Snag your ticket now!</strong></a></p>
<p>See you in Austin, where the insights and vibes are hotter.</p>
<p><strong>About Carmen:</strong></p>
<p>Carmen Harris is the founder and CEO of Signal &amp; Noise, a boutique comms firm for cybersecurity and AI companies that want to be understood. She’s built a career helping technical founders translate their work into stories that land with reporters, analysts, and buyers.</p>
<p>She’s the one who gets the “can-you-fix-this” call mid-crisis and the “we’re-about-to-launch” call mid-chaos, and she loves both. Carmen’s not about gimmicks. She helps companies understand their market, dig into what matters, and build comms strategies that work in the real world.</p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1716</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d353c32a-63e0-11f0-afb8-bf6bf59f357e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1104793799.mp3?updated=1753941127" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>You Don’t Need a Budget—You Need a Hat: Orly Bar-Lev on Lasso’s GTM</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/171/notes</link>
      <description>Episode summary: 

“We decided that Lasso is Matthew McConaughey.”

That’s how Orly Bar Lev, Head of Marketing at Lasso Security, describes the brand she helped shape—laid back, sharp, and not trying to be like anyone else.

In this episode, Orly joins Gianna Whitver to tell the full story: how a GenAI cybersecurity startup launched out of stealth with sheriff-themed swag, a cowboy hat logo, and a Kyrgyzstan-coded website. He tells how it started and how it almost all fell apart when a sheep-centric rebrand crashed just one week before go-live.

She walked out of that moment, rewrote the pitch, and sold a new vision: the founders are the sheriffs, the product is the lasso, and the brand is the cowboy. And somehow, it worked.

This isn’t a theory-of-branding episode. It’s what happens when you do it for real, with no team, no safety net, and just enough weirdness to make it stick.

The sheep died. The hat stayed. Lasso rides.



🔗 Links &amp; Resources:

Connect with Orly Bar Lev on LinkedInExplore Lasso Security: Official Website | LinkedIn PageWatch "Sheep Happens": Campaign Video

Dive into Lasso's Insights: Blog &amp; Resources



About Orly: 

Orly Bar Lev is the Head of Marketing at Lasso Security, where she helped take the company from stealth mode to standing out, armed with a Kyrgyzstan-coded website, a cowboy hat, and a clear mission: secure GenAI.

She’s a sharp strategist with a background in cybersecurity communications, known for turning complex GenAI risks (like prompt injection and hallucinations) into conversations that actually land with both technical teams and marketers.

She’s spoken on The Inspired Marketer podcast about balancing innovation and security in enterprise environments, which is why Lasso’s brand is part sheriffs, part swagger, and somehow still totally credible.



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 16 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>You Don’t Need a Budget—You Need a Hat: Orly Bar-Lev on Lasso’s GTM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>171</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode summary: 

“We decided that Lasso is Matthew McConaughey.”

That’s how Orly Bar Lev, Head of Marketing at Lasso Security, describes the brand she helped shape—laid back, sharp, and not trying to be like anyone else.

In this episode, Orly joins Gianna Whitver to tell the full story: how a GenAI cybersecurity startup launched out of stealth with sheriff-themed swag, a cowboy hat logo, and a Kyrgyzstan-coded website. He tells how it started and how it almost all fell apart when a sheep-centric rebrand crashed just one week before go-live.

She walked out of that moment, rewrote the pitch, and sold a new vision: the founders are the sheriffs, the product is the lasso, and the brand is the cowboy. And somehow, it worked.

This isn’t a theory-of-branding episode. It’s what happens when you do it for real, with no team, no safety net, and just enough weirdness to make it stick.

The sheep died. The hat stayed. Lasso rides.



🔗 Links &amp; Resources:

Connect with Orly Bar Lev on LinkedInExplore Lasso Security: Official Website | LinkedIn PageWatch "Sheep Happens": Campaign Video

Dive into Lasso's Insights: Blog &amp; Resources



About Orly: 

Orly Bar Lev is the Head of Marketing at Lasso Security, where she helped take the company from stealth mode to standing out, armed with a Kyrgyzstan-coded website, a cowboy hat, and a clear mission: secure GenAI.

She’s a sharp strategist with a background in cybersecurity communications, known for turning complex GenAI risks (like prompt injection and hallucinations) into conversations that actually land with both technical teams and marketers.

She’s spoken on The Inspired Marketer podcast about balancing innovation and security in enterprise environments, which is why Lasso’s brand is part sheriffs, part swagger, and somehow still totally credible.



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode summary: </strong></p>
<p>“We decided that Lasso is Matthew McConaughey.”</p>
<p>That’s how Orly Bar Lev, Head of Marketing at Lasso Security, describes the brand she helped shape—laid back, sharp, and not trying to be like anyone else.</p>
<p>In this episode, Orly joins Gianna Whitver to tell the full story: how a GenAI cybersecurity startup launched out of stealth with sheriff-themed swag, a cowboy hat logo, and a Kyrgyzstan-coded website. He tells how it started and how it almost all fell apart when a sheep-centric rebrand crashed just one week before go-live.</p>
<p>She walked out of that moment, rewrote the pitch, and sold a new vision: the founders are the sheriffs, the product is the lasso, and the brand is the cowboy. And somehow, it worked.</p>
<p>This isn’t a theory-of-branding episode. It’s what happens when you do it for real, with no team, no safety net, and just enough weirdness to make it stick.</p>
<p>The sheep died. The hat stayed. Lasso rides.</p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources</strong>:</p>
<p>Connect with Orly Bar Lev on<a href="https://www.linkedin.com/in/orly-bar-lev/"> <u>LinkedIn</u></a>Explore Lasso Security:<a href="https://www.lasso.security/"> <u>Official Website</u></a> |<a href="https://www.linkedin.com/company/lasso-security/"> <u>LinkedIn Page</u></a>Watch "Sheep Happens": <a href="https://www.lasso.security/resources/sheep-happens-genai-is-great"><u>Campaign Video</u></a></p>
<p>Dive into Lasso's Insights: <a href="https://www.lasso.security/blog"><u>Blog &amp; Resources</u></a></p>
<p><br></p>
<p><strong>About Orly: </strong></p>
<p>Orly Bar Lev is the Head of Marketing at<a href="https://www.lasso.security"> <u>Lasso Security</u></a>, where she helped take the company from stealth mode to standing out, armed with a Kyrgyzstan-coded website, a cowboy hat, and a clear mission: secure GenAI.</p>
<p>She’s a sharp strategist with a background in cybersecurity communications, known for turning complex GenAI risks (like prompt injection and hallucinations) into conversations that actually land with both technical teams and marketers.</p>
<p>She’s spoken on <em>The Inspired Marketer</em> podcast about balancing innovation and security in enterprise environments, which is why Lasso’s brand is part sheriffs, part swagger, and somehow still totally credible.</p>
<p><br></p>
<p><strong>Subscribe &amp; Review</strong>:</p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts</strong>:</p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2673</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59bac5fa-5e58-11f0-95c0-1343045bb9f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2956177248.mp3?updated=1752607306" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Metaphors, Missed Signals, and Making Cyber Make Sense with Evgeniy Kharam</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/170/notes</link>
      <description>Episode summary: 

Security architect, podcast host, and author Evgeniy Kharam has seen it again and again: a company buys a shiny new security product, and a year later, it’s still sitting on the shelf. Not because it didn’t work, but because no one knew how to explain it, use it, or get buy-in.

That gap between buying and deploying, between knowing and communicating, is what pulled Evgeniy into his next chapter. After years in technical delivery and architecture, he realized that soft skills weren’t nice to have; they were survival tools.

In this episode, we talk about what happens when security teams can’t translate what they do, how marketers can meet them in the middle, and why metaphors (tents, dogs, houses, you’ll see) work. We get into RSA booth fatigue, Zoom call awkwardness, and what it takes to connect with someone who’s nodding along but completely lost.

Also: hummus etiquette, a three-year campaign to get Evgeniy to CyberMarketingCon, and his dream escape plan involving a shawarma truck.



🔗 Links &amp; Resources:


  
🎙️ Security Architecture PodcastCo-hosted by Evgeniy Kharam and Dmitry Raidman, this podcast delves into cybersecurity architecture, offering insights into network, application, and cloud security.Listen to the podcast



  
📘 Architecting Success: The Art of Soft Skills in Technical SalesEvgeniy Kharam's book emphasizes the importance of soft skills in technical sales and provides strategies to enhance communication and build trust. Get the book on Amazon



  
🧠 Soft Skills TechEvgeniy's platform is dedicated to coaching and resources on soft skills in the tech industry. Explore Soft Skills Tech



  
🏢 EK Cyber and Media ConsultingA consulting firm founded by Evgeniy Kharam, offering services in cybersecurity and media for vendors and MSSPs. Visit EK Cyber and Media Consulting





  
📺 Interview with Evgeniy KharamAn in-depth interview exploring Evgeniy's journey and insights into cybersecurity. Watch on YouTube




About Evgeniy:

Evgeniy Kharam has worn nearly every hat in cybersecurity from firewall deployment engineer to VP of Architecture at the Herjavec Group, where he helped grow the team from 15 to over 300. Over two decades in the industry gave him a front-row seat to a recurring problem: great tech failing because no one knew how to explain it.

That realization led him to focus on something most security pros avoid talking about: soft skills. He’s now the author of Architecting Success: The Art of Soft Skills in Technical Sales, host of From Tech to Trust, and co-founder of the Security Architecture Podcast. He also moderates panels, hosts interviews, and advises on the board of the Canadian Cybersecurity Network.

Evgeniy blends technical depth with a human-first approach, whether running a ski-slope cybersecurity conference or helping vendors communicate like real people. He now leads his own consulting firm, where he guides cybersecurity companies through both architecture and storytelling.



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 09 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Metaphors, Missed Signals, and Making Cyber Make Sense with Evgeniy Kharam</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>170</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode summary: 

Security architect, podcast host, and author Evgeniy Kharam has seen it again and again: a company buys a shiny new security product, and a year later, it’s still sitting on the shelf. Not because it didn’t work, but because no one knew how to explain it, use it, or get buy-in.

That gap between buying and deploying, between knowing and communicating, is what pulled Evgeniy into his next chapter. After years in technical delivery and architecture, he realized that soft skills weren’t nice to have; they were survival tools.

In this episode, we talk about what happens when security teams can’t translate what they do, how marketers can meet them in the middle, and why metaphors (tents, dogs, houses, you’ll see) work. We get into RSA booth fatigue, Zoom call awkwardness, and what it takes to connect with someone who’s nodding along but completely lost.

Also: hummus etiquette, a three-year campaign to get Evgeniy to CyberMarketingCon, and his dream escape plan involving a shawarma truck.



🔗 Links &amp; Resources:


  
🎙️ Security Architecture PodcastCo-hosted by Evgeniy Kharam and Dmitry Raidman, this podcast delves into cybersecurity architecture, offering insights into network, application, and cloud security.Listen to the podcast



  
📘 Architecting Success: The Art of Soft Skills in Technical SalesEvgeniy Kharam's book emphasizes the importance of soft skills in technical sales and provides strategies to enhance communication and build trust. Get the book on Amazon



  
🧠 Soft Skills TechEvgeniy's platform is dedicated to coaching and resources on soft skills in the tech industry. Explore Soft Skills Tech



  
🏢 EK Cyber and Media ConsultingA consulting firm founded by Evgeniy Kharam, offering services in cybersecurity and media for vendors and MSSPs. Visit EK Cyber and Media Consulting





  
📺 Interview with Evgeniy KharamAn in-depth interview exploring Evgeniy's journey and insights into cybersecurity. Watch on YouTube




About Evgeniy:

Evgeniy Kharam has worn nearly every hat in cybersecurity from firewall deployment engineer to VP of Architecture at the Herjavec Group, where he helped grow the team from 15 to over 300. Over two decades in the industry gave him a front-row seat to a recurring problem: great tech failing because no one knew how to explain it.

That realization led him to focus on something most security pros avoid talking about: soft skills. He’s now the author of Architecting Success: The Art of Soft Skills in Technical Sales, host of From Tech to Trust, and co-founder of the Security Architecture Podcast. He also moderates panels, hosts interviews, and advises on the board of the Canadian Cybersecurity Network.

Evgeniy blends technical depth with a human-first approach, whether running a ski-slope cybersecurity conference or helping vendors communicate like real people. He now leads his own consulting firm, where he guides cybersecurity companies through both architecture and storytelling.



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode summary: </strong></p>
<p>Security architect, podcast host, and author Evgeniy Kharam has seen it again and again: a company buys a shiny new security product, and a year later, it’s still sitting on the shelf. Not because it didn’t work, but because no one knew how to explain it, use it, or get buy-in.</p>
<p>That gap between buying and deploying, between knowing and communicating, is what pulled Evgeniy into his next chapter. After years in technical delivery and architecture, he realized that soft skills weren’t nice to have; they were survival tools.</p>
<p>In this episode, we talk about what happens when security teams can’t translate what they do, how marketers can meet them in the middle, and why metaphors (tents, dogs, houses, you’ll see) work. We get into RSA booth fatigue, Zoom call awkwardness, and what it takes to connect with someone who’s nodding along but completely lost.</p>
<p>Also: hummus etiquette, a three-year campaign to get Evgeniy to CyberMarketingCon, and his dream escape plan involving a shawarma truck.</p>
<p><br></p>
<p>🔗<strong> Links &amp; Resources</strong>:</p>
<ul>
  <li>
<p>🎙️ <strong>Security Architecture Podcast</strong>Co-hosted by Evgeniy Kharam and Dmitry Raidman, this podcast delves into cybersecurity architecture, offering insights into network, application, and cloud security.<a href="https://www.security-architecture.org/"><u>Listen to the podcast</u></a></p>
</li>
  <li>
<p>📘 <strong>Architecting Success: The Art of Soft Skills in Technical Sales</strong>Evgeniy Kharam's book emphasizes the importance of soft skills in technical sales and provides strategies to enhance communication and build trust.<a href="https://www.amazon.com/Architecting-Success-Skills-Technical-Connect/dp/1998503003"> <u>Get the book on Amazon</u></a></p>
</li>
  <li>
<p>🧠 <strong>Soft Skills Tech</strong>Evgeniy's platform is dedicated to coaching and resources on soft skills in the tech industry. <a href="https://www.softskillstech.ca/"><u>Explore Soft Skills Tech</u></a></p>
</li>
  <li>
<p>🏢 <strong>EK Cyber and Media Consulting</strong>A consulting firm founded by Evgeniy Kharam, offering services in cybersecurity and media for vendors and MSSPs. <a href="https://www.linkedin.com/company/ek-cyber-and-media-consulting"><u>Visit EK Cyber and Media Consulting</u></a></p>
</li>
</ul>
<ul>
  <li>
<p>📺 <strong>Interview with Evgeniy Kharam</strong>An in-depth interview exploring Evgeniy's journey and insights into cybersecurity.<a href="https://www.youtube.com/watch?v=5vgXaKr9QSk"> <u>Watch on YouTube</u></a></p>
</li>
</ul>
<p><strong>About Evgeniy:</strong></p>
<p>Evgeniy Kharam has worn nearly every hat in cybersecurity from firewall deployment engineer to VP of Architecture at the Herjavec Group, where he helped grow the team from 15 to over 300. Over two decades in the industry gave him a front-row seat to a recurring problem: great tech failing because no one knew how to explain it.</p>
<p>That realization led him to focus on something most security pros avoid talking about: soft skills. He’s now the author of <em>Architecting Success: The Art of Soft Skills in Technical Sales</em>, host of <em>From Tech to Trust</em>, and co-founder of the <em>Security Architecture Podcast</em>. He also moderates panels, hosts interviews, and advises on the board of the Canadian Cybersecurity Network.</p>
<p>Evgeniy blends technical depth with a human-first approach, whether running a ski-slope cybersecurity conference or helping vendors communicate like real people. He now leads his own consulting firm, where he guides cybersecurity companies through both architecture <em>and</em> storytelling.</p>
<p><br></p>
<p><strong>Subscribe &amp; Review</strong>:</p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><strong>Follow the Hosts</strong>:</p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br></p>]]>
      </content:encoded>
      <itunes:duration>2282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dcf6c472-58dc-11f0-82b7-33f387be6005]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5937500248.mp3?updated=1751636908" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scrappy Then, Strategic Now: The Evolution of a Cybersecurity CMO</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/169/notes</link>
      <description>Most first marketers don’t stay long enough to see scale. Thomas LeDuc did. Six years in, he’s still at Semperis, leading a 35-person marketing team and showing it’s possible to evolve from scrappy to strategic.

Gianna and Charles explore what makes that kind of longevity possible: the mindset shifts, the habits that stuck, and the moments that nearly broke him. This episode is full of clarity, honesty, and the kind of leadership most people don’t talk about.

You’ll hear:


  Why growing with the company means unlearning just as much as learning.

  How Tom hires people who want the blank page, not the playbook

  What it takes to stop micromanaging and still care deeply

  The difference between culture as words and culture as actions

  How a team's passion project became a Braille space education initiative


This one will land if you’ve ever had to scale yourself while scaling a team.

🔗 Links &amp; Resources:

Semperis — ⁠semperis.com⁠ 

How to build a centaur: Semperis hits $100M ARR milestone: https://www.insightpartners.com/ideas/how-to-build-a-centaur-semperis-hits-100m-arr-milestone/

When Space Camp calls, you go! #ForceForGood https://www.youtube.com/watch?v=DEgz45b-RgA

⁠Webflow⁠ — No-code website builder

⁠Join the Cybersecurity Marketing Society⁠: Join our 3,700+ member Slack, find jobs, and get connected.

About Tom:

Tom LeDuc joined Semperis in 2019 as a scrappy marketer and helped scale the company from a few million ARR to now more than $100M ARR, reaching “centaur status” in 2024. Today, he leads a 35-person team as CMO, overseeing everything from brand and product marketing to demand gen, field programs, and built out the SDR program.

Before Semperis, he held leadership roles at Verodin (acquired by FireEye). He got his start in cybersecurity as a BDR at Securonix and played a big role in building several categories you’ve probably seen on Gartner quadrants.

Outside work, Tom is a dad of two young kiddos, makes indie films, travels a lot, and is very pro-dog.

Thomas LeDuc on ⁠LinkedIn

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: ⁠podcast@cybersecuritymarketingsociety.com⁠ 

Follow the Hosts:


  Gianna Whitver on ⁠LinkedIn⁠


  Charles Gold on ⁠LinkedIn⁠



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on ⁠our website⁠, main ⁠LinkedIn page⁠, ⁠Instagram⁠ page, or podcast ⁠LinkedIn⁠ page. 

See you in the next episode!</description>
      <pubDate>Wed, 02 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Scrappy Then, Strategic Now: The Evolution of a Cybersecurity CMO</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>169</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Most first marketers don’t stay long enough to see scale. Thomas LeDuc did. Six years in, he’s still at Semperis, leading a 35-person marketing team and showing it’s possible to evolve from scrappy to strategic.

Gianna and Charles explore what makes that kind of longevity possible: the mindset shifts, the habits that stuck, and the moments that nearly broke him. This episode is full of clarity, honesty, and the kind of leadership most people don’t talk about.

You’ll hear:


  Why growing with the company means unlearning just as much as learning.

  How Tom hires people who want the blank page, not the playbook

  What it takes to stop micromanaging and still care deeply

  The difference between culture as words and culture as actions

  How a team's passion project became a Braille space education initiative


This one will land if you’ve ever had to scale yourself while scaling a team.

🔗 Links &amp; Resources:

Semperis — ⁠semperis.com⁠ 

How to build a centaur: Semperis hits $100M ARR milestone: https://www.insightpartners.com/ideas/how-to-build-a-centaur-semperis-hits-100m-arr-milestone/

When Space Camp calls, you go! #ForceForGood https://www.youtube.com/watch?v=DEgz45b-RgA

⁠Webflow⁠ — No-code website builder

⁠Join the Cybersecurity Marketing Society⁠: Join our 3,700+ member Slack, find jobs, and get connected.

About Tom:

Tom LeDuc joined Semperis in 2019 as a scrappy marketer and helped scale the company from a few million ARR to now more than $100M ARR, reaching “centaur status” in 2024. Today, he leads a 35-person team as CMO, overseeing everything from brand and product marketing to demand gen, field programs, and built out the SDR program.

Before Semperis, he held leadership roles at Verodin (acquired by FireEye). He got his start in cybersecurity as a BDR at Securonix and played a big role in building several categories you’ve probably seen on Gartner quadrants.

Outside work, Tom is a dad of two young kiddos, makes indie films, travels a lot, and is very pro-dog.

Thomas LeDuc on ⁠LinkedIn

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: ⁠podcast@cybersecuritymarketingsociety.com⁠ 

Follow the Hosts:


  Gianna Whitver on ⁠LinkedIn⁠


  Charles Gold on ⁠LinkedIn⁠



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on ⁠our website⁠, main ⁠LinkedIn page⁠, ⁠Instagram⁠ page, or podcast ⁠LinkedIn⁠ page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Most first marketers don’t stay long enough to see scale. Thomas LeDuc did. Six years in, he’s still at Semperis, leading a 35-person marketing team and showing it’s possible to evolve from scrappy to strategic.</p>
<p>Gianna and Charles explore what makes that kind of longevity possible: the mindset shifts, the habits that stuck, and the moments that nearly broke him. This episode is full of clarity, honesty, and the kind of leadership most people don’t talk about.</p>
<p>You’ll hear:</p>
<ul>
  <li>Why growing with the company means unlearning just as much as learning.</li>
  <li>How Tom hires people who want the blank page, not the playbook</li>
  <li>What it takes to stop micromanaging and still care deeply</li>
  <li>The difference between culture as words and culture as actions</li>
  <li>How a team's passion project became a Braille space education initiative</li>
</ul>
<p>This one will land if you’ve ever had to scale yourself while scaling a team.</p>
<p><strong>🔗 Links &amp; Resources:</strong></p>
<p>Semperis — <a href="http://semperis.com/">⁠semperis.com⁠</a> </p>
<p>How to build a centaur: Semperis hits $100M ARR milestone: <a href="https://www.insightpartners.com/ideas/how-to-build-a-centaur-semperis-hits-100m-arr-milestone/">https://www.insightpartners.com/ideas/how-to-build-a-centaur-semperis-hits-100m-arr-milestone/</a></p>
<p>When Space Camp calls, you go! #ForceForGood <a href="https://www.youtube.com/watch?v=DEgz45b-RgA">https://www.youtube.com/watch?v=DEgz45b-RgA</a></p>
<p><a href="http://webflow.com/">⁠Webflow⁠</a> — No-code website builder</p>
<p><a href="http://cybersecuritymarketingsociety.com/">⁠Join the Cybersecurity Marketing Society⁠</a>: Join our 3,700+ member Slack, find jobs, and get connected.</p>
<p><strong>About Tom:</strong></p>
<p>Tom LeDuc joined Semperis in 2019 as a scrappy marketer and helped scale the company from a few million ARR to now more than $100M ARR, reaching “centaur status” in 2024. Today, he leads a 35-person team as CMO, overseeing everything from brand and product marketing to demand gen, field programs, and built out the SDR program.</p>
<p>Before Semperis, he held leadership roles at Verodin (acquired by FireEye). He got his start in cybersecurity as a BDR at Securonix and played a big role in building several categories you’ve probably seen on Gartner quadrants.</p>
<p>Outside work, Tom is a dad of two young kiddos, makes indie films, travels a lot, and is very pro-dog.</p>
<p>Thomas LeDuc on <a href="https://www.linkedin.com/in/t-leduc/">⁠LinkedIn</a></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">⁠<u>podcast@cybersecuritymarketingsociety.com</u>⁠</a> </p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver">⁠<u>LinkedIn</u>⁠</a>
</li>
  <li>Charles Gold on <a href="https://www.linkedin.com/in/charlesgold/">⁠<u>LinkedIn</u>⁠</a>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">⁠<u>our website</u>⁠</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">⁠<u>LinkedIn page</u>⁠</a>, <a href="https://www.instagram.com/cybermsociety/">⁠<u>Instagram</u>⁠</a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">⁠<u>LinkedIn</u>⁠</a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2097</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8bc93ba0-5334-11f0-bd04-6fc891e1005f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4706771394.mp3?updated=1751551084" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Founder-Led GTM in Cyber: How Taha Sajid Built Trust Without Selling</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/168/notes</link>
      <description>Episode Summary:

Let’s talk about telecom infrastructure: complex, overlooked, and still running on outdated tools most vendors were never built to secure. This episode, we’re joined by Taha Sajid, telecom security architect and founder of Xecurity Pulse, who’s on a mission to fix the gaps in enterprise tools.

From growing up in Pakistan to leading security efforts at Huawei and Comcast, Taha’s story is all about solving real-world problems, sharing what he’s learned, and pushing back against the copy-paste approach to infrastructure security. He breaks down how an education-first go-to-market (GTM) strategy helped him land his first customers and why understanding the telecom stack is critical to protecting what matters most.

We also get into:


  
The human factors that still break security programs



  
Bootcamps that turn into a pipeline



  
Solving problems vs. pushing tools



  
Plus, the school Taha dreams of building for kids who deserve better than the status quo education.




👉 If you’re selling technical solutions, building trust from scratch, or just tired of surface-level cyber talk, this one’s for you.



About Taha:

Taha Sajid is the founder of Xecurity Pulse, a cybersecurity company focused on solving the unique challenges in telecom security. With a rich background that includes roles at Huawei, Ufone, and Comcast, Taha has been at the forefront of implementing Zero Trust architectures across global networks.

He pioneered the first 5G Security Bootcamp, authored "The Ultimate Blockchain Security Handbook," and leads a YouTube channel that delves into the convergence of AI, security, and telecom. His contributions to standards bodies like NIST, 3GPP, and the Linux Foundation underscore his commitment to advancing global cybersecurity practices.

Beyond his technical endeavors, Taha is passionate about mentorship. He has guided numerous professionals through the EB1A visa process, drawing from his own successful experience. Through his X-LAB initiative, he continues to innovate, bridging the gap between critical infrastructure and modern security solutions.

Follow Taha on LinkedIn.



🔗 Links &amp; Resources:

🌐 Xecurity Pulse – Taha’s company focused on telecom security

📘 The Ultimate Blockchain Security Handbook – Book authored by Taha

Buy on Amazon

🧪 5G Security Bootcamp – Technical bootcamp designed and run by Taha

Explore the bootcamp

📺 Taha’s YouTube Channel – Deep dives on AI, security, and telecom

@XecurityPulse by Taha Sajid

🧠 X-LAB by Xecurity Pulse – Community + mentorship + tooling



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 25 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>Founder-Led GTM in Cyber: How Taha Sajid Built Trust Without Selling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>168</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Let’s talk about telecom infrastructure: complex, overlooked, and still running on outdated tools most vendors were never built to secure. This episode, we’re joined by Taha Sajid, telecom security architect and founder of Xecurity Pulse, who’s on a mission to fix the gaps in enterprise tools.

From growing up in Pakistan to leading security efforts at Huawei and Comcast, Taha’s story is all about solving real-world problems, sharing what he’s learned, and pushing back against the copy-paste approach to infrastructure security. He breaks down how an education-first go-to-market (GTM) strategy helped him land his first customers and why understanding the telecom stack is critical to protecting what matters most.

We also get into:


  
The human factors that still break security programs



  
Bootcamps that turn into a pipeline



  
Solving problems vs. pushing tools



  
Plus, the school Taha dreams of building for kids who deserve better than the status quo education.




👉 If you’re selling technical solutions, building trust from scratch, or just tired of surface-level cyber talk, this one’s for you.



About Taha:

Taha Sajid is the founder of Xecurity Pulse, a cybersecurity company focused on solving the unique challenges in telecom security. With a rich background that includes roles at Huawei, Ufone, and Comcast, Taha has been at the forefront of implementing Zero Trust architectures across global networks.

He pioneered the first 5G Security Bootcamp, authored "The Ultimate Blockchain Security Handbook," and leads a YouTube channel that delves into the convergence of AI, security, and telecom. His contributions to standards bodies like NIST, 3GPP, and the Linux Foundation underscore his commitment to advancing global cybersecurity practices.

Beyond his technical endeavors, Taha is passionate about mentorship. He has guided numerous professionals through the EB1A visa process, drawing from his own successful experience. Through his X-LAB initiative, he continues to innovate, bridging the gap between critical infrastructure and modern security solutions.

Follow Taha on LinkedIn.



🔗 Links &amp; Resources:

🌐 Xecurity Pulse – Taha’s company focused on telecom security

📘 The Ultimate Blockchain Security Handbook – Book authored by Taha

Buy on Amazon

🧪 5G Security Bootcamp – Technical bootcamp designed and run by Taha

Explore the bootcamp

📺 Taha’s YouTube Channel – Deep dives on AI, security, and telecom

@XecurityPulse by Taha Sajid

🧠 X-LAB by Xecurity Pulse – Community + mentorship + tooling



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Let’s talk about telecom infrastructure: complex, overlooked, and still running on outdated tools most vendors were never built to secure. This episode, we’re joined by Taha Sajid, telecom security architect and founder of Xecurity Pulse, who’s on a mission to fix the gaps in enterprise tools.</p>
<p>From growing up in Pakistan to leading security efforts at Huawei and Comcast, Taha’s story is all about solving real-world problems, sharing what he’s learned, and pushing back against the copy-paste approach to infrastructure security. He breaks down how an education-first go-to-market (GTM) strategy helped him land his first customers and why understanding the telecom stack is critical to protecting what matters most.</p>
<p>We also get into:</p>
<ul>
  <li>
<p>The human factors that still break security programs</p>
</li>
  <li>
<p>Bootcamps that turn into a pipeline</p>
</li>
  <li>
<p>Solving problems vs. pushing tools</p>
</li>
  <li>
<p>Plus, the school Taha dreams of building for kids who deserve better than the status quo education.</p>
</li>
</ul>
<p>👉 If you’re selling technical solutions, building trust from scratch, or just tired of surface-level cyber talk, this one’s for you.</p>
<p><br></p>
<p><strong>About Taha:</strong></p>
<p>Taha Sajid is the founder of Xecurity Pulse, a cybersecurity company focused on solving the unique challenges in telecom security. With a rich background that includes roles at Huawei, Ufone, and Comcast, Taha has been at the forefront of implementing Zero Trust architectures across global networks.</p>
<p>He pioneered the first 5G Security Bootcamp, authored "The Ultimate Blockchain Security Handbook," and leads a YouTube channel that delves into the convergence of AI, security, and telecom. His contributions to standards bodies like NIST, 3GPP, and the Linux Foundation underscore his commitment to advancing global cybersecurity practices.</p>
<p>Beyond his technical endeavors, Taha is passionate about mentorship. He has guided numerous professionals through the EB1A visa process, drawing from his own successful experience. Through his X-LAB initiative, he continues to innovate, bridging the gap between critical infrastructure and modern security solutions.</p>
<p>Follow Taha on <a href="https://www.linkedin.com/in/taha-sajid/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>🔗 Links &amp; Resources:</strong></p>
<p>🌐 <a href="https://xecuritypulse.com"><u>Xecurity Pulse</u></a> – Taha’s company focused on telecom security</p>
<p>📘 T<a href="https://www.amazon.com/dp/9390475988"><u>he Ultimate Blockchain Security Handbook</u></a> – Book authored by Taha</p>
<p>Buy on Amazon</p>
<p>🧪 <a href="https://xecuritypulse.com/bootcamps/"><u>5G Security Bootcamp</u></a> – Technical bootcamp designed and run by Taha</p>
<p>Explore the bootcamp</p>
<p>📺 <a href="https://www.youtube.com/@XecurityPulsebyTahaSajid"><u>Taha’s YouTube Channel</u></a> – Deep dives on AI, security, and telecom</p>
<p>@XecurityPulse by Taha Sajid</p>
<p>🧠 <a href="https://xecuritypulse.com/"><u>X-LAB by Xecurity Pulse</u></a> – Community + mentorship + tooling</p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria on LinkedIn</p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1906</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[496612be-4d04-11f0-b054-0bc6d59ef9e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7989032931.mp3?updated=1750774487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Free Forever, No BS: Inside Bitwarden’s Growth Playbook with Gary Orenstein</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/167/notes</link>
      <description>Episode Summary:

Most cybersecurity vendors lead with fear, gate their best features, and hide behind complexity. Bitwarden did the opposite and still won.

In this episode, Gianna and Maria sit down with Gary Orenstein, the Chief Customer Officer at Bitwarden, to break down how an open-source password manager with a “free forever” product became a trusted global brand across consumers and enterprises. No gimmicks. No fear-mongering. Just a strategy built on transparency, trust, and a product that actually works.

You’ll hear:


  
Why giving your product away can actually drive enterprise growth



  
How open source builds instant credibility and shortens sales cycles



  
The surprising emotional side of password security



  
What marketers should stop doing and what to try instead



  
How Bitwarden quietly created one of the most effective PLG motions in the industry




If you’re tired of the usual cybersecurity playbook, this episode is a refreshing—and useful—detour.

And yes, Gary’s dream job involves tiny foxes and national parks. Stick around for that.


🔗 Links &amp; Resources:

Bitwarden

Channel Islands National Park

Central Park’s surprisingly excellent Instagram
About Gary:

Gary Orenstein is the Chief Customer Officer at Bitwarden, leading go-to-market across customer success, marketing, and sales. He’s been deep in the infrastructure and data space for years, with leadership roles at companies like Yellowbrick Data, SingleStore, and Fusion-io (which went public during his time there). Earlier, he ran marketing at Compellent, which IPO’d and was later acquired by Dell.

Translation: Gary knows what it takes to build and scale trust, from scrappy startups to big exits.

He’s also got the academic chops to match: a bachelor’s from Dartmouth and an MBA from Wharton.

Follow Gary on LinkedIn
Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 
Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 18 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>Free Forever, No BS: Inside Bitwarden’s Growth Playbook with Gary Orenstein</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>167</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Most cybersecurity vendors lead with fear, gate their best features, and hide behind complexity. Bitwarden did the opposite and still won.

In this episode, Gianna and Maria sit down with Gary Orenstein, the Chief Customer Officer at Bitwarden, to break down how an open-source password manager with a “free forever” product became a trusted global brand across consumers and enterprises. No gimmicks. No fear-mongering. Just a strategy built on transparency, trust, and a product that actually works.

You’ll hear:


  
Why giving your product away can actually drive enterprise growth



  
How open source builds instant credibility and shortens sales cycles



  
The surprising emotional side of password security



  
What marketers should stop doing and what to try instead



  
How Bitwarden quietly created one of the most effective PLG motions in the industry




If you’re tired of the usual cybersecurity playbook, this episode is a refreshing—and useful—detour.

And yes, Gary’s dream job involves tiny foxes and national parks. Stick around for that.


🔗 Links &amp; Resources:

Bitwarden

Channel Islands National Park

Central Park’s surprisingly excellent Instagram
About Gary:

Gary Orenstein is the Chief Customer Officer at Bitwarden, leading go-to-market across customer success, marketing, and sales. He’s been deep in the infrastructure and data space for years, with leadership roles at companies like Yellowbrick Data, SingleStore, and Fusion-io (which went public during his time there). Earlier, he ran marketing at Compellent, which IPO’d and was later acquired by Dell.

Translation: Gary knows what it takes to build and scale trust, from scrappy startups to big exits.

He’s also got the academic chops to match: a bachelor’s from Dartmouth and an MBA from Wharton.

Follow Gary on LinkedIn
Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 
Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Most cybersecurity vendors lead with fear, gate their best features, and hide behind complexity. Bitwarden did the opposite and still won.</p>
<p>In this episode, Gianna and Maria sit down with Gary Orenstein, the Chief Customer Officer at Bitwarden, to break down how an open-source password manager with a “free forever” product became a trusted global brand across consumers and enterprises. No gimmicks. No fear-mongering. Just a strategy built on transparency, trust, and a product that actually works.</p>
<p>You’ll hear:</p>
<ul>
  <li>
<p>Why giving your product away can actually drive enterprise growth<br></p>
</li>
  <li>
<p>How open source builds instant credibility and shortens sales cycles<br></p>
</li>
  <li>
<p>The surprising emotional side of password security<br></p>
</li>
  <li>
<p>What marketers should stop doing and what to try instead<br></p>
</li>
  <li>
<p>How Bitwarden quietly created one of the most effective PLG motions in the industry</p>
</li>
</ul>
<p><strong>If you’re tired of the usual cybersecurity playbook, this episode is a refreshing—and useful—detour.</strong></p>
<p>And yes, Gary’s dream job involves tiny foxes and national parks. Stick around for that.</p>
<p>
🔗 <strong>Links &amp; Resources:</strong></p>
<p><a href="https://bitwarden.com"><u>Bitwarden</u></a></p>
<p><a href="https://www.nps.gov/chis/index.htm"><u>Channel Islands National Park</u></a></p>
<p><a href="https://www.instagram.com/centralparknyc/"><u>Central Park’s surprisingly excellent Instagram</u></a><br>
<strong>About Gary:</strong></p>
<p>Gary Orenstein is the Chief Customer Officer at Bitwarden, leading go-to-market across customer success, marketing, and sales. He’s been deep in the infrastructure and data space for years, with leadership roles at companies like Yellowbrick Data, SingleStore, and Fusion-io (which went public during his time there). Earlier, he ran marketing at Compellent, which IPO’d and was later acquired by Dell.</p>
<p>Translation: Gary knows what it takes to build and scale trust, from scrappy startups to big exits.</p>
<p>He’s also got the academic chops to match: a bachelor’s from Dartmouth and an MBA from Wharton.</p>
<p>Follow Gary on <a href="https://www.linkedin.com/in/garyorenstein/"><u>LinkedIn</u></a><br>
<strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> <br>
<strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria on LinkedIn</p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1795</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39019abc-4825-11f0-a8a1-af76068d8150]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4410615854.mp3?updated=1749798818" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside Tom Wentworth’s AI Stack: How to Automate the Stuff Marketers Hate</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/166/notes</link>
      <description>Episode Summary:

Tom Wentworth, CMO at Incident.io, got tired of doing the same stuff over and over, so he built AI agents to do it for him. Sales call summaries? Automated. Blog posts from discovery calls? Done in minutes. Battle cards? They update themselves.

He’s wiring together Slack, Notion, Zapier, Gong, and ChatGPT in ways that help his team move faster without adding headcount or complexity. There are no big declarations, just real systems that save time and don’t annoy people.

We talk about what’s working, what’s breaking, and how far you can push things without sounding like a robot. Also: cold plunges, prompt rage, and the Notion doc that’s 90 pages long.

🎧 Press play to hear how Tom stretches modern marketing ops with the right automation setup.



Links &amp; Resources Mentioned:


    

Incident.io


    

Gong


    

Zapier


    

ChatGPT


    

Notion


    

Slack


    

Common Room


    

Sanity CMS


    

11Labs (Voice AI)



About Tom:

Tom is a high-growth SaaS marketing leader with experience across enterprise GTM and product-led models. He writes occasionally about tech marketing at tomwentworth.com and previously hosted the Scaleup Marketing podcast.

Follow Tom on LinkedIn



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Charles Gold on LinkedIn 




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 11 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>Inside Tom Wentworth’s AI Stack: How to Automate the Stuff Marketers Hate</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>166</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

Tom Wentworth, CMO at Incident.io, got tired of doing the same stuff over and over, so he built AI agents to do it for him. Sales call summaries? Automated. Blog posts from discovery calls? Done in minutes. Battle cards? They update themselves.

He’s wiring together Slack, Notion, Zapier, Gong, and ChatGPT in ways that help his team move faster without adding headcount or complexity. There are no big declarations, just real systems that save time and don’t annoy people.

We talk about what’s working, what’s breaking, and how far you can push things without sounding like a robot. Also: cold plunges, prompt rage, and the Notion doc that’s 90 pages long.

🎧 Press play to hear how Tom stretches modern marketing ops with the right automation setup.



Links &amp; Resources Mentioned:


    

Incident.io


    

Gong


    

Zapier


    

ChatGPT


    

Notion


    

Slack


    

Common Room


    

Sanity CMS


    

11Labs (Voice AI)



About Tom:

Tom is a high-growth SaaS marketing leader with experience across enterprise GTM and product-led models. He writes occasionally about tech marketing at tomwentworth.com and previously hosted the Scaleup Marketing podcast.

Follow Tom on LinkedIn



Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 



Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Charles Gold on LinkedIn 




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>Tom Wentworth, CMO at Incident.io, got tired of doing the same stuff over and over, so he built AI agents to do it for him. Sales call summaries? Automated. Blog posts from discovery calls? Done in minutes. Battle cards? They update themselves.</p>
<p>He’s wiring together Slack, Notion, Zapier, Gong, and ChatGPT in ways that help his team move faster without adding headcount or complexity. There are no big declarations, just real systems that save time and don’t annoy people.</p>
<p>We talk about what’s working, what’s breaking, and how far you can push things without sounding like a robot. Also: cold plunges, prompt rage, and the Notion doc that’s 90 pages long.</p>
<p>🎧 Press play to hear how Tom stretches modern marketing ops with the right automation setup.</p>
<p><br></p>
<p><strong>Links &amp; Resources Mentioned:</strong></p>
<ul>
  <li>  </li>
<li><a href="https://incident.io"><u>Incident.io</u></a></li>

  <li>  </li>
<li><a href="https://www.gong.io"><u>Gong</u></a></li>

  <li>  </li>
<li><a href="https://zapier.com"><u>Zapier</u></a></li>

  <li>  </li>
<li><a href="https://chat.openai.com"><u>ChatGPT</u></a></li>

  <li>  </li>
<li><a href="https://www.notion.so"><u>Notion</u></a></li>

  <li>  </li>
<li><a href="https://slack.com"><u>Slack</u></a></li>

  <li>  </li>
<li><a href="https://www.commonroom.io"><u>Common Room</u></a></li>

  <li>  </li>
<li><a href="https://www.sanity.io"><u>Sanity CMS</u></a></li>

  <li>  </li>
<li><a href="https://www.elevenlabs.io"><u>11Labs (Voice AI)</u></a></li>

</ul>
<p><strong>About Tom:</strong></p>
<p>Tom is a high-growth SaaS marketing leader with experience across enterprise GTM and product-led models. He writes occasionally about tech marketing at<a href="https://tomwentworth.com"><u> tomwentworth.com</u></a> and previously hosted the Scaleup Marketing podcast.</p>
<p>Follow Tom on <a href="https://www.linkedin.com/in/twentworth/"><u>LinkedIn</u></a></p>
<p><br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Charles Gold on <a href="https://www.linkedin.com/in/charlesgold/"><u>LinkedIn</u></a> </p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>
<p><br>

</p>]]>
      </content:encoded>
      <itunes:duration>2293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c0dd3ac-4209-11f0-abe6-f30e10fdcbac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5690471515.mp3?updated=1749127292" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Hype to Human: Live from RSAC Conference with Alexandra Charikova</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/165/notes</link>
      <description>Episode Summary:

We’re back with a special episode recorded at RSAC 2025. The booths are packed up, and the leftover swag is gathering dust, but the real conversations are just getting started. 

Gianna and Maria sat down with Alexandra Charikova, Growth Marketing Manager at Escape and host of The Elephant in AppSec, to talk more about what marketing feels like right now with shifting teams, budget curveballs, and more noise than ever.

We got into the messy middle: navigating layoffs, budget cuts, and leadership turnover, all while still trying to show up, stand out, and connect with buyers. Alexandra shares why she’s officially anti-swag (and what’s in her expo survival kit instead), and we talk through what still works in 2025: human stories, smart content, and follow-up that doesn’t feel like a chore.

Also on the table are burnout, booth chaos, and how to make it through a conference without losing your mind. If you’ve ever been asked to “do more with less” or pitch a rebrand while the leadership team is changing around you… This one’s for you

Links &amp; Resources Mentioned:


  
Cybersecurity Marketing Society - Home of this podcast, and the community where cybersecurity marketers share ideas, swap stories, and figure things out together.



  
Escape - Alexandra’s day job. They help folks secure modern apps, and they’re hiring smart marketers too (probably).



  
The Elephant in AppSec - Alexandra’s podcast. Honest convos, strong opinions, and the kind of AppSec talk you want to hear.



  
CyberMarketingCon - The Society’s yearly in-person event, where the vibes are strong, the talks are real, and the hallway convos might just change your career.




About Alexandra:

Alexandra isn’t just curious, she’s driven by it. That curiosity has taken her across disciplines, from marketing and sales ops to engineering, data, and project management. What ties it all together? A love of solving complex problems, especially alongside smart, collaborative people.

Outside of her day-to-day work, Alexandra is all in on making application security more accessible and honest. She’s the host of The Elephant in AppSec, a podcast that asks tough questions and challenges how the industry talks about security.

She thrives on connection and is always up for a thoughtful chat or fresh perspective, so don’t be shy about reaching out.

Follow her on LinkedIn. Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 04 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>From Hype to Human: Live from RSAC Conference with Alexandra Charikova</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>165</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

We’re back with a special episode recorded at RSAC 2025. The booths are packed up, and the leftover swag is gathering dust, but the real conversations are just getting started. 

Gianna and Maria sat down with Alexandra Charikova, Growth Marketing Manager at Escape and host of The Elephant in AppSec, to talk more about what marketing feels like right now with shifting teams, budget curveballs, and more noise than ever.

We got into the messy middle: navigating layoffs, budget cuts, and leadership turnover, all while still trying to show up, stand out, and connect with buyers. Alexandra shares why she’s officially anti-swag (and what’s in her expo survival kit instead), and we talk through what still works in 2025: human stories, smart content, and follow-up that doesn’t feel like a chore.

Also on the table are burnout, booth chaos, and how to make it through a conference without losing your mind. If you’ve ever been asked to “do more with less” or pitch a rebrand while the leadership team is changing around you… This one’s for you

Links &amp; Resources Mentioned:


  
Cybersecurity Marketing Society - Home of this podcast, and the community where cybersecurity marketers share ideas, swap stories, and figure things out together.



  
Escape - Alexandra’s day job. They help folks secure modern apps, and they’re hiring smart marketers too (probably).



  
The Elephant in AppSec - Alexandra’s podcast. Honest convos, strong opinions, and the kind of AppSec talk you want to hear.



  
CyberMarketingCon - The Society’s yearly in-person event, where the vibes are strong, the talks are real, and the hallway convos might just change your career.




About Alexandra:

Alexandra isn’t just curious, she’s driven by it. That curiosity has taken her across disciplines, from marketing and sales ops to engineering, data, and project management. What ties it all together? A love of solving complex problems, especially alongside smart, collaborative people.

Outside of her day-to-day work, Alexandra is all in on making application security more accessible and honest. She’s the host of The Elephant in AppSec, a podcast that asks tough questions and challenges how the industry talks about security.

She thrives on connection and is always up for a thoughtful chat or fresh perspective, so don’t be shy about reaching out.

Follow her on LinkedIn. Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.

📩 Questions, feedback, or want to be a guest? Email: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>We’re back with a special episode recorded at RSAC 2025. The booths are packed up, and the leftover swag is gathering dust, but the real conversations are just getting started. </p>
<p>Gianna and Maria sat down with Alexandra Charikova, Growth Marketing Manager at<a href="https://escape.tech/"> <u>Escape</u></a> and host of<a href="https://podcasts.apple.com/us/podcast/the-elephant-in-appsec/id1776641598"> <u>The Elephant in AppSec</u></a>, to talk more about what marketing feels like right now with shifting teams, budget curveballs, and more noise than ever.</p>
<p>We got into the messy middle: navigating layoffs, budget cuts, and leadership turnover, all while still trying to show up, stand out, and connect with buyers. Alexandra shares why she’s officially anti-swag (and what’s in her expo survival kit instead), and we talk through what still works in 2025: human stories, smart content, and follow-up that doesn’t feel like a chore.</p>
<p>Also on the table are burnout, booth chaos, and how to make it through a conference without losing your mind. If you’ve ever been asked to “do more with less” or pitch a rebrand while the leadership team is changing around you… This one’s for you</p>
<p><strong>Links &amp; Resources Mentioned:</strong></p>
<ul>
  <li>
<p><a href="https://www.cybersecuritymarketingsociety.com"><u>Cybersecurity Marketing Society</u></a> - Home of this podcast, and the community where cybersecurity marketers share ideas, swap stories, and figure things out together.</p>
</li>
  <li>
<p><a href="https://escape.tech/"><u>Escape</u></a> - Alexandra’s day job. They help folks secure modern apps, and they’re hiring smart marketers too (probably).</p>
</li>
  <li>
<p><a href="https://www.youtube.com/@the-elephant-in-appsec"><u>The Elephant in AppSec</u></a> - Alexandra’s podcast. Honest convos, strong opinions, and the kind of AppSec talk you want to hear.</p>
</li>
  <li>
<p><a href="https://www.cybermarketingcon.com"><u>CyberMarketingCon</u></a> - The Society’s yearly in-person event, where the vibes are strong, the talks are real, and the hallway convos might just change your career.</p>
</li>
</ul>
<p><strong>About Alexandra:</strong></p>
<p>Alexandra isn’t just curious, she’s driven by it. That curiosity has taken her across disciplines, from marketing and sales ops to engineering, data, and project management. What ties it all together? A love of solving complex problems, especially alongside smart, collaborative people.</p>
<p>Outside of her day-to-day work, Alexandra is all in on making application security more accessible and honest. She’s the host of <em>The Elephant in AppSec</em>, a podcast that asks tough questions and challenges how the industry talks about security.</p>
<p>She thrives on connection and is always up for a thoughtful chat or fresh perspective, so don’t be shy about reaching out.</p>
<p>Follow her on <a href="https://www.linkedin.com/in/alexandra-charikova/"><u>LinkedIn</u></a>. <br><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating or review, it helps more marketers find the show.</p>
<p>📩 Questions, feedback, or want to be a guest? Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><strong>podcast@cybersecuritymarketingsociety.com</strong></a><strong> </strong></p>
<p><br><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on <a href="https://www.linkedin.com/in/giannawhitver"><u>LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1166</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fbb178da-3d70-11f0-92fe-0f1c8da5bb24]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9115184437.mp3?updated=1749055875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>EXCLUSIVE: Monster Trucks, Skeletons &amp; ROI: Torq CMO Don Jeter at RSAC</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/164/notes</link>
      <description>Episode Summary:

At RSAC 2025, most brands went sleek and high-speed: F1 cars, luxury lounges, big screens.

Torq showed up with a monster truck, a firey skeleton, and a single message: “SOAR is dead.”

It wasn’t a stunt; it was a fully realized creative campaign that stood out for all the right reasons. Thoughtful, bold, and totally out of left field, Torq’s RSAC Conference presence and brand philosophy drew comparisons to Wiz, widely regarded as the benchmark in cyber marketing excellence, from Forbes.

In this episode, Don Jeter, Torq's CMO, joins Gianna and Maria to unpack how a toy in a Costco aisle became the catalyst for a six-city Monster Jam tour, how off-the-cuff ideas turned into strategy, and why his team operates more like a jam band than a traditional marketing organization.

He also shares what it takes to build brands people care about and how that same creative-first mindset helped scale Pax8 from $5M to $1B.

Love this episode? Get more Don Jeter wisdom at CyberMarketingCon 2025, where he will give a keynote: Stop Marketing. Start World-Building.



Links &amp; Resources Mentioned:


  
Torq.io



  
Pax8




About Don:

CMO at Torq, former growth architect at Pax8, and possibly the only marketing leader to launch a six-city Monster Jam tour to prove a point. Don builds brands people don’t just notice, they remember.

He’s a startup native with a strong point of view, a jam-band approach to execution, and a reputation for turning “what if” into actual pipeline. Whether burying SOAR or rethinking the RSAC booth experience, Don leads with story, trusts creative instinct, and always bets on brand.

When he’s not working, he’s probably sketching sneakers, dodging longboards, or figuring out how to sneak a skeleton mascot into the next campaign.

Follow Don on LinkedIn. 

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating and review on your favorite podcast platform. It helps us grow the show and reach more cyber marketers like you!

📩 Got feedback or want to be a guest? Email us: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</description>
      <pubDate>Wed, 28 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>EXCLUSIVE: Monster Trucks, Skeletons &amp; ROI: Torq CMO Don Jeter at RSAC</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>164</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

At RSAC 2025, most brands went sleek and high-speed: F1 cars, luxury lounges, big screens.

Torq showed up with a monster truck, a firey skeleton, and a single message: “SOAR is dead.”

It wasn’t a stunt; it was a fully realized creative campaign that stood out for all the right reasons. Thoughtful, bold, and totally out of left field, Torq’s RSAC Conference presence and brand philosophy drew comparisons to Wiz, widely regarded as the benchmark in cyber marketing excellence, from Forbes.

In this episode, Don Jeter, Torq's CMO, joins Gianna and Maria to unpack how a toy in a Costco aisle became the catalyst for a six-city Monster Jam tour, how off-the-cuff ideas turned into strategy, and why his team operates more like a jam band than a traditional marketing organization.

He also shares what it takes to build brands people care about and how that same creative-first mindset helped scale Pax8 from $5M to $1B.

Love this episode? Get more Don Jeter wisdom at CyberMarketingCon 2025, where he will give a keynote: Stop Marketing. Start World-Building.



Links &amp; Resources Mentioned:


  
Torq.io



  
Pax8




About Don:

CMO at Torq, former growth architect at Pax8, and possibly the only marketing leader to launch a six-city Monster Jam tour to prove a point. Don builds brands people don’t just notice, they remember.

He’s a startup native with a strong point of view, a jam-band approach to execution, and a reputation for turning “what if” into actual pipeline. Whether burying SOAR or rethinking the RSAC booth experience, Don leads with story, trusts creative instinct, and always bets on brand.

When he’s not working, he’s probably sketching sneakers, dodging longboards, or figuring out how to sneak a skeleton mascot into the next campaign.

Follow Don on LinkedIn. 

Subscribe &amp; Review:

Enjoyed this episode? Leave us a ⭐ rating and review on your favorite podcast platform. It helps us grow the show and reach more cyber marketers like you!

📩 Got feedback or want to be a guest? Email us: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:


  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page. 

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>At RSAC 2025, most brands went sleek and high-speed: F1 cars, luxury lounges, big screens.</p>
<p>Torq showed up with a monster truck, a firey skeleton, and a single message: “SOAR is dead.”</p>
<p>It wasn’t a stunt; it was a fully realized creative campaign that stood out for all the right reasons. Thoughtful, bold, and<em> totally out of left field</em>, Torq’s RSAC Conference presence and brand philosophy drew comparisons to Wiz, widely regarded as the benchmark in cyber marketing excellence, <a href="https://www.forbes.com/sites/tonybradley/2025/04/24/carving-an-unconventional-new-lane-in-cybersecurity/"><u>from Forbes</u></a>.</p>
<p>In this episode, Don Jeter, Torq's CMO, joins Gianna and Maria to unpack how a toy in a Costco aisle became the catalyst for a six-city Monster Jam tour, how off-the-cuff ideas turned into strategy, and why his team operates more like a jam band than a traditional marketing organization.</p>
<p>He also shares what it takes to build brands people care about and how that same creative-first mindset helped scale Pax8 from $5M to $1B.</p>
<p>Love this episode? Get more Don Jeter wisdom at <a href="https://www.cybermarketingconference.com/"><u>CyberMarketingCon 2025</u></a>, where he will give a keynote:<em> Stop Marketing. Start World-Building.</em></p>
<p><br></p>
<p><strong>Links &amp; Resources Mentioned:</strong></p>
<ul>
  <li>
<p><a href="https://torq.io/"><u>Torq.io</u></a></p>
</li>
  <li>
<p><a href="https://www.pax8.com/"><u>Pax8</u></a></p>
</li>
</ul>
<p><strong>About Don:</strong></p>
<p>CMO at Torq, former growth architect at Pax8, and possibly the only marketing leader to launch a six-city Monster Jam tour to prove a point. Don builds brands people don’t just notice, they remember.</p>
<p>He’s a startup native with a strong point of view, a jam-band approach to execution, and a reputation for turning “what if” into actual pipeline. Whether burying SOAR or rethinking the RSAC booth experience, Don leads with story, trusts creative instinct, and always bets on brand.</p>
<p>When he’s not working, he’s probably sketching sneakers, dodging longboards, or figuring out how to sneak a skeleton mascot into the next campaign.</p>
<p>Follow Don on <a href="https://www.linkedin.com/in/goodmarketing/"><u>LinkedIn</u></a>. <br></p>
<p><strong>Subscribe &amp; Review:</strong></p>
<p>Enjoyed this episode? Leave us a ⭐ rating and review on your favorite podcast platform. It helps us grow the show and reach more cyber marketers like you!</p>
<p>📩 Got feedback or want to be a guest? Email us: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><strong>podcast@cybersecuritymarketingsociety.com</strong></a><strong> </strong></p>
<p><br><strong>Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on<a href="https://www.linkedin.com/in/giannawhitver"><u> LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page. </p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2738</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[da41b1e0-3a52-11f0-a553-df0fc9b4baf0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9471265714.mp3?updated=1748375187" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brian Goldfarb on Rebuilding a Legacy Brand…Without Losing Your Mind</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/163/notes</link>
      <description>Episode Summary:

This week, Gianna and Maria are joined by Brian Goldfarb, CMO at SolarWinds and a veteran of some of the biggest names in tech, including Google, Tenable, and Salesforce. But this isn’t your typical “lessons from the top” chat.

Brian gets real about what it takes to lead modern marketing orgs: how to decide what’s worth fixing, why marketers need to think more like operators, and what it’s like steering GTM at a legacy brand undergoing massive transformation.

We talk trust, storytelling, and the fine art of not panicking even when you lose your job and voice in the same week.

About Guest:

A full-stack marketing executive with deep experience across the GTM spectrum from product marketing and demand gen to PR/AR, digital, and strategy. Known for translating complex technical products into powerful, scalable marketing programs that drive real pipeline.

Brian has led marketing for developer tools, cloud platforms (Azure, AWS, Google Cloud), and high-growth cybersecurity and infrastructure companies. His portfolio spans web technologies, mobility, media (codecs, DRM), and ad platforms, focusing on developer and technical audiences.

He’s built and scaled global marketing engines, aligned field and digital efforts, and helped take emerging tech from concept to category leader. Whether launching a new cloud product or rebuilding a GTM motion from scratch, Brian brings sharp execution, clear narrative, and a deep understanding of what makes modern B2B marketing work.

Follow him on LinkedIn. 

Subscribe &amp; Review:
Enjoyed this episode? Leave us a ⭐ rating and review on your favorite podcast platform. It helps us grow the show and reach more cyber marketers like you!

Got feedback or want to join the pod? Email us: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:

Gianna Whitver on LinkedIn

Maria Velasquez on LinkedIn

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page, and keep up with us on X.

See you in the next episode!</description>
      <pubDate>Wed, 21 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Brian Goldfarb on Rebuilding a Legacy Brand…Without Losing Your Mind</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>163</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

This week, Gianna and Maria are joined by Brian Goldfarb, CMO at SolarWinds and a veteran of some of the biggest names in tech, including Google, Tenable, and Salesforce. But this isn’t your typical “lessons from the top” chat.

Brian gets real about what it takes to lead modern marketing orgs: how to decide what’s worth fixing, why marketers need to think more like operators, and what it’s like steering GTM at a legacy brand undergoing massive transformation.

We talk trust, storytelling, and the fine art of not panicking even when you lose your job and voice in the same week.

About Guest:

A full-stack marketing executive with deep experience across the GTM spectrum from product marketing and demand gen to PR/AR, digital, and strategy. Known for translating complex technical products into powerful, scalable marketing programs that drive real pipeline.

Brian has led marketing for developer tools, cloud platforms (Azure, AWS, Google Cloud), and high-growth cybersecurity and infrastructure companies. His portfolio spans web technologies, mobility, media (codecs, DRM), and ad platforms, focusing on developer and technical audiences.

He’s built and scaled global marketing engines, aligned field and digital efforts, and helped take emerging tech from concept to category leader. Whether launching a new cloud product or rebuilding a GTM motion from scratch, Brian brings sharp execution, clear narrative, and a deep understanding of what makes modern B2B marketing work.

Follow him on LinkedIn. 

Subscribe &amp; Review:
Enjoyed this episode? Leave us a ⭐ rating and review on your favorite podcast platform. It helps us grow the show and reach more cyber marketers like you!

Got feedback or want to join the pod? Email us: podcast@cybersecuritymarketingsociety.com 

Follow the Hosts:

Gianna Whitver on LinkedIn

Maria Velasquez on LinkedIn

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, main LinkedIn page, Instagram page, or podcast LinkedIn page, and keep up with us on X.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>This week, Gianna and Maria are joined by Brian Goldfarb, CMO at SolarWinds and a veteran of some of the biggest names in tech, including Google, Tenable, and Salesforce. But this isn’t your typical “lessons from the top” chat.</p>
<p>Brian gets real about what it takes to lead modern marketing orgs: how to decide what’s worth fixing, why marketers need to think more like operators, and what it’s like steering GTM at a legacy brand undergoing massive transformation.</p>
<p>We talk trust, storytelling, and the fine art of not panicking even when you lose your job and voice in the same week.</p>
<p><strong>About Guest:</strong></p>
<p>A full-stack marketing executive with deep experience across the GTM spectrum from product marketing and demand gen to PR/AR, digital, and strategy. Known for translating complex technical products into powerful, scalable marketing programs that drive real pipeline.</p>
<p>Brian has led marketing for developer tools, cloud platforms (Azure, AWS, Google Cloud), and high-growth cybersecurity and infrastructure companies. His portfolio spans web technologies, mobility, media (codecs, DRM), and ad platforms, focusing on developer and technical audiences.</p>
<p>He’s built and scaled global marketing engines, aligned field and digital efforts, and helped take emerging tech from concept to category leader. Whether launching a new cloud product or rebuilding a GTM motion from scratch, Brian brings sharp execution, clear narrative, and a deep understanding of what makes modern B2B marketing work.</p>
<p>Follow him on <a href="https://www.linkedin.com/in/bgold/"><u>LinkedIn</u></a>. </p>
<p><strong>Subscribe &amp; Review:</strong>
Enjoyed this episode? Leave us a ⭐ rating and review on your favorite podcast platform. It helps us grow the show and reach more cyber marketers like you!</p>
<p>Got feedback or want to join the pod? Email us: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><strong>podcast@cybersecuritymarketingsociety.com</strong></a><strong> </strong></p>
<p><strong>Follow the Hosts:</strong></p>
<p>Gianna Whitver on<a href="https://www.linkedin.com/in/giannawhitver"><u> LinkedIn</u></a></p>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a><br></p>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety"><u>X</u></a>.</p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2776</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a755a94-35ad-11f0-8489-47a956e77322]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7884082370.mp3?updated=1748012402" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Booths, Buzz, and B2B Brilliance: A Cyber Marketer’s Guide to RSAC 2025</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/162/notes</link>
      <description>Episode Summary:

We’re back from RSAC Conference 2025, and what a week it was! Gianna and Maria recap their third RSAC Conference rodeo in style in this live-recorded, post-conference edition of Breaking Through in Cybersecurity Marketing.



We break down the boldest, weirdest, and most wonderful marketing moments from the show floor (and the streets of San Francisco), including:


  
CrowdStrike’s genius geo-targeted Uber ads



  
Sweet Security’s literal singing swag truck



  
Wiz’s cloud security toy store (!!)



  
And Rubrik’s nostalgic retro arcade booth




We also launched something big: The Cybersecurity Marketing Practice, our brand-new advisory service for cyber founders and venture capitalists (VCs). We threw a sold-out marketer party, handed out coloring books at the Marketer Oasis, and supported early-stage startups through the AWS Cyber Accelerator.

Timestamps:00:29 – Live from the floor: our third RSAC, and it’s bigger than ever01:31 – RSAC’s rebrand: the “C” is for Community (and we’re here for it)02:25 – From live events to digital presence: how RSAC is evolving03:35 – Uber ads from CrowdStrike? B2B finally gets playful05:20 – Singing trucks &amp; yellow cups: Sweet Security stands out06:09 – Wiz’s Toy Store &amp; Rubrik’s retro arcade07:06 – CyberMarketingCon 2025: theme reveals–Marketing Time Machine07:50 – We launched something new: The Cybersecurity Marketing Practice09:38 – Talking to founders &amp; VCs: our GTM strategy braintrust10:23 – Our RSAC Party for Marketers: 220+ guests and community magic13:42 – CyberMarketingCon 2025: theme reveals–Marketing Time Machine (deep dive)14:27 – Foundations + Innovations: rebuilding cyber marketing from the ground up15:44 – Speaker preview: Connor from Amnis &amp; Don Jeter from Torq18:23 – Enter the Beautiful Booth Awards (by May 20!)

📢 What’s Next


  Product Marketing Workshop – Boston | July 2025


Led by Beth Barach, this half-day workshop is in-person and hands-on. Become a product marketing wiz. Reg. page will be live soon!


  CyberMarketingCon 2025 – Austin, TX


December 7–10, 2025 Get your ticket TODAY: cybermarketingconference.com

This year’s theme: Marketing Time Machine. Explore both the foundational skills and innovative tactics every cyber marketer needs now.


  Beautiful Booth Awards – Apply by May 20!


Flashy or scrappy, we celebrate smart booths of all sizes. Apply now. 

🔗 Links &amp; Resources:


  
Cybersecurity Marketing Society



  
CyberMarketingCon 2025



  
RSAC

🎧 Follow the Hosts:





  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or on our podcast LinkedIn page, and keep up with us on X.

See you in the next episode!</description>
      <pubDate>Wed, 14 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Booths, Buzz, and B2B Brilliance: A Cyber Marketer’s Guide to RSAC 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>162</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

We’re back from RSAC Conference 2025, and what a week it was! Gianna and Maria recap their third RSAC Conference rodeo in style in this live-recorded, post-conference edition of Breaking Through in Cybersecurity Marketing.



We break down the boldest, weirdest, and most wonderful marketing moments from the show floor (and the streets of San Francisco), including:


  
CrowdStrike’s genius geo-targeted Uber ads



  
Sweet Security’s literal singing swag truck



  
Wiz’s cloud security toy store (!!)



  
And Rubrik’s nostalgic retro arcade booth




We also launched something big: The Cybersecurity Marketing Practice, our brand-new advisory service for cyber founders and venture capitalists (VCs). We threw a sold-out marketer party, handed out coloring books at the Marketer Oasis, and supported early-stage startups through the AWS Cyber Accelerator.

Timestamps:00:29 – Live from the floor: our third RSAC, and it’s bigger than ever01:31 – RSAC’s rebrand: the “C” is for Community (and we’re here for it)02:25 – From live events to digital presence: how RSAC is evolving03:35 – Uber ads from CrowdStrike? B2B finally gets playful05:20 – Singing trucks &amp; yellow cups: Sweet Security stands out06:09 – Wiz’s Toy Store &amp; Rubrik’s retro arcade07:06 – CyberMarketingCon 2025: theme reveals–Marketing Time Machine07:50 – We launched something new: The Cybersecurity Marketing Practice09:38 – Talking to founders &amp; VCs: our GTM strategy braintrust10:23 – Our RSAC Party for Marketers: 220+ guests and community magic13:42 – CyberMarketingCon 2025: theme reveals–Marketing Time Machine (deep dive)14:27 – Foundations + Innovations: rebuilding cyber marketing from the ground up15:44 – Speaker preview: Connor from Amnis &amp; Don Jeter from Torq18:23 – Enter the Beautiful Booth Awards (by May 20!)

📢 What’s Next


  Product Marketing Workshop – Boston | July 2025


Led by Beth Barach, this half-day workshop is in-person and hands-on. Become a product marketing wiz. Reg. page will be live soon!


  CyberMarketingCon 2025 – Austin, TX


December 7–10, 2025 Get your ticket TODAY: cybermarketingconference.com

This year’s theme: Marketing Time Machine. Explore both the foundational skills and innovative tactics every cyber marketer needs now.


  Beautiful Booth Awards – Apply by May 20!


Flashy or scrappy, we celebrate smart booths of all sizes. Apply now. 

🔗 Links &amp; Resources:


  
Cybersecurity Marketing Society



  
CyberMarketingCon 2025



  
RSAC

🎧 Follow the Hosts:





  
Gianna Whitver on LinkedIn



  
Maria Velasquez on LinkedIn




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, our Instagram page, or on our podcast LinkedIn page, and keep up with us on X.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>We’re back from RSAC Conference 2025, and what a week it was! Gianna and Maria recap their third RSAC Conference rodeo in style in this live-recorded, post-conference edition of Breaking Through in Cybersecurity Marketing.</p>
<p><br></p>
<p>We break down the boldest, weirdest, and most wonderful marketing moments from the show floor (and the streets of San Francisco), including:</p>
<ul>
  <li>
<p><a href="https://www.crowdstrike.com/en-us/"><u>CrowdStrike</u></a>’s genius geo-targeted Uber ads<br></p>
</li>
  <li>
<p><a href="https://www.sweet.security/"><u>Sweet Security</u></a>’s literal singing swag truck<br></p>
</li>
  <li>
<p><a href="https://www.wiz.io/"><u>Wiz</u></a>’s cloud security toy store (!!)<br></p>
</li>
  <li>
<p>And <a href="https://www.rubrik.com/"><u>Rubrik</u></a>’s nostalgic retro arcade booth</p>
</li>
</ul>
<p>We also launched something big: The Cybersecurity Marketing Practice, our brand-new advisory service for cyber founders and venture capitalists (VCs). We threw a sold-out marketer party, handed out coloring books at the Marketer Oasis, and supported early-stage startups through the AWS Cyber Accelerator.</p>
<p><strong>Timestamps:</strong><br>00:29 – Live from the floor: our third RSAC, and it’s bigger than ever<br>01:31 – RSAC’s rebrand: the “C” is for Community (and we’re here for it)<br>02:25 – From live events to digital presence: how RSAC is evolving<br>03:35 – Uber ads from CrowdStrike? B2B finally gets playful<br>05:20 – Singing trucks &amp; yellow cups: Sweet Security stands out<br>06:09 – Wiz’s Toy Store &amp; Rubrik’s retro arcade<br>07:06 – CyberMarketingCon 2025: theme reveals–Marketing Time Machine<br>07:50 – We launched something new: The Cybersecurity Marketing Practice<br>09:38 – Talking to founders &amp; VCs: our GTM strategy braintrust<br>10:23 – Our RSAC Party for Marketers: 220+ guests and community magic<br>13:42 – CyberMarketingCon 2025: theme reveals–Marketing Time Machine (deep dive)<br>14:27 – Foundations + Innovations: rebuilding cyber marketing from the ground up<br>15:44 – Speaker preview: Connor from Amnis &amp; Don Jeter from Torq<br>18:23 – Enter the Beautiful Booth Awards (by May 20!)</p>
<p><strong>📢 What’s Next</strong></p>
<ul>
  <li><strong>Product Marketing Workshop – Boston | July 2025</strong></li>
</ul>
<p>Led by <a href="https://www.linkedin.com/in/bethbarach/"><u>Beth Barach</u></a>, this half-day workshop is in-person and hands-on. Become a product marketing wiz. Reg. page will be live soon!</p>
<ul>
  <li><strong>CyberMarketingCon 2025 – Austin, TX</strong></li>
</ul>
<p>December 7–10, 2025 Get your ticket TODAY: <a href="https://cybermarketingconference.com"><u>cybermarketingconference.com</u></a></p>
<p>This year’s theme: <em>Marketing Time Machine. </em>Explore both the foundational skills and innovative tactics every cyber marketer needs now.</p>
<ul>
  <li><strong>Beautiful Booth Awards – Apply by May 20!</strong></li>
</ul>
<p>Flashy or scrappy, we celebrate smart booths of all sizes. Apply<a href="https://www.cybersecuritymarketingsociety.com/beautiful-booth-awards"><u> now.</u></a> </p>
<p><strong>🔗 Links &amp; Resources:</strong></p>
<ul>
  <li>
<p><a href="https://www.cybersecuritymarketingsociety.com"><u>Cybersecurity Marketing Society</u><br></a></p>
</li>
  <li>
<p><a href="https://cybermarketingconference.com"><u>CyberMarketingCon 2025</u><br></a></p>
</li>
  <li>
<p><a href="https://www.rsaconference.com/"><u>RSAC</u></a></p>
<p><strong>🎧 Follow the Hosts:</strong></p>
</li>
</ul>
<ul>
  <li>
<p>Gianna Whitver on<a href="https://www.linkedin.com/in/giannawhitver"><u> LinkedIn</u></a></p>
</li>
  <li>
<p>Maria Velasquez on <a href="https://www.linkedin.com/in/maria-vepa/"><u>LinkedIn</u></a></p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, our <a href="https://www.instagram.com/cybermsociety/"><u>Instagram</u></a> page, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety"><u>X</u></a>.</p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be94f88a-2ce7-11f0-983e-d75aeaab37e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6151982384.mp3?updated=1747341109" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CMO Who Runs Toward the Fire: Marc Blackmer on Messy Startups and Honest Leadership</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/161/notes</link>
      <description>Episode Summary:

From Cisco to chaos (by choice), Marc Blackmer, CMO at Corero Network Security, joins us to unpack the real talk no one warns you about when you take the top marketing job.

In this episode, Gianna and Charles sit down with Marc to unpack the real, raw, and hilarious side of marketing leadership. From walking away from Cisco to jumping back into the startup chaos, Marc shares with us why he needs a mess to clean up, how he builds teams that balance his creative chaos, and why telling the truth in interviews matters more than boasting about perks.

We discuss impostor syndrome, hiring to your weaknesses, and how ChatGPT became Marc’s idea dumping ground so he doesn’t drive his team crazy. And yes, there’s even a game that ends in a heartfelt tribute to Dave Grohl.

If you’ve ever felt like the only marketer in the room, making it up as you go, this episode is your support group.


  
03:41 – Welcome to Cyber CMO Confidential with Charles and Gianna



  
04:14 – Meet Marc Blackmer: radio voice, CMO, AI nerd, and ex-Cisco-er



  
05:38 – From Cisco comfort to startup chaos: Why Marc chooses the hard path



  
07:33 – How CyberMarketingCon made Marc quit his job (in a good way)



  
08:59 – The CMO’s lonely seat: finding your “board of directors”



  
11:28 – Building the right team: vibes, skills, and hiring to your weaknesses



  
13:52 – Why Marc tells candidates why not to take the job



  
18:35 – Owning your strengths and learning to recognize them



  
19:28 – Creative CMO meets operational team: How they balance each other



  
21:34 – Why ideas ≠ , action items, and how to avoid overwhelming your team



  
22:56 – Designing psychologically safe environments for input and ownership



  
26:11 – Creating teams people want to be on—and knowing when they’ll leave



  
28:33 – “Plagiarism saves time”: Building a culture of shared wisdom



  
28:49 – Game time! Fictional swaps and Dave Grohl admiration



  
32:20 – Where to find Marc and final thanks




About the guest: 

Marc Blackmer, Chief Marketing Officer, Corero Network Security

Marc Blackmer is a veteran of the cybersecurity and tech industries, with a career spanning enterprise giants like Cisco and early-stage startups such as ShardSecure. Now serving as CMO at Corero Network Security, Marc brings a unique blend of visionary creativity and operational grounding to his role. With a background in ICS (Industrial Control Systems), AI, and sales engineering, he has been acquired more than once, held a wide array of roles, from partner marketing to channel and IT, and lived to tell the tale.

🖇 Connect with Marc: 

🔗 LinkedIn 

🏢 Corero Network Security

📬 Get in Touch with us:

Want to be on CyberCMO Confidential? Email us at podcast@cybersecuritymarketingsociety.com 

🎧 Follow the Hosts:


  
Gianna Whitver on LinkedIn.



  
Charles Gold on LinkedIn.




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 07 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>The CMO Who Runs Toward the Fire: Marc Blackmer on Messy Startups and Honest Leadership</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>161</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

From Cisco to chaos (by choice), Marc Blackmer, CMO at Corero Network Security, joins us to unpack the real talk no one warns you about when you take the top marketing job.

In this episode, Gianna and Charles sit down with Marc to unpack the real, raw, and hilarious side of marketing leadership. From walking away from Cisco to jumping back into the startup chaos, Marc shares with us why he needs a mess to clean up, how he builds teams that balance his creative chaos, and why telling the truth in interviews matters more than boasting about perks.

We discuss impostor syndrome, hiring to your weaknesses, and how ChatGPT became Marc’s idea dumping ground so he doesn’t drive his team crazy. And yes, there’s even a game that ends in a heartfelt tribute to Dave Grohl.

If you’ve ever felt like the only marketer in the room, making it up as you go, this episode is your support group.


  
03:41 – Welcome to Cyber CMO Confidential with Charles and Gianna



  
04:14 – Meet Marc Blackmer: radio voice, CMO, AI nerd, and ex-Cisco-er



  
05:38 – From Cisco comfort to startup chaos: Why Marc chooses the hard path



  
07:33 – How CyberMarketingCon made Marc quit his job (in a good way)



  
08:59 – The CMO’s lonely seat: finding your “board of directors”



  
11:28 – Building the right team: vibes, skills, and hiring to your weaknesses



  
13:52 – Why Marc tells candidates why not to take the job



  
18:35 – Owning your strengths and learning to recognize them



  
19:28 – Creative CMO meets operational team: How they balance each other



  
21:34 – Why ideas ≠ , action items, and how to avoid overwhelming your team



  
22:56 – Designing psychologically safe environments for input and ownership



  
26:11 – Creating teams people want to be on—and knowing when they’ll leave



  
28:33 – “Plagiarism saves time”: Building a culture of shared wisdom



  
28:49 – Game time! Fictional swaps and Dave Grohl admiration



  
32:20 – Where to find Marc and final thanks




About the guest: 

Marc Blackmer, Chief Marketing Officer, Corero Network Security

Marc Blackmer is a veteran of the cybersecurity and tech industries, with a career spanning enterprise giants like Cisco and early-stage startups such as ShardSecure. Now serving as CMO at Corero Network Security, Marc brings a unique blend of visionary creativity and operational grounding to his role. With a background in ICS (Industrial Control Systems), AI, and sales engineering, he has been acquired more than once, held a wide array of roles, from partner marketing to channel and IT, and lived to tell the tale.

🖇 Connect with Marc: 

🔗 LinkedIn 

🏢 Corero Network Security

📬 Get in Touch with us:

Want to be on CyberCMO Confidential? Email us at podcast@cybersecuritymarketingsociety.com 

🎧 Follow the Hosts:


  
Gianna Whitver on LinkedIn.



  
Charles Gold on LinkedIn.




Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>From Cisco to chaos (by choice), Marc Blackmer, CMO at Corero Network Security, joins us to unpack the real talk no one warns you about when you take the top marketing job.</p>
<p>In this episode, Gianna and Charles sit down with Marc to unpack the real, raw, and hilarious side of marketing leadership. From walking away from Cisco to jumping back into the startup chaos, Marc shares with us why he needs a mess to clean up, how he builds teams that balance his creative chaos, and why telling the truth in interviews matters more than boasting about perks.</p>
<p>We discuss impostor syndrome, hiring to your weaknesses, and how ChatGPT became Marc’s idea dumping ground so he doesn’t drive his team crazy. And yes, there’s even a game that ends in a heartfelt tribute to Dave Grohl.</p>
<p>If you’ve ever felt like the only marketer in the room, making it up as you go, this episode is your support group.</p>
<ul>
  <li>
<p><strong>03:41</strong> – Welcome to Cyber CMO Confidential with Charles and Gianna<br></p>
</li>
  <li>
<p><strong>04:14</strong> – Meet Marc Blackmer: radio voice, CMO, AI nerd, and ex-Cisco-er<br></p>
</li>
  <li>
<p><strong>05:38</strong> – From Cisco comfort to startup chaos: Why Marc chooses the hard path<br></p>
</li>
  <li>
<p><strong>07:33</strong> – How CyberMarketingCon made Marc quit his job (in a good way)<br></p>
</li>
  <li>
<p><strong>08:59</strong> – The CMO’s lonely seat: finding your “board of directors”<br></p>
</li>
  <li>
<p><strong>11:28</strong> – Building the right team: vibes, skills, and hiring to your weaknesses<br></p>
</li>
  <li>
<p><strong>13:52</strong> – Why Marc tells candidates why <em>not</em> to take the job<br></p>
</li>
  <li>
<p><strong>18:35</strong> – Owning your strengths and learning to recognize them<br></p>
</li>
  <li>
<p><strong>19:28</strong> – Creative CMO meets operational team: How they balance each other<br></p>
</li>
  <li>
<p><strong>21:34</strong> – Why ideas ≠ , action items, and how to avoid overwhelming your team<br></p>
</li>
  <li>
<p><strong>22:56</strong> – Designing psychologically safe environments for input and ownership<br></p>
</li>
  <li>
<p><strong>26:11</strong> – Creating teams people <em>want</em> to be on—and knowing when they’ll leave<br></p>
</li>
  <li>
<p><strong>28:33</strong> – “Plagiarism saves time”: Building a culture of shared wisdom<br></p>
</li>
  <li>
<p><strong>28:49</strong> – Game time! Fictional swaps and Dave Grohl admiration<br></p>
</li>
  <li>
<p><strong>32:20</strong> – Where to find Marc and final thanks</p>
</li>
</ul>
<p><strong>About the guest: </strong></p>
<p><strong>Marc Blackmer, Chief Marketing Officer, Corero Network Security</strong></p>
<p>Marc Blackmer is a veteran of the cybersecurity and tech industries, with a career spanning enterprise giants like Cisco and early-stage startups such as ShardSecure. Now serving as CMO at<a href="https://www.corero.com"> <u>Corero Network Security</u></a>, Marc brings a unique blend of visionary creativity and operational grounding to his role. With a background in ICS (Industrial Control Systems), AI, and sales engineering, he has been acquired more than once, held a wide array of roles, from partner marketing to channel and IT, and lived to tell the tale.</p>
<p><strong>🖇 Connect with Marc</strong>: </p>
<p>🔗<a href="https://www.linkedin.com/in/marcblackmer"> <u>LinkedIn</u></a> </p>
<p>🏢<a href="https://www.corero.com"> <u>Corero Network Security</u></a></p>
<p><strong>📬 Get in Touch with us:</strong></p>
<p>Want to be on CyberCMO Confidential? Email us at <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><strong>🎧 Follow the Hosts:</strong></p>
<ul>
  <li>
<p>Gianna Whitver on<a href="https://www.linkedin.com/in/giannawhitver"><u> LinkedIn.</u></a></p>
</li>
  <li>
<p>Charles Gold on <a href="https://www.linkedin.com/in/charlesgold"><u>LinkedIn</u></a>.</p>
</li>
</ul>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety"><u>Twitter</u></a>.</p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1774</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77134256-275a-11f0-b432-57cdb8381550]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3376607626.mp3?updated=1746474831" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How VCs Spot GTM Red Flags (and the Marketer Hires That Actually Work)</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/160/notes</link>
      <description>Episode Summary:

What do VCs think about your GTM strategy? This week, Gianna and Maria chat with Asad Khaliq and Mark Kraynak, two of the founding members of Acrew Capital, about what it takes to build or break a go-to-market motion at an early-stage cyber startup.

Asad and Mark share how Acrew was founded, why they’re so focused on cyber and data, and what they’ve learned from backing some of the most well-known names in the industry. From hiring your first salesperson to avoiding “we stop threats” messaging, they’ve seen it all and they’re sharing the good, the bad, and the surprisingly funny.

Timestamps: 

01:55 – Founding Acrew: A venture firm built on thesis, collaboration, and trust. 

03:59 – The "green light" test: Would founders be happy to hear from us? 04:57 – Mark’s unexpected path: From poetry to product marketing to VC. 

06:36 – Storytelling, messaging, and the marketing power of poetry. 07:32 – Product positioning tips for startups: What words mean. 

08:59 – Messaging ≠ intent: Why it’s about what the customer hears. 10:01 – Asad’s entry into cyber through the software infrastructure. 

12:27 – Cyber + data = one GTM motion. 

13:50 – The hidden magic of cybersecurity and the infrastructure we forget. 

14:22 – GTM hiring tips: Why founders get the first sales—and what comes next. 

15:51 – Why hiring growth too early is a recipe for failure. 

16:47 – First marketing hire? Make it product, not growth. 

17:53 – How to find your double unicorns: Player-coach profiles &amp; product marketers. 

19:50 – The danger of over-automating with AI in outbound.

 21:04 – Standing out means going against the volume game. 

22:26 – Culture of experimentation: The new GTM advantage. 

24:22 – Channel deprecation: Email’s broken, ABM is back. 

26:42 – In-person &gt; inbox: Human connection is underrated. 

28:49 – Advice for marketers joining early-stage startups. 

31:40 – Vision and values: What to align on before joining a startup. 

32:44 – Red flags: Fundraising ≠ success 

34:52 – Lightning round: Best cyber website you’ve seen? 

37:26 – Shout-out to the Vanta marketing team



About the guest: 

Follow Asad on LinkedIn.

Follow Mark on LinkedIn. 

Follow Acrew Capital on LinkedIn or the website. 


💌 Feedback or Wanna Be on the Show?

 Email: podcast@cybersecuritymarketingsociety.com 



Follow your hosts on LinkedIn:

👉Gianna Whitver

👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 30 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>How VCs Spot GTM Red Flags (and the Marketer Hires That Actually Work)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:

What do VCs think about your GTM strategy? This week, Gianna and Maria chat with Asad Khaliq and Mark Kraynak, two of the founding members of Acrew Capital, about what it takes to build or break a go-to-market motion at an early-stage cyber startup.

Asad and Mark share how Acrew was founded, why they’re so focused on cyber and data, and what they’ve learned from backing some of the most well-known names in the industry. From hiring your first salesperson to avoiding “we stop threats” messaging, they’ve seen it all and they’re sharing the good, the bad, and the surprisingly funny.

Timestamps: 

01:55 – Founding Acrew: A venture firm built on thesis, collaboration, and trust. 

03:59 – The "green light" test: Would founders be happy to hear from us? 04:57 – Mark’s unexpected path: From poetry to product marketing to VC. 

06:36 – Storytelling, messaging, and the marketing power of poetry. 07:32 – Product positioning tips for startups: What words mean. 

08:59 – Messaging ≠ intent: Why it’s about what the customer hears. 10:01 – Asad’s entry into cyber through the software infrastructure. 

12:27 – Cyber + data = one GTM motion. 

13:50 – The hidden magic of cybersecurity and the infrastructure we forget. 

14:22 – GTM hiring tips: Why founders get the first sales—and what comes next. 

15:51 – Why hiring growth too early is a recipe for failure. 

16:47 – First marketing hire? Make it product, not growth. 

17:53 – How to find your double unicorns: Player-coach profiles &amp; product marketers. 

19:50 – The danger of over-automating with AI in outbound.

 21:04 – Standing out means going against the volume game. 

22:26 – Culture of experimentation: The new GTM advantage. 

24:22 – Channel deprecation: Email’s broken, ABM is back. 

26:42 – In-person &gt; inbox: Human connection is underrated. 

28:49 – Advice for marketers joining early-stage startups. 

31:40 – Vision and values: What to align on before joining a startup. 

32:44 – Red flags: Fundraising ≠ success 

34:52 – Lightning round: Best cyber website you’ve seen? 

37:26 – Shout-out to the Vanta marketing team



About the guest: 

Follow Asad on LinkedIn.

Follow Mark on LinkedIn. 

Follow Acrew Capital on LinkedIn or the website. 


💌 Feedback or Wanna Be on the Show?

 Email: podcast@cybersecuritymarketingsociety.com 



Follow your hosts on LinkedIn:

👉Gianna Whitver

👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Episode Summary:</strong></p>
<p>What do VCs think about your GTM strategy? This week, Gianna and Maria chat with Asad Khaliq and Mark Kraynak, two of the founding members of Acrew Capital, about what it takes to build or break a go-to-market motion at an early-stage cyber startup.</p>
<p>Asad and Mark share how Acrew was founded, why they’re so focused on cyber and data, and what they’ve learned from backing some of the most well-known names in the industry. From hiring your first salesperson to avoiding “we stop threats” messaging, they’ve seen it all and they’re sharing the good, the bad, and the surprisingly funny.</p>
<p><strong>Timestamps:</strong> </p>
<p>01:55 – Founding Acrew: A venture firm built on thesis, collaboration, and trust. </p>
<p>03:59 – The "green light" test: Would founders be happy to hear from us? 04:57 – Mark’s unexpected path: From poetry to product marketing to VC. </p>
<p>06:36 – Storytelling, messaging, and the marketing power of poetry. 07:32 – Product positioning tips for startups: What words mean. </p>
<p>08:59 – Messaging ≠ intent: Why it’s about what the customer hears. 10:01 – Asad’s entry into cyber through the software infrastructure. </p>
<p>12:27 – Cyber + data = one GTM motion. </p>
<p>13:50 – The hidden magic of cybersecurity and the infrastructure we forget. </p>
<p>14:22 – GTM hiring tips: Why founders get the first sales—and what comes next. </p>
<p>15:51 – Why hiring growth too early is a recipe for failure. </p>
<p>16:47 – First marketing hire? Make it product, not growth. </p>
<p>17:53 – How to find your double unicorns: Player-coach profiles &amp; product marketers. </p>
<p>19:50 – The danger of over-automating with AI in outbound.</p>
<p> 21:04 – Standing out means going against the volume game. </p>
<p>22:26 – Culture of experimentation: The new GTM advantage. </p>
<p>24:22 – Channel deprecation: Email’s broken, ABM is back. </p>
<p>26:42 – In-person &gt; inbox: Human connection is underrated. </p>
<p>28:49 – Advice for marketers joining early-stage startups. </p>
<p>31:40 – Vision and values: What to align on before joining a startup. </p>
<p>32:44 – Red flags: Fundraising ≠ success </p>
<p>34:52 – Lightning round: Best cyber website you’ve seen? </p>
<p>37:26 – Shout-out to the <a href="https://www.vanta.com"><u>Vanta </u></a>marketing team</p>
<p><br></p>
<p><strong>About the guest: </strong></p>
<p>Follow Asad on <a href="https://www.linkedin.com/in/asadkhaliq/"><u>LinkedIn</u></a>.</p>
<p>Follow Mark on <a href="https://www.linkedin.com/in/mark-kraynak/"><u>LinkedIn</u></a>. </p>
<p>Follow Acrew Capital on <a href="https://www.linkedin.com/company/acrew-capital/"><u>LinkedIn</u></a> or the <a href="https://www.acrewcapital.com/"><u>website</u></a>. 
</p>
<p><strong>💌 Feedback or Wanna Be on the Show?</strong></p>
<p> Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com"><u>podcast@cybersecuritymarketingsociety.com</u></a> </p>
<p><br></p>
<p><strong>Follow your hosts on LinkedIn:</strong></p>
<p>👉<a href="https://www.linkedin.com/in/giannawhitver/"><u>Gianna Whitver</u></a></p>
<p>👉<a href="https://www.linkedin.com/in/mariavelasquez1/"><u>Maria Velasquez</u></a></p>
<p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/"><u>our website</u></a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/"><u>LinkedIn page</u></a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"><u>LinkedIn</u></a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety"><u>Twitter</u></a>.</p>
<p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2670</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8b88b322-2504-11f0-8b41-335ac21c76a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2326705663.mp3?updated=1746024286" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Coach, Cut, or Course-Correct? Manny Ataebi on Leading Through the Tough Stuff</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/159/notes</link>
      <description>Episode Summary:
There’s one part of leadership no one prepares you for: the hard conversations. Whether it’s underperformance or misplaced potential, these conversations are uncomfortable but unavoidable. 

In this episode, Manny Ataebi, Demostack's CMO, gets brutally honest about how to achieve clarity, empathy, and zero regrets. He drops hard truths and heart-forward advice on managing performance, coaching with empathy, and making the tough calls when attitude isn't enough. From skip levels and PIPs to founders hiring out of FOMO, we cover it all with zero sugarcoating.
This one’s for the managers in the trenches. If you’ve ever wondered when to coach, when to cut, or how to protect your culture, Manny’s got answers. And stories. And probably a little tough love.

Timestamps:
01:25 – Manny’s framework: When underperformance happens, what's next?
03:19 – Coaching vs. wrong role: The stress factor and impact on team morale.
04:31 – Working with founders: early hiring mistakes, and how to fix them.
06:26 – Hiring smart for startups: work ethic, street smarts, and fire in the belly.
07:05 – The year-one review and spotting growth potential.
09:25 – Transitioning team members across roles: real stories and structure.
11:36 – Difficult conversations: why surprise = manager failure.
14:31 – Role play, real scenarios, and preparing your team for exec-level readiness.
16:42 – QBRs and letting team members lead in front of leadership.
18:36 – Different styles, different focus: how Manny adjusts his management approach.
22:19 – When it’s a motivation issue: Candy Crush and the “Farmville” effect.
24:35 – Self-improvement mindset: what separates strivers from coasters.
26:07 – Managing through pivots: startup vs. scale-up realities.
27:32 – The energy vampires of the team: Eeyores, excuses, and responsibility.
29:31 – Let them fail (a little): growth through discomfort.
30:25 –  Game Time! If Manny weren’t a CMO, what would he be?
32:10 – Life coach dreams, physical therapy passion, and a heart for helping others.
35:22 – Acting aspirations, fake film pitches, and final laughs.

About the guest: 
Follow Manny Ataebi on LinkedIn. 

Links &amp; Resources Mentioned:
Demostack
Cybersecurity Marketing Society
CyberMarketingCon

Upcoming Events:

RSAC 2025 Marketers Party
Sunday, April 27 – Vibes, wagyu, and every cybersecurity marketer you love. You know the drill.
 👉 RSVP now before it’s too late.

Subscribe &amp; Show Some Love: 
New episodes every Wednesday. Subscribe, leave a five-star review, and send this to a coworker playing Candy Crush during Zoom calls.

💌 Feedback or Wanna Be on the Show?
 Email: podcast@cybersecuritymarketingsociety.com 

Follow your hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 23 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title> Coach, Cut, or Course-Correct? Manny Ataebi on Leading Through the Tough Stuff</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>159</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
There’s one part of leadership no one prepares you for: the hard conversations. Whether it’s underperformance or misplaced potential, these conversations are uncomfortable but unavoidable. 

In this episode, Manny Ataebi, Demostack's CMO, gets brutally honest about how to achieve clarity, empathy, and zero regrets. He drops hard truths and heart-forward advice on managing performance, coaching with empathy, and making the tough calls when attitude isn't enough. From skip levels and PIPs to founders hiring out of FOMO, we cover it all with zero sugarcoating.
This one’s for the managers in the trenches. If you’ve ever wondered when to coach, when to cut, or how to protect your culture, Manny’s got answers. And stories. And probably a little tough love.

Timestamps:
01:25 – Manny’s framework: When underperformance happens, what's next?
03:19 – Coaching vs. wrong role: The stress factor and impact on team morale.
04:31 – Working with founders: early hiring mistakes, and how to fix them.
06:26 – Hiring smart for startups: work ethic, street smarts, and fire in the belly.
07:05 – The year-one review and spotting growth potential.
09:25 – Transitioning team members across roles: real stories and structure.
11:36 – Difficult conversations: why surprise = manager failure.
14:31 – Role play, real scenarios, and preparing your team for exec-level readiness.
16:42 – QBRs and letting team members lead in front of leadership.
18:36 – Different styles, different focus: how Manny adjusts his management approach.
22:19 – When it’s a motivation issue: Candy Crush and the “Farmville” effect.
24:35 – Self-improvement mindset: what separates strivers from coasters.
26:07 – Managing through pivots: startup vs. scale-up realities.
27:32 – The energy vampires of the team: Eeyores, excuses, and responsibility.
29:31 – Let them fail (a little): growth through discomfort.
30:25 –  Game Time! If Manny weren’t a CMO, what would he be?
32:10 – Life coach dreams, physical therapy passion, and a heart for helping others.
35:22 – Acting aspirations, fake film pitches, and final laughs.

About the guest: 
Follow Manny Ataebi on LinkedIn. 

Links &amp; Resources Mentioned:
Demostack
Cybersecurity Marketing Society
CyberMarketingCon

Upcoming Events:

RSAC 2025 Marketers Party
Sunday, April 27 – Vibes, wagyu, and every cybersecurity marketer you love. You know the drill.
 👉 RSVP now before it’s too late.

Subscribe &amp; Show Some Love: 
New episodes every Wednesday. Subscribe, leave a five-star review, and send this to a coworker playing Candy Crush during Zoom calls.

💌 Feedback or Wanna Be on the Show?
 Email: podcast@cybersecuritymarketingsociety.com 

Follow your hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>There’s one part of leadership no one prepares you for: the hard conversations. Whether it’s underperformance or misplaced potential, these conversations are uncomfortable but unavoidable. </p><p><br></p><p>In this episode, <a href="https://www.linkedin.com/in/mannyanyc/">Manny Ataebi</a>, <a href="https://www.linkedin.com/company/demostack/">Demostack</a>'s CMO, gets brutally honest about how to achieve clarity, empathy, and zero regrets. He drops hard truths and heart-forward advice on managing performance, coaching with empathy, and making the tough calls when attitude isn't enough. From skip levels and PIPs to founders hiring out of FOMO, we cover it all with zero sugarcoating.</p><p>This one’s for the managers in the trenches. If you’ve ever wondered when to coach, when to cut, or how to protect your culture, Manny’s got answers. And stories. And probably a little tough love.</p><p><br></p><h2><strong>Timestamps:</strong></h2><p><strong>01:25</strong> – Manny’s framework: When underperformance happens, what's next?</p><p><strong>03:19</strong> – Coaching vs. wrong role: The stress factor and impact on team morale.</p><p><strong>04:31</strong> – Working with founders: early hiring mistakes, and how to fix them.</p><p><strong>06:26</strong> – Hiring smart for startups: work ethic, street smarts, and fire in the belly.</p><p><strong>07:05</strong> – The year-one review and spotting growth potential.</p><p><strong>09:25</strong> – Transitioning team members across roles: real stories and structure.</p><p><strong>11:36</strong> – Difficult conversations: why surprise = manager failure.</p><p><strong>14:31</strong> – Role play, real scenarios, and preparing your team for exec-level readiness.</p><p><strong>16:42</strong> – QBRs and letting team members lead in front of leadership.</p><p><strong>18:36</strong> – Different styles, different focus: how Manny adjusts his management approach.</p><p><strong>22:19</strong> – When it’s a motivation issue: Candy Crush and the “Farmville” effect.</p><p><strong>24:35</strong> – Self-improvement mindset: what separates strivers from coasters.</p><p><strong>26:07</strong> – Managing through pivots: startup vs. scale-up realities.</p><p><strong>27:32</strong> – The energy vampires of the team: Eeyores, excuses, and responsibility.</p><p><strong>29:31</strong> – Let them fail (a little): growth through discomfort.</p><p><strong>30:25</strong> –  Game Time! If Manny weren’t a CMO, what would he be?</p><p><strong>32:10</strong> – Life coach dreams, physical therapy passion, and a heart for helping others.</p><p><strong>35:22</strong> – Acting aspirations, fake film pitches, and final laughs.</p><h3><br></h3><h2>About the guest: </h2><p>Follow <a href="https://www.linkedin.com/in/mannyanyc/">Manny Ataebi</a> on LinkedIn. </p><p><br></p><h2>Links &amp; Resources Mentioned:</h2><p><a href="https://www.demostack.com/">Demostack</a></p><p><a href="https://www.cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a></p><p><a href="https://www.cybermarketingconference.com/">CyberMarketingCon</a></p><h3><br></h3><h2>Upcoming Events:</h2><p><br></p><p><strong>RSAC 2025 Marketers Party</strong></p><p>S<em>unday, April 27</em> – Vibes, wagyu, and every cybersecurity marketer you love. You know the drill.</p><p> 👉<a href="https://www.cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2024"> RSVP now</a> before it’s too late.</p><p><br></p><h2>Subscribe &amp; Show Some Love: </h2><p>New episodes every Wednesday. Subscribe, leave a five-star review, and send this to a coworker playing Candy Crush during Zoom calls.</p><p><br></p><p><strong>💌 Feedback or Wanna Be on the Show?</strong></p><p> Email: <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p><h3><br></h3><h2>Follow your hosts on LinkedIn:</h2><p>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/mariavelasquez1/">Maria Velasquez</a></p><p><br></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2116</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[335bc140-1f6d-11f0-b48a-43ba45b23719]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5731051494.mp3?updated=1745338057" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chris Cochran on Marketing to an Audience That Doesn’t Trust You </title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/158/notes</link>
      <description>Episode Summary:
This week, we’re going full circle with the one and only Chris Cochran, VP of Marketing at AKA Identity and Founder of Audacious GTM. Chris is a former cybersecurity practitioner, Netflix threat intel lead, Marine Corps vet, and one of the original champions behind this very podcast.
Gianna and Maria sit down with Chris to trace his journey from the intelligence trenches to the marketing boardroom, blending creativity, psychology, and strategy. They talk about the unique challenges of marketing to cyber pros, bridging the gap between art and science, and the delicate dance between taste and truth in brand messaging. Chris also drops wisdom on authentic communication, building community with content, and why mutual benefit is the secret sauce of GTM.

Timestamps:
03:14 – From Marine Corps to NSA to Netflix: Chris’s practitioner roots
08:10 – Hacker Valley origins: How podcasting sparked a creative empire
12:35 – Joining the Society: The invite that changed everything
15:02 – Building brand and community at aka Identity
18:27 – Art + science: Chris’s marketing philosophy
22:15 – Empathy between marketers and practitioners
26:48 – Campaigns, AB testing, and dopamine hits
31:05 – Leading marketing teams and educating across the org
34:22 – Taste vs. truth: Internal feedback challenges
38:45 – Wins, video campaigns, and building for conversion
43:30 – Escaping cyber (briefly) and coming back home

📢 Upcoming Events:
CyberMarketingCon 2025 – Call for Speakers Open!
 🗓️ December 7–10, 2025 – Austin, TX
 📝 Submit by April 15th to share your brilliance with 700+ cyber marketing pros.

RSAC 2025 Marketers Party
 🎉 Sunday, April 27th – Food, friends, and fun with the Cybersecurity Marketing Society.
 🎟️ Tickets: cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2024

🔗 Links &amp; Resources Mentioned:

Audacious GTM

Cybersecurity Marketing Society

CyberMarketingCon

IDPro

Hacker Valley Media


🔔 Subscribe &amp; Review:
If this episode inspired you (or made you laugh), hit that subscribe button and leave us a ⭐⭐⭐⭐⭐ review on your favorite podcast app! It helps us bring you even more brilliant guests like Chris.

📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com

 Follow our hosts on LinkedIn:
👉 Gianna Whitver
👉 Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 16 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>Chris Cochran on Marketing to an Audience That Doesn’t Trust You </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>158</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
This week, we’re going full circle with the one and only Chris Cochran, VP of Marketing at AKA Identity and Founder of Audacious GTM. Chris is a former cybersecurity practitioner, Netflix threat intel lead, Marine Corps vet, and one of the original champions behind this very podcast.
Gianna and Maria sit down with Chris to trace his journey from the intelligence trenches to the marketing boardroom, blending creativity, psychology, and strategy. They talk about the unique challenges of marketing to cyber pros, bridging the gap between art and science, and the delicate dance between taste and truth in brand messaging. Chris also drops wisdom on authentic communication, building community with content, and why mutual benefit is the secret sauce of GTM.

Timestamps:
03:14 – From Marine Corps to NSA to Netflix: Chris’s practitioner roots
08:10 – Hacker Valley origins: How podcasting sparked a creative empire
12:35 – Joining the Society: The invite that changed everything
15:02 – Building brand and community at aka Identity
18:27 – Art + science: Chris’s marketing philosophy
22:15 – Empathy between marketers and practitioners
26:48 – Campaigns, AB testing, and dopamine hits
31:05 – Leading marketing teams and educating across the org
34:22 – Taste vs. truth: Internal feedback challenges
38:45 – Wins, video campaigns, and building for conversion
43:30 – Escaping cyber (briefly) and coming back home

📢 Upcoming Events:
CyberMarketingCon 2025 – Call for Speakers Open!
 🗓️ December 7–10, 2025 – Austin, TX
 📝 Submit by April 15th to share your brilliance with 700+ cyber marketing pros.

RSAC 2025 Marketers Party
 🎉 Sunday, April 27th – Food, friends, and fun with the Cybersecurity Marketing Society.
 🎟️ Tickets: cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2024

🔗 Links &amp; Resources Mentioned:

Audacious GTM

Cybersecurity Marketing Society

CyberMarketingCon

IDPro

Hacker Valley Media


🔔 Subscribe &amp; Review:
If this episode inspired you (or made you laugh), hit that subscribe button and leave us a ⭐⭐⭐⭐⭐ review on your favorite podcast app! It helps us bring you even more brilliant guests like Chris.

📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com

 Follow our hosts on LinkedIn:
👉 Gianna Whitver
👉 Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>This week, we’re going full circle with the one and only Chris Cochran, VP of Marketing at<a href="https://www.akaidentity.io/"> AKA Identity</a> and Founder of <a href="https://www.audaciousgtm.com/">Audacious GTM</a>. Chris is a former cybersecurity practitioner, Netflix threat intel lead, Marine Corps vet, and one of the original champions behind this very podcast.</p><p>Gianna and Maria sit down with Chris to trace his journey from the intelligence trenches to the marketing boardroom, blending creativity, psychology, and strategy. They talk about the unique challenges of marketing to cyber pros, bridging the gap between art and science, and the delicate dance between taste and truth in brand messaging. Chris also drops wisdom on authentic communication, building community with content, and why mutual benefit is the secret sauce of GTM.</p><h3><br></h3><h2>Timestamps:</h2><p>03:14 – From Marine Corps to NSA to Netflix: Chris’s practitioner roots</p><p>08:10 – Hacker Valley origins: How podcasting sparked a creative empire</p><p>12:35 – Joining the Society: The invite that changed everything</p><p>15:02 – Building brand and community at aka Identity</p><p>18:27 – Art + science: Chris’s marketing philosophy</p><p>22:15 – Empathy between marketers and practitioners</p><p>26:48 – Campaigns, AB testing, and dopamine hits</p><p>31:05 – Leading marketing teams and educating across the org</p><p>34:22 – Taste vs. truth: Internal feedback challenges</p><p>38:45 – Wins, video campaigns, and building for conversion</p><p>43:30 – Escaping cyber (briefly) and coming back home</p><h3><br></h3><h2>📢 Upcoming Events:</h2><p><strong>CyberMarketingCon 2025 – Call for Speakers Open!</strong></p><p> 🗓️ December 7–10, 2025 – Austin, TX</p><p> 📝 <a href="https://www.cybermarketingconference.com/speak">Submit </a>by April 15th to share your brilliance with 700+ cyber marketing pros.</p><p><br></p><p><strong>RSAC 2025 Marketers Party</strong></p><p> 🎉 Sunday, April 27th – Food, friends, and fun with the Cybersecurity Marketing Society.</p><p> 🎟️ Tickets:<a href="https://www.cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2024"> cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2024</a></p><h3><br></h3><h3>🔗 Links &amp; Resources Mentioned:</h3><ul>
<li><a href="https://www.linkedin.com/company/audacious-gtm/">Audacious GTM</a></li>
<li><a href="https://www.cybersecuritymarketingsociety.com">Cybersecurity Marketing Society</a></li>
<li><a href="https://www.cybermarketingconference.com">CyberMarketingCon</a></li>
<li><a href="https://idpro.org">IDPro</a></li>
<li><a href="https://www.hackervalley.com">Hacker Valley Media</a></li>
</ul><h3><br></h3><h2>🔔 Subscribe &amp; Review:</h2><p>If this episode inspired you (or made you laugh), hit that <strong>subscribe</strong> button and leave us a ⭐⭐⭐⭐⭐ review on your favorite podcast app! It helps us bring you even more brilliant guests like Chris.</p><p><br></p><p>📩 Got feedback or want to be on the show? Email us at <a href="mailto:podcast@cybersecuritymarketingsociety.comm">podcast@cybersecuritymarketingsociety.com</a></p><p><br></p><h2> Follow our hosts on LinkedIn:</h2><p>👉<a href="https://www.linkedin.com/in/giannawhitver"> Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/"> Maria Velasquez</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ed245bde-1944-11f0-aaa3-b715140614a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3575913226.mp3?updated=1744733536" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Why Brand Is the Secret Weapon for Cybersecurity CMOs with Jennifer Leggio </title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/157/notes</link>
      <description>The Cyber CMO Confidential is back, and we are starting with our favourite guest, Jennifer Leggio, Chief Strategy Officer at W2 Communications.

Jen’s back on the mic, taking us on her journey from cyber PR pro to CMO extraordinaire to brief, educational COO life. She understands why the brand isn’t just fluff but your secret growth engine. We break down how to talk about “the B-word” with a CFO who only wants more demo requests and explore why branding might just be your most powerful (and misunderstood) sales tool.

You’ll hear about the empathetic sale, how brand boosts pricing power, and why the buyer’s journey looks more like a bow tie than a funnel these days. If you care about brand, pipeline, or just surviving another board meeting, this one’s a must-listen.

Timestamps:
 01:04 – Guest intro: Jennifer Leggio, CSO at W2 Communications
 02:27 – Jen’s path to W2: From cyber PR to CMO to COO and back
 04:17 – “Brand is the new demand gen”: What that means
 05:40 – The empathetic sale: Qualify out as much as you qualify in
 07:31 – Talking about brand with your CEO and CFO
 09:00 – Real-life examples of brand influence (Carvana FTW)
 11:15 – Demo requests ≠ demand strategy
 13:09 – The bow tie journey: Reimagining the funnel
 14:48 – Turning brand wins into sales enablement and retention tools
 15:14 – Brand = pricing power: The Excedrin analogy
 16:06 – Why does a brand build trust and support for go-to-market
 17:14 – Brand’s impact on valuation and M&amp;A (Sourcefire story!)
 18:55 – Personal brand power and founder-led storytelling
 20:53 – Budgeting for brand: “Brandman” and the peanut butter cup
 23:02 – Using brand for customer retention and advocacy
 25:26 – ABX + brand = targeted impact

About the guest:
Jennifer Leggio is the chief strategy officer at W2 Communications and has been a longtime force in cybersecurity marketing and operations. With nearly 25 years in the game, she’s held leadership roles across the spectrum, VP of Comms, CMO, COO, and built a reputation for driving bold, strategic growth. Known for her sharp storytelling, no-fluff approach, and deep operational chops, Jen has helped scale, rebuild, and position companies for high-impact outcomes.
She’s also a frequent speaker at top industry conferences like DEF CON, RSA, and CyberMarketingCon, and pens columns for SecurityWeek that spotlight the human side of cyber business. Whether building revenue engines or challenging the status quo, Jen brings clarity, candor, and an unwavering focus on what works.

Upcoming Events:

RSAC 2025 Marketers Party
On Sunday, April 27th, join the Cybersecurity Marketing Society for the best pre-RSAC bash. Drinks, Wagyu, and all your GTM besties. 🎟 Get tickets here

CyberMarketingCon 2025 – CFP Open!
📝 CFP closes April 15th!

🔗 Links &amp; Resources Mentioned:

W2 Communications

Cybersecurity Marketing Society


Subscribe &amp; Review:
If you loved this episode, hit that subscribe button and leave us a review! It helps us grow and bring even more incredible guests your way.
📩 Got feedback or want to be on the show? Email us: podcast@cybersecuritymarketingsociety.com
 
Follow your hosts on LinkedIn:
👉 Gianna Whitver
👉 Charles Gold

Thanks for tuning in! We'll catch you next time on Cyber CMO Confidential.</description>
      <pubDate>Wed, 09 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>Why Brand Is the Secret Weapon for Cybersecurity CMOs with Jennifer Leggio </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>157</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Cyber CMO Confidential is back, and we are starting with our favourite guest, Jennifer Leggio, Chief Strategy Officer at W2 Communications.

Jen’s back on the mic, taking us on her journey from cyber PR pro to CMO extraordinaire to brief, educational COO life. She understands why the brand isn’t just fluff but your secret growth engine. We break down how to talk about “the B-word” with a CFO who only wants more demo requests and explore why branding might just be your most powerful (and misunderstood) sales tool.

You’ll hear about the empathetic sale, how brand boosts pricing power, and why the buyer’s journey looks more like a bow tie than a funnel these days. If you care about brand, pipeline, or just surviving another board meeting, this one’s a must-listen.

Timestamps:
 01:04 – Guest intro: Jennifer Leggio, CSO at W2 Communications
 02:27 – Jen’s path to W2: From cyber PR to CMO to COO and back
 04:17 – “Brand is the new demand gen”: What that means
 05:40 – The empathetic sale: Qualify out as much as you qualify in
 07:31 – Talking about brand with your CEO and CFO
 09:00 – Real-life examples of brand influence (Carvana FTW)
 11:15 – Demo requests ≠ demand strategy
 13:09 – The bow tie journey: Reimagining the funnel
 14:48 – Turning brand wins into sales enablement and retention tools
 15:14 – Brand = pricing power: The Excedrin analogy
 16:06 – Why does a brand build trust and support for go-to-market
 17:14 – Brand’s impact on valuation and M&amp;A (Sourcefire story!)
 18:55 – Personal brand power and founder-led storytelling
 20:53 – Budgeting for brand: “Brandman” and the peanut butter cup
 23:02 – Using brand for customer retention and advocacy
 25:26 – ABX + brand = targeted impact

About the guest:
Jennifer Leggio is the chief strategy officer at W2 Communications and has been a longtime force in cybersecurity marketing and operations. With nearly 25 years in the game, she’s held leadership roles across the spectrum, VP of Comms, CMO, COO, and built a reputation for driving bold, strategic growth. Known for her sharp storytelling, no-fluff approach, and deep operational chops, Jen has helped scale, rebuild, and position companies for high-impact outcomes.
She’s also a frequent speaker at top industry conferences like DEF CON, RSA, and CyberMarketingCon, and pens columns for SecurityWeek that spotlight the human side of cyber business. Whether building revenue engines or challenging the status quo, Jen brings clarity, candor, and an unwavering focus on what works.

Upcoming Events:

RSAC 2025 Marketers Party
On Sunday, April 27th, join the Cybersecurity Marketing Society for the best pre-RSAC bash. Drinks, Wagyu, and all your GTM besties. 🎟 Get tickets here

CyberMarketingCon 2025 – CFP Open!
📝 CFP closes April 15th!

🔗 Links &amp; Resources Mentioned:

W2 Communications

Cybersecurity Marketing Society


Subscribe &amp; Review:
If you loved this episode, hit that subscribe button and leave us a review! It helps us grow and bring even more incredible guests your way.
📩 Got feedback or want to be on the show? Email us: podcast@cybersecuritymarketingsociety.com
 
Follow your hosts on LinkedIn:
👉 Gianna Whitver
👉 Charles Gold

Thanks for tuning in! We'll catch you next time on Cyber CMO Confidential.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Cyber CMO Confidential is back, and we are starting with our favourite guest, <a href="https://www.linkedin.com/in/jenniferleggio">Jennifer Leggio</a>, Chief Strategy Officer at W2 Communications.</p><p><br></p><p>Jen’s back on the mic, taking us on her journey from cyber PR pro to CMO extraordinaire to brief, educational COO life. She understands why the brand isn’t just fluff but your secret growth engine. We break down how to talk about “the B-word” with a CFO who only wants more demo requests and explore why branding might just be your most powerful (and misunderstood) sales tool.</p><p><br></p><p>You’ll hear about the empathetic sale, how brand boosts pricing power, and why the buyer’s journey looks more like a bow tie than a funnel these days. If you care about brand, pipeline, or just surviving another board meeting, this one’s a must-listen.</p><h3><br></h3><h2>Timestamps:</h2><p> 01:04 – Guest intro: Jennifer Leggio, CSO at W2 Communications</p><p> 02:27 – Jen’s path to W2: From cyber PR to CMO to COO and back</p><p> 04:17 – “Brand is the new demand gen”: What that means</p><p> 05:40 – The empathetic sale: Qualify out as much as you qualify in</p><p> 07:31 – Talking about brand with your CEO and CFO</p><p> 09:00 – Real-life examples of brand influence (Carvana FTW)</p><p> 11:15 – Demo requests ≠ demand strategy</p><p> 13:09 – The bow tie journey: Reimagining the funnel</p><p> 14:48 – Turning brand wins into sales enablement and retention tools</p><p> 15:14 – Brand = pricing power: The Excedrin analogy</p><p> 16:06 – Why does a brand build trust and support for go-to-market</p><p> 17:14 – Brand’s impact on valuation and M&amp;A (Sourcefire story!)</p><p> 18:55 – Personal brand power and founder-led storytelling</p><p> 20:53 – Budgeting for brand: “Brandman” and the peanut butter cup</p><p> 23:02 – Using brand for customer retention and advocacy</p><p> 25:26 – ABX + brand = targeted impact</p><p><br></p><h2>About the guest:</h2><p>Jennifer Leggio is the chief strategy officer at W2 Communications and has been a longtime force in cybersecurity marketing and operations. With nearly 25 years in the game, she’s held leadership roles across the spectrum, VP of Comms, CMO, COO, and built a reputation for driving bold, strategic growth. Known for her sharp storytelling, no-fluff approach, and deep operational chops, Jen has helped scale, rebuild, and position companies for high-impact outcomes.</p><p>She’s also a frequent speaker at top industry conferences like DEF CON, RSA, and CyberMarketingCon, and pens columns for SecurityWeek that spotlight the human side of cyber business. Whether building revenue engines or challenging the status quo, Jen brings clarity, candor, and an unwavering focus on what works.</p><p><br></p><h2>Upcoming Events:</h2><p><br></p><p><strong>RSAC 2025 Marketers Party</strong></p><p>On Sunday, April 27th, join the Cybersecurity Marketing Society for the best pre-RSAC bash. Drinks, Wagyu, and all your GTM besties. 🎟<a href="https://www.cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2024"> Get tickets here</a></p><p><br></p><p><strong>CyberMarketingCon 2025 – CFP Open!</strong></p><p>📝 CFP closes <a href="https://www.cybermarketingconference.com/speak">April 15th</a>!</p><h3><br></h3><h3>🔗 Links &amp; Resources Mentioned:</h3><ul>
<li><a href="https://w2comm.com">W2 Communications</a></li>
<li><a href="https://www.cybersecuritymarketingsociety.com">Cybersecurity Marketing Society</a></li>
</ul><p><br></p><h2><strong>Subscribe &amp; Review:</strong></h2><p>If you loved this episode, hit that subscribe button and leave us a review! It helps us grow and bring even more incredible guests your way.</p><p>📩 Got feedback or want to be on the show? Email us: <strong>podcast@cybersecuritymarketingsociety.com</strong></p><p> </p><h2>Follow your hosts on LinkedIn:</h2><p>👉 <a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉 <a href="https://www.linkedin.com/in/charlesgold/">Charles Gold</a></p><p><br></p><p>Thanks for tuning in! We'll catch you next time on <em>Cyber CMO Confidential</em>.</p>]]>
      </content:encoded>
      <itunes:duration>1683</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4771783c-145a-11f0-8326-e7b47459f9cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4332574559.mp3?updated=1744118528" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The RevOps Whisperer: How Joe Aurilia Fixes the Stuff No One Wants to Touch</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/156/notes</link>
      <description>Episode Summary:
This week, we’ve got an extra special guest, Joe Aurilia, Jr., SVP of Operations at Cyware. Joining Gianna and Maria to talk more about the art of scaling, automating, and just plain getting stuff done. Joe takes us on a ride from being Cyware’s first U.S. hire (aka "the guinea pig") to building and overseeing every corner of operations from legal and IT to rev ops and marketing ops. 
We chat about how to spot and fix the messiest processes, why RevOps is the unsung hero of the GTM engine, and what happens when contracts, people, and data collide. Joe also drops gems on internal sales/marketing for change management, and we close out with his dream career as an ice cream shop owner.
Plus: purple dashboards, auctioneer aspirations, and a serious stance on free sprinkles.

Timestamps:
 03:02 - What even is "Operations"? Joe breaks it down.
 07:55 - Being Cyware’s first U.S. hire and building from scratch.
 10:10 - Automate and scale: Joe’s operational north star.
 13:48 - The birth of RevOps and tackling the mess no one else wants.
 18:12 - Walking through change across departments and people.
 22:44 - On avoiding fiefdoms and removing blockers.
 27:02 - Asana, tears of joy, and operational adoption.
 30:50 - Data integrity: The holy grail of RevOps.
 36:40 - Working with leadership and enabling decision-making.
 41:12 - Tactical wins to streamline GTM and shorten deal cycles.
 47:10 - Contracts as living documents and reducing friction. 

📢 Upcoming Events:

RSAC 2025 Marketers Party
Sunday, April 27th — Join the Cybersecurity Marketing Society for the best pre-RSAC bash with drinks, Wagyu, and your GTM friends. Get tickets at https://www.cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2024.

CyberMarketingCon 2025 – CFP Open!
Speak, learn, and network with 700+ marketers and GTM pros in Austin, TX. 🗓️ December 7–10, 2025 📝 CFP closes April 15th!

🔗Links &amp; Resources Mentioned:

Cyware

Asana

Cybersecurity Marketing Society

CyberMarketingCon25


🔔 Subscribe &amp; Review:
If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉 Gianna Whitver
👉 Maria Velasquez

Thanks for tuning in. Remember, every Wednesday, we drop a new episode guaranteed to knock your SOCs off. 😎</description>
      <pubDate>Wed, 02 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>The RevOps Whisperer: How Joe Aurilia Fixes the Stuff No One Wants to Touch</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
This week, we’ve got an extra special guest, Joe Aurilia, Jr., SVP of Operations at Cyware. Joining Gianna and Maria to talk more about the art of scaling, automating, and just plain getting stuff done. Joe takes us on a ride from being Cyware’s first U.S. hire (aka "the guinea pig") to building and overseeing every corner of operations from legal and IT to rev ops and marketing ops. 
We chat about how to spot and fix the messiest processes, why RevOps is the unsung hero of the GTM engine, and what happens when contracts, people, and data collide. Joe also drops gems on internal sales/marketing for change management, and we close out with his dream career as an ice cream shop owner.
Plus: purple dashboards, auctioneer aspirations, and a serious stance on free sprinkles.

Timestamps:
 03:02 - What even is "Operations"? Joe breaks it down.
 07:55 - Being Cyware’s first U.S. hire and building from scratch.
 10:10 - Automate and scale: Joe’s operational north star.
 13:48 - The birth of RevOps and tackling the mess no one else wants.
 18:12 - Walking through change across departments and people.
 22:44 - On avoiding fiefdoms and removing blockers.
 27:02 - Asana, tears of joy, and operational adoption.
 30:50 - Data integrity: The holy grail of RevOps.
 36:40 - Working with leadership and enabling decision-making.
 41:12 - Tactical wins to streamline GTM and shorten deal cycles.
 47:10 - Contracts as living documents and reducing friction. 

📢 Upcoming Events:

RSAC 2025 Marketers Party
Sunday, April 27th — Join the Cybersecurity Marketing Society for the best pre-RSAC bash with drinks, Wagyu, and your GTM friends. Get tickets at https://www.cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2024.

CyberMarketingCon 2025 – CFP Open!
Speak, learn, and network with 700+ marketers and GTM pros in Austin, TX. 🗓️ December 7–10, 2025 📝 CFP closes April 15th!

🔗Links &amp; Resources Mentioned:

Cyware

Asana

Cybersecurity Marketing Society

CyberMarketingCon25


🔔 Subscribe &amp; Review:
If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉 Gianna Whitver
👉 Maria Velasquez

Thanks for tuning in. Remember, every Wednesday, we drop a new episode guaranteed to knock your SOCs off. 😎</itunes:summary>
      <content:encoded>
        <![CDATA[<h3>Episode Summary:</h3><p>This week, we’ve got an extra special guest, <a href="https://www.linkedin.com/in/josephauriliajr/">Joe Aurilia, Jr</a>., SVP of Operations at <a href="https://www.linkedin.com/company/cyware/">Cyware</a>. Joining Gianna and Maria to talk more about the art of scaling, automating, and just plain getting stuff done. Joe takes us on a ride from being Cyware’s first U.S. hire (aka "the guinea pig") to building and overseeing every corner of operations from legal and IT to rev ops and marketing ops. </p><p>We chat about how to spot and fix the messiest processes, why RevOps is the unsung hero of the GTM engine, and what happens when contracts, people, and data collide. Joe also drops gems on internal sales/marketing for change management, and we close out with his dream career as an ice cream shop owner.</p><p>Plus: purple dashboards, auctioneer aspirations, and a serious stance on free sprinkles.</p><h3><br></h3><h3>Timestamps:</h3><p> 03:02 - What even is "Operations"? Joe breaks it down.</p><p> 07:55 - Being Cyware’s first U.S. hire and building from scratch.</p><p> 10:10 - Automate and scale: Joe’s operational north star.</p><p> 13:48 - The birth of RevOps and tackling the mess no one else wants.</p><p> 18:12 - Walking through change across departments and people.</p><p> 22:44 - On avoiding fiefdoms and removing blockers.</p><p> 27:02 - Asana, tears of joy, and operational adoption.</p><p> 30:50 - Data integrity: The holy grail of RevOps.</p><p> 36:40 - Working with leadership and enabling decision-making.</p><p> 41:12 - Tactical wins to streamline GTM and shorten deal cycles.</p><p> 47:10 - Contracts as living documents and reducing friction. </p><h3><br></h3><h3>📢 Upcoming Events:</h3><p><br></p><p><strong>RSAC 2025 Marketers Party</strong></p><p>Sunday, April 27th — Join the Cybersecurity Marketing Society for the best pre-RSAC bash with drinks, Wagyu, and your GTM friends. Get tickets at<a href="https://cybersecuritymarketingsociety.com"> https://www.cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2024.</a></p><p><br></p><p><strong>CyberMarketingCon 2025 – CFP Open!</strong></p><p>Speak, learn, and network with 700+ marketers and GTM pros in Austin, TX. 🗓️ December 7–10, 2025 📝 <a href="https://www.cybermarketingconference.com/speak">CFP closes April 15th!</a></p><p><br></p><h3>🔗Links &amp; Resources Mentioned:</h3><ul>
<li><a href="https://www.cyware.com/">Cyware</a></li>
<li><a href="https://asana.com/">Asana</a></li>
<li><a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a></li>
<li><a href="https://www.cybermarketingconference.com/">CyberMarketingCon25</a></li>
</ul><p><br></p><h3>🔔 Subscribe &amp; Review:</h3><p>If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!</p><p>📩 Got feedback or want to be on the show? Email us at <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p><p><br></p><h3>Be sure also to follow our hosts on LinkedIn:</h3><p>👉<a href="https://www.linkedin.com/in/giannawhitver"> Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-velasquez"> Maria Velasquez</a></p><p><br></p><p>Thanks for tuning in. Remember, <strong>every Wednesday</strong>, we drop a new episode guaranteed to knock your SOCs off. 😎</p>]]>
      </content:encoded>
      <itunes:duration>2001</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22214716-0bcb-11f0-96d7-775ac70f9263]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1369628316.mp3?updated=1743598984" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Run B2B Social Media Without Losing Your Mind (or Creativity) with Jacqui Morgan</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/155/notes</link>
      <description>Episode Summary:
Running social media isn’t easy; so many expectations and trade-offs. You need to be informative yet fun, creative yet professional, and engaging yet consistent, all while keeping things fresh. Even worse, when you manage a massive cybersecurity brand, it’s about more than just posting. It’s about making an impact in a sea of corporate noise. No one does that better than Jacqui Morgan, Global Social Lead at Palo Alto Networks.
Jacqui is the force behind high-impact, creative content that breaks through the typical B2B jargon and excites people about cybersecurity. In this episode, she pulls back the curtain on how her team strikes the perfect balance between strategy and spontaneity, why less can mean more, and how to inject personality into cybersecurity marketing. We also talk about big social media wins, some not-so-great flops, and her dream career outside of tech (hint: it’s delicious). 
If you’re ready to remove the boring in your B2B social strategy, this episode is for you!

Timestamps:
[05:15] Running a lean global team without losing creativity: Jacqui breaks down how her small-but-mighty team supports every part of Palo Alto Networks, balancing global regions, creative partners, and agencies while keeping their sanity.
[10:45] Less is more, cutting through the noise: How Jacqui prioritizes quality over quantity, scales back on low-impact requests, and positions the social team as strategic partners—not order takers.
[15:30] Making cybersecurity social fun: Why creativity is crucial, how her team injects personality into LinkedIn content, and their approach to standing out in a traditionally dry space.
[20:20] Agency partnerships done right: Jacqui shares how to transform agency relationships from transactional to true creative partnerships and how trust plays a key role.
[25:15] Campaign wins &amp; lessons from flops: Hear the story of a bold, standout campaign at a significant conference, plus a candid look at a past misstep and the lessons Jacqui walked away with.
[30:40] Getting leadership buy-in: Why building internal trust and strong relationships with executives, marketers, and sales teams is key to social media success.
[35:10] Jacqui’s dream career (hint: it’s delicious): We wrap up with her fun, non-tech dream job—and it’s something you might just want to visit one day.

🔗Links &amp; Resources Mentioned:

Palo Alto Networks on LinkedIn.

Jacqui Morgan on LinkedIn. 


📢 Upcoming Events:
🚀 Join us at the RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets here.

🔔 Subscribe &amp; Review:
If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 26 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>How to Run B2B Social Media Without Losing Your Mind (or Creativity) with Jacqui Morgan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>155</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
Running social media isn’t easy; so many expectations and trade-offs. You need to be informative yet fun, creative yet professional, and engaging yet consistent, all while keeping things fresh. Even worse, when you manage a massive cybersecurity brand, it’s about more than just posting. It’s about making an impact in a sea of corporate noise. No one does that better than Jacqui Morgan, Global Social Lead at Palo Alto Networks.
Jacqui is the force behind high-impact, creative content that breaks through the typical B2B jargon and excites people about cybersecurity. In this episode, she pulls back the curtain on how her team strikes the perfect balance between strategy and spontaneity, why less can mean more, and how to inject personality into cybersecurity marketing. We also talk about big social media wins, some not-so-great flops, and her dream career outside of tech (hint: it’s delicious). 
If you’re ready to remove the boring in your B2B social strategy, this episode is for you!

Timestamps:
[05:15] Running a lean global team without losing creativity: Jacqui breaks down how her small-but-mighty team supports every part of Palo Alto Networks, balancing global regions, creative partners, and agencies while keeping their sanity.
[10:45] Less is more, cutting through the noise: How Jacqui prioritizes quality over quantity, scales back on low-impact requests, and positions the social team as strategic partners—not order takers.
[15:30] Making cybersecurity social fun: Why creativity is crucial, how her team injects personality into LinkedIn content, and their approach to standing out in a traditionally dry space.
[20:20] Agency partnerships done right: Jacqui shares how to transform agency relationships from transactional to true creative partnerships and how trust plays a key role.
[25:15] Campaign wins &amp; lessons from flops: Hear the story of a bold, standout campaign at a significant conference, plus a candid look at a past misstep and the lessons Jacqui walked away with.
[30:40] Getting leadership buy-in: Why building internal trust and strong relationships with executives, marketers, and sales teams is key to social media success.
[35:10] Jacqui’s dream career (hint: it’s delicious): We wrap up with her fun, non-tech dream job—and it’s something you might just want to visit one day.

🔗Links &amp; Resources Mentioned:

Palo Alto Networks on LinkedIn.

Jacqui Morgan on LinkedIn. 


📢 Upcoming Events:
🚀 Join us at the RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets here.

🔔 Subscribe &amp; Review:
If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>Running social media isn’t easy; so many expectations and trade-offs. You need to be informative yet fun, creative yet professional, and engaging yet consistent, all while keeping things fresh. Even worse, when you manage a massive cybersecurity brand, it’s about more than just posting. It’s about making an impact in a sea of corporate noise. No one does that better than Jacqui Morgan, Global Social Lead at Palo Alto Networks.</p><p>Jacqui is the force behind high-impact, creative content that breaks through the typical B2B jargon and excites people about cybersecurity. In this episode, she pulls back the curtain on how her team strikes the perfect balance between strategy and spontaneity, why <em>less</em> can mean <em>more</em>, and how to inject personality into cybersecurity marketing. We also talk about big social media wins, some not-so-great flops, and her dream career outside of tech (hint: it’s delicious). </p><p>If you’re ready to remove the boring in your B2B social strategy, this episode is for you!</p><p><br></p><h2>Timestamps:</h2><p><strong>[05:15] Running a lean global team without losing creativity:</strong> Jacqui breaks down how her small-but-mighty team supports every part of Palo Alto Networks, balancing global regions, creative partners, and agencies while keeping their sanity.</p><p><strong>[10:45] Less is more, cutting through the noise:</strong> How Jacqui prioritizes quality over quantity, scales back on low-impact requests, and positions the social team as strategic partners—not order takers.</p><p><strong>[15:30]</strong> <strong>Making cybersecurity social fun: </strong>Why creativity is crucial, how her team injects personality into LinkedIn content, and their approach to standing out in a traditionally dry space.</p><p><strong>[20:20] Agency partnerships done right: </strong>Jacqui shares how to transform agency relationships from transactional to true creative partnerships and how trust plays a key role.</p><p><strong>[25:15] Campaign wins &amp; lessons from flops:</strong> Hear the story of a bold, standout campaign at a significant conference, plus a candid look at a past misstep and the lessons Jacqui walked away with.</p><p><strong>[30:40] Getting leadership buy-in: </strong>Why building internal trust and strong relationships with executives, marketers, and sales teams is key to social media success.</p><p><strong>[35:10] Jacqui’s dream career (hint: it’s delicious):</strong> We wrap up with her fun, non-tech dream job—and it’s something you might just want to visit one day.</p><p><br></p><h2>🔗Links &amp; Resources Mentioned:</h2><ul>
<li>Palo Alto Networks on <a href="https://www.linkedin.com/company/palo-alto-networks">LinkedIn</a>.</li>
<li>Jacqui Morgan on <a href="https://www.linkedin.com/in/jacquimorgan/">LinkedIn</a>. </li>
</ul><p><br></p><h2>📢 Upcoming Events:</h2><p>🚀 Join us at the RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets <a href="https://www.cybersecuritymarketingsociety.com/meet-ups/rsac-2025-party-for-marketers">here</a>.</p><p><br></p><h2>🔔 Subscribe &amp; Review:</h2><p>If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!</p><p>📩 Got feedback or want to be on the show? Email us at <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1716</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfa99a4a-04d9-11f0-9550-3f5ffbe7cf4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3881311366.mp3?updated=1742938521" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Why Founder-Led Marketing is the Future of Cybersecurity Awareness with Tatianna Harris</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/154/notes</link>
      <description>Episode Summary:
In cybersecurity marketing, messaging is everything, but what happens when your audience doesn’t understand your language?
This week, we sit down with Tatianna Harris, Head of Digital Marketing at EchoMark, to discuss the nuances of building brand awareness in a category that barely exists in the market’s vocabulary. From navigating the complexities of insider risk messaging to executing a founder-led thought leadership strategy, Tatianna shares what it takes to market cybersecurity solutions while wearing every marketing hat as a solo practitioner.

Timestamps:
 [03:12] - How Tatianna got her job at EchoMark through networking
 [06:40] - The power of word-of-mouth in career growth
 [09:55] - What EchoMark does and Tatianna’s role as a solo marketer
 [14:30] - Challenges of marketing at a cybersecurity startup
 [18:20] - Why EchoMark pivoted its messaging from “Forensic Watermarking” to “Invisible Watermarking”
 [22:45] - How Tatianna worked with leadership to change messaging
 [27:15] - Thought leadership and CEO-led marketing strategies
 [32:05] - How Tatianna prioritizes her time as the only marketer

🔗Links &amp; Resources Mentioned:
EchoMark on their Website or LinkedIn.
Follow Tatianna on LinkedIn. 

📢 Upcoming Events:
🚀 Join us at RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets here.

🔔 Subscribe &amp; Review:
If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 19 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>154</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
In cybersecurity marketing, messaging is everything, but what happens when your audience doesn’t understand your language?
This week, we sit down with Tatianna Harris, Head of Digital Marketing at EchoMark, to discuss the nuances of building brand awareness in a category that barely exists in the market’s vocabulary. From navigating the complexities of insider risk messaging to executing a founder-led thought leadership strategy, Tatianna shares what it takes to market cybersecurity solutions while wearing every marketing hat as a solo practitioner.

Timestamps:
 [03:12] - How Tatianna got her job at EchoMark through networking
 [06:40] - The power of word-of-mouth in career growth
 [09:55] - What EchoMark does and Tatianna’s role as a solo marketer
 [14:30] - Challenges of marketing at a cybersecurity startup
 [18:20] - Why EchoMark pivoted its messaging from “Forensic Watermarking” to “Invisible Watermarking”
 [22:45] - How Tatianna worked with leadership to change messaging
 [27:15] - Thought leadership and CEO-led marketing strategies
 [32:05] - How Tatianna prioritizes her time as the only marketer

🔗Links &amp; Resources Mentioned:
EchoMark on their Website or LinkedIn.
Follow Tatianna on LinkedIn. 

📢 Upcoming Events:
🚀 Join us at RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets here.

🔔 Subscribe &amp; Review:
If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>In cybersecurity marketing, messaging is everything, but what happens when your audience doesn’t understand your language?</p><p>This week, we sit down with Tatianna Harris, Head of Digital Marketing at EchoMark, to discuss the nuances of building brand awareness in a category that barely exists in the market’s vocabulary. From navigating the complexities of insider risk messaging to executing a founder-led thought leadership strategy, Tatianna shares what it takes to market cybersecurity solutions while wearing <em>every</em> marketing hat as a solo practitioner.</p><p><br></p><h2>Timestamps:</h2><p> <strong>[03:12]</strong> - How Tatianna got her job at EchoMark through networking</p><p> <strong>[06:40]</strong> - The power of word-of-mouth in career growth</p><p> <strong>[09:55]</strong> - What EchoMark does and Tatianna’s role as a solo marketer</p><p> <strong>[14:30]</strong> - Challenges of marketing at a cybersecurity startup</p><p> <strong>[18:20]</strong> - Why EchoMark pivoted its messaging from “Forensic Watermarking” to “Invisible Watermarking”</p><p> <strong>[22:45]</strong> - How Tatianna worked with leadership to change messaging</p><p> <strong>[27:15]</strong> - Thought leadership and CEO-led marketing strategies</p><p> <strong>[32:05]</strong> - How Tatianna prioritizes her time as the only marketer</p><p><br></p><h2>🔗Links &amp; Resources Mentioned:</h2><p>EchoMark on their <a href="https://www.echomark.com/">Website</a> or <a href="https://www.linkedin.com/company/echomark/">LinkedIn</a>.</p><p>Follow Tatianna on<a href="https://www.linkedin.com/in/tatiannaharris/"> LinkedIn</a>. </p><p><br></p><h2>📢 Upcoming Events:</h2><p>🚀 Join us at RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets <a href="https://www.cybersecuritymarketingsociety.com/meet-ups/rsac-2025-party-for-marketers">here</a>.</p><p><br></p><h2>🔔 Subscribe &amp; Review:</h2><p>If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!</p><p>📩 Got feedback or want to be on the show? Email us at <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p><br></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1529</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6186dac-00e8-11f0-8844-f7b7edb12773]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5667130313.mp3?updated=1742315894" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beyond Clicks: Crafting Cybersecurity Content That Works with David J. Ebner</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/153/notes</link>
      <description>Episode Summary:
Content isn’t just something you create and forget—it’s an asset, a living, evolving piece of your brand’s identity. According to David J. Ebner, great content isn’t about chasing trends or churning out endless articles; it’s about crafting something that stands the test of time, resonates with the right audience, and drives meaningful business outcomes.
In this episode, David, CEO and Founder of Content Workshop, discusses how companies of all sizes can fine-tune their messaging, build effective content strategies, and avoid the common mistakes that hold marketing teams back. He also discusses why content should be treated as a long-term business investment, how to navigate AI’s role in content creation, and what makes a difference in SEO and backlinking.
We also explore how cybersecurity marketers can make a real impact at RSAC 2025—from standing out in a crowded space to building trust with the right audience. Whether you’re leading a marketing team or running solo, this episode is packed with practical advice you can use immediately.

Timestamps:


05:30 Content Strategies for Small vs. Large Companies – Adjusting marketing tactics based on team size and resources.


12:45 Persona Building &amp; Message Mapping – Understanding your audience and structuring effective messaging.


18:20 Why Calling Your Product a Solution Matters – How positioning influences buyer perception and engagement.


24:10 Content Production Challenges &amp; Best Practices – Overcoming bottlenecks and keeping content high-quality.


30:50 The Power of Backlinking &amp; SEO in Cybersecurity – Strengthening domain authority and search visibility.


38:15 AI’s Role in Content Marketing: Hype vs. Reality – Where AI adds value and human creativity still leads.


45:00 How to Stand Out at RSAC 2025 – Strategies to make a lasting impact at cybersecurity’s biggest event.


52:35 The Morality of Marketing &amp; Creating Meaningful Content – Ethical considerations and why authenticity matters.


Links &amp; Resources Mentioned:
🔗 Content Workshop: www.contentworkshop.com
🔗 Follow David J. Ebner on LinkedIn: David J. Ebner
🔗 Clutch - Professional Services Reviews: www.clutch.co
🔗 G2 - Software &amp; Service Reviews: www.g2.com
🔗 Capterra - Software Reviews &amp; Comparisons: www.capterra.com
🔗 RSAC 2025 Conference Information: www.rsaconference.com
🔗 Cybersecurity Marketing Society &amp; Content Workshop Webinar on Backlinks (May 15): Register here

📢 Upcoming Events:
🚀 Join us at RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets here.

🔔 Subscribe &amp; Review:
If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 12 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>Beyond Clicks: Crafting Cybersecurity Content That Works with David J. Ebner</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>153</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
Content isn’t just something you create and forget—it’s an asset, a living, evolving piece of your brand’s identity. According to David J. Ebner, great content isn’t about chasing trends or churning out endless articles; it’s about crafting something that stands the test of time, resonates with the right audience, and drives meaningful business outcomes.
In this episode, David, CEO and Founder of Content Workshop, discusses how companies of all sizes can fine-tune their messaging, build effective content strategies, and avoid the common mistakes that hold marketing teams back. He also discusses why content should be treated as a long-term business investment, how to navigate AI’s role in content creation, and what makes a difference in SEO and backlinking.
We also explore how cybersecurity marketers can make a real impact at RSAC 2025—from standing out in a crowded space to building trust with the right audience. Whether you’re leading a marketing team or running solo, this episode is packed with practical advice you can use immediately.

Timestamps:


05:30 Content Strategies for Small vs. Large Companies – Adjusting marketing tactics based on team size and resources.


12:45 Persona Building &amp; Message Mapping – Understanding your audience and structuring effective messaging.


18:20 Why Calling Your Product a Solution Matters – How positioning influences buyer perception and engagement.


24:10 Content Production Challenges &amp; Best Practices – Overcoming bottlenecks and keeping content high-quality.


30:50 The Power of Backlinking &amp; SEO in Cybersecurity – Strengthening domain authority and search visibility.


38:15 AI’s Role in Content Marketing: Hype vs. Reality – Where AI adds value and human creativity still leads.


45:00 How to Stand Out at RSAC 2025 – Strategies to make a lasting impact at cybersecurity’s biggest event.


52:35 The Morality of Marketing &amp; Creating Meaningful Content – Ethical considerations and why authenticity matters.


Links &amp; Resources Mentioned:
🔗 Content Workshop: www.contentworkshop.com
🔗 Follow David J. Ebner on LinkedIn: David J. Ebner
🔗 Clutch - Professional Services Reviews: www.clutch.co
🔗 G2 - Software &amp; Service Reviews: www.g2.com
🔗 Capterra - Software Reviews &amp; Comparisons: www.capterra.com
🔗 RSAC 2025 Conference Information: www.rsaconference.com
🔗 Cybersecurity Marketing Society &amp; Content Workshop Webinar on Backlinks (May 15): Register here

📢 Upcoming Events:
🚀 Join us at RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets here.

🔔 Subscribe &amp; Review:
If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>Content isn’t just something you create and forget—it’s an asset, a living, evolving piece of your brand’s identity. According to <a href="https://www.linkedin.com/in/davidjebner">David J. Ebner</a>, great content isn’t about chasing trends or churning out endless articles; it’s about crafting something that stands the test of time, resonates with the right audience, and drives meaningful business outcomes.</p><p>In this episode, David, CEO and Founder of <a href="https://www.contentworkshop.com">Content Workshop</a>, discusses how companies of all sizes can fine-tune their messaging, build effective content strategies, and avoid the common mistakes that hold marketing teams back. He also discusses why content should be treated as a long-term business investment, how to navigate AI’s role in content creation, and what makes a difference in SEO and backlinking.</p><p>We also explore how cybersecurity marketers can make a real impact at RSAC 2025—from standing out in a crowded space to building trust with the right audience. Whether you’re leading a marketing team or running solo, this episode is packed with practical advice you can use immediately.</p><p><br></p><h2>Timestamps:</h2><ul>
<li>
<strong>05:30 Content Strategies for Small vs. Large Companies </strong>– Adjusting marketing tactics based on team size and resources.</li>
<li>
<strong>12:45 Persona Building &amp; Message Mapping</strong> – Understanding your audience and structuring effective messaging.</li>
<li>
<strong>18:20 Why Calling Your Product a Solution Matters</strong> – How positioning influences buyer perception and engagement.</li>
<li>
<strong>24:10 Content Production Challenges &amp; Best Practices</strong> – Overcoming bottlenecks and keeping content high-quality.</li>
<li>
<strong>30:50 The Power of Backlinking &amp; SEO in Cybersecurity</strong> – Strengthening domain authority and search visibility.</li>
<li>
<strong>38:15 AI’s Role in Content Marketing: Hype vs. Reality</strong> – Where AI adds value and human creativity still leads.</li>
<li>
<strong>45:00 How to Stand Out at RSAC 2025</strong> – Strategies to make a lasting impact at cybersecurity’s biggest event.</li>
<li>
<strong>52:35 The Morality of Marketing &amp; Creating Meaningful Content </strong>– Ethical considerations and why authenticity matters.</li>
</ul><h3><br></h3><h2>Links &amp; Resources Mentioned:</h2><p>🔗 Content Workshop:<a href="https://www.contentworkshop.com"> www.contentworkshop.com</a></p><p>🔗 Follow David J. Ebner on LinkedIn:<a href="https://www.linkedin.com/in/davidjebner"> David J. Ebner</a></p><p>🔗 Clutch - Professional Services Reviews:<a href="https://www.clutch.co"> www.clutch.co</a></p><p>🔗 G2 - Software &amp; Service Reviews:<a href="https://www.g2.com"> www.g2.com</a></p><p>🔗 Capterra - Software Reviews &amp; Comparisons:<a href="https://www.capterra.com"> www.capterra.com</a></p><p>🔗 RSAC 2025 Conference Information:<a href="https://www.rsaconference.com"> www.rsaconference.com</a></p><p>🔗 Cybersecurity Marketing Society &amp; Content Workshop Webinar on Backlinks (May 15): <a href="https://us02web.zoom.us/webinar/register/WN_rJPvPaJJTCuygxbiOpEBPw#/registration">Register here</a></p><p><br></p><h2>📢 Upcoming Events:</h2><p>🚀 Join us at RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets <a href="https://www.cybersecuritymarketingsociety.com/event/party-for-marketers-rsac-2025-conference?utm_source=chatgpt.com">here</a>.</p><h3><br></h3><h2>🔔 Subscribe &amp; Review:</h2><p>If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!</p><p>📩 Got feedback or want to be on the show? Email us at <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p><h3><br></h3><h2>Be sure also to follow our hosts on LinkedIn:</h2><p>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[faffdfb0-fb50-11ef-8855-d338d25e525d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6204367395.mp3?updated=1741708137" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CISO Obsession Is a Mistake—Here’s Who Makes Decisions with Parham Eftekhari</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/152/notes</link>
      <description>Episode Summary:
Most cybersecurity events feel the same: a packed schedule, a few familiar faces, and vendors trying to grab your attention. But does any of it build a lasting community?
Parham Eftekhari, EVP of Communities at CyberRisk Alliance (CRA), has spent years figuring out what security professionals want. CRA runs 150+ in-person events annually, but its focus isn’t just filling rooms—it’s creating connections beyond a name badge.

What You’ll Learn in This Episode:
🔹 The role of community-building in cybersecurity marketing.
🔹 Why mid-market cybersecurity teams need more attention.
🔹 How CISOs and their teams make buying decisions.
🔹 The shift from traditional marketing to community-led initiatives. 
🔹 The upcoming expansion of CRA’s membership and what it means for vendors. 

Timestamps: 
[02:30] What Does an EVP of Communities Do?

Parham explains his role at CyberRisk Alliance and how CRA supports 3.2 million cybersecurity professionals.

The three key divisions of CRA are events, Connect (Media), and Communities.

[06:15] Scaling Cybersecurity Events &amp; Summits

CRA organizes 150+ in-person events annually, plus weekly virtual events.

The strategy behind community-driven event planning—members nominate speakers &amp; topics.

How CRA balances technical and leadership content for practitioners and executives.

[11:50] The Shift Toward Community-Led Marketing

More vendors are shifting marketing budgets to community-led initiatives over traditional events.

Why peer-driven engagement is more effective than sales-heavy webinars.

The importance of vendor partnerships in community-building.

[16:30] Why Mid-Market is a Huge Opportunity

Many vendors overlook mid-market organizations despite their cybersecurity needs.

Mid-market companies lack dedicated security teams and need more support.

How CRA is expanding membership to include companies with $50M+ revenue.

[21:00] Who Makes Cybersecurity Buying Decisions?

Myth: CISOs are the only decision-makers.

Reality: CISO direct reports &amp; technical teams drive research, evaluation, and vendor selection.

Advice for marketers: Target the security team and the CFO, not just the CISO.

[26:40] Expanding CRA’s Membership Model

CRA’s next phase: A new membership tier for mid-senior level leaders.

The challenge of creating valuable community experiences for different leadership levels.

Why vendor-side CISOs will soon have a place in the CRA community.

[33:15] Ensuring Vendor Trust in the Community

Guardrails to prevent sales-heavy interactions in CRA’s membership model.

CRA’s commitment to non-biased content, peer-driven insights, and ethical engagement.

How CRA handles bad actors who misuse the community.


Links &amp; Resources:
🌐 Connect with Parham Eftekari:

LinkedIn: Parham Eftekhari


Website: CyberRisk Alliance



📢 Upcoming Events:
🚀 Join us at RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets here.
🔔 Subscribe &amp; Review:

If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 05 Mar 2025 06:00:00 -0000</pubDate>
      <itunes:title>The CISO Obsession Is a Mistake—Here’s Who Makes Decisions with Parham Eftekhari</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>152</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
Most cybersecurity events feel the same: a packed schedule, a few familiar faces, and vendors trying to grab your attention. But does any of it build a lasting community?
Parham Eftekhari, EVP of Communities at CyberRisk Alliance (CRA), has spent years figuring out what security professionals want. CRA runs 150+ in-person events annually, but its focus isn’t just filling rooms—it’s creating connections beyond a name badge.

What You’ll Learn in This Episode:
🔹 The role of community-building in cybersecurity marketing.
🔹 Why mid-market cybersecurity teams need more attention.
🔹 How CISOs and their teams make buying decisions.
🔹 The shift from traditional marketing to community-led initiatives. 
🔹 The upcoming expansion of CRA’s membership and what it means for vendors. 

Timestamps: 
[02:30] What Does an EVP of Communities Do?

Parham explains his role at CyberRisk Alliance and how CRA supports 3.2 million cybersecurity professionals.

The three key divisions of CRA are events, Connect (Media), and Communities.

[06:15] Scaling Cybersecurity Events &amp; Summits

CRA organizes 150+ in-person events annually, plus weekly virtual events.

The strategy behind community-driven event planning—members nominate speakers &amp; topics.

How CRA balances technical and leadership content for practitioners and executives.

[11:50] The Shift Toward Community-Led Marketing

More vendors are shifting marketing budgets to community-led initiatives over traditional events.

Why peer-driven engagement is more effective than sales-heavy webinars.

The importance of vendor partnerships in community-building.

[16:30] Why Mid-Market is a Huge Opportunity

Many vendors overlook mid-market organizations despite their cybersecurity needs.

Mid-market companies lack dedicated security teams and need more support.

How CRA is expanding membership to include companies with $50M+ revenue.

[21:00] Who Makes Cybersecurity Buying Decisions?

Myth: CISOs are the only decision-makers.

Reality: CISO direct reports &amp; technical teams drive research, evaluation, and vendor selection.

Advice for marketers: Target the security team and the CFO, not just the CISO.

[26:40] Expanding CRA’s Membership Model

CRA’s next phase: A new membership tier for mid-senior level leaders.

The challenge of creating valuable community experiences for different leadership levels.

Why vendor-side CISOs will soon have a place in the CRA community.

[33:15] Ensuring Vendor Trust in the Community

Guardrails to prevent sales-heavy interactions in CRA’s membership model.

CRA’s commitment to non-biased content, peer-driven insights, and ethical engagement.

How CRA handles bad actors who misuse the community.


Links &amp; Resources:
🌐 Connect with Parham Eftekari:

LinkedIn: Parham Eftekhari


Website: CyberRisk Alliance



📢 Upcoming Events:
🚀 Join us at RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets here.
🔔 Subscribe &amp; Review:

If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!
📩 Got feedback or want to be on the show? Email us at podcast@cybersecuritymarketingsociety.com 

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>Most cybersecurity events feel the same: a packed schedule, a few familiar faces, and vendors trying to grab your attention. But does any of it build a lasting community?</p><p><a href="https://www.linkedin.com/in/parhamtech/">Parham Eftekhari</a>, EVP of Communities at <a href="https://www.linkedin.com/company/cyberriskalliance/">CyberRisk Alliance</a> (CRA), has spent years figuring out what security professionals want. CRA runs 150+ in-person events annually, but its focus isn’t just filling rooms—it’s creating connections beyond a name badge.</p><p><br></p><h2>What You’ll Learn in This Episode:</h2><p>🔹 The role of community-building in cybersecurity marketing.</p><p>🔹 Why mid-market cybersecurity teams need more attention.</p><p>🔹 How CISOs and their teams make buying decisions.</p><p>🔹 The shift from traditional marketing to community-led initiatives. </p><p>🔹 The upcoming expansion of CRA’s membership and what it means for vendors. </p><p><br></p><h2>Timestamps: </h2><p>[02:30] What Does an EVP of Communities Do?</p><ul>
<li>Parham explains his role at CyberRisk Alliance and how CRA supports 3.2 million cybersecurity professionals.</li>
<li>The three key divisions of CRA are events, Connect (Media), and Communities.</li>
</ul><p>[06:15] Scaling Cybersecurity Events &amp; Summits</p><ul>
<li>CRA organizes 150+ in-person events annually, plus weekly virtual events.</li>
<li>The strategy behind community-driven event planning—members nominate speakers &amp; topics.</li>
<li>How CRA balances technical and leadership content for practitioners and executives.</li>
</ul><p>[11:50] The Shift Toward Community-Led Marketing</p><ul>
<li>More vendors are shifting marketing budgets to community-led initiatives over traditional events.</li>
<li>Why peer-driven engagement is more effective than sales-heavy webinars.</li>
<li>The importance of vendor partnerships in community-building.</li>
</ul><p>[16:30] Why Mid-Market is a Huge Opportunity</p><ul>
<li>Many vendors overlook mid-market organizations despite their cybersecurity needs.</li>
<li>Mid-market companies lack dedicated security teams and need more support.</li>
<li>How CRA is expanding membership to include companies with $50M+ revenue.</li>
</ul><p>[21:00] Who Makes Cybersecurity Buying Decisions?</p><ul>
<li>Myth: CISOs are the only decision-makers.</li>
<li>Reality: CISO direct reports &amp; technical teams drive research, evaluation, and vendor selection.</li>
<li>Advice for marketers: Target the security team and the CFO, not just the CISO.</li>
</ul><p>[26:40] Expanding CRA’s Membership Model</p><ul>
<li>CRA’s next phase: A new membership tier for mid-senior level leaders.</li>
<li>The challenge of creating valuable community experiences for different leadership levels.</li>
<li>Why vendor-side CISOs will soon have a place in the CRA community.</li>
</ul><p>[33:15] Ensuring Vendor Trust in the Community</p><ul>
<li>Guardrails to prevent sales-heavy interactions in CRA’s membership model.</li>
<li>CRA’s commitment to non-biased content, peer-driven insights, and ethical engagement.</li>
<li>How CRA handles bad actors who misuse the community.</li>
</ul><h3><br></h3><h2>Links &amp; Resources:</h2><p>🌐 Connect with Parham Eftekari:</p><ul>
<li>LinkedIn:<a href="https://www.linkedin.com/in/parhamtech/"> Parham Eftekhari</a>
</li>
<li>Website: <a href="https://www.cyberriskcollaborative.com/"><em>CyberRisk Alliance</em></a>
</li>
</ul><p><br></p><h2><strong>📢 Upcoming Events:</strong></h2><p>🚀 Join us at RSAC 2025 Conference! Secure your spot for the ultimate Cybersecurity Marketing Society Party at RSAC. 🎉 Get tickets here.</p><p>🔔 Subscribe &amp; Review:</p><p><br></p><p>If you enjoyed this episode, please leave us a rating &amp; review on your favorite podcast platform. It helps us grow and brings you more awesome guests!</p><p>📩 Got feedback or want to be on the show? Email us at <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p><h3><br></h3><h2>Be sure also to follow our hosts on LinkedIn:</h2><p>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2365</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[82b6ecee-f5fe-11ef-be91-8fbdc9889491]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8444892146.mp3?updated=1741275782" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Hidden Power of Cybersecurity Podcasts (and How to Make Yours Stand Out) with David Moulton</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/151/notes</link>
      <description>Episode Summary:
This week’s episode is about love—the love of great content, storytelling, and marketing.
Gianna and Maria sit down with David Moulton, host of the Threat Vector Podcast at Palo Alto Networks, to discuss the secrets to making a cybersecurity podcast that works. Forget boring, “salesy” content—David shares the Three E’s of Podcasting (Education, Engagement, and Entertainment) and explains why a killer podcast is one of the most powerful (yet underrated) tools in cybersecurity marketing.
But that’s not all—David also reveals his ROI formula for proving a podcast’s value (yes, there’s math, but the fun kind!), his dream career if he wasn’t in cybersecurity, and why marketing is just like chocolate—you have to savor the good stuff. 🍫
If you’re thinking about launching a podcast or proving its value to leadership, this is the episode you cannot afford to miss.

Timestamps: 
 [01:22] - David’s Journey Into Cybersecurity Podcasting - How David got into his role at Palo Alto Networks and his experience with internal and external podcasts.
 [02:56] - The Secret to a Great Podcast: The 3 E’s - Education, Engagement, and Entertainment – A framework for successful content.
[05:35] - Creating Value for Listeners, Not Just Leads - The importance of thought leadership over hard selling.
[06:50] - Doing the Hard Things in Marketing - Why cybersecurity marketing must go beyond Google-able content.
[08:54] - The ROI of Podcasting: How to Prove It Works - Ear-minutes x $1.03 per minute – The formula for podcast attention value.
[12:14] - The Hardest Part of Running a Podcast - Balancing content strategy, editing, and distribution.
[16:01] - The Problem of Podcast “Pod Fade” - Why most podcasts fail by episode six and how to stay consistent and build momentum.
 [19:47] - Getting Executive Buy-In for Podcasts - Overcoming objections to attribution challenges and how BP, universities, and Fortune 50 companies validate podcast success.
[24:12] - What You Can Learn About Your Podcast Audience - Using data from Megaphone (geo, devices, listener trends).
[26:42] - The Self-Attribution Hack for Proving Impact - Why add "How did you hear about us?" fields matter, and how does traditional attribution miss the human element?

Resources &amp; Mentions


Threat Vector Podcast – Listen Here



The Challenger Sale: Taking Control of the Customer Conversation by Matthew Dixon and Brent Adamson is a seminal book that introduces a new approach to sales, emphasizing the importance of challenging customers' thinking to add value.​ You can find more details and purchase the book on Amazon or read reviews on Goodreads.


Be sure also to follow our hosts on LinkedIn:

👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 26 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>The Hidden Power of Cybersecurity Podcasts (and How to Make Yours Stand Out) with David Moulton</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>151</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
This week’s episode is about love—the love of great content, storytelling, and marketing.
Gianna and Maria sit down with David Moulton, host of the Threat Vector Podcast at Palo Alto Networks, to discuss the secrets to making a cybersecurity podcast that works. Forget boring, “salesy” content—David shares the Three E’s of Podcasting (Education, Engagement, and Entertainment) and explains why a killer podcast is one of the most powerful (yet underrated) tools in cybersecurity marketing.
But that’s not all—David also reveals his ROI formula for proving a podcast’s value (yes, there’s math, but the fun kind!), his dream career if he wasn’t in cybersecurity, and why marketing is just like chocolate—you have to savor the good stuff. 🍫
If you’re thinking about launching a podcast or proving its value to leadership, this is the episode you cannot afford to miss.

Timestamps: 
 [01:22] - David’s Journey Into Cybersecurity Podcasting - How David got into his role at Palo Alto Networks and his experience with internal and external podcasts.
 [02:56] - The Secret to a Great Podcast: The 3 E’s - Education, Engagement, and Entertainment – A framework for successful content.
[05:35] - Creating Value for Listeners, Not Just Leads - The importance of thought leadership over hard selling.
[06:50] - Doing the Hard Things in Marketing - Why cybersecurity marketing must go beyond Google-able content.
[08:54] - The ROI of Podcasting: How to Prove It Works - Ear-minutes x $1.03 per minute – The formula for podcast attention value.
[12:14] - The Hardest Part of Running a Podcast - Balancing content strategy, editing, and distribution.
[16:01] - The Problem of Podcast “Pod Fade” - Why most podcasts fail by episode six and how to stay consistent and build momentum.
 [19:47] - Getting Executive Buy-In for Podcasts - Overcoming objections to attribution challenges and how BP, universities, and Fortune 50 companies validate podcast success.
[24:12] - What You Can Learn About Your Podcast Audience - Using data from Megaphone (geo, devices, listener trends).
[26:42] - The Self-Attribution Hack for Proving Impact - Why add "How did you hear about us?" fields matter, and how does traditional attribution miss the human element?

Resources &amp; Mentions


Threat Vector Podcast – Listen Here



The Challenger Sale: Taking Control of the Customer Conversation by Matthew Dixon and Brent Adamson is a seminal book that introduces a new approach to sales, emphasizing the importance of challenging customers' thinking to add value.​ You can find more details and purchase the book on Amazon or read reviews on Goodreads.


Be sure also to follow our hosts on LinkedIn:

👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2><strong>Episode Summary:</strong></h2><p>This week’s episode is about love—the love of great content, storytelling, and marketing.</p><p>Gianna and Maria sit down with<a href="https://www.linkedin.com/in/davidrmoulton/"> David Moulton</a>, host of the <em>Threat Vector Podcast</em> at <a href="https://www.linkedin.com/company/palo-alto-networks/">Palo Alto Networks</a>, to discuss the secrets to making a cybersecurity podcast that works. Forget boring, “salesy” content—David shares the Three E’s of Podcasting (<em>Education, Engagement, and Entertainment</em>) and explains why a killer podcast is one of the most powerful (yet underrated) tools in cybersecurity marketing.</p><p>But that’s not all—David also reveals his ROI formula for proving a podcast’s value (yes, there’s math, but the fun kind!), his dream career if he wasn’t in cybersecurity, and why marketing is just like chocolate—you have to savor the good stuff. 🍫</p><p>If you’re thinking about launching a podcast or proving its value to leadership, this is the episode you <em>cannot</em> afford to miss.</p><p><br></p><h2>Timestamps: </h2><p><strong> [01:22] - David’s Journey Into Cybersecurity Podcasting </strong>- How David got into his role at Palo Alto Networks and his experience with internal and external podcasts.</p><p><strong> [02:56] - The Secret to a Great Podcast: The 3 E’s</strong> - Education, Engagement, and Entertainment – A framework for successful content.</p><p><strong>[05:35] - Creating Value for Listeners, Not Just Leads </strong>- The importance of thought leadership over hard selling.</p><p><strong>[06:50] - Doing the Hard Things in Marketing </strong>- Why cybersecurity marketing must go beyond Google-able content.</p><p><strong>[08:54] - The ROI of Podcasting: How to Prove It Works</strong> - Ear-minutes x $1.03 per minute – The formula for podcast attention value.</p><p><strong>[12:14] - The Hardest Part of Running a Podcast</strong> - Balancing content strategy, editing, and distribution.</p><p><strong>[16:01] - The Problem of Podcast “Pod Fade”</strong> - Why most podcasts fail by episode six and how to stay consistent and build momentum.</p><p> <strong>[19:47] - Getting Executive Buy-In for Podcasts</strong> - Overcoming objections to attribution challenges and how BP, universities, and Fortune 50 companies validate podcast success.</p><p><strong>[24:12] - What You Can Learn About Your Podcast Audience</strong> - Using data from Megaphone (geo, devices, listener trends).</p><p><strong>[26:42] - The Self-Attribution Hack for Proving Impact </strong>- Why add "How did you hear about us?" fields matter, and how does traditional attribution miss the human element?</p><p><br></p><h2>Resources &amp; Mentions</h2><ul>
<li>
<strong>Threat Vector Podcast – </strong><a href="https://podcasts.apple.com/is/podcast/threat-vector-by-palo-alto-networks/id1725324656"><strong>Listen Here</strong></a>
</li>
<li>
<strong>The Challenger Sale: Taking Control of the Customer Conversation</strong> by Matthew Dixon and Brent Adamson is a seminal book that introduces a new approach to sales, emphasizing the importance of challenging customers' thinking to add value.​ You can find more details and purchase the book on<a href="https://www.amazon.com/Challenger-Sale-Control-Customer-Conversation/dp/1591844355"> Amazon</a> or read reviews on<a href="https://www.goodreads.com/book/show/11910902-the-challenger-sale"> Goodreads</a>.</li>
</ul><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><br></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a133bb0e-f359-11ef-8b8d-ef927b56d845]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6450674775.mp3?updated=1740516137" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Empowering Cybersecurity: RSAC's Expanded Vision</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/150/notes</link>
      <description>Episode Summary:
This week, we’re pulling back the curtain on one of the most significant shifts in cybersecurity events—RSAC’s bold rebrand and vision for the future. Joining us are two insiders, Ben Waring, Director of Global PR &amp; Communications, and Jessica Porter, Senior Director of Marketing, who will reveal the strategy behind the transformation, the impact on the global security community, and what’s in store for 2025 and beyond. If you want the inside scoop on industry trends, new opportunities, and what’s next for the world’s leading cybersecurity event, this episode is a must-listen!

Timestamps:
01:26: RSAC’s rebrand: Why and what it means—RSAC is changing things up with a brand refresh that resonates with the cybersecurity community and aligns with its future goals.
03:28: Expanding RSAC beyond a conference into a year-round community – A cybersecurity conference is valuable, but what happens when the event ends? 
05:29: Behind the scenes of the rebrand: Process and key decisions – A rebrand of this scale takes time, strategic planning, and a deep understanding of the community’s needs. Ben and Jessica take us through the months-long process, their challenges, and the key decisions that shaped RSAC’s new identity.
09:07: Upcoming RSAC initiatives and events – What’s next for RSAC? We explore some of the new initiatives, expanded programming, and upcoming events. 
12:40: How RSAC engages vendors and cybersecurity professionals –RSAC is a large community that connects vendors, practitioners, and industry leaders. It enables exhibitors and sponsors to engage with attendees while emphasizing education and innovation.
20:45: The new “Cybersecurity Together” theme—Community is at the heart of everything RSAC does, and this new theme encapsulates its commitment to inclusivity, collaboration, and collective growth in the cybersecurity space. We discuss how this theme influences programming, partnerships, and plans.
25:13: Inspiration from other conferences and industry trends—From South by Southwest to niche industry gatherings, we discuss what RSAC has learned from other successful events and how those insights shape its future.
30:33 - Will RSAC move from San Francisco? – RSAC has called the Bay Area home for decades, but will it stay? 
34:02—Big announcement: RSAC expands to the Yerba Buena Center for the Arts—Growth is key, and RSAC is physically broadening its footprint by adding space at the Yerba Buena Center for the Arts. What does this mean for attendees, exhibitors, and programming? We break down the impact of this exciting development.
34:53 - RSAC introduces its booth (#S-3425) – For the first time, RSAC will have a dedicated booth where attendees can learn more about the brand's evolution, upcoming events, and community initiatives. Be sure to stop by!

Resources &amp; Links
🔗 Stay updated at OneRSAC.com
🔗 Join the RSAC community: OneRSAC.com/joinus 
📍 Visit RAC's booth at the concourse between North &amp; South Expo (#S-3425)

Be sure also to follow our hosts on LinkedIn:

👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 19 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>Empowering Cybersecurity: RSAC's Expanded Vision</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>150</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
This week, we’re pulling back the curtain on one of the most significant shifts in cybersecurity events—RSAC’s bold rebrand and vision for the future. Joining us are two insiders, Ben Waring, Director of Global PR &amp; Communications, and Jessica Porter, Senior Director of Marketing, who will reveal the strategy behind the transformation, the impact on the global security community, and what’s in store for 2025 and beyond. If you want the inside scoop on industry trends, new opportunities, and what’s next for the world’s leading cybersecurity event, this episode is a must-listen!

Timestamps:
01:26: RSAC’s rebrand: Why and what it means—RSAC is changing things up with a brand refresh that resonates with the cybersecurity community and aligns with its future goals.
03:28: Expanding RSAC beyond a conference into a year-round community – A cybersecurity conference is valuable, but what happens when the event ends? 
05:29: Behind the scenes of the rebrand: Process and key decisions – A rebrand of this scale takes time, strategic planning, and a deep understanding of the community’s needs. Ben and Jessica take us through the months-long process, their challenges, and the key decisions that shaped RSAC’s new identity.
09:07: Upcoming RSAC initiatives and events – What’s next for RSAC? We explore some of the new initiatives, expanded programming, and upcoming events. 
12:40: How RSAC engages vendors and cybersecurity professionals –RSAC is a large community that connects vendors, practitioners, and industry leaders. It enables exhibitors and sponsors to engage with attendees while emphasizing education and innovation.
20:45: The new “Cybersecurity Together” theme—Community is at the heart of everything RSAC does, and this new theme encapsulates its commitment to inclusivity, collaboration, and collective growth in the cybersecurity space. We discuss how this theme influences programming, partnerships, and plans.
25:13: Inspiration from other conferences and industry trends—From South by Southwest to niche industry gatherings, we discuss what RSAC has learned from other successful events and how those insights shape its future.
30:33 - Will RSAC move from San Francisco? – RSAC has called the Bay Area home for decades, but will it stay? 
34:02—Big announcement: RSAC expands to the Yerba Buena Center for the Arts—Growth is key, and RSAC is physically broadening its footprint by adding space at the Yerba Buena Center for the Arts. What does this mean for attendees, exhibitors, and programming? We break down the impact of this exciting development.
34:53 - RSAC introduces its booth (#S-3425) – For the first time, RSAC will have a dedicated booth where attendees can learn more about the brand's evolution, upcoming events, and community initiatives. Be sure to stop by!

Resources &amp; Links
🔗 Stay updated at OneRSAC.com
🔗 Join the RSAC community: OneRSAC.com/joinus 
📍 Visit RAC's booth at the concourse between North &amp; South Expo (#S-3425)

Be sure also to follow our hosts on LinkedIn:

👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2><strong>Episode Summary:</strong></h2><p>This week, we’re pulling back the curtain on one of the most significant shifts in cybersecurity events—RSAC’s bold rebrand and vision for the future. Joining us are two insiders, Ben Waring, Director of Global PR &amp; Communications, and Jessica Porter, Senior Director of Marketing, who will reveal the strategy behind the transformation, the impact on the global security community, and what’s in store for 2025 and beyond. If you want the inside scoop on industry trends, new opportunities, and what’s next for the world’s leading cybersecurity event, this episode is a must-listen!</p><p><br></p><h2>Timestamps:</h2><p><strong>01:26</strong>: <strong>RSAC’s rebrand: Why and what it means</strong>—RSAC is changing things up with a brand refresh that resonates with the cybersecurity community and aligns with its future goals.</p><p><strong>03:28</strong>: <strong>Expanding RSAC beyond a conference into a year-round community</strong> – A cybersecurity conference is valuable, but what happens when the event ends? </p><p><strong>05:29</strong>: <strong>Behind the scenes of the rebrand: Process and key decisions</strong> – A rebrand of this scale takes time, strategic planning, and a deep understanding of the community’s needs. Ben and Jessica take us through the months-long process, their challenges, and the key decisions that shaped RSAC’s new identity.</p><p><strong>09:07</strong>: <strong>Upcoming RSAC initiatives and events</strong> – What’s next for RSAC? We explore some of the new initiatives, expanded programming, and upcoming events. </p><p><strong>12:40</strong>: <strong>How RSAC engages vendors and cybersecurity professionals </strong>–RSAC is a large community that connects vendors, practitioners, and industry leaders. It enables exhibitors and sponsors to engage with attendees while emphasizing education and innovation.</p><p><strong>20:45</strong>: <strong>The new “Cybersecurity Together” theme</strong>—Community is at the heart of everything RSAC does, and this new theme encapsulates its commitment to inclusivity, collaboration, and collective growth in the cybersecurity space. We discuss how this theme influences programming, partnerships, and plans.</p><p><strong>25:13</strong>: <strong>Inspiration from other conferences and industry trends</strong>—From South by Southwest to niche industry gatherings, we discuss what RSAC has learned from other successful events and how those insights shape its future.</p><p><strong>30:33</strong> - <strong>Will RSAC move from San Francisco?</strong> – RSAC has called the Bay Area home for decades, but will it stay? </p><p><strong>34:02—Big announcement: RSAC expands to the Yerba Buena Center for the Arts—Growth is key, and RSAC is physically broadening</strong> its footprint by adding space at the Yerba Buena Center for the Arts. What does this mean for attendees, exhibitors, and programming? We break down the impact of this exciting development.</p><p><strong>34:53</strong> - <strong>RSAC introduces its booth (#S-3425)</strong> – For the first time, RSAC will have a dedicated booth where attendees can learn more about the brand's evolution, upcoming events, and community initiatives. Be sure to stop by!</p><p><br></p><h2>Resources &amp; Links</h2><p>🔗 Stay updated at<a href="https://www.onersac.com"> OneRSAC.com</a></p><p>🔗 Join the RSAC community: <a href="http://onersac.com/joinus">OneRSAC.com/joinus</a> </p><p>📍 Visit RAC's booth at the concourse between North &amp; South Expo (#S-3425)</p><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><br></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2348</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39b890f2-edc9-11ef-b663-cb7bfebaeb87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2414190667.mp3?updated=1739941853" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI, LLMs &amp; Cybersecurity: The Good, The Bad, and The Deepfakes with Dr. Andrea Isoni</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/149/notes</link>
      <description>Episode Summary:
The race to be the best in artificial intelligence (AI) is getting stronger. Open-source models are now competing with closed systems, which affects how we create new technology and keep it safe. Will open AI help us make significant discoveries quickly, or could it be too risky? How will governments, businesses, and hackers use this new technology?
In this episode, Dr. Andrea Isoni, the Chief AI Officer at AI Technologies, discusses the latest advances in AI, from computer chips and deepfakes to cybersecurity threats

Timestamps:
[02:30] - The cost and performance of new AI models vs. OpenAI
[06:45] - The LLM arms race: Open vs. Closed AI models
[12:10] - The importance of optimization in pre-training and post-training AI models
[18:00] - China's AI strategy and global AI adoption challenges
[22:40] - The battle for GPU dominance: NVIDIA, AMD, and upcoming players
[29:15] - Cybersecurity and AI: Threats and solutions
[35:20] - The impact of the EU AI Act and global AI regulations
[42:00] - Deepfakes and how AI can protect against AI-powered attacks
[48:50] - The future of AI security: Blockchain, cryptographic verification, and watermarking

Key Takeaways:


AI Optimization is Important: The next wave of large language models (LLMs) will focus on improving optimization, using synthetic data to boost efficiency.  


China’s AI Game Plan: Even with all the geopolitical bumps, China is making serious strides in AI and chip manufacturing. 


Cybersecurity &amp; AI: AI-driven cyber threats like deepfakes, phishing, and AI poisoning are becoming more sophisticated, so developing AI defenses is essential now.  


Regulation is Key: The EU AI Act and other global regulations will play a significant role in adopting AI and developing security measures.  


The GPU Race: While NVIDIA is still the top dog, AMD and some newer brands are catching up, prioritizing cost efficiency and innovation.


Resources &amp; Links:

State of Artificial Intelligence Report: stateofartificialintelligence.com


 AI Research &amp; Insights: AI Technologies - Click on the "AI Insights" section for more reports and analysis.

EU AI Act Overview: European Commission AI Regulations


OECD AI Incident Index: OECD AI Policy Observatory


Reality Defender (Deepfake Detection Startup): Reality Defender



Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 12 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>AI, LLMs &amp; Cybersecurity: The Good, The Bad, and The Deepfakes with Dr. Andrea Isoni</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>149</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
The race to be the best in artificial intelligence (AI) is getting stronger. Open-source models are now competing with closed systems, which affects how we create new technology and keep it safe. Will open AI help us make significant discoveries quickly, or could it be too risky? How will governments, businesses, and hackers use this new technology?
In this episode, Dr. Andrea Isoni, the Chief AI Officer at AI Technologies, discusses the latest advances in AI, from computer chips and deepfakes to cybersecurity threats

Timestamps:
[02:30] - The cost and performance of new AI models vs. OpenAI
[06:45] - The LLM arms race: Open vs. Closed AI models
[12:10] - The importance of optimization in pre-training and post-training AI models
[18:00] - China's AI strategy and global AI adoption challenges
[22:40] - The battle for GPU dominance: NVIDIA, AMD, and upcoming players
[29:15] - Cybersecurity and AI: Threats and solutions
[35:20] - The impact of the EU AI Act and global AI regulations
[42:00] - Deepfakes and how AI can protect against AI-powered attacks
[48:50] - The future of AI security: Blockchain, cryptographic verification, and watermarking

Key Takeaways:


AI Optimization is Important: The next wave of large language models (LLMs) will focus on improving optimization, using synthetic data to boost efficiency.  


China’s AI Game Plan: Even with all the geopolitical bumps, China is making serious strides in AI and chip manufacturing. 


Cybersecurity &amp; AI: AI-driven cyber threats like deepfakes, phishing, and AI poisoning are becoming more sophisticated, so developing AI defenses is essential now.  


Regulation is Key: The EU AI Act and other global regulations will play a significant role in adopting AI and developing security measures.  


The GPU Race: While NVIDIA is still the top dog, AMD and some newer brands are catching up, prioritizing cost efficiency and innovation.


Resources &amp; Links:

State of Artificial Intelligence Report: stateofartificialintelligence.com


 AI Research &amp; Insights: AI Technologies - Click on the "AI Insights" section for more reports and analysis.

EU AI Act Overview: European Commission AI Regulations


OECD AI Incident Index: OECD AI Policy Observatory


Reality Defender (Deepfake Detection Startup): Reality Defender



Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>The race to be the best in artificial intelligence (AI) is getting stronger. Open-source models are now competing with closed systems, which affects how we create new technology and keep it safe. Will open AI help us make significant discoveries quickly, or could it be too risky? How will governments, businesses, and hackers use this new technology?</p><p>In this episode, <a href="https://www.linkedin.com/in/andreaisoni20/">Dr. Andrea Isoni</a>, the Chief AI Officer at <a href="https://www.linkedin.com/company/ai-technologies-limited/">AI Technologies</a>, discusses the latest advances in AI, from computer chips and deepfakes to cybersecurity threats</p><p><br></p><h2>Timestamps:</h2><p><strong>[02:30]</strong> - The cost and performance of new AI models vs. OpenAI</p><p><strong>[06:45]</strong> - The LLM arms race: Open vs. Closed AI models</p><p><strong>[12:10]</strong> - The importance of optimization in pre-training and post-training AI models</p><p><strong>[18:00]</strong> - China's AI strategy and global AI adoption challenges</p><p><strong>[22:40]</strong> - The battle for GPU dominance: NVIDIA, AMD, and upcoming players</p><p><strong>[29:15]</strong> - Cybersecurity and AI: Threats and solutions</p><p><strong>[35:20]</strong> - The impact of the EU AI Act and global AI regulations</p><p><strong>[42:00]</strong> - Deepfakes and how AI can protect against AI-powered attacks</p><p><strong>[48:50]</strong> - The future of AI security: Blockchain, cryptographic verification, and watermarking</p><p><br></p><h2>Key Takeaways:</h2><ul>
<li>
<strong>AI Optimization is Important</strong>: The next wave of large language models (LLMs) will focus on improving optimization, using synthetic data to boost efficiency.  </li>
<li>
<strong>China’s AI Game Plan</strong>: Even with all the geopolitical bumps, China is making serious strides in AI and chip manufacturing. </li>
<li>
<strong>Cybersecurity &amp; AI</strong>: AI-driven cyber threats like deepfakes, phishing, and AI poisoning are becoming more sophisticated, so developing AI defenses is essential now.  </li>
<li>
<strong>Regulation is</strong> Key: The EU AI Act and other global regulations will play a significant role in adopting AI and developing security measures.  </li>
<li>
<strong>The GPU Race</strong>: While NVIDIA is still the top dog, AMD and some newer brands are catching up, prioritizing cost efficiency and innovation.</li>
</ul><p><br></p><h2>Resources &amp; Links:</h2><ul>
<li>State of Artificial Intelligence Report:<a href="https://stateofartificialintelligence.com"> stateofartificialintelligence.com</a>
</li>
<li> AI Research &amp; Insights:<a href="https://aitechnologies.co"> AI Technologies</a> - Click on the "AI Insights" section for more reports and analysis.</li>
<li>EU AI Act Overview:<a href="https://digital-strategy.ec.europa.eu/en/policies/artificial-intelligence"> European Commission AI Regulations</a>
</li>
<li>OECD AI Incident Index:<a href="https://oecd.ai"> OECD AI Policy Observatory</a>
</li>
<li>Reality Defender (Deepfake Detection Startup):<a href="https://realitydefender.com"> Reality Defender</a>
</li>
</ul><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0ec3128-e56e-11ef-98ff-bf48b024845f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7279854196.mp3?updated=1739295145" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Sell Security to Local Governments, Mayors, and Councils with Kush Sharma</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/148/notes</link>
      <description>Episode Summary:
Marketing and selling cybersecurity to local government isn't like pitching to a Fortune 500 company—it’s an entirely different game. In this episode, Kush Sharma, Director of Municipal Modernization and Partnerships at MISA Ontario, joins Gianna and Maria to pull back the curtain on how cybersecurity budgets are actually won (and lost) in the public sector.

Key highlights:
[03:45] What is MISA Ontario? – Kush explains how his organization supports municipalities in IT &amp; cybersecurity.
[07:30] Advocating for Cybersecurity in Government – Who controls the budget, and how do you convince them?
[12:15] Selling Cyber to Mayors &amp; Councils – Why traditional cyber risk talk doesn’t work, and how to translate it into real-world concerns.
[17:40] Marketing &amp; Politics in Cybersecurity – Understanding political motivations and tailoring the message to different decision-makers.
[23:10] The Budget Battle – How cybersecurity leaders can secure funding (even when compliance isn’t enough).
[28:45] Cyber Threats in 2025 – Why Ransomware is still the #1 concern for municipalities.
[34:20] Startups &amp; Government Cybersecurity – Why smaller vendors need to rethink how they sell to local government. 
[40:00] Building Cybersecurity Programs at Scale – From the City of Toronto to all of Ontario, how to scale security efforts. 

Links and Resources Mentioned:

Knight Spectre Website

Follow Kush on LinkedIn


MISA Ontario Website



Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 05 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>How to Sell Security to Local Governments, Mayors, and Councils with Kush Sharma</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>148</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
Marketing and selling cybersecurity to local government isn't like pitching to a Fortune 500 company—it’s an entirely different game. In this episode, Kush Sharma, Director of Municipal Modernization and Partnerships at MISA Ontario, joins Gianna and Maria to pull back the curtain on how cybersecurity budgets are actually won (and lost) in the public sector.

Key highlights:
[03:45] What is MISA Ontario? – Kush explains how his organization supports municipalities in IT &amp; cybersecurity.
[07:30] Advocating for Cybersecurity in Government – Who controls the budget, and how do you convince them?
[12:15] Selling Cyber to Mayors &amp; Councils – Why traditional cyber risk talk doesn’t work, and how to translate it into real-world concerns.
[17:40] Marketing &amp; Politics in Cybersecurity – Understanding political motivations and tailoring the message to different decision-makers.
[23:10] The Budget Battle – How cybersecurity leaders can secure funding (even when compliance isn’t enough).
[28:45] Cyber Threats in 2025 – Why Ransomware is still the #1 concern for municipalities.
[34:20] Startups &amp; Government Cybersecurity – Why smaller vendors need to rethink how they sell to local government. 
[40:00] Building Cybersecurity Programs at Scale – From the City of Toronto to all of Ontario, how to scale security efforts. 

Links and Resources Mentioned:

Knight Spectre Website

Follow Kush on LinkedIn


MISA Ontario Website



Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2><strong>Episode Summary:</strong></h2><p>Marketing and selling cybersecurity to local government isn't like pitching to a Fortune 500 company—it’s an entirely different game. In this episode, <a href="https://www.linkedin.com/in/kush-m-sharma-9bb875a/"><strong>Kush Sharma</strong></a>, Director of Municipal Modernization and Partnerships at <a href="https://www.linkedin.com/company/misa-ontario/"><strong>MISA Ontario</strong></a>, joins Gianna and Maria to pull back the curtain on how cybersecurity budgets are actually won (and lost) in the public sector.</p><p><br></p><h2><strong>Key highlights:</strong></h2><p><strong>[03:45]</strong> <strong>What is MISA Ontario?</strong> – Kush explains how his organization supports municipalities in IT &amp; cybersecurity.</p><p><strong>[07:30]</strong> <strong>Advocating for Cybersecurity in Government</strong> – Who controls the budget, and how do you convince them?</p><p><strong>[12:15]</strong> <strong>Selling Cyber to Mayors &amp; Councils</strong> – Why traditional cyber risk talk <em>doesn’t</em> work, and how to translate it into real-world concerns.</p><p><strong>[17:40]</strong> <strong>Marketing &amp; Politics in Cybersecurity</strong> – Understanding political motivations and tailoring the message to different decision-makers.</p><p><strong>[23:10]</strong> <strong>The Budget Battle</strong> – How cybersecurity leaders can secure funding (even when compliance isn’t enough).</p><p><strong>[28:45]</strong> <strong>Cyber Threats in 2025</strong> – Why <strong>Ransomware</strong> is still the #1 concern for municipalities.</p><p><strong>[34:20]</strong> <strong>Startups &amp; Government Cybersecurity</strong> – Why smaller vendors need to rethink how they sell to local government. </p><p><strong>[40:00]</strong> <strong>Building Cybersecurity Programs at Scale</strong> – From the City of Toronto to all of Ontario, how to scale security efforts. </p><p><br></p><h2><strong>Links and Resources Mentioned:</strong></h2><ul>
<li><a href="https://www.knightspectre.com">Knight Spectre Website</a></li>
<li>Follow Kush on<a href="https://www.linkedin.com/in/kush-m-sharma-9bb875a/"> LinkedIn</a>
</li>
<li>MISA Ontario <a href="https://www.misa-asim.ca/page/ON_Homepage">Website</a>
</li>
</ul><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p><br></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2288</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66bb1998-e235-11ef-b845-2f27f6bf88f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1974233252.mp3?updated=1738681901" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> From Billion-Dollar Deals to AI Takeover: The 2024 Cybersecurity Recap with Mike Privette</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/147/notes</link>
      <description>Episode Summary:
It’s the first episode of 2025, and we’re kicking things off with the cybersecurity economy! Gianna and Maria are joined by Mike Privette, CISO and Cybersecurity Economist at Return on Security, to chat about the key funding, acquisition, and industry trends from 2024—and what they mean for marketers and cybersecurity professionals in 2025.
From billion-dollar acquisitions to the role of AI in reshaping cybersecurity, Mike gives insights on the state of the market, the rise of resiliency, and what marketers need to know when evaluating companies and trends. Plus, a look at the promise (and pitfalls) of AI-driven security operations and the long road to IPOs in a competitive market.

Oh, and don’t miss the debate over Mike’s alternate career paths—sled dogs vs. professor!

Key highlights:
[03:10] – In 2024, the cybersecurity scene held up well! There were fewer transactions, but funds raised took off with significant acquisitions like MasterCard snagging Recorded Future for $45 billion
[07:45] –Why MasterCard decided to buy Recorded Future: This acquisition boosted MasterCard’s fraud prevention efforts and shows just how closely tied cybersecurity is to the world of fintech.
[11:22] – Consolidation and Resiliency Trends: In 2024, data protection and disaster recovery became important. With all the ransomware attacks and significant outages, businesses focused on finding solid backup and recovery solutions.
AI in Security Operations: AI isn't just trendy—it's making security operations smarter, automating tedious tasks, and training systems to test each other for more vigorous defense.
[22:38] – The Future of AI in Cyber:  Mike talks about how new AI tech is helping organizations fight off threats and highlights why marketers should pay attention. From training AI to tackle adversaries to putting privacy first, it’s all about staying one step ahead.
[28:12] – Picking Your Next Move: Mike gives some insight into trending topics like data backup and AI tools for marketers when checking out job opportunities, sharing tips on what to keep an eye on in a potential employer.
[36:10] – Mike’s Alternate Reality: Would Mike be a professor or a sled dog racer? Hear the hilarious guesses and the surprising answer.

Links and Resources Mentioned:


Mike Privette on LinkedIn: Connect with Mike



Return on Security: Connect on LinkedIn



Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 29 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title> From Billion-Dollar Deals to AI Takeover: The 2024 Cybersecurity Recap with Mike Privette</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>147</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
It’s the first episode of 2025, and we’re kicking things off with the cybersecurity economy! Gianna and Maria are joined by Mike Privette, CISO and Cybersecurity Economist at Return on Security, to chat about the key funding, acquisition, and industry trends from 2024—and what they mean for marketers and cybersecurity professionals in 2025.
From billion-dollar acquisitions to the role of AI in reshaping cybersecurity, Mike gives insights on the state of the market, the rise of resiliency, and what marketers need to know when evaluating companies and trends. Plus, a look at the promise (and pitfalls) of AI-driven security operations and the long road to IPOs in a competitive market.

Oh, and don’t miss the debate over Mike’s alternate career paths—sled dogs vs. professor!

Key highlights:
[03:10] – In 2024, the cybersecurity scene held up well! There were fewer transactions, but funds raised took off with significant acquisitions like MasterCard snagging Recorded Future for $45 billion
[07:45] –Why MasterCard decided to buy Recorded Future: This acquisition boosted MasterCard’s fraud prevention efforts and shows just how closely tied cybersecurity is to the world of fintech.
[11:22] – Consolidation and Resiliency Trends: In 2024, data protection and disaster recovery became important. With all the ransomware attacks and significant outages, businesses focused on finding solid backup and recovery solutions.
AI in Security Operations: AI isn't just trendy—it's making security operations smarter, automating tedious tasks, and training systems to test each other for more vigorous defense.
[22:38] – The Future of AI in Cyber:  Mike talks about how new AI tech is helping organizations fight off threats and highlights why marketers should pay attention. From training AI to tackle adversaries to putting privacy first, it’s all about staying one step ahead.
[28:12] – Picking Your Next Move: Mike gives some insight into trending topics like data backup and AI tools for marketers when checking out job opportunities, sharing tips on what to keep an eye on in a potential employer.
[36:10] – Mike’s Alternate Reality: Would Mike be a professor or a sled dog racer? Hear the hilarious guesses and the surprising answer.

Links and Resources Mentioned:


Mike Privette on LinkedIn: Connect with Mike



Return on Security: Connect on LinkedIn



Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2><strong>Episode Summary:</strong></h2><p>It’s the first episode of 2025, and we’re kicking things off with the cybersecurity economy! Gianna and Maria are joined by Mike Privette, CISO and Cybersecurity Economist at Return on Security, to chat about the key funding, acquisition, and industry trends from 2024—and what they mean for marketers and cybersecurity professionals in 2025.</p><p>From billion-dollar acquisitions to the role of AI in reshaping cybersecurity, Mike gives insights on the state of the market, the rise of resiliency, and what marketers need to know when evaluating companies and trends. Plus, a look at the promise (and pitfalls) of AI-driven security operations and the long road to IPOs in a competitive market.</p><p><br></p><p>Oh, and don’t miss the debate over Mike’s alternate career paths—sled dogs vs. professor!</p><p><br></p><h2><strong>Key highlights:</strong></h2><p>[03:10] –<strong> In 2024, the cybersecurity scene held up well!</strong> There were fewer transactions, but funds raised took off with significant acquisitions like MasterCard snagging Recorded Future for $45 billion</p><p>[07:45] –<strong>Why MasterCard decided to buy Recorded Future:</strong> This acquisition boosted MasterCard’s fraud prevention efforts and shows just how closely tied cybersecurity is to the world of fintech.</p><p>[11:22] – <strong>Consolidation and Resiliency Trends:</strong> In 2024, data protection and disaster recovery became important. With all the ransomware attacks and significant outages, businesses focused on finding solid backup and recovery solutions.</p><p><strong>AI in Security Operations:</strong> AI isn't just trendy—it's making security operations smarter, automating tedious tasks, and training systems to test each other for more vigorous defense.</p><p>[22:38] – <strong>The Future of AI in Cyber: </strong> Mike talks about how new AI tech is helping organizations fight off threats and highlights why marketers should pay attention. From training AI to tackle adversaries to putting privacy first, it’s all about staying one step ahead.</p><p>[28:12] – <strong>Picking Your Next Move: </strong>Mike gives some insight into trending topics like data backup and AI tools for marketers when checking out job opportunities, sharing tips on what to keep an eye on in a potential employer.</p><p>[36:10] – <strong>Mike’s Alternate Reality:</strong> Would Mike be a professor or a sled dog racer? Hear the hilarious guesses and the surprising answer.</p><p><br></p><h2><strong>Links and Resources Mentioned:</strong></h2><ul>
<li>
<strong>Mike Privette on LinkedIn:</strong> <a href="https://www.linkedin.com/in/mikeprivette/">Connect with Mike</a>
</li>
<li>
<strong>Return on Security:</strong><a href="https://www.linkedin.com/company/return-on-security/"> Connect on LinkedIn</a>
</li>
</ul><h3><br></h3><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p><br></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2242</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89a03e08-da5a-11ef-98cb-2f374ebdc28e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9220797736.mp3?updated=1737736150" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can a $30 Mic Change Your Life? David Spark Thinks So</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/146/notes</link>
      <description>Episode Summary:
What does it take to launch a successful cybersecurity podcast? This week, we’re excited to chat with David Spark, the creative mind behind the CISO Series Podcast and Spark Media. David, who began his career as a stand-up comedian, has significantly impacted the cybersecurity world! He will share his journey, the valuable lessons he has learned along the way, and some excellent tips for marketing teams looking to maximize their podcasts. Podcast production goes beyond simply talking into a microphone; it's also about engaging your audience with high-quality audio and achieving the right balance between content and production value. In this episode, David shares insider tips for working with sponsors and creating quality episodes and reveals his insights on Cyber Marketing Con. Tune in for an inspiring conversation!

Key Highlights:
[03:10] – David’s Journey into Podcasting: From stand-up comedy and tech journalism to creating the CISO Series Podcast, David discusses how his background in media has shaped his approach to cybersecurity podcasting.
[08:20] – Why Audio Quality Matters: Investing in quality microphones and a proper audio setup is crucial for listener retention and credibility. David shares his favorite affordable microphone options and audio tips.
[12:45] – Sponsorship Success Secrets: Great sponsorships begin with great guests. David emphasizes featuring compelling speakers to maximize podcasts' return on investment (ROI).
[18:05] – The Long Tail of Podcasting: Podcasts offer lasting value, unlike trade shows. David explains how episodes generate engagement and leads long after their initial release.
[23:40] – Editing Magic: David discusses why every podcast’s first episode tends to be less than ideal and advises delaying public announcements until production quality is refined.
[29:55] – Cyber Marketing Con Love: David highlights why the Cyber Marketing Con is his favorite event for connecting with the community, meeting sponsors, and learning new marketing strategies.
[35:15] – New Show Announcement: David teases his latest podcast, "Security You Should Know," and shares exciting updates about hiring at the CISO Series.

Links and Resources Mentioned:
CISO Series Podcast: Listen Here
30 Microphone Recommendation: Fifine USB Microphone
CyberMarketingCon25: Learn More
Connect with David Spark: LinkedIn

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 22 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>Can a $30 Mic Change Your Life? David Spark Thinks So</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>146</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
What does it take to launch a successful cybersecurity podcast? This week, we’re excited to chat with David Spark, the creative mind behind the CISO Series Podcast and Spark Media. David, who began his career as a stand-up comedian, has significantly impacted the cybersecurity world! He will share his journey, the valuable lessons he has learned along the way, and some excellent tips for marketing teams looking to maximize their podcasts. Podcast production goes beyond simply talking into a microphone; it's also about engaging your audience with high-quality audio and achieving the right balance between content and production value. In this episode, David shares insider tips for working with sponsors and creating quality episodes and reveals his insights on Cyber Marketing Con. Tune in for an inspiring conversation!

Key Highlights:
[03:10] – David’s Journey into Podcasting: From stand-up comedy and tech journalism to creating the CISO Series Podcast, David discusses how his background in media has shaped his approach to cybersecurity podcasting.
[08:20] – Why Audio Quality Matters: Investing in quality microphones and a proper audio setup is crucial for listener retention and credibility. David shares his favorite affordable microphone options and audio tips.
[12:45] – Sponsorship Success Secrets: Great sponsorships begin with great guests. David emphasizes featuring compelling speakers to maximize podcasts' return on investment (ROI).
[18:05] – The Long Tail of Podcasting: Podcasts offer lasting value, unlike trade shows. David explains how episodes generate engagement and leads long after their initial release.
[23:40] – Editing Magic: David discusses why every podcast’s first episode tends to be less than ideal and advises delaying public announcements until production quality is refined.
[29:55] – Cyber Marketing Con Love: David highlights why the Cyber Marketing Con is his favorite event for connecting with the community, meeting sponsors, and learning new marketing strategies.
[35:15] – New Show Announcement: David teases his latest podcast, "Security You Should Know," and shares exciting updates about hiring at the CISO Series.

Links and Resources Mentioned:
CISO Series Podcast: Listen Here
30 Microphone Recommendation: Fifine USB Microphone
CyberMarketingCon25: Learn More
Connect with David Spark: LinkedIn

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>What does it take to launch a successful cybersecurity podcast? This week, we’re excited to chat with David Spark, the creative mind behind the CISO Series Podcast and Spark Media. David, who began his career as a stand-up comedian, has significantly impacted the cybersecurity world! He will share his journey, the valuable lessons he has learned along the way, and some excellent tips for marketing teams looking to maximize their podcasts. Podcast production goes beyond simply talking into a microphone; it's also about engaging your audience with high-quality audio and achieving the right balance between content and production value. In this episode, David shares insider tips for working with sponsors and creating quality episodes and reveals his insights on Cyber Marketing Con. Tune in for an inspiring conversation!</p><p><br></p><h2>Key Highlights:</h2><p><strong>[03:10]</strong> – David’s Journey into Podcasting: From stand-up comedy and tech journalism to creating the CISO Series Podcast, David discusses how his background in media has shaped his approach to cybersecurity podcasting.</p><p><strong>[08:20] </strong>– Why Audio Quality Matters: Investing in quality microphones and a proper audio setup is crucial for listener retention and credibility. David shares his favorite affordable microphone options and audio tips.</p><p><strong>[12:45]</strong> – Sponsorship Success Secrets: Great sponsorships begin with great guests. David emphasizes featuring compelling speakers to maximize podcasts' return on investment (ROI).</p><p><strong>[18:05] </strong>– The Long Tail of Podcasting: Podcasts offer lasting value, unlike trade shows. David explains how episodes generate engagement and leads long after their initial release.</p><p><strong>[23:40] </strong>– Editing Magic: David discusses why every podcast’s first episode tends to be less than ideal and advises delaying public announcements until production quality is refined.</p><p><strong>[29:55]</strong> – Cyber Marketing Con Love: David highlights why the Cyber Marketing Con is his favorite event for connecting with the community, meeting sponsors, and learning new marketing strategies.</p><p><strong>[35:15] </strong>– New Show Announcement: David teases his latest podcast, "Security You Should Know," and shares exciting updates about hiring at the CISO Series.</p><p><br></p><h2>Links and Resources Mentioned:</h2><p>CISO Series Podcast: <a href="https://cisoseries.com/category/podcast/ciso-series-podcast/">Listen Here</a></p><p>30 Microphone Recommendation: <a href="https://fifinemicrophone.com/collections/usb-microphones">Fifine USB Microphone</a></p><p>CyberMarketingCon25: <a href="https://www.cybermarketingconference.com/2025">Learn More</a></p><p>Connect with David Spark: <a href="https://www.linkedin.com/in/davidspark/">LinkedIn</a></p><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1658</itunes:duration>
      <guid isPermaLink="false"><![CDATA[69ea6b60-d81b-11ef-a0a9-aff1a603d514]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5612386250.mp3?updated=1737480073" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Palo Alto Networks is Leading with Optimism in Cybersecurity Marketing with Navneet Singh</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/109/notes</link>
      <description>Please enjoy this encore episode:
It's refreshing to hear, especially in the world of AI, that the human element remains crucial. "There's no such thing as B2B marketing; it's B2H: Business to Human," because ultimately, humans are the ones making the decisions, says our guest, Navneet Singh, Vice President of Marketing for the Network Security Division at Palo Alto Networks. Navneet takes us through his fascinating transition from engineering to marketing, shining a light on the importance of positivity and putting the customer first when marketing in cybersecurity. Join us to find out how Palo Alto Networks is redefining the landscape with its fresh, optimistic approach to cybersecurity marketing.

Takeaways:

Focus on the customer and their needs in cybersecurity marketing.

Convey optimism and positivity in marketing to inspire confidence in customers.

Differentiate your company by being opposite to industry norms.

Avoid using fear as a marketing tactic in cybersecurity.

Create a culture of optimism and accountability within the marketing team.


Key Episode Highlights:

[00:06 - 01:20] Announcement of Cybersecurity Marketing Society's 2024 RSAC Party for Cyber Marketers! 

[01:32 - 04:23] Navneet Singh shares his career transition from engineering to marketing, emphasizing his passion for product management and marketing.

[04:27 - 07:42] The philosophical shift in cybersecurity marketing towards optimism and confidence, moving away from fear-based tactics.

[08:31 - 11:54] How Palo Alto Networks' marketing strategy is distinct, focusing on enabling businesses securely rather than instilling fear.

[12:21 - 17:39] The importance of focusing on the customer, humanizing B2B marketing, and the creative process behind the "We've Got Next" campaign.

[18:35 - 24:59] The significance of hope and education in cybersecurity, and the strategy behind avoiding fear-based marketing.

[25:29 - 31:09] How internal optimism and a positive company culture influence marketing strategies and customer interactions.

[31:14 - 35:21] Game Time: Guessing Nav's alternate career path, followed by Nav's revelation of his potential career in the armed forces if not in marketing.


﻿Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
Connect with Navneet Singh:
For more insights and discussions, connect with Nav on LinkedIn. Engage and share ideas on pushing the boundaries of cybersecurity marketing.
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of "Breaking Through in Cybersecurity Marketing." Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</description>
      <pubDate>Wed, 15 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>How Palo Alto Networks is Leading with Optimism in Cybersecurity Marketing with Navneet Singh</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode:
It's refreshing to hear, especially in the world of AI, that the human element remains crucial. "There's no such thing as B2B marketing; it's B2H: Business to Human," because ultimately, humans are the ones making the decisions, says our guest, Navneet Singh, Vice President of Marketing for the Network Security Division at Palo Alto Networks. Navneet takes us through his fascinating transition from engineering to marketing, shining a light on the importance of positivity and putting the customer first when marketing in cybersecurity. Join us to find out how Palo Alto Networks is redefining the landscape with its fresh, optimistic approach to cybersecurity marketing.

Takeaways:

Focus on the customer and their needs in cybersecurity marketing.

Convey optimism and positivity in marketing to inspire confidence in customers.

Differentiate your company by being opposite to industry norms.

Avoid using fear as a marketing tactic in cybersecurity.

Create a culture of optimism and accountability within the marketing team.


Key Episode Highlights:

[00:06 - 01:20] Announcement of Cybersecurity Marketing Society's 2024 RSAC Party for Cyber Marketers! 

[01:32 - 04:23] Navneet Singh shares his career transition from engineering to marketing, emphasizing his passion for product management and marketing.

[04:27 - 07:42] The philosophical shift in cybersecurity marketing towards optimism and confidence, moving away from fear-based tactics.

[08:31 - 11:54] How Palo Alto Networks' marketing strategy is distinct, focusing on enabling businesses securely rather than instilling fear.

[12:21 - 17:39] The importance of focusing on the customer, humanizing B2B marketing, and the creative process behind the "We've Got Next" campaign.

[18:35 - 24:59] The significance of hope and education in cybersecurity, and the strategy behind avoiding fear-based marketing.

[25:29 - 31:09] How internal optimism and a positive company culture influence marketing strategies and customer interactions.

[31:14 - 35:21] Game Time: Guessing Nav's alternate career path, followed by Nav's revelation of his potential career in the armed forces if not in marketing.


﻿Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
Connect with Navneet Singh:
For more insights and discussions, connect with Nav on LinkedIn. Engage and share ideas on pushing the boundaries of cybersecurity marketing.
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of "Breaking Through in Cybersecurity Marketing." Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode:</p><p>It's refreshing to hear, especially in the world of AI, that the human element remains crucial. "<em>There's no such thing as B2B marketing; it's B2H: Business to Human,"</em> because ultimately, humans are the ones making the decisions, says our guest, <a href="https://www.linkedin.com/in/nasingh/">Navneet Singh</a>, Vice President of Marketing for the Network Security Division at <a href="https://www.paloaltonetworks.com/">Palo Alto Networks</a>. Navneet takes us through his fascinating transition from engineering to marketing, shining a light on the importance of positivity and putting the customer first when marketing in cybersecurity. Join us to find out how<a href="https://www.paloaltonetworks.com/"> Palo Alto Networks</a> is redefining the landscape with its fresh, optimistic approach to cybersecurity marketing.</p><p><br></p><h2><strong>Takeaways:</strong></h2><ul>
<li>Focus on the customer and their needs in cybersecurity marketing.</li>
<li>Convey optimism and positivity in marketing to inspire confidence in customers.</li>
<li>Differentiate your company by being opposite to industry norms.</li>
<li>Avoid using fear as a marketing tactic in cybersecurity.</li>
<li>Create a culture of optimism and accountability within the marketing team.</li>
</ul><p><br></p><h2><strong>Key Episode Highlights:</strong></h2><ul>
<li>[00:06 - 01:20] Announcement of Cybersecurity Marketing Society's <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">2024 RSAC Party</a> for Cyber Marketers! </li>
<li>[01:32 - 04:23] Navneet Singh shares his career transition from engineering to marketing, emphasizing his passion for product management and marketing.</li>
<li>[04:27 - 07:42] The philosophical shift in cybersecurity marketing towards optimism and confidence, moving away from fear-based tactics.</li>
<li>[08:31 - 11:54] How Palo Alto Networks' marketing strategy is distinct, focusing on enabling businesses securely rather than instilling fear.</li>
<li>[12:21 - 17:39] The importance of focusing on the customer, humanizing B2B marketing, and the creative process behind the "We've Got Next" campaign.</li>
<li>[18:35 - 24:59] The significance of hope and education in cybersecurity, and the strategy behind avoiding fear-based marketing.</li>
<li>[25:29 - 31:09] How internal optimism and a positive company culture influence marketing strategies and customer interactions.</li>
<li>[31:14 - 35:21] Game Time: Guessing Nav's alternate career path, followed by Nav's revelation of his potential career in the armed forces if not in marketing.</li>
</ul><p><br></p><h2><strong>﻿Join Us at RSA 2024:</strong></h2><p>Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><h2><strong>Connect with Navneet Singh:</strong></h2><p>For more insights and discussions, connect with Nav on<a href="https://www.linkedin.com/in/nasingh/"> LinkedIn</a>. Engage and share ideas on pushing the boundaries of cybersecurity marketing.</p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>Thank you for tuning in to another episode of "Breaking Through in Cybersecurity Marketing." Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2093</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a1698f8c-d2b5-11ef-a551-734dd8706bc6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7001901878.mp3?updated=1736886602" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What is a Phantom CISO? With Mishaal Khan.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/103/notes</link>
      <description>Please enjoy this encore episode with Mishaal Khan. He's a serial entrepreneur, author, security expert, and VC sharing his journey, from growing up around computers to becoming a cybersecurity expert and author of the book "The Phantom CISO." Listen to hear insights from the security practitioner’s point of view on marketing, brand-building, and book-publishing!

Episode highlights:

[01:07]	 Mishaal’s early career beginnings and influences.

[06:30] The Phantom CISO -  Mishaal's book and his approach to marketing it.

[16:40] How Mishaal used malware, phishing, and ransomware to market his company. 

[22:07] A look behind the promotion Mishaal used for his book, from the price to self-publishing.

[24:15] The evolution of fearmongering in cybersecurity and the need for practical solutions.

[28:40] More strategies Mishaal used to promote his book


Episode Links:
The Phantom CISO
You can catch Mishaal on LinkedIn

Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 08 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>What is a Phantom CISO? With Mishaal Khan.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode with Mishaal Khan. He's a serial entrepreneur, author, security expert, and VC sharing his journey, from growing up around computers to becoming a cybersecurity expert and author of the book "The Phantom CISO." Listen to hear insights from the security practitioner’s point of view on marketing, brand-building, and book-publishing!

Episode highlights:

[01:07]	 Mishaal’s early career beginnings and influences.

[06:30] The Phantom CISO -  Mishaal's book and his approach to marketing it.

[16:40] How Mishaal used malware, phishing, and ransomware to market his company. 

[22:07] A look behind the promotion Mishaal used for his book, from the price to self-publishing.

[24:15] The evolution of fearmongering in cybersecurity and the need for practical solutions.

[28:40] More strategies Mishaal used to promote his book


Episode Links:
The Phantom CISO
You can catch Mishaal on LinkedIn

Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode with Mishaal Khan. He's a serial entrepreneur, author, security expert, and VC sharing his journey, from growing up around computers to becoming a cybersecurity expert and author of the book "The Phantom CISO." Listen to hear insights from the security practitioner’s point of view on marketing, brand-building, and book-publishing!</p><p><br></p><h2><strong>Episode highlights:</strong></h2><ul>
<li>[01:07]	 Mishaal’s early career beginnings and influences.</li>
<li>[06:30] <a href="https://www.phantomciso.com/">The Phantom CISO</a> -  Mishaal's book and his approach to marketing it.</li>
<li>[16:40] How Mishaal used malware, phishing, and ransomware to market his company. </li>
<li>[22:07] A look behind the promotion Mishaal used for his book, from the price to self-publishing.</li>
<li>[24:15] The evolution of fearmongering in cybersecurity and the need for practical solutions.</li>
<li>[28:40] More strategies Mishaal used to promote his book</li>
</ul><p><br></p><h2><strong>Episode Links:</strong></h2><p><a href="https://www.phantomciso.com/">The Phantom CISO</a></p><p>You can catch Mishaal on <a href="https://www.linkedin.com/in/mish-aal/">LinkedIn</a></p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2672</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7e51315e-cd19-11ef-85e5-fb20f4da76cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3856509100.mp3?updated=1736269786" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wiz’s Strategic Events with Jasmin Ozeri</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/115/notes</link>
      <description>Please enjoy this encore of Breaking Through in Cybersecurity Marketing.
This week, we are talking about all things cybersecurity events with Jasmin Ozeri, Strategic Events Manager at Wiz. While co-host Maria Velasquez couldn't join us, host Gianna Whitver explores how Jasmin brings creativity and strategic thinking to one of the hottest cloud security companies around. With a particular focus on the RSA Conference in this episode, discover how Jasmin's approach to bustling conference floors and strategic booth designs not only enhances Wiz's brand presence but also makes cybersecurity approachable and engaging.
Highlights:

[00:00:30] Introduction to the episode and today's guest, Jasmin Ozeri.

[00:01:50] Jasmin's journey from a wedding venue childhood to a cybersecurity event strategist.

[00:06:00] Inside Wiz's innovative event strategies: From Wizard of Oz to interactive booths.

[00:11:30] Preview of Wiz's plans for RSA Conference 2024.

[00:15:00] The strategic role of events in cybersecurity marketing.

[00:20:00] What would Jasmin be doing if not in cybersecurity? A surprising career alternative.

Takeaways:

Events are more than just logistical exercises; they're pivotal for brand building and creating meaningful customer engagement.

Bringing creativity into event planning can significantly enhance the attendee experience, making your booth and brand memorable.

Strategic event management involves careful planning and execution, ensuring every aspect aligns with the company’s marketing goals.


Join Us at RSAC 2024:
Remember to join the Cybersecurity Marketing Society's party at RSAC 2024 on May 5th, at Novela San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!

About Our Guest:

👉Follow Jasmin Ozeri on LinkedIn to keep up with her latest event strategies and insights into cybersecurity marketing.

👉Learn more about Wiz on their LinkedIn or website to see how they are revolutionizing cloud security (and RSAC booths!).


Connect with Our Hosts on LinkedIn:

👉Gianna Whitver


👉Maria Velasquez



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 01 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>Wiz’s Strategic Events with Jasmin Ozeri</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Breaking Through in Cybersecurity Marketing.
This week, we are talking about all things cybersecurity events with Jasmin Ozeri, Strategic Events Manager at Wiz. While co-host Maria Velasquez couldn't join us, host Gianna Whitver explores how Jasmin brings creativity and strategic thinking to one of the hottest cloud security companies around. With a particular focus on the RSA Conference in this episode, discover how Jasmin's approach to bustling conference floors and strategic booth designs not only enhances Wiz's brand presence but also makes cybersecurity approachable and engaging.
Highlights:

[00:00:30] Introduction to the episode and today's guest, Jasmin Ozeri.

[00:01:50] Jasmin's journey from a wedding venue childhood to a cybersecurity event strategist.

[00:06:00] Inside Wiz's innovative event strategies: From Wizard of Oz to interactive booths.

[00:11:30] Preview of Wiz's plans for RSA Conference 2024.

[00:15:00] The strategic role of events in cybersecurity marketing.

[00:20:00] What would Jasmin be doing if not in cybersecurity? A surprising career alternative.

Takeaways:

Events are more than just logistical exercises; they're pivotal for brand building and creating meaningful customer engagement.

Bringing creativity into event planning can significantly enhance the attendee experience, making your booth and brand memorable.

Strategic event management involves careful planning and execution, ensuring every aspect aligns with the company’s marketing goals.


Join Us at RSAC 2024:
Remember to join the Cybersecurity Marketing Society's party at RSAC 2024 on May 5th, at Novela San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!

About Our Guest:

👉Follow Jasmin Ozeri on LinkedIn to keep up with her latest event strategies and insights into cybersecurity marketing.

👉Learn more about Wiz on their LinkedIn or website to see how they are revolutionizing cloud security (and RSAC booths!).


Connect with Our Hosts on LinkedIn:

👉Gianna Whitver


👉Maria Velasquez



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Breaking Through in Cybersecurity Marketing.</p><p>This week, we are talking about all things cybersecurity events with <a href="https://www.linkedin.com/in/jasmin-ozeri-267914128/">Jasmin Ozeri</a>, Strategic Events Manager at Wiz. While co-host Maria Velasquez couldn't join us, host Gianna Whitver explores how Jasmin brings creativity and strategic thinking to one of the hottest cloud security companies around. With a particular focus on the RSA Conference in this episode, discover how Jasmin's approach to bustling conference floors and strategic booth designs not only enhances Wiz's brand presence but also makes cybersecurity approachable and engaging.</p><h2><strong>Highlights:</strong></h2><ul>
<li>[00:00:30] Introduction to the episode and today's guest, Jasmin Ozeri.</li>
<li>[00:01:50] Jasmin's journey from a wedding venue childhood to a cybersecurity event strategist.</li>
<li>[00:06:00] Inside Wiz's innovative event strategies: From Wizard of Oz to interactive booths.</li>
<li>[00:11:30] Preview of Wiz's plans for RSA Conference 2024.</li>
<li>[00:15:00] The strategic role of events in cybersecurity marketing.</li>
<li>[00:20:00] What would Jasmin be doing if not in cybersecurity? A surprising career alternative.</li>
</ul><h2><strong>Takeaways:</strong></h2><ul>
<li>Events are more than just logistical exercises; they're pivotal for brand building and creating meaningful customer engagement.</li>
<li>Bringing creativity into event planning can significantly enhance the attendee experience, making your booth and brand memorable.</li>
<li>Strategic event management involves careful planning and execution, ensuring every aspect aligns with the company’s marketing goals.</li>
</ul><p><br></p><h2><strong>Join Us at RSAC 2024:</strong></h2><p>Remember to join the Cybersecurity Marketing Society's party at RSAC 2024 on May 5th, at Novela San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><p><br></p><h2><strong>About Our Guest:</strong></h2><ul>
<li>👉Follow <a href="https://www.linkedin.com/in/jasmin-ozeri-267914128/">Jasmin Ozeri</a> on LinkedIn to keep up with her latest event strategies and insights into cybersecurity marketing.</li>
<li>👉Learn more about Wiz on their<a href="https://www.linkedin.com/company/wizsecurity/"> LinkedIn</a> or <a href="https://www.wiz.io/">website</a> to see how they are revolutionizing cloud security (and RSAC booths!).</li>
</ul><p><br></p><h2>Connect with Our Hosts on LinkedIn:</h2><ul>
<li>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a>
</li>
<li>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a>
</li>
</ul><p><br></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1514</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01995766-bc95-11ef-8183-33383813da36]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7622397835.mp3?updated=1734453720" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside the Mind of a CISO with Joe Evangelisto.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/105/notes</link>
      <description>Please enjoy this encore of Breaking Through in Cybersecurity Marketing.
In today's episode, Gianna and Maria are joined by a seasoned CISO from NetSPI, Joe Evangelisto. Joe shares his insights into the cybersecurity industry's challenges AND his passion for baking! Stay tuned to hear what organizations he recommends for support for CISOs, how to use content switching to your advantage, and how security events can better serve small firms, per his viral post about Black Hat. 

Episode Highlights:

[01:05] Joe expresses excitement and gratitude for joining NetSPI and leading the talented security team.

[03:01] Joe’s viral LinkedIn post about his decision not to attend Black Hat, and the unique challenges faced by SMB CISOs compared to those at larger enterprises. 

[08:15] Content Switching: Joe shares his experience balancing different responsibilities as a CISO at a smaller organization and balancing all his priorities while wearing different hats. 

[13:30] Why it's important to build strong internal relationships across the departments. 

[17:38] Joe recommends the supportive community of CISOs in his area with organizations like ISSA, ISC², and more!


Reach out to Joe on LinkedIn. 
Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 25 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Inside the Mind of a CISO with Joe Evangelisto.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Breaking Through in Cybersecurity Marketing.
In today's episode, Gianna and Maria are joined by a seasoned CISO from NetSPI, Joe Evangelisto. Joe shares his insights into the cybersecurity industry's challenges AND his passion for baking! Stay tuned to hear what organizations he recommends for support for CISOs, how to use content switching to your advantage, and how security events can better serve small firms, per his viral post about Black Hat. 

Episode Highlights:

[01:05] Joe expresses excitement and gratitude for joining NetSPI and leading the talented security team.

[03:01] Joe’s viral LinkedIn post about his decision not to attend Black Hat, and the unique challenges faced by SMB CISOs compared to those at larger enterprises. 

[08:15] Content Switching: Joe shares his experience balancing different responsibilities as a CISO at a smaller organization and balancing all his priorities while wearing different hats. 

[13:30] Why it's important to build strong internal relationships across the departments. 

[17:38] Joe recommends the supportive community of CISOs in his area with organizations like ISSA, ISC², and more!


Reach out to Joe on LinkedIn. 
Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Breaking Through in Cybersecurity Marketing.</p><p>In today's episode, Gianna and Maria are joined by a seasoned CISO from NetSPI, Joe Evangelisto. Joe shares his insights into the cybersecurity industry's challenges AND his passion for baking! Stay tuned to hear what organizations he recommends for support for CISOs, how to use content switching to your advantage, and how security events can better serve small firms, per his viral post about Black Hat. </p><p><br></p><h2><strong>Episode Highlights:</strong></h2><ul>
<li>[01:05] Joe expresses excitement and gratitude for joining <a href="https://www.netspi.com/">NetSPI</a> and leading the talented security team.</li>
<li>[03:01] Joe’s viral LinkedIn post about his decision not to attend Black Hat, and the unique challenges faced by SMB CISOs compared to those at larger enterprises. </li>
<li>[08:15] Content Switching: Joe shares his experience balancing different responsibilities as a CISO at a smaller organization and balancing all his priorities while wearing different hats. </li>
<li>[13:30] Why it's important to build strong internal relationships across the departments. </li>
<li>[17:38] Joe recommends the supportive community of CISOs in his area with organizations like <a href="https://www.issa.org/">ISSA</a>, I<a href="https://www.isc2.org/">SC²</a>, and more!</li>
</ul><p><br></p><p><strong>Reach out to Joe on </strong><a href="https://www.linkedin.com/in/joe-evangelisto/"><strong>LinkedIn. </strong></a></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5eb2ba0-bc90-11ef-978c-5384c64c006e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2439728563.mp3?updated=1734451927" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Keys to Successful Cybersecurity Products with Nicholas Muy and guest co-host Ross Haleliuk</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/120/notes</link>
      <description>Please enjoy this encore episode of Breaking Through in Cybersecurity Markeing.
As the podcast that keeps things fresh, this week our co-hosts Gianna Whitver and Maria Velasquez are handing over the reins to a guest host who is quite well-known: the author of the viral cyber bestseller Cyber for Builders, Ross Haleliuk! Ross is joined by the Chief Security Officer (CSO/CISO) at Scrut Automation, Nicholas Muy. Together they explore the intricacies of building cybersecurity products that truly matter. The episode dives into the challenges and strategies of product development in the cybersecurity industry, emphasizing the importance of genuine user feedback, real-world experience, and building trust within the community.

Key Takeaways:

[03:30] - Nick shares his background and current role at Scrut Automation

[05:15] - Common mistakes founders make in cybersecurity product development

[08:45] - The importance of engaging with the cybersecurity community

[12:30] - How to balance customer feedback with a founder’s vision

[16:00] - Real-world examples from Nick's experience as an investor and advisor

[20:15] - Practical advice for startup employees in evaluating early-stage startups


Guest hosts are new for us and we would appreciate your feedback, email your thoughts: podcasts@breakingthroughincybersecuritymarketing.com. 

Get to know our guest host and guest:
👉Reach out to Ross on LinkedIn.
👉Get your copy of Cyber for Builders on Amazon.
👉Connect with Nick Muy: LinkedIn.

Be sure to also follow our main show hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter. See you in the next episode!</description>
      <pubDate>Wed, 18 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>The Keys to Successful Cybersecurity Products with Nicholas Muy and guest co-host Ross Haleliuk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Breaking Through in Cybersecurity Markeing.
As the podcast that keeps things fresh, this week our co-hosts Gianna Whitver and Maria Velasquez are handing over the reins to a guest host who is quite well-known: the author of the viral cyber bestseller Cyber for Builders, Ross Haleliuk! Ross is joined by the Chief Security Officer (CSO/CISO) at Scrut Automation, Nicholas Muy. Together they explore the intricacies of building cybersecurity products that truly matter. The episode dives into the challenges and strategies of product development in the cybersecurity industry, emphasizing the importance of genuine user feedback, real-world experience, and building trust within the community.

Key Takeaways:

[03:30] - Nick shares his background and current role at Scrut Automation

[05:15] - Common mistakes founders make in cybersecurity product development

[08:45] - The importance of engaging with the cybersecurity community

[12:30] - How to balance customer feedback with a founder’s vision

[16:00] - Real-world examples from Nick's experience as an investor and advisor

[20:15] - Practical advice for startup employees in evaluating early-stage startups


Guest hosts are new for us and we would appreciate your feedback, email your thoughts: podcasts@breakingthroughincybersecuritymarketing.com. 

Get to know our guest host and guest:
👉Reach out to Ross on LinkedIn.
👉Get your copy of Cyber for Builders on Amazon.
👉Connect with Nick Muy: LinkedIn.

Be sure to also follow our main show hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Breaking Through in Cybersecurity Markeing.</p><p>As the podcast that keeps things fresh, this week our co-hosts Gianna Whitver and Maria Velasquez are handing over the reins to a guest host who is quite well-known: the author of the viral cyber bestseller <em>Cyber for Builders</em>, Ross Haleliuk! Ross is joined by the Chief Security Officer (CSO/CISO) at <a href="https://www.linkedin.com/company/scrut-automation/">Scrut Automation</a>, <a href="https://www.linkedin.com/in/nicholasmuy/">Nicholas Muy</a>. Together they explore the intricacies of building cybersecurity products that truly matter. The episode dives into the challenges and strategies of product development in the cybersecurity industry, emphasizing the importance of genuine user feedback, real-world experience, and building trust within the community.</p><p><br></p><h2><strong>Key Takeaways:</strong></h2><ul>
<li>[03:30] - Nick shares his background and current role at Scrut Automation</li>
<li>[05:15] - Common mistakes founders make in cybersecurity product development</li>
<li>[08:45] - The importance of engaging with the cybersecurity community</li>
<li>[12:30] - How to balance customer feedback with a founder’s vision</li>
<li>[16:00] - Real-world examples from Nick's experience as an investor and advisor</li>
<li>[20:15] - Practical advice for startup employees in evaluating early-stage startups</li>
</ul><p><br></p><p>Guest hosts are new for us and we would appreciate your feedback, email your thoughts: <a href="mailto:podcasts@breakingthroughincybersecuritymarketing.com">podcasts@breakingthroughincybersecuritymarketing.com</a>. </p><p><br></p><h2>Get to know our guest host and guest:</h2><p>👉Reach out to Ross on <a href="https://www.linkedin.com/in/rosshaleliuk/">LinkedIn</a>.</p><p>👉Get your copy of Cyber for Builders on<a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/"> Amazon</a>.</p><p>👉Connect with Nick Muy: <a href="https://www.linkedin.com/in/nicholasmuy/">LinkedIn</a>.</p><p><br></p><h2>Be sure to also follow our main show hosts on LinkedIn:</h2><p>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2537</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dfc6bef4-bc8e-11ef-8ddf-57a9b255690e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5925082184.mp3?updated=1734451031" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Social Media Strategies with Matt Mullan</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/112/notes</link>
      <description>Please enjoy this encore episode of Breaking Through in Cybersecurity Marketing.
"Social media in cybersecurity is like walking a tightrope; you're balancing between being serious and injecting just the right amount of light-heartedness to crack a smile. That's how you get people to listen." - Matt Mullan 
This week, we're diving deep into the world of social media with none other than Matt Mullan, the Senior Social Media Manager at Illumio, a pioneering zero-trust segmentation company. Matt brings a treasure trove of insights from his journey—from starting in sales to mastering the art of social media in our complicated, technical, and fast-paced industry. Today, he's set to peel back the layers of the unique challenges and opportunities that come with marketing in the cybersecurity industry, drawing contrasts with his diverse experiences in sectors as varied as toy manufacturing and HR/payroll software. Prepare to learn from one of the best in navigating the complex currents of social media in the cybersecurity sector!

Highlight Reel:

[01:04] - Matt shares his professional background and transition into cybersecurity from sales and social media.

[03:56] - Discussing the unique challenges and opportunities in cybersecurity marketing.

[04:18] - Insights into engaging cybersecurity communities and leveraging humor in social media strategies.

[06:26] - The effectiveness and strategy behind using memes and light-hearted content to drive engagement.

[08:11] - The role of influencer marketing in cybersecurity and the potential shift towards micro-influencers.

[10:41] - Exploring social media's impact on brand awareness and lead generation within the cybersecurity sector.

[12:57] - The importance of diversifying social media strategies and not relying solely on one platform.

[17:29] - The concept of 'thought leadership' and its role in successful social media marketing.

[20:14] - The future of influencer marketing in cybersecurity and its challenges.


Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</description>
      <pubDate>Wed, 11 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Cyber Social Media Strategies with Matt Mullan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Breaking Through in Cybersecurity Marketing.
"Social media in cybersecurity is like walking a tightrope; you're balancing between being serious and injecting just the right amount of light-heartedness to crack a smile. That's how you get people to listen." - Matt Mullan 
This week, we're diving deep into the world of social media with none other than Matt Mullan, the Senior Social Media Manager at Illumio, a pioneering zero-trust segmentation company. Matt brings a treasure trove of insights from his journey—from starting in sales to mastering the art of social media in our complicated, technical, and fast-paced industry. Today, he's set to peel back the layers of the unique challenges and opportunities that come with marketing in the cybersecurity industry, drawing contrasts with his diverse experiences in sectors as varied as toy manufacturing and HR/payroll software. Prepare to learn from one of the best in navigating the complex currents of social media in the cybersecurity sector!

Highlight Reel:

[01:04] - Matt shares his professional background and transition into cybersecurity from sales and social media.

[03:56] - Discussing the unique challenges and opportunities in cybersecurity marketing.

[04:18] - Insights into engaging cybersecurity communities and leveraging humor in social media strategies.

[06:26] - The effectiveness and strategy behind using memes and light-hearted content to drive engagement.

[08:11] - The role of influencer marketing in cybersecurity and the potential shift towards micro-influencers.

[10:41] - Exploring social media's impact on brand awareness and lead generation within the cybersecurity sector.

[12:57] - The importance of diversifying social media strategies and not relying solely on one platform.

[17:29] - The concept of 'thought leadership' and its role in successful social media marketing.

[20:14] - The future of influencer marketing in cybersecurity and its challenges.


Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Breaking Through in Cybersecurity Marketing.</p><p><em>"Social media in cybersecurity is like walking a tightrope; you're balancing between being serious and injecting just the right amount of light-heartedness to crack a smile. That's how you get people to listen."</em> - Matt Mullan </p><p>This week, we're diving deep into the world of social media with none other than <a href="https://www.linkedin.com/in/mullanmatthew/">Matt Mullan</a>, the Senior Social Media Manager at <a href="https://www.linkedin.com/company/illumio/">Illumio</a>, a pioneering zero-trust segmentation company. Matt brings a treasure trove of insights from his journey—from starting in sales to mastering the art of social media in our complicated, technical, and fast-paced industry. Today, he's set to peel back the layers of the unique challenges and opportunities that come with marketing in the cybersecurity industry, drawing contrasts with his diverse experiences in sectors as varied as toy manufacturing and HR/payroll software. Prepare to learn from one of the best in navigating the complex currents of social media in the cybersecurity sector!</p><h2>
<strong>Highlight Reel</strong>:</h2><ul>
<li>[01:04] - Matt shares his professional background and transition into cybersecurity from sales and social media.</li>
<li>[03:56] - Discussing the unique challenges and opportunities in cybersecurity marketing.</li>
<li>[04:18] - Insights into engaging cybersecurity communities and leveraging humor in social media strategies.</li>
<li>[06:26] - The effectiveness and strategy behind using memes and light-hearted content to drive engagement.</li>
<li>[08:11] - The role of influencer marketing in cybersecurity and the potential shift towards micro-influencers.</li>
<li>[10:41] - Exploring social media's impact on brand awareness and lead generation within the cybersecurity sector.</li>
<li>[12:57] - The importance of diversifying social media strategies and not relying solely on one platform.</li>
<li>[17:29] - The concept of 'thought leadership' and its role in successful social media marketing.</li>
<li>[20:14] - The future of influencer marketing in cybersecurity and its challenges.</li>
</ul><p><br></p><h2><strong>Join Us at RSA 2024:</strong></h2><p>Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58660030-b93a-11ee-9e93-5facde35377b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1566339755.mp3?updated=1733859547" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Head of Marketing Perspective: Bridging Strategy &amp; Tactics at CyberInt with Danny Miller</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/145/notes</link>
      <description>Episode Summary:
What does it mean to be an impactful marketer in cybersecurity? Danny Miller, VP of Marketing at CyberInt, joins us in this CyberCMO Confidential segment episode to share how he drives success at a company redefining external threat intelligence. From strategy meetings with the CEO to packing custom swag kits, Danny takes us through the day-to-day life as the marketing leader at a growing cybersecurity startup.

Discover how CyberInt’s unique focus on actionable intelligence influences its culture and customer relationships, the art of balancing strategic priorities with hands-on work, and the challenges of scaling a team while staying involved. Plus, hear Danny’s thoughts on aligning with sales, creating seamless customer journeys, and why sometimes it’s okay to let go—even if you’re a little bit of a control freak.

Key Highlights:
[02:00] - Making Intelligence: Danny explains how CyberInt goes beyond data to deliver actionable insights that impact cybersecurity teams.
[05:15] - Meet the Team: A behind-the-scenes look at CyberInt’s global marketing squad—10 pros balancing demand gen, product marketing, and BDR operations.
[08:40] - A CMO’s Day in the Trenches: From boardroom strategy to packing elaborate swag kits, Danny’s day is anything but boring.
[15:20] - The Art of Letting Go: Danny shares how he’s learning to delegate while keeping his personal touch on the work that matters most.
[20:35] - Keeping Execs in the Loop: Danny uses reports, OKRs, and transparency to align with the CEO and leadership team.
[28:00] - From Lead to Loyalty: The challenge of creating a seamless customer experience across marketing, sales, and beyond—and why it’s worth the effort.
[35:50] - Lessons in Staying the Course: The best advice Danny ignored and how it shaped his perspective on perseverance and growth.

Links and Resources Mentioned:
Learn more about CyberInt: cyberint.com
Send your comments, questions, or topic suggestions to podcast@cybersecuritymarketingsociety.com 

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Charles Gold
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 04 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Head of Marketing Perspective: Bridging Strategy &amp; Tactics at CyberInt with Danny Miller</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>145</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
What does it mean to be an impactful marketer in cybersecurity? Danny Miller, VP of Marketing at CyberInt, joins us in this CyberCMO Confidential segment episode to share how he drives success at a company redefining external threat intelligence. From strategy meetings with the CEO to packing custom swag kits, Danny takes us through the day-to-day life as the marketing leader at a growing cybersecurity startup.

Discover how CyberInt’s unique focus on actionable intelligence influences its culture and customer relationships, the art of balancing strategic priorities with hands-on work, and the challenges of scaling a team while staying involved. Plus, hear Danny’s thoughts on aligning with sales, creating seamless customer journeys, and why sometimes it’s okay to let go—even if you’re a little bit of a control freak.

Key Highlights:
[02:00] - Making Intelligence: Danny explains how CyberInt goes beyond data to deliver actionable insights that impact cybersecurity teams.
[05:15] - Meet the Team: A behind-the-scenes look at CyberInt’s global marketing squad—10 pros balancing demand gen, product marketing, and BDR operations.
[08:40] - A CMO’s Day in the Trenches: From boardroom strategy to packing elaborate swag kits, Danny’s day is anything but boring.
[15:20] - The Art of Letting Go: Danny shares how he’s learning to delegate while keeping his personal touch on the work that matters most.
[20:35] - Keeping Execs in the Loop: Danny uses reports, OKRs, and transparency to align with the CEO and leadership team.
[28:00] - From Lead to Loyalty: The challenge of creating a seamless customer experience across marketing, sales, and beyond—and why it’s worth the effort.
[35:50] - Lessons in Staying the Course: The best advice Danny ignored and how it shaped his perspective on perseverance and growth.

Links and Resources Mentioned:
Learn more about CyberInt: cyberint.com
Send your comments, questions, or topic suggestions to podcast@cybersecuritymarketingsociety.com 

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Charles Gold
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>What does it mean to be an impactful marketer in cybersecurity?<a href="https://www.linkedin.com/in/danny-miller-2012331/"> Danny Miller</a>, VP of Marketing at <a href="https://www.linkedin.com/company/cyberint/">CyberInt</a>, joins us in this CyberCMO Confidential segment episode to share how he drives success at a company redefining external threat intelligence. From strategy meetings with the CEO to packing custom swag kits, Danny takes us through the day-to-day life as the marketing leader at a growing cybersecurity startup.</p><p><br></p><p>Discover how CyberInt’s unique focus on actionable intelligence influences its culture and customer relationships, the art of balancing strategic priorities with hands-on work, and the challenges of scaling a team while staying involved. Plus, hear Danny’s thoughts on aligning with sales, creating seamless customer journeys, and why sometimes it’s okay to let go—even if you’re a little bit of a control freak.</p><h2><br></h2><h2>Key Highlights:</h2><p><strong>[02:00]</strong> - <em>Making Intelligence: </em>Danny explains how CyberInt goes beyond data to deliver actionable insights that impact cybersecurity teams.</p><p><strong>[05:15]</strong> - <em>Meet the Team</em>: A behind-the-scenes look at CyberInt’s global marketing squad—10 pros balancing demand gen, product marketing, and BDR operations.</p><p><strong>[08:40]</strong> - <em>A CMO’s Day in the Trenches</em>: From boardroom strategy to packing elaborate swag kits, Danny’s day is anything but boring.</p><p><strong>[15:20]</strong> - <em>The Art of Letting Go</em>: Danny shares how he’s learning to delegate while keeping his personal touch on the work that matters most.</p><p><strong>[20:35]</strong> - <em>Keeping Execs in the Loop</em>: Danny uses reports, OKRs, and transparency to align with the CEO and leadership team.</p><p><strong>[28:00]</strong> - <em>From Lead to Loyalty</em>: The challenge of creating a seamless customer experience across marketing, sales, and beyond—and why it’s worth the effort.</p><p><strong>[35:50]</strong> - <em>Lessons in Staying the Course</em>: The best advice Danny ignored and how it shaped his perspective on perseverance and growth.</p><p><br></p><h2>Links and Resources Mentioned:</h2><p>Learn more about CyberInt:<a href="https://cyberint.com"> cyberint.com</a></p><p>Send your comments, questions, or topic suggestions to <a href="mailto:podcast@cybersecuritymarketingsociety.com">podcast@cybersecuritymarketingsociety.com</a> </p><p><br></p><h2>Join us at Cyber MarketingCon2024!</h2><p>(December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>CyberMarketingCon</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/charlesgold/">Charles Gold</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1580</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[caa109e8-ad7b-11ef-a313-bb7b4d0a5ecd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6011548423.mp3?updated=1733173311" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mastering Marketing Ops with Rob Young.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/132/notes</link>
      <description>Please enjoy this encore episode of Breaking Through in Cybersecurity Marketing:
Ready to shake up your approach to cybersecurity marketing? In this episode of Breaking Through in Cybersecurity Marketing, Gianna and Maria bring on Rob Young, the amazing VP of Marketing at Cypago. Rob doesn't just talk strategy—he’s lived it, from the fast-paced world of startups to leading massive organizations. Tune in as he shares game-changing insights, the secrets behind his biggest wins, and why your marketing efforts need a serious upgrade. If you’re tired of the same old advice, this episode is your wake-up call.

[14:50] - Transition into Cybersecurity Marketing
Rob's early experience in the startup world began with the AI-platform, Astound, where he focused on building teams, and developing and executing strategies in a fast-paced environment. There are differences between marketing in startups, which requires quick decision-making and hands-on work, versus large companies, where processes are slower and more structured.

[20:25] - Advice for Marketing Leaders
Rob shares insights on staying agile in large organizations by building strong relationships across departments to speed up processes.

[25:45] - Setting Up a Marketing Org from Scratch
When Rob joins a new company, he focuses on messaging, positioning, and product marketing. He stresses the importance of aligning sales and marketing to ensure a clear and compelling value proposition for customers.

[30:15] - The Importance of Marketing Ops
Rob's first hire at Astound was in marketing ops due to its role in tracking data and optimizing strategies. Having a core team that includes marketing ops, digital marketing, and product marketing helps in driving the company's marketing effort. 

[39:40] - Low-Hanging Fruit in a New Marketing Role
Optimizing website content, implementing effective digital strategies, and steering clear of outdated marketing tactics are important quick wins in a new marketing role. Rob discusses the more challenging wins he focuses on, like managing leads and making sure they align with the ideal customer profile (ICP).  

[45:35] - The Changing Landscape of Sales and Marketing
Rob talks about the shift from high-volume to more targeted marketing, which has led to a reduced role for SDRs. He explores how to balance noise and signal in lead generation and shares his perspective on evolving trends in marketing strategies.

About our guests:
👉Follow Rob on LinkedIn. 
👉Learn more about Cypago.   

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 27 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>Mastering Marketing Ops with Rob Young.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Breaking Through in Cybersecurity Marketing:
Ready to shake up your approach to cybersecurity marketing? In this episode of Breaking Through in Cybersecurity Marketing, Gianna and Maria bring on Rob Young, the amazing VP of Marketing at Cypago. Rob doesn't just talk strategy—he’s lived it, from the fast-paced world of startups to leading massive organizations. Tune in as he shares game-changing insights, the secrets behind his biggest wins, and why your marketing efforts need a serious upgrade. If you’re tired of the same old advice, this episode is your wake-up call.

[14:50] - Transition into Cybersecurity Marketing
Rob's early experience in the startup world began with the AI-platform, Astound, where he focused on building teams, and developing and executing strategies in a fast-paced environment. There are differences between marketing in startups, which requires quick decision-making and hands-on work, versus large companies, where processes are slower and more structured.

[20:25] - Advice for Marketing Leaders
Rob shares insights on staying agile in large organizations by building strong relationships across departments to speed up processes.

[25:45] - Setting Up a Marketing Org from Scratch
When Rob joins a new company, he focuses on messaging, positioning, and product marketing. He stresses the importance of aligning sales and marketing to ensure a clear and compelling value proposition for customers.

[30:15] - The Importance of Marketing Ops
Rob's first hire at Astound was in marketing ops due to its role in tracking data and optimizing strategies. Having a core team that includes marketing ops, digital marketing, and product marketing helps in driving the company's marketing effort. 

[39:40] - Low-Hanging Fruit in a New Marketing Role
Optimizing website content, implementing effective digital strategies, and steering clear of outdated marketing tactics are important quick wins in a new marketing role. Rob discusses the more challenging wins he focuses on, like managing leads and making sure they align with the ideal customer profile (ICP).  

[45:35] - The Changing Landscape of Sales and Marketing
Rob talks about the shift from high-volume to more targeted marketing, which has led to a reduced role for SDRs. He explores how to balance noise and signal in lead generation and shares his perspective on evolving trends in marketing strategies.

About our guests:
👉Follow Rob on LinkedIn. 
👉Learn more about Cypago.   

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Breaking Through in Cybersecurity Marketing:</p><p>Ready to shake up your approach to cybersecurity marketing? In this episode of Breaking Through in Cybersecurity Marketing, Gianna and Maria bring on <a href="https://www.linkedin.com/in/rob-young-19021113/">Rob Young</a>, the amazing VP of Marketing at <a href="https://www.linkedin.com/company/cypago/">Cypago</a>. Rob doesn't just talk strategy—he’s lived it, from the fast-paced world of startups to leading massive organizations. Tune in as he shares game-changing insights, the secrets behind his biggest wins, and why your marketing efforts need a serious upgrade. If you’re tired of the same old advice, this episode is your wake-up call.</p><p><br></p><p><strong>[14:50] - Transition into Cybersecurity Marketing</strong></p><p>Rob's early experience in the startup world began with the AI-platform, Astound, where he focused on building teams, and developing and executing strategies in a fast-paced environment. There are differences between marketing in startups, which requires quick decision-making and hands-on work, versus large companies, where processes are slower and more structured.</p><p><br></p><p><strong>[20:25] - Advice for Marketing Leaders</strong></p><p>Rob shares insights on staying agile in large organizations by building strong relationships across departments to speed up processes.</p><p><br></p><p><strong>[25:45] - Setting Up a Marketing Org from Scratch</strong></p><p>When Rob joins a new company, he focuses on messaging, positioning, and product marketing. He stresses the importance of aligning sales and marketing to ensure a clear and compelling value proposition for customers.</p><p><br></p><p><strong>[30:15] - The Importance of Marketing Ops</strong></p><p>Rob's first hire at Astound was in marketing ops due to its role in tracking data and optimizing strategies. Having a core team that includes marketing ops, digital marketing, and product marketing helps in driving the company's marketing effort. </p><p><br></p><p><strong>[39:40] - Low-Hanging Fruit in a New Marketing Role</strong></p><p>Optimizing website content, implementing effective digital strategies, and steering clear of outdated marketing tactics are important quick wins in a new marketing role. Rob discusses the more challenging wins he focuses on, like managing leads and making sure they align with the ideal customer profile (ICP).  </p><p><br></p><p><strong>[45:35] - The Changing Landscape of Sales and Marketing</strong></p><p>Rob talks about the shift from high-volume to more targeted marketing, which has led to a reduced role for SDRs. He explores how to balance noise and signal in lead generation and shares his perspective on evolving trends in marketing strategies.</p><p><br></p><h2><strong>About our guests:</strong></h2><p>👉Follow Rob on <a href="https://www.linkedin.com/in/rob-young-19021113/">LinkedIn</a>. </p><p>👉Learn more about <a href="https://www.linkedin.com/company/cypago/">Cypago</a>.   </p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2464</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[020bcb4c-ac29-11ef-8dbf-e37eaae50c4d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8396161497.mp3?updated=1732648061" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The PGA’s Digital Swing: Passwordless, Cloud-Based, and Ready for Anything with Kevin J. Scott.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/144/notes</link>
      <description>Episode Summary:
This week, we sit down with Kevin J. Scott, the unconventional CTO/CIO and AI Engineer of the PGA of America, who brings a fresh perspective to technology in the golf industry. Kevin discusses how he has transformed the PGA's IT infrastructure from traditional methods to an entirely cloud-based, passwordless environment—eliminating the need for Active Directory and VPNs, resulting in smooth and secure user access. Additionally, he is rethinking cybersecurity partnerships, offering Managed Security Service Providers (MSSPs) the opportunity to take on tech roles and gain brand exposure at major PGA events. This episode is where technology, innovation, and the magic of golf come together!

Key Highlights:
[02:30] – PGA of America: More Than Just Tournaments
Kevin talks about the PGA of America’s unique role, which supports 30,000 golf pros and fosters career growth, distinct from the PGA Tour’s event focus.
[04:15] – The Tech Trio: Product, Design, and Code
Kevin’s team at PGA combines product managers, designers, and software engineers to create tailored tech solutions that fit the organization’s mission.
[06:50] – Cybersecurity Reinvented
A ransomware incident set off a cybersecurity overhaul, pushing PGA of America to the cloud and adopting a “no corporate network” policy with MFA, SSO, and zero-trust.
[10:30] – Goodbye, MFA Fatigue
To simplify security, Kevin’s team employs Okta’s Verify app and plans for passwordless login, making access smooth and secure for users without overwhelming them.
[15:10] – Future-Proofing Identity
Kevin discusses the shift toward biometrics and Face ID, highlighting how these tools simplify secure access for everyone—even non-techies.
[21:00] – A Game-Changing RFP
In a first for PGA, Kevin reveals an MSSP RFP that mixes security with a brand partnership, offering vendors visibility at PGA events.
[33:00] – AI: The RFP Sidekick
With 150 RFP responses, Kevin’s team uses AI to quickly sort and answer 900+ questions, proving how AI transforms workflows.
[39:50] – Custom Marketing for Tech Partners
Kevin’s team is crafting unique marketing packages for RFP finalists, ensuring authentic and mutually beneficial partnerships.

Links and Resources Mentioned:
Listeners, please send your questions or thoughts to podcast@cybersecuritymarketingsociety.com — we’d love to hear from you!

Join us at Cyber MarketingCon2024!
 (December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 20 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>The PGA’s Digital Swing: Passwordless, Cloud-Based, and Ready for Anything with Kevin J. Scott.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>144</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
This week, we sit down with Kevin J. Scott, the unconventional CTO/CIO and AI Engineer of the PGA of America, who brings a fresh perspective to technology in the golf industry. Kevin discusses how he has transformed the PGA's IT infrastructure from traditional methods to an entirely cloud-based, passwordless environment—eliminating the need for Active Directory and VPNs, resulting in smooth and secure user access. Additionally, he is rethinking cybersecurity partnerships, offering Managed Security Service Providers (MSSPs) the opportunity to take on tech roles and gain brand exposure at major PGA events. This episode is where technology, innovation, and the magic of golf come together!

Key Highlights:
[02:30] – PGA of America: More Than Just Tournaments
Kevin talks about the PGA of America’s unique role, which supports 30,000 golf pros and fosters career growth, distinct from the PGA Tour’s event focus.
[04:15] – The Tech Trio: Product, Design, and Code
Kevin’s team at PGA combines product managers, designers, and software engineers to create tailored tech solutions that fit the organization’s mission.
[06:50] – Cybersecurity Reinvented
A ransomware incident set off a cybersecurity overhaul, pushing PGA of America to the cloud and adopting a “no corporate network” policy with MFA, SSO, and zero-trust.
[10:30] – Goodbye, MFA Fatigue
To simplify security, Kevin’s team employs Okta’s Verify app and plans for passwordless login, making access smooth and secure for users without overwhelming them.
[15:10] – Future-Proofing Identity
Kevin discusses the shift toward biometrics and Face ID, highlighting how these tools simplify secure access for everyone—even non-techies.
[21:00] – A Game-Changing RFP
In a first for PGA, Kevin reveals an MSSP RFP that mixes security with a brand partnership, offering vendors visibility at PGA events.
[33:00] – AI: The RFP Sidekick
With 150 RFP responses, Kevin’s team uses AI to quickly sort and answer 900+ questions, proving how AI transforms workflows.
[39:50] – Custom Marketing for Tech Partners
Kevin’s team is crafting unique marketing packages for RFP finalists, ensuring authentic and mutually beneficial partnerships.

Links and Resources Mentioned:
Listeners, please send your questions or thoughts to podcast@cybersecuritymarketingsociety.com — we’d love to hear from you!

Join us at Cyber MarketingCon2024!
 (December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>This week, we sit down with <a href="https://www.linkedin.com/in/thatkevinjscott/">Kevin J. Scott</a>, the unconventional CTO/CIO and AI Engineer of the <a href="https://www.linkedin.com/company/pga-of-america/">PGA of America</a>, who brings a fresh perspective to technology in the golf industry. Kevin discusses how he has transformed the PGA's IT infrastructure from traditional methods to an entirely cloud-based, passwordless environment—eliminating the need for Active Directory and VPNs, resulting in smooth and secure user access. Additionally, he is rethinking cybersecurity partnerships, offering Managed Security Service Providers (MSSPs) the opportunity to take on tech roles and gain brand exposure at major PGA events. This episode is where technology, innovation, and the magic of golf come together!</p><p><br></p><h2>Key Highlights:</h2><p><strong>[02:30] – PGA of America: More Than Just Tournaments</strong></p><p>Kevin talks about the PGA of America’s unique role, which supports 30,000 golf pros and fosters career growth, distinct from the PGA Tour’s event focus.</p><p><strong>[04:15] – The Tech Trio: Product, Design, and Code</strong></p><p>Kevin’s team at PGA combines product managers, designers, and software engineers to create tailored tech solutions that fit the organization’s mission.</p><p><strong>[06:50] – Cybersecurity Reinvented</strong></p><p>A ransomware incident set off a cybersecurity overhaul, pushing PGA of America to the cloud and adopting a “no corporate network” policy with MFA, SSO, and zero-trust.</p><p><strong>[10:30] – Goodbye, MFA Fatigue</strong></p><p>To simplify security, Kevin’s team employs Okta’s Verify app and plans for passwordless login, making access smooth and secure for users without overwhelming them.</p><p><strong>[15:10] – Future-Proofing Identity</strong></p><p>Kevin discusses the shift toward biometrics and Face ID, highlighting how these tools simplify secure access for everyone—even non-techies.</p><p><strong>[21:00] – A Game-Changing RFP</strong></p><p>In a first for PGA, Kevin reveals an MSSP RFP that mixes security with a brand partnership, offering vendors visibility at PGA events.</p><p><strong>[33:00] – AI: The RFP Sidekick</strong></p><p>With 150 RFP responses, Kevin’s team uses AI to quickly sort and answer 900+ questions, proving how AI transforms workflows.</p><p><strong>[39:50] – Custom Marketing for Tech Partners</strong></p><p>Kevin’s team is crafting unique marketing packages for RFP finalists, ensuring authentic and mutually beneficial partnerships.</p><h2><br></h2><h2>Links and Resources Mentioned:</h2><p>Listeners, please send your questions or thoughts to <a href="mailto:podcast@cybersecuritymarketingsociety.com"><strong>podcast@cybersecuritymarketingsociety.com</strong></a><strong> </strong>— we’d love to hear from you!</p><p><br></p><h2>Join us at Cyber MarketingCon2024!</h2><p> (December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>CyberMarketingCon</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><h2><br></h2><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p><br></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4df74472-a34c-11ef-8e87-af1419551480]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3956160697.mp3?updated=1732051517" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Culture, Credibility, and Collaboration: Thomas Bain’s Playbook for CMO Success</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/143/notes</link>
      <description>Episode Summary:
"It’s not all numbers and dashboards—sometimes, CMO success boils down to building trust and a team that clicks." This week on Cyber CMO Confidential, we’ve got Thomas Bain, the CMO of  VulnCheck, joining us to reveal the keys to leading in cybersecurity marketing. Tom shares how he builds credibility with technical teams, aligns with sales without losing autonomy, and cultivates a company culture that drives actual results. Hosts Gianna Whitver and Charles Gold dig into the art (and science) of connecting across departments, understanding team dynamics, and confidently navigating rapid growth.
Tom explains why CMOs should focus on continuous learning and shares what he seeks in a company’s leadership before joining. This is THE episode for anyone hoping to excel in the leadership aspect of marketing.

Key Highlights:
[02:30] – The importance of company culture: Why communication and transparency are essential for building a productive workplace.
[05:15] – Aligning with engineers and technical teams: Building credibility when marketing meets cybersecurity expertise.
[10:40] – The impact of culture on recruitment: Finding the suitable hires and aligning them with company goals.
[15:25] – Balancing sales and marketing needs: More strategies for smooth collaboration and avoiding the blame game.
[20:30] – Building a trusted CMO-Sales relationship: How to stay aligned with sales leadership in a fast-paced environment.
[25:10] – The high stakes of hiring in small teams: Tom’s tips for spotting cultural alignment during the interview process.
[35:50] – Why continuous learning matters for CMOs: Tom advises staying relevant and growing as a marketing leader.

Links and Resources Mentioned:
VulnCheck – Learn more about Tom Bain’s work and VolnCheck's cybersecurity solutions.
Listeners, please send your questions or thoughts to podcast@cybersecuritymarketingsociety.com — we’d love to hear from you!

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
👉Charles Gold
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 13 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>Culture, Credibility, and Collaboration: Thomas Bain’s Playbook for CMO Success</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>143</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
"It’s not all numbers and dashboards—sometimes, CMO success boils down to building trust and a team that clicks." This week on Cyber CMO Confidential, we’ve got Thomas Bain, the CMO of  VulnCheck, joining us to reveal the keys to leading in cybersecurity marketing. Tom shares how he builds credibility with technical teams, aligns with sales without losing autonomy, and cultivates a company culture that drives actual results. Hosts Gianna Whitver and Charles Gold dig into the art (and science) of connecting across departments, understanding team dynamics, and confidently navigating rapid growth.
Tom explains why CMOs should focus on continuous learning and shares what he seeks in a company’s leadership before joining. This is THE episode for anyone hoping to excel in the leadership aspect of marketing.

Key Highlights:
[02:30] – The importance of company culture: Why communication and transparency are essential for building a productive workplace.
[05:15] – Aligning with engineers and technical teams: Building credibility when marketing meets cybersecurity expertise.
[10:40] – The impact of culture on recruitment: Finding the suitable hires and aligning them with company goals.
[15:25] – Balancing sales and marketing needs: More strategies for smooth collaboration and avoiding the blame game.
[20:30] – Building a trusted CMO-Sales relationship: How to stay aligned with sales leadership in a fast-paced environment.
[25:10] – The high stakes of hiring in small teams: Tom’s tips for spotting cultural alignment during the interview process.
[35:50] – Why continuous learning matters for CMOs: Tom advises staying relevant and growing as a marketing leader.

Links and Resources Mentioned:
VulnCheck – Learn more about Tom Bain’s work and VolnCheck's cybersecurity solutions.
Listeners, please send your questions or thoughts to podcast@cybersecuritymarketingsociety.com — we’d love to hear from you!

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
👉Charles Gold
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p><em>"It’s not all numbers and dashboards—sometimes, CMO success boils down to building trust and a team that clicks."</em> This week on <em>Cyber CMO Confidential</em>, we’ve got <a href="https://www.linkedin.com/in/thomasbain/">Thomas Bain</a>, the CMO of  <a href="https://www.linkedin.com/company/vulncheck/">VulnCheck</a>, joining us to reveal the keys to leading in cybersecurity marketing. Tom shares how he builds credibility with technical teams, aligns with sales without losing autonomy, and cultivates a company culture that drives actual results. Hosts Gianna Whitver and Charles Gold dig into the art (<em>and science</em>) of connecting across departments, understanding team dynamics, and confidently navigating rapid growth.</p><p>Tom explains why CMOs should focus on continuous learning and shares what he seeks in a company’s leadership before joining. This is <em>THE</em> episode for anyone hoping to excel in the leadership aspect of marketing.</p><p><br></p><h2>Key Highlights:</h2><p><strong>[02:30]</strong> – <em>The importance of company culture</em>: Why communication and transparency are essential for building a productive workplace.</p><p><strong>[05:15]</strong> –<em> Aligning with engineers and technical teams</em>: Building credibility when marketing meets cybersecurity expertise.</p><p><strong>[10:40]</strong> – <em>The impact of culture on recruitmen</em>t: Finding the suitable hires and aligning them with company goals.</p><p><strong>[15:25]</strong> – <em>Balancing sales and marketing needs</em>: More strategies for smooth collaboration and avoiding the blame game.</p><p><strong>[20:30]</strong> – <em>Building a trusted CMO-Sales relationship</em>: How to stay aligned with sales leadership in a fast-paced environment.</p><p><strong>[25:10]</strong> – <em>The high stakes of hiring in small teams</em>: Tom’s tips for spotting cultural alignment during the interview process.</p><p><strong>[35:50]</strong> – <em>Why continuous learning matters for CMOs</em>: Tom advises staying relevant and growing as a marketing leader.</p><p><br></p><h2>Links and Resources Mentioned:</h2><p><a href="https://www.linkedin.com/company/vulncheck/">VulnCheck</a> – Learn more about Tom Bain’s work and VolnCheck's cybersecurity solutions.</p><p>Listeners, please send your questions or thoughts to <a href="mailto:podcast@cybersecuritymarketingsociety.com"><strong>podcast@cybersecuritymarketingsociety.com</strong></a><strong> </strong>— we’d love to hear from you!</p><p><br></p><h2>Join us at Cyber MarketingCon2024!</h2><p>(December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>CyberMarketingCon</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>👉<a href="https://linkedin.com/in/charlesgold">Charles Gold</a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1638</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d15df726-9dd8-11ef-8ab5-774ff8da7407]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1458133583.mp3?updated=1731441114" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From ‘Meh’ to Mastery: Steve Piper on ABM Strategies that Work. </title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/142/notes</link>
      <description>Episode Summary:
Are you looking for an edge in cybersecurity marketing? Steve Piper, CEO of CyberEdge Group, is here to help! As the head of the largest research and marketing firm dedicated to cybersecurity, Steve knows the art and science of turning leads into wins. In this episode, he’s spilling secrets on building the perfect target account list, the magic of message mapping, and what many marketers get wrong about content syndication (spoiler: it’s way easier than you think). Steve shares strategies on target account lists, segmentation, content alignment, and multi-channel engagement. Discover differences between “one-touch” and “nurtured” leads, why content syndication matters, and five ways to supercharge your ABM program.

Key Highlights:
[02:00] - Intro to CyberEdge Group: How Steve Piper grew CyberEdge into a leader in cybersecurity marketing with 50+ services.
[06:50] - Why ABM Is Challenging: Common ABM struggles, from nurturing expectations to the complexity of multi-stakeholder targeting.
[10:20] - Five Ways to Supercharge ABM: Steve’s expert tips, starting with target account list optimization.
[15:00] - Content Strategy for ABM: Using message maps and segment-specific content to drive engagement.
[18:45] - Channel Mix &amp; Experimentation: How CyberEdge uses webinars, content syndication, and multi-touch nurturing in ABM.
[22:30] - Nurturing "One-Touch" Leads: The importance of qualifying leads and when to contact sales-ready leads.

Links and Resources Mentioned:
CyberEdge Group – Learn more about CyberEdge's services for cybersecurity marketers.

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 06 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>From ‘Meh’ to Mastery: Steve Piper on ABM Strategies that Work. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>142</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
Are you looking for an edge in cybersecurity marketing? Steve Piper, CEO of CyberEdge Group, is here to help! As the head of the largest research and marketing firm dedicated to cybersecurity, Steve knows the art and science of turning leads into wins. In this episode, he’s spilling secrets on building the perfect target account list, the magic of message mapping, and what many marketers get wrong about content syndication (spoiler: it’s way easier than you think). Steve shares strategies on target account lists, segmentation, content alignment, and multi-channel engagement. Discover differences between “one-touch” and “nurtured” leads, why content syndication matters, and five ways to supercharge your ABM program.

Key Highlights:
[02:00] - Intro to CyberEdge Group: How Steve Piper grew CyberEdge into a leader in cybersecurity marketing with 50+ services.
[06:50] - Why ABM Is Challenging: Common ABM struggles, from nurturing expectations to the complexity of multi-stakeholder targeting.
[10:20] - Five Ways to Supercharge ABM: Steve’s expert tips, starting with target account list optimization.
[15:00] - Content Strategy for ABM: Using message maps and segment-specific content to drive engagement.
[18:45] - Channel Mix &amp; Experimentation: How CyberEdge uses webinars, content syndication, and multi-touch nurturing in ABM.
[22:30] - Nurturing "One-Touch" Leads: The importance of qualifying leads and when to contact sales-ready leads.

Links and Resources Mentioned:
CyberEdge Group – Learn more about CyberEdge's services for cybersecurity marketers.

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>Are you looking for an <em>edge</em> in cybersecurity marketing? <a href="https://www.linkedin.com/in/stevenrpiper/">Steve Piper</a>, CEO of <a href="https://www.linkedin.com/company/cyberedge-group-llc/">CyberEdge Group</a>, is here to help! As the head of the largest research and marketing firm dedicated to cybersecurity, Steve knows the art and science of turning leads into wins. In this episode, he’s spilling secrets on building the perfect target account list, the magic of message mapping, and what many marketers get wrong about content syndication (<em>spoiler: it’s way easier than you think</em>). Steve shares strategies on target account lists, segmentation, content alignment, and multi-channel engagement. Discover differences between “one-touch” and “nurtured” leads, why content syndication matters, and five ways to supercharge your ABM program.</p><h3><br></h3><h2>Key Highlights:</h2><p><strong>[02:00]</strong> - <strong>Intro to CyberEdge Group</strong>: How Steve Piper grew CyberEdge into a leader in cybersecurity marketing with 50+ services.</p><p><strong>[06:50]</strong> - <strong>Why ABM Is Challenging</strong>: Common ABM struggles, from nurturing expectations to the complexity of multi-stakeholder targeting.</p><p><strong>[10:20]</strong> - <strong>Five Ways to Supercharge ABM</strong>: Steve’s expert tips, starting with target account list optimization.</p><p><strong>[15:00]</strong> - <strong>Content Strategy for ABM</strong>: Using message maps and segment-specific content to drive engagement.</p><p><strong>[18:45]</strong> - <strong>Channel Mix &amp; Experimentation</strong>: How CyberEdge uses webinars, content syndication, and multi-touch nurturing in ABM.</p><p><strong>[22:30]</strong> - <strong>Nurturing "One-Touch" Leads</strong>: The importance of qualifying leads and when to contact sales-ready leads.</p><p><br></p><h2>Links and Resources Mentioned:</h2><p><strong>CyberEdge Group</strong> – Learn more about <a href="https://cyberedgegroup.com/">CyberEdge</a>'s services for cybersecurity marketers.</p><p><br></p><h2>Join us at Cyber MarketingCon2024!</h2><p>(December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>CyberMarketingCon</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[30563b68-984c-11ef-b767-2b5d173e4139]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3698120785.mp3?updated=1730825299" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CMO Carole Winqwist on Growth, AI, and Global Marketing Success</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/141/notes</link>
      <description>Episode Summary:
Being a CMO isn't just about crunching numbers or throwing creative campaigns at the wall to see what sticks. It’s more like steering a high-speed ship through uncharted waters—where every turn demands equal parts strategy, innovation, and intuition. In CyberCMO Confidential, hosted by the always-sharp Charles Gold, we dive into the behind-the-scenes world of marketing leadership, where every decision is a mix of art and data.
In this month’s episode, Charles chats with Carole Winqwist, GitGuardian's CMO, about growing her team from 3 to 23, balancing the quirks of U.S. and French work cultures, and how AI is transforming the day-to-day. Get ready for an insightful discussion from two marketing pros about strategy, innovation, and 100% real talk.

Key Highlights:


[01:00] – Carole’s career journey to becoming CMO and her approach to picking her title at GitGuardian.


[03:00] – Building a marketing team from 3 to 23 people: addressing the challenges of scaling a team and supporting both the French and U.S. markets

.[06:40] – Managing cross-cultural teams and the differences between U.S. and French work environments, especially around job security and loyalty.


[04:00] – The most significant challenges of B2B marketing: long sales cycles and measuring marketing impact.


[20:00] – How GitGuardian’s marketing team leverages AI tools like ChatGPT to accelerate content creation and maintain high quality.


[25:00] – Navigating marketing and sales alignment while maintaining autonomy and avoiding being an "order-taker."



[15:10] – The role of BDRs in the marketing team and why having them close to content creation makes all the difference.


Links and Resources Mentioned:
GitGuardian – Learn more about GitGuardian and their cutting-edge security solutions here.

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 30 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>CMO Carole Winqwist on Growth, AI, and Global Marketing Success</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>141</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
Being a CMO isn't just about crunching numbers or throwing creative campaigns at the wall to see what sticks. It’s more like steering a high-speed ship through uncharted waters—where every turn demands equal parts strategy, innovation, and intuition. In CyberCMO Confidential, hosted by the always-sharp Charles Gold, we dive into the behind-the-scenes world of marketing leadership, where every decision is a mix of art and data.
In this month’s episode, Charles chats with Carole Winqwist, GitGuardian's CMO, about growing her team from 3 to 23, balancing the quirks of U.S. and French work cultures, and how AI is transforming the day-to-day. Get ready for an insightful discussion from two marketing pros about strategy, innovation, and 100% real talk.

Key Highlights:


[01:00] – Carole’s career journey to becoming CMO and her approach to picking her title at GitGuardian.


[03:00] – Building a marketing team from 3 to 23 people: addressing the challenges of scaling a team and supporting both the French and U.S. markets

.[06:40] – Managing cross-cultural teams and the differences between U.S. and French work environments, especially around job security and loyalty.


[04:00] – The most significant challenges of B2B marketing: long sales cycles and measuring marketing impact.


[20:00] – How GitGuardian’s marketing team leverages AI tools like ChatGPT to accelerate content creation and maintain high quality.


[25:00] – Navigating marketing and sales alignment while maintaining autonomy and avoiding being an "order-taker."



[15:10] – The role of BDRs in the marketing team and why having them close to content creation makes all the difference.


Links and Resources Mentioned:
GitGuardian – Learn more about GitGuardian and their cutting-edge security solutions here.

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, CyberMarketingCon is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>Being a CMO isn't just about crunching numbers or throwing creative campaigns at the wall to see what sticks. It’s more like steering a high-speed ship through uncharted waters—where every turn demands equal parts strategy, innovation, and intuition. In <strong>CyberCMO Confidential</strong>, hosted by the always-sharp <a href="https://www.linkedin.com/in/charlesgold/">Charles Gold</a>, we dive into the behind-the-scenes world of marketing leadership, where every decision is a mix of art and data.</p><p>In this month’s episode, Charles chats with <a href="https://www.linkedin.com/in/carole-winqwist-8415323/">Carole Winqwist</a>, <a href="https://www.linkedin.com/company/gitguardian/">GitGuardian</a>'s CMO, about growing her team from 3 to 23, balancing the quirks of U.S. and French work cultures, and how AI is transforming the day-to-day. Get ready for an insightful discussion from two marketing pros about strategy, innovation, and 100% real talk.</p><p><br></p><h2>Key Highlights:</h2><ul>
<li>
<strong>[01:00]</strong> – Carole’s career journey to becoming CMO and her approach to picking her title at GitGuardian.</li>
<li>
<strong>[03:00]</strong> – <em>Building a marketing team from 3 to 23 people</em>: addressing the challenges of scaling a team and supporting both the French and U.S. markets</li>
<li>.<strong>[06:40]</strong> – Managing cross-cultural teams and the differences between U.S. and French work environments, especially around job security and loyalty.</li>
<li>
<strong>[04:00]</strong> – The most significant challenges of B2B marketing: long sales cycles and measuring marketing impact.</li>
<li>
<strong>[20:00]</strong> – How GitGuardian’s marketing team leverages AI tools like ChatGPT to accelerate content creation and maintain high quality.</li>
<li>
<strong>[25:00]</strong> – Navigating marketing and sales alignment while maintaining autonomy and avoiding being an<em> "order-taker."</em>
</li>
<li>
<strong>[15:10]</strong> – The role of BDRs in the marketing team and why having them close to content creation makes all the difference.</li>
</ul><p><br></p><h2>Links and Resources Mentioned:</h2><p><a href="https://www.linkedin.com/company/gitguardian/">GitGuardian</a> – Learn more about GitGuardian and their cutting-edge security solutions<a href="https://www.gitguardian.com/"> here</a>.</p><p><br></p><h2>Join us at Cyber MarketingCon2024!</h2><p>(December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>CyberMarketingCon</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p><br></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1893</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d2e790a8-92d3-11ef-8aba-03d768b35574]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2890177650.mp3?updated=1730304606" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Art of Tech Podcasting: Insights from IT Pro’s Podcasters Rory Bathgate and Jane McCallion</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/140/notes</link>
      <description>Episode Summary:
Today’s episode feels like a stroll through a cute British seaside town—full of charm, surprises, and a little podcast mischief! We’re joined by the voices behind the IT Pro Podcast—Rory Bathgate, Features &amp; Multimedia Editor, and Jane McCallion, Managing Editor, to chat about all things tech, journalism, and podcasting. These two aren’t just tech experts; they have that unique podcaster vibe that makes every story more interesting.

Rory and Jane will discuss the intersection of technology and journalism, discussing how tech affects reporting and content creation. They touch on the challenges and benefits of podcasting, including audience engagement and the technical side of producing episodes. The conversation also covers social media’s role in news dissemination and the importance of podcasts in educating listeners on tech advancements. They also share their perspectives on new technologies like AI and cybersecurity, especially the need for ethical journalism in tech. 

This episode isn’t just for tech enthusiasts and storytellers—it’s also a great listen for anyone considering starting a podcast. You'll get everything from behind-the-scenes laughs to insights on tech reporting—with that signature British cheekiness and humor. 

Episode Highlights: 


[03:10] - Kick things off with Rory and Jane as they talk about their roles at IT Pro and spill the beans on crafting a killer B2B tech podcast.


[07:30] - Find out how the IT Pro Podcast found its unique voice amidst the whirlwind pace of tech journalism.


[12:45] - Join us live from the field! Rory and Jane chat about how recording at live events adds a new flavor to podcasting.


[18:15] - Seek behind the curtain with IT Pro Podcast: the laughs, the flubs, and those oh-so-fun tech snafus (yup, including their adventures in a makeshift soundproof studio!).

[25:20] - It's all about community: Hear how listeners shape the podcast and snag some tips on keeping everyone hooked.

[32:40] - Dive into why deep, rich conversations in tech matter and why some stories hit differently on a podcast than in print.

[40:50] - Pro tip alert! Find out what catches our eye when choosing podcast guests and how to pitch a story that'll click with our vibe.



Links and Resources Mentioned:

IT Pro Podcast


Graham Cluley 



Connect with Our Guests:


Rory Bathgate - LinkedIn



Jane McCallion - LinkedIn



Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!
Remember to hit the subscribe button so you never miss an episode! If you enjoyed today’s show, leave us a five-star review and share it with your friends in the cybersecurity world.</description>
      <pubDate>Wed, 23 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>The Art of Tech Podcasting: Insights from IT Pro’s Podcasters Rory Bathgate and Jane McCallion</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>140</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
Today’s episode feels like a stroll through a cute British seaside town—full of charm, surprises, and a little podcast mischief! We’re joined by the voices behind the IT Pro Podcast—Rory Bathgate, Features &amp; Multimedia Editor, and Jane McCallion, Managing Editor, to chat about all things tech, journalism, and podcasting. These two aren’t just tech experts; they have that unique podcaster vibe that makes every story more interesting.

Rory and Jane will discuss the intersection of technology and journalism, discussing how tech affects reporting and content creation. They touch on the challenges and benefits of podcasting, including audience engagement and the technical side of producing episodes. The conversation also covers social media’s role in news dissemination and the importance of podcasts in educating listeners on tech advancements. They also share their perspectives on new technologies like AI and cybersecurity, especially the need for ethical journalism in tech. 

This episode isn’t just for tech enthusiasts and storytellers—it’s also a great listen for anyone considering starting a podcast. You'll get everything from behind-the-scenes laughs to insights on tech reporting—with that signature British cheekiness and humor. 

Episode Highlights: 


[03:10] - Kick things off with Rory and Jane as they talk about their roles at IT Pro and spill the beans on crafting a killer B2B tech podcast.


[07:30] - Find out how the IT Pro Podcast found its unique voice amidst the whirlwind pace of tech journalism.


[12:45] - Join us live from the field! Rory and Jane chat about how recording at live events adds a new flavor to podcasting.


[18:15] - Seek behind the curtain with IT Pro Podcast: the laughs, the flubs, and those oh-so-fun tech snafus (yup, including their adventures in a makeshift soundproof studio!).

[25:20] - It's all about community: Hear how listeners shape the podcast and snag some tips on keeping everyone hooked.

[32:40] - Dive into why deep, rich conversations in tech matter and why some stories hit differently on a podcast than in print.

[40:50] - Pro tip alert! Find out what catches our eye when choosing podcast guests and how to pitch a story that'll click with our vibe.



Links and Resources Mentioned:

IT Pro Podcast


Graham Cluley 



Connect with Our Guests:


Rory Bathgate - LinkedIn



Jane McCallion - LinkedIn



Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure also to follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 

Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!
Remember to hit the subscribe button so you never miss an episode! If you enjoyed today’s show, leave us a five-star review and share it with your friends in the cybersecurity world.</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>Today’s episode feels like a stroll through a cute British seaside town—full of charm, surprises, and a little podcast mischief! We’re joined by the voices behind the <a href="https://www.itpro.com/the-it-pro-podcast">IT Pro Podcast</a>—<a href="https://www.linkedin.com/in/rory-bathgate-2176b6161/">Rory Bathgate</a>, Features &amp; Multimedia Editor, and <a href="https://www.linkedin.com/in/jane-mccallion/">Jane McCallion</a>, Managing Editor, to chat about all things tech, journalism, and podcasting. These two aren’t just tech experts; they have that unique podcaster <em>vibe</em> that makes every story more interesting.</p><p><br></p><p>Rory and Jane will discuss the intersection of technology and journalism, discussing how tech affects reporting and content creation. They touch on the challenges and benefits of podcasting, including audience engagement and the technical side of producing episodes. The conversation also covers social media’s role in news dissemination and the importance of podcasts in educating listeners on tech advancements. They also share their perspectives on new technologies like AI and cybersecurity, especially the need for ethical journalism in tech. </p><p><br></p><p>This episode isn’t just for tech enthusiasts and storytellers—it’s also a great listen for anyone considering starting a podcast. You'll get everything from behind-the-scenes laughs to insights on tech reporting—with that signature<em> British cheekiness and humor</em>. </p><p><br></p><h2>Episode Highlights: </h2><ul>
<li>
<strong>[03:10]</strong> - Kick things off with Rory and Jane as they talk about their roles at IT Pro and spill the beans on crafting a killer B2B tech podcast.</li>
<li>
<strong>[07:30]</strong> - Find out how the IT Pro Podcast found its unique voice amidst the whirlwind pace of tech journalism.</li>
<li>
<strong>[12:45]</strong> - <em>Join us live from the field!</em> Rory and Jane chat about how recording at live events adds a new flavor to podcasting.</li>
<li>
<strong>[18:15]</strong> - <em>Seek behind the curtain with IT Pro Podcast</em>: the laughs, the flubs, and those oh-so-fun tech snafus (yup, including their adventures in a makeshift soundproof studio!).</li>
<li>[25:20] -<em> It's all about community</em>: Hear how listeners shape the podcast and snag some tips on keeping everyone hooked.</li>
<li>[32:40] - Dive into why deep, rich conversations in tech matter and why some stories hit differently on a podcast than in print.</li>
<li>[40:50] -<em> Pro tip alert</em>! Find out what catches our eye when choosing podcast guests and how to pitch a story that'll click with our vibe.</li>
<li><br></li>
</ul><h2>Links and Resources Mentioned:</h2><ul>
<li><a href="https://www.itpro.com/the-it-pro-podcast">IT Pro Podcast</a></li>
<li>
<a href="https://grahamcluley.com/">Graham Cluley</a> </li>
<li><br></li>
</ul><h2>Connect with Our Guests:</h2><ul>
<li>
<strong>Rory Bathgate</strong> - <a href="https://www.linkedin.com/in/rory-bathgate-2176b6161/">LinkedIn</a>
</li>
<li>
<strong>Jane McCallion</strong> - <a href="https://www.linkedin.com/in/jane-mccallion/">LinkedIn</a>
</li>
</ul><p><br></p><h2>Join us at Cyber MarketingCon2024!</h2><p>(December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>Cyber Marketing Con</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><p><br></p><h2>Be sure also to follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p><br></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p><p><em>Remember to hit the subscribe button so you never miss an episode! If you enjoyed today’s show, leave us a five-star review and share it with your friends in the cybersecurity world.</em></p>]]>
      </content:encoded>
      <itunes:duration>2298</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29a3a11a-8d53-11ef-92be-9fd24afb53ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6106414883.mp3?updated=1729617774" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two Podcasters &amp; Endless OSINT Gold with Aubrey Byron and Shannon Ragan </title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/139/notes</link>
      <description>Episode Summary:
What happens when two podcasters sit down… on another podcast? We’re so excited to be joined by an amazing duo—Aubrey Byron, Content Marketing Manager, and Shannon Ragan, Director of Content Marketing at Authentic8. They are also co-hosts from the Needlestack Podcast. These two content marketing powerhouses take us behind the scenes of building a successful podcast that uncovers the secrets of open-source intelligence (OSINT), sharing stories of landing big-name guests, and why the world of government marketing is like navigating through an “iron curtain.” And just when you think you’ve heard it all, Shannon drops an unexpected bombshell about her future plans! Tune in for all the tips, creative inspiration, and of course, a dash of the unexpected. 

Key Highlights:
[02:15] - The journey of launching the Needlestack Podcast and how it pivoted from a live show to guest-driven interviews.
[03:50] - How cold DMing experts like Jack Rhysider from Darknet Diaries became a winning strategy for landing influential guests.
[07:15] - Why balancing tactical content with compelling storytelling keeps their audience engaged.
[10:49] - How OSINT’s constant evolution drives both interest and demand for the latest tools.
[13:32] - The role short-form video and organic social play in extending podcast reach.
[19:39] - Breaking into government and federal sectors through content, despite the iron curtain of limited data.
[28:02] - A deep dive into podcast production: sourcing guests, prep interviews, editing, and repurposing content.
[42:43] - A surprising twist—Shannon announces her sabbatical to finish her historical fiction book!

Links and Resources Mentioned:
Needlestack Podcast - Each week, NeedleStack co-hosts interview professional open-source researchers who discuss tips to hone your skills, improve tradecraft and protect yourself as you search the surface, deep and dark web. Subscribe wherever you get your podcasts.

Jack Reisider, Darknet Diaries - Your Conversation Studio to record in high quality, edit in a flash, and go live with a bang. Not necessarily in that order.

David Oltien (SEO Expert): Join David Oltien, Sr. Web Marketing Manager at Anomali, for Crawl, Walk, Run: leveling up your SEO skill set – an in-depth workshop designed for content and digital marketers who know the basics of SEO and want to master enterprise SEO strategies and technical SEO. 📅 Get your tickets now: www.cybermarketingconference.com!

Riverside Recording Platform: Riverside.fm

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 16 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>Two Podcasters &amp; Endless OSINT Gold with Aubrey Byron and Shannon Ragan </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>139</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Summary:
What happens when two podcasters sit down… on another podcast? We’re so excited to be joined by an amazing duo—Aubrey Byron, Content Marketing Manager, and Shannon Ragan, Director of Content Marketing at Authentic8. They are also co-hosts from the Needlestack Podcast. These two content marketing powerhouses take us behind the scenes of building a successful podcast that uncovers the secrets of open-source intelligence (OSINT), sharing stories of landing big-name guests, and why the world of government marketing is like navigating through an “iron curtain.” And just when you think you’ve heard it all, Shannon drops an unexpected bombshell about her future plans! Tune in for all the tips, creative inspiration, and of course, a dash of the unexpected. 

Key Highlights:
[02:15] - The journey of launching the Needlestack Podcast and how it pivoted from a live show to guest-driven interviews.
[03:50] - How cold DMing experts like Jack Rhysider from Darknet Diaries became a winning strategy for landing influential guests.
[07:15] - Why balancing tactical content with compelling storytelling keeps their audience engaged.
[10:49] - How OSINT’s constant evolution drives both interest and demand for the latest tools.
[13:32] - The role short-form video and organic social play in extending podcast reach.
[19:39] - Breaking into government and federal sectors through content, despite the iron curtain of limited data.
[28:02] - A deep dive into podcast production: sourcing guests, prep interviews, editing, and repurposing content.
[42:43] - A surprising twist—Shannon announces her sabbatical to finish her historical fiction book!

Links and Resources Mentioned:
Needlestack Podcast - Each week, NeedleStack co-hosts interview professional open-source researchers who discuss tips to hone your skills, improve tradecraft and protect yourself as you search the surface, deep and dark web. Subscribe wherever you get your podcasts.

Jack Reisider, Darknet Diaries - Your Conversation Studio to record in high quality, edit in a flash, and go live with a bang. Not necessarily in that order.

David Oltien (SEO Expert): Join David Oltien, Sr. Web Marketing Manager at Anomali, for Crawl, Walk, Run: leveling up your SEO skill set – an in-depth workshop designed for content and digital marketers who know the basics of SEO and want to master enterprise SEO strategies and technical SEO. 📅 Get your tickets now: www.cybermarketingconference.com!

Riverside Recording Platform: Riverside.fm

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Summary:</h2><p>What happens when two podcasters sit down… on <em>another</em> podcast? We’re so excited to be joined by an amazing duo—<a href="https://www.linkedin.com/in/aubrey-byron-61a2a955/">Aubrey Byron</a>, Content Marketing Manager, and Shannon Ragan, Director of Content Marketing at <a href="https://www.linkedin.com/company/authentic8/">Authentic8</a>. They are also co-hosts from the <a href="https://www.authentic8.com/needlestack"><em>Needlestack Podcast</em></a>. These two content marketing powerhouses take us behind the scenes of building a successful podcast that uncovers the secrets of open-source intelligence (OSINT), sharing stories of landing big-name guests, and why the world of government marketing is like navigating through an<em> “iron curtain.”</em> And just when you think you’ve heard it all, Shannon drops an unexpected bombshell about her future plans! Tune in for all the tips, creative inspiration, and of course, a dash of the unexpected. </p><p><br></p><h2>Key Highlights:</h2><p>[02:15] - The journey of launching the <em>Needlestack Podcast</em> and how it pivoted from a live show to guest-driven interviews.</p><p>[03:50] - How cold DMing experts like Jack Rhysider from <em>Darknet Diaries</em> became a winning strategy for landing influential guests.</p><p>[07:15] - Why balancing tactical content with compelling storytelling keeps their audience engaged.</p><p>[10:49] - How OSINT’s constant evolution drives both interest and demand for the latest tools.</p><p>[13:32] - The role short-form video and organic social play in extending podcast reach.</p><p>[19:39] - Breaking into government and federal sectors through content, despite the iron curtain of limited data.</p><p>[28:02] - A deep dive into podcast production: sourcing guests, prep interviews, editing, and repurposing content.</p><p>[42:43] - A surprising twist—Shannon announces her sabbatical to finish her historical fiction book!</p><p><br></p><h2>Links and Resources Mentioned:</h2><p><a href="https://www.authentic8.com/needlestack">Needlestack Podcast</a> - Each week, NeedleStack co-hosts interview professional open-source researchers who discuss tips to hone your skills, improve tradecraft and protect yourself as you search the surface, deep and dark web. Subscribe wherever you get your podcasts.</p><p><br></p><p><strong>Jack </strong><strong>Reisider</strong><strong>, </strong><a href="https://darknetdiaries.com"><strong>Darknet Diaries</strong></a> - Your Conversation Studio to record in high quality, edit in a flash, and go live with a bang. Not necessarily in that order.</p><p><br></p><p><strong>David </strong><strong>Oltien</strong> <strong>(SEO Expert):</strong> Join <a href="https://www.linkedin.com/in/dpoltean/">David Oltien</a>, Sr. Web Marketing Manager at Anomali, for <em>Crawl, Walk, Run: leveling up your SEO skill set –</em> an in-depth workshop designed for content and digital marketers who know the basics of SEO and want to master enterprise SEO strategies and technical SEO. 📅 Get your tickets now: <a href="http://www.cybermarketingconference.com">www.cybermarketingconference.com</a>!</p><p><br></p><p><strong>Riverside Recording Platform</strong>:<a href="https://www.riverside.fm"> Riverside.fm</a></p><p><br></p><h2>Join us at Cyber MarketingCon2024!</h2><p>(December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>Cyber Marketing Con</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><p><br></p><h2>Be sure to also follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2708</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9dfcfcd0-87d3-11ef-9f33-6755461420fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2033329039.mp3?updated=1729178768" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>9 Exits and Counting: CMO Varun Kohli’s Framework for Success (and for Getting on the Today Show!)</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/138/notes</link>
      <description>Episode Overview:
Let's hear the audience clap for our next guest! Ever wonder how a cybersecurity CMO gets featured on shows like the Today Show? Varun Kohli, CMO of Cequence Security, shares exactly how he did it. But it's not just about the applause. Kohli dives deep into how combining data with storytelling helped him achieve success across nine exits in his career. He also introduces his strategic "IMPP" framework—focusing on Investors, Market Size, People, and Product—which has been key to his impressive track record. This episode is packed with real marketing tips and lessons every cybersecurity marketer can learn from.

Episode Highlights/Timestamps:
[02:15] - IMPP Framework for Success
Varun shares his secret to navigating nine successful exits: his IMPP framework, focusing on Investors, Market, People, and Product.
[07:30] - AI’s Impact on Cybersecurity
Varun discusses why AI is shaking up cybersecurity and where the real opportunities lie.
[13:05] - How Storytelling Landed Varun on the Today Show
Hear how a powerful story and strategic data got Varun’s company on national TV, driving huge results.
[19:45] - Combining Data and Storytelling
Discover why Varun believes data and storytelling are inseparable for effective marketing.
[22:30] - Focusing on Your Brand, Not the Competition
Varun explains why chasing competitors is a mistake and how to stay focused on building your own brand.
[30:15] - Traditional Ads Still Work
From billboards to media ads, Varun talks about why traditional marketing can still be a game-changer in B2B.

About our guests:
👉Follow Varun on LinkedIn.  
👉Learn more about Cequence Security. 

Links and Resources Mentioned in This Episode
👉7 Uses of ChatGPT &amp; Generative AI for Marketing by Varun Kohli 
👉Today Show Segment with SkyCure – Watch how Varun got SkyCure onto the Today Show.
👉Mastering Marketing Mayhem with Pam Cobb – Get ready for a wild ride through Pam’s journey of managing chaos while growing a brand.

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 09 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>9 Exits and Counting: CMO Varun Kohli’s Framework for Success (and for Getting on the Today Show!)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>138</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Overview:
Let's hear the audience clap for our next guest! Ever wonder how a cybersecurity CMO gets featured on shows like the Today Show? Varun Kohli, CMO of Cequence Security, shares exactly how he did it. But it's not just about the applause. Kohli dives deep into how combining data with storytelling helped him achieve success across nine exits in his career. He also introduces his strategic "IMPP" framework—focusing on Investors, Market Size, People, and Product—which has been key to his impressive track record. This episode is packed with real marketing tips and lessons every cybersecurity marketer can learn from.

Episode Highlights/Timestamps:
[02:15] - IMPP Framework for Success
Varun shares his secret to navigating nine successful exits: his IMPP framework, focusing on Investors, Market, People, and Product.
[07:30] - AI’s Impact on Cybersecurity
Varun discusses why AI is shaking up cybersecurity and where the real opportunities lie.
[13:05] - How Storytelling Landed Varun on the Today Show
Hear how a powerful story and strategic data got Varun’s company on national TV, driving huge results.
[19:45] - Combining Data and Storytelling
Discover why Varun believes data and storytelling are inseparable for effective marketing.
[22:30] - Focusing on Your Brand, Not the Competition
Varun explains why chasing competitors is a mistake and how to stay focused on building your own brand.
[30:15] - Traditional Ads Still Work
From billboards to media ads, Varun talks about why traditional marketing can still be a game-changer in B2B.

About our guests:
👉Follow Varun on LinkedIn.  
👉Learn more about Cequence Security. 

Links and Resources Mentioned in This Episode
👉7 Uses of ChatGPT &amp; Generative AI for Marketing by Varun Kohli 
👉Today Show Segment with SkyCure – Watch how Varun got SkyCure onto the Today Show.
👉Mastering Marketing Mayhem with Pam Cobb – Get ready for a wild ride through Pam’s journey of managing chaos while growing a brand.

Join us at Cyber MarketingCon2024!
(December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Overview:</h2><p>Let's hear the audience clap for our next guest! Ever wonder how a cybersecurity CMO gets featured on shows like the <em>Today Show</em>? <a href="https://www.linkedin.com/in/kohlivarun/">Varun Kohli</a>, CMO of <a href="https://www.linkedin.com/company/cequence-security/">Cequence Security</a>, shares exactly how he did it. But it's not just about the applause. Kohli dives deep into how combining data with storytelling helped him achieve success across <strong>nine exits</strong> in his career. He also introduces his strategic "IMPP" framework—focusing on <strong>Investors, Market Size, People, and Product</strong>—which has been key to his impressive track record. This episode is packed with real marketing tips and lessons every cybersecurity marketer can learn from.</p><p><br></p><h2>Episode Highlights/Timestamps:</h2><p><strong>[02:15] - IMPP Framework for Success</strong></p><p>Varun shares his secret to navigating nine successful exits: his IMPP framework, focusing on Investors, Market, People, and Product.</p><p><strong>[07:30] - AI’s Impact on Cybersecurity</strong></p><p>Varun discusses why AI is shaking up cybersecurity and where the real opportunities lie.</p><p><strong>[13:05] - How Storytelling Landed Varun on the Today Show</strong></p><p>Hear how a powerful story and strategic data got Varun’s company on national TV, driving huge results.</p><p><strong>[19:45] - Combining Data and Storytelling</strong></p><p>Discover why Varun believes data and storytelling are inseparable for effective marketing.</p><p><strong>[22:30] - Focusing on Your Brand, Not the Competition</strong></p><p>Varun explains why chasing competitors is a mistake and how to stay focused on building your own brand.</p><p><strong>[30:15] - Traditional Ads Still Work</strong></p><p>From billboards to media ads, Varun talks about why traditional marketing can still be a game-changer in B2B.</p><h2><br></h2><h2>About our guests:</h2><p>👉Follow Varun on <a href="https://www.linkedin.com/company/cequence-security/">LinkedIn</a>.  </p><p>👉Learn more about <a href="https://www.linkedin.com/company/cequence-security/">Cequence Security</a>. </p><p><br></p><h2>Links and Resources Mentioned in This Episode</h2><p>👉<a href="https://www.linkedin.com/pulse/7-uses-chatgpt-generative-ai-marketing-varun-kohli/">7 Uses of ChatGPT &amp; Generative AI for Marketing</a> by Varun Kohli </p><p>👉Today Show Segment with SkyCure – Watch <a href="https://www.youtube.com/watch?v=-D4dSXx0MpA">how Varun got SkyCure onto the Today Show</a>.</p><p>👉<a href="https://www.thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/116/notes">Mastering Marketing Mayhem</a> with Pam Cobb – Get ready for a wild ride through Pam’s journey of managing chaos while growing a brand.</p><p><br></p><h2>Join us at Cyber MarketingCon2024!</h2><p>(December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>Cyber Marketing Con</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><p><br></p><h2>Be sure to also follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2098</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40079a2a-8262-11ef-b39d-6f0185492c23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9630969009.mp3?updated=1728402641" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taylor Swift. Cookware. Threat Research &amp; Marketing.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/137/notes</link>
      <description>Episode Overview:
What do Taylor Swift and Telegram have in common? Surprisingly, they are both prime targets for today’s most sophisticated scammers. In this episode, we chat with Nati Tal, Head of Guardio Labs and Sharon Blatt Cohen, Head of Marketing Communications from Guardio, who reveal how deep-fake ads featuring Taylor Swift are used to sell fake cookware, and how they went undercover on Telegram to discover just how easy it is to launch a full-scale phishing scam in less than a day. From pop culture to cutting-edge cybersecurity, this episode takes you behind the scenes of the dark world of online threats and shows how Guardio is staying one step ahead of scammers...and marketing that fact! Buckle up—this one’s a wild ride!

Episode Highlights:
[00:04:10] - What is Guardio?
Guardio focuses on protecting consumers and small businesses from online threats. Their browser extension and mobile apps help block scam emails, phishing links, and keep your information safe online.
[00:09:00] - Guardio Labs and Threat Hunting
Nati explains how Guardio Labs's research helps improve Guardio’s tools and keeps users safe from new types of attacks.
[00:15:45] - Marketing Meets Security
Sharon shares how marketing and security teams work together, using trending topics like Taylor Swift scams to create engaging campaigns that showcase Guardio’s ability to block threats.
[00:25:30] - Organic Media Attention  
Their Taylor Swift scam campaign was so timely it got picked up by the media, showing how good content and research can naturally spread and get press attention.
[00:32:45] - Telegram Scams and Fake Campaigns
Nati talks about setting up a fake scam on Telegram to learn how hackers operate. They found out how easy and cheap it is to set up scams, highlighting why cybersecurity is so important.
[00:41:10] - Staying Ahead of Scammers
Sharon explains how fast scammers jump on trends and how Guardio stays one step ahead to protect people before scams can cause harm.

About our guests:
👉Follow:
Sharon on LinkedIn. 
Check out Nati LinkedIn. 
👉Learn more Guardio. 

Links and Resources Mentioned in This Episode
Guardio - Learn more about Guardio’s cybersecurity solutions for consumers and small businesses, including their web extension and mobile apps. Visit Guardio. 
Guardio Labs - Explore Guardio Labs' security research and threat hunting to stay ahead of emerging online threats. Learn about Guardio Labs. 
Taylor Swift Scam Report - Read more about how deepfake ads featuring celebrities like Taylor Swift were used in online scams, part of Guardio's research. Read more about the research here. 
Guardio on TikTok - Follow Guardio’s TikTok for fun, educational videos about online scams and cybersecurity tips. Guardio TikTok. 
Breaking Through in Cybersecurity Marketing Podcast Instagram - We’ve launched an Instagram account, follow the podcast on Instagram for updates and behind-the-scenes content.
Cyber M Society on Instagram. 

Join us at Cyber MarketingCon2024!
 (December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 02 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>Taylor Swift. Cookware. Threat Research &amp; Marketing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>137</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Episode Overview:
What do Taylor Swift and Telegram have in common? Surprisingly, they are both prime targets for today’s most sophisticated scammers. In this episode, we chat with Nati Tal, Head of Guardio Labs and Sharon Blatt Cohen, Head of Marketing Communications from Guardio, who reveal how deep-fake ads featuring Taylor Swift are used to sell fake cookware, and how they went undercover on Telegram to discover just how easy it is to launch a full-scale phishing scam in less than a day. From pop culture to cutting-edge cybersecurity, this episode takes you behind the scenes of the dark world of online threats and shows how Guardio is staying one step ahead of scammers...and marketing that fact! Buckle up—this one’s a wild ride!

Episode Highlights:
[00:04:10] - What is Guardio?
Guardio focuses on protecting consumers and small businesses from online threats. Their browser extension and mobile apps help block scam emails, phishing links, and keep your information safe online.
[00:09:00] - Guardio Labs and Threat Hunting
Nati explains how Guardio Labs's research helps improve Guardio’s tools and keeps users safe from new types of attacks.
[00:15:45] - Marketing Meets Security
Sharon shares how marketing and security teams work together, using trending topics like Taylor Swift scams to create engaging campaigns that showcase Guardio’s ability to block threats.
[00:25:30] - Organic Media Attention  
Their Taylor Swift scam campaign was so timely it got picked up by the media, showing how good content and research can naturally spread and get press attention.
[00:32:45] - Telegram Scams and Fake Campaigns
Nati talks about setting up a fake scam on Telegram to learn how hackers operate. They found out how easy and cheap it is to set up scams, highlighting why cybersecurity is so important.
[00:41:10] - Staying Ahead of Scammers
Sharon explains how fast scammers jump on trends and how Guardio stays one step ahead to protect people before scams can cause harm.

About our guests:
👉Follow:
Sharon on LinkedIn. 
Check out Nati LinkedIn. 
👉Learn more Guardio. 

Links and Resources Mentioned in This Episode
Guardio - Learn more about Guardio’s cybersecurity solutions for consumers and small businesses, including their web extension and mobile apps. Visit Guardio. 
Guardio Labs - Explore Guardio Labs' security research and threat hunting to stay ahead of emerging online threats. Learn about Guardio Labs. 
Taylor Swift Scam Report - Read more about how deepfake ads featuring celebrities like Taylor Swift were used in online scams, part of Guardio's research. Read more about the research here. 
Guardio on TikTok - Follow Guardio’s TikTok for fun, educational videos about online scams and cybersecurity tips. Guardio TikTok. 
Breaking Through in Cybersecurity Marketing Podcast Instagram - We’ve launched an Instagram account, follow the podcast on Instagram for updates and behind-the-scenes content.
Cyber M Society on Instagram. 

Join us at Cyber MarketingCon2024!
 (December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>Episode Overview:</h2><p>What do Taylor Swift and Telegram have in common? Surprisingly, they are both prime targets for today’s most sophisticated scammers. In this episode, we chat with <a href="https://www.linkedin.com/in/natital/">Nati Tal</a>, Head of Guardio Labs and <a href="https://www.linkedin.com/in/sharon-blatt-cohen/">Sharon Blatt Cohen</a>, Head of Marketing Communications from <a href="https://www.linkedin.com/company/guardiosec/">Guardio</a>, who reveal how deep-fake ads featuring Taylor Swift are used to sell fake cookware, and how they went undercover on Telegram to discover just how easy it is to launch a full-scale phishing scam in less than a day. From pop culture to cutting-edge cybersecurity, this episode takes you behind the scenes of the dark world of online threats and shows how Guardio is staying one step ahead of scammers...and marketing that fact! Buckle up—this one’s a wild ride!</p><h3><br></h3><h2>Episode Highlights:</h2><p><strong>[00:04:10] - What is Guardio?</strong></p><p>Guardio focuses on protecting consumers and small businesses from online threats. Their browser extension and mobile apps help block scam emails, phishing links, and keep your information safe online.</p><p><strong>[00:09:00] - Guardio Labs and Threat Hunting</strong></p><p>Nati explains how Guardio Labs's research helps improve Guardio’s tools and keeps users safe from new types of attacks.</p><p><strong>[00:15:45] - Marketing Meets Security</strong></p><p>Sharon shares how marketing and security teams work together, using trending topics like Taylor Swift scams to create engaging campaigns that showcase Guardio’s ability to block threats.</p><p><strong>[00:25:30] - Organic Media Attention  </strong></p><p>Their Taylor Swift scam campaign was so timely it got picked up by the media, showing how good content and research can naturally spread and get press attention.</p><p><strong>[00:32:45] - Telegram Scams and Fake Campaigns</strong></p><p>Nati talks about setting up a fake scam on Telegram to learn how hackers operate. They found out how easy and cheap it is to set up scams, highlighting why cybersecurity is so important.</p><p><strong>[00:41:10] - Staying Ahead of Scammers</strong></p><p>Sharon explains how fast scammers jump on trends and how Guardio stays one step ahead to protect people before scams can cause harm.</p><p><br></p><h2>About our guests:</h2><p>👉Follow:</p><p>Sharon on <a href="https://www.linkedin.com/in/sharon-blatt-cohen/">LinkedIn</a>. </p><p>Check out Nati <a href="https://www.linkedin.com/in/natital/">LinkedIn</a>. </p><p>👉Learn more <a href="https://www.linkedin.com/company/guardiosec/">Guardio</a>. </p><p><br></p><h2>Links and Resources Mentioned in This Episode</h2><p><strong>Guardio</strong> - Learn more about Guardio’s cybersecurity solutions for consumers and small businesses, including their web extension and mobile apps. <a href="https://www.guard.io/">Visit Guardio</a>. </p><p><strong>Guardio Labs</strong> - Explore Guardio Labs' security research and threat hunting to stay ahead of emerging online threats. <a href="https://labs.guard.io/">Learn about Guardio Labs</a>. </p><p><strong>Taylor Swift Scam Report</strong> - Read more about how deepfake ads featuring celebrities like Taylor Swift were used in online scams, part of Guardio's research. <a href="https://guard.io/blog/most-imitated-brand-in-phishing-attacks-for-q1-2024">Read more about the research here</a>. </p><p><strong>Guardio on TikTok</strong> - Follow Guardio’s TikTok for fun, educational videos about online scams and cybersecurity tips. <a href="https://www.tiktok.com/@guardiosecurity?lang=en">Guardio TikTok</a>. </p><p><strong>Breaking Through in Cybersecurity Marketing Podcast Instagram</strong> - We’ve launched an Instagram account, follow the podcast on Instagram for updates and behind-the-scenes content.</p><p><a href="https://www.instagram.com/cybermsociety">Cyber M Society on Instagram</a>. </p><p><br></p><h2>Join us at Cyber MarketingCon2024!</h2><p> (December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>Cyber Marketing Con</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><h3><br></h3><h2>Be sure to also follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a66535ee-7cf3-11ef-a1fe-2f4774e4395a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9607192630.mp3?updated=1727715601" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISO-Led Content &amp; Marketing-Generated Leads with Lauren Koppelman</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/136/notes</link>
      <description>We’ve got one of the coolest marketers in cybersecurity joining us this week—Lauren Koppelman, Senior Global Campaign Manager at Fortinet after a recent acquisition.  Lauren will be taking us behind the scenes of the popular video series CISO on the Street and sharing the creative, data-driven strategies that fuel her success. From how niche Linux security content helped drive high-quality leads to how her cold lead nurture campaign re-engaged enterprise accounts, Lauren breaks down the tactics that work. She also shares how she refined keyword strategies to avoid bad-fit leads and crafted emails that grab the attention of even the most skeptical cybersecurity pros. This episode is packed with practical tips for any marketer looking to stand out in the cybersecurity world!

Episode Highlights:

[01:45] - How CISO on the Street Started
Lauren talks about how she came up with the idea for CISO on the Street at RSA and turned it into a video series. “Why not turn these casual conversations into a video series?” The spur-of-the-moment idea turned into a key piece of content marketing.

[06:40] - Niche Content Drives Leads
Lauren explains how she found that Linux security content was driving great leads and what she did to promote that content. 

[11:50] - Cold Lead Nurture Campaign Success
Lauren shares how a cold lead nurture campaign she developed brought enterprise-level accounts back to life, even while she was on vacation.

[17:00] - Fixing Key-word Issues
Lauren explains how the keyword “HIPAA” ended up attracting the wrong audience—like people who were Googling what HIPAA was while at their doctor’s office. She realized that attracting doctors’ waiting room visitors wasn’t the goal, and had to refine the strategy.

[23:00] - Tips for Writing Effective Emails
Lauren offers advice on writing emails for cybersecurity professionals, keeping them clear, simple, and direct.

About our guests:
👉Follow Lauren on LinkedIn. 
👉Learn more about Fortinet. 

Links and Resources Mentioned in This Episode
Watch CISO on the Street Video Series here!

Join us at Cyber MarketingCon2024!
 (December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 25 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>CISO-Led Content &amp; Marketing-Generated Leads with Lauren Koppelman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>136</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We’ve got one of the coolest marketers in cybersecurity joining us this week—Lauren Koppelman, Senior Global Campaign Manager at Fortinet after a recent acquisition.  Lauren will be taking us behind the scenes of the popular video series CISO on the Street and sharing the creative, data-driven strategies that fuel her success. From how niche Linux security content helped drive high-quality leads to how her cold lead nurture campaign re-engaged enterprise accounts, Lauren breaks down the tactics that work. She also shares how she refined keyword strategies to avoid bad-fit leads and crafted emails that grab the attention of even the most skeptical cybersecurity pros. This episode is packed with practical tips for any marketer looking to stand out in the cybersecurity world!

Episode Highlights:

[01:45] - How CISO on the Street Started
Lauren talks about how she came up with the idea for CISO on the Street at RSA and turned it into a video series. “Why not turn these casual conversations into a video series?” The spur-of-the-moment idea turned into a key piece of content marketing.

[06:40] - Niche Content Drives Leads
Lauren explains how she found that Linux security content was driving great leads and what she did to promote that content. 

[11:50] - Cold Lead Nurture Campaign Success
Lauren shares how a cold lead nurture campaign she developed brought enterprise-level accounts back to life, even while she was on vacation.

[17:00] - Fixing Key-word Issues
Lauren explains how the keyword “HIPAA” ended up attracting the wrong audience—like people who were Googling what HIPAA was while at their doctor’s office. She realized that attracting doctors’ waiting room visitors wasn’t the goal, and had to refine the strategy.

[23:00] - Tips for Writing Effective Emails
Lauren offers advice on writing emails for cybersecurity professionals, keeping them clear, simple, and direct.

About our guests:
👉Follow Lauren on LinkedIn. 
👉Learn more about Fortinet. 

Links and Resources Mentioned in This Episode
Watch CISO on the Street Video Series here!

Join us at Cyber MarketingCon2024!
 (December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We’ve got one of the coolest marketers in cybersecurity joining us this week—<a href="https://www.linkedin.com/in/laurenkoppelman/">Lauren Koppelman</a>, Senior Global Campaign Manager at <a href="https://www.linkedin.com/company/fortinet/">Fortinet</a> after a recent acquisition.  Lauren will be taking us behind the scenes of the popular video series <em>CISO on the Street</em> and sharing the creative, data-driven strategies that fuel her success. From how niche Linux security content helped drive high-quality leads to how her cold lead nurture campaign re-engaged enterprise accounts, Lauren breaks down the tactics that work. She also shares how she refined keyword strategies to avoid bad-fit leads and crafted emails that grab the attention of even the most skeptical cybersecurity pros. This episode is packed with practical tips for any marketer looking to stand out in the cybersecurity world!</p><p><br></p><h2>Episode Highlights:</h2><p><br></p><p><strong>[01:45] - How <em>CISO on the Street</em> Started</strong></p><p>Lauren talks about how she came up with the idea for <em>CISO on the Street</em> at RSA and turned it into a video series. <em>“Why not turn these casual conversations into a video series?” </em>The spur-of-the-moment idea turned into a key piece of content marketing.</p><p><br></p><p><strong>[06:40] - Niche Content Drives Leads</strong></p><p>Lauren explains how she found that Linux security content was driving great leads and what she did to promote that content. </p><p><br></p><p><strong>[11:50] - Cold Lead Nurture Campaign Success</strong></p><p>Lauren shares how a cold lead nurture campaign she developed brought enterprise-level accounts back to life, even while she was on vacation.</p><p><br></p><p><strong>[17:00] - Fixing Key-word Issues</strong></p><p>Lauren explains how the keyword “HIPAA” ended up attracting the wrong audience—like people who were Googling what HIPAA was while at their doctor’s office. She realized that attracting doctors’ waiting room visitors wasn’t the goal, and had to refine the strategy.</p><p><br></p><p><strong>[23:00] - Tips for Writing Effective Emails</strong></p><p>Lauren offers advice on writing emails for cybersecurity professionals, keeping them clear, simple, and direct.</p><p><br></p><h2>About our guests:</h2><p>👉Follow Lauren on <a href="https://www.linkedin.com/in/laurenkoppelman/">LinkedIn</a>. </p><p>👉Learn more about <a href="https://www.linkedin.com/company/fortinet/">Fortinet</a>. </p><h2><br></h2><h2>Links and Resources Mentioned in This Episode</h2><p>Watch CISO on the Street Video Series <a href="https://www.youtube.com/@nextdlp/videos">here</a>!</p><h3><br></h3><h2>Join us at Cyber MarketingCon2024!</h2><p> (December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>Cyber Marketing Con</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><p><br></p><h2>Be sure to also follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2453</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a79e9e74-7757-11ef-8b10-a32b7230f615]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9807497368.mp3?updated=1727200171" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity Marketing, Paris Edition with Oscar Burns.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/135/notes</link>
      <description>What do breaking up high school brawls, surviving French citizenship tests, and marketing cybersecurity across Europe have in common? They’re all part of the hilarious and unexpected journey of today’s guest, Oscar Burns! Oscar, the Senior Field Marketing Manager at GitGuardian, joins us from France to spill the beans on his unconventional path from teaching in London to navigating the complexities of cybersecurity marketing in Europe.
From dealing with language barriers, cultural differences, and figuring out how to make marketing magic happen at Europe’s biggest cybersecurity events, Oscar brings a fresh perspective—packed with humor. Whether you’re curious about the differences between U.S. and European markets, or you’re just here for the stories about $48 sandwiches in Monaco, this episode has something for you!

[2:00] - Oscar’s Background: From Teaching to Tech
Oscar shares his early career as a teacher in London and how a funny incident led him to switch careers, eventually moving to France for a business internship.

[6:30] - Moving into Marketing from Sales
After several years in sales at Powell Software, Oscar became interested in marketing. He recalls creating the company’s origin story as his first marketing task.

[9:30] - Transition to Cybersecurity and Joining GitGuardian
Oscar discusses his move into cybersecurity marketing at GitGuardian, where he currently works in field marketing, focused on code security solutions.

[13:00] - Working in Cybersecurity in Europe vs. the U.S.
Gianna and Oscar compare cybersecurity marketing in Europe and the U.S., noting differences in event size, budget, and business opportunities.

[16:45] - Event Marketing in Europe
Oscar explains how European companies approach events like Infosecurity Europe versus larger U.S. events like RSA Conference, with a focus on return on investment.

[18:30] - Les Assises in Monaco: The Premier European Cyber Event
Discussion of Les Assises, a high-end, CISO-only cybersecurity event in Monaco. Oscar highlights the exclusivity and success of the event for companies.

[24:00] - Living and Working in Europe as an American
Oscar shares practical tips on working in Europe, including the reality of lower salaries, cultural differences, and the perks of European work-life balance.

About our guests:
👉Follow Oscar on LinkedIn. 
👉Learn more about GitGuardian. 

Links and Resources Mentioned in This Episode
Cyber Marketing Con 2024 (December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!


Funniest Past Episodes Mentioned:
Want more laughs and insights? Check out these fan-favorite episodes we mentioned:



Mastering Marketing Mayhem with Pam Cobb – Get ready for a wild ride through Pam’s journey of managing chaos while growing a brand.


Art of Cyber Defense: Insights from a Theatrical-Minded CISO with Kayne McGladrey – Dive into the intersection of creativity and cybersecurity with Kayne, and discover how theater and cybersecurity aren’t so different after all.


Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 18 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity Marketing, Paris Edition with Oscar Burns.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>135</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>What do breaking up high school brawls, surviving French citizenship tests, and marketing cybersecurity across Europe have in common? They’re all part of the hilarious and unexpected journey of today’s guest, Oscar Burns! Oscar, the Senior Field Marketing Manager at GitGuardian, joins us from France to spill the beans on his unconventional path from teaching in London to navigating the complexities of cybersecurity marketing in Europe.
From dealing with language barriers, cultural differences, and figuring out how to make marketing magic happen at Europe’s biggest cybersecurity events, Oscar brings a fresh perspective—packed with humor. Whether you’re curious about the differences between U.S. and European markets, or you’re just here for the stories about $48 sandwiches in Monaco, this episode has something for you!

[2:00] - Oscar’s Background: From Teaching to Tech
Oscar shares his early career as a teacher in London and how a funny incident led him to switch careers, eventually moving to France for a business internship.

[6:30] - Moving into Marketing from Sales
After several years in sales at Powell Software, Oscar became interested in marketing. He recalls creating the company’s origin story as his first marketing task.

[9:30] - Transition to Cybersecurity and Joining GitGuardian
Oscar discusses his move into cybersecurity marketing at GitGuardian, where he currently works in field marketing, focused on code security solutions.

[13:00] - Working in Cybersecurity in Europe vs. the U.S.
Gianna and Oscar compare cybersecurity marketing in Europe and the U.S., noting differences in event size, budget, and business opportunities.

[16:45] - Event Marketing in Europe
Oscar explains how European companies approach events like Infosecurity Europe versus larger U.S. events like RSA Conference, with a focus on return on investment.

[18:30] - Les Assises in Monaco: The Premier European Cyber Event
Discussion of Les Assises, a high-end, CISO-only cybersecurity event in Monaco. Oscar highlights the exclusivity and success of the event for companies.

[24:00] - Living and Working in Europe as an American
Oscar shares practical tips on working in Europe, including the reality of lower salaries, cultural differences, and the perks of European work-life balance.

About our guests:
👉Follow Oscar on LinkedIn. 
👉Learn more about GitGuardian. 

Links and Resources Mentioned in This Episode
Cyber Marketing Con 2024 (December 8-11, 2024) – A Conference for Cybersecurity Marketers
If you’re serious about leveling up your marketing game in the cybersecurity industry, Cyber Marketing Con is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! Grab Your Ticket Here!


Funniest Past Episodes Mentioned:
Want more laughs and insights? Check out these fan-favorite episodes we mentioned:



Mastering Marketing Mayhem with Pam Cobb – Get ready for a wild ride through Pam’s journey of managing chaos while growing a brand.


Art of Cyber Defense: Insights from a Theatrical-Minded CISO with Kayne McGladrey – Dive into the intersection of creativity and cybersecurity with Kayne, and discover how theater and cybersecurity aren’t so different after all.


Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What do breaking up high school brawls, surviving French citizenship tests, and marketing cybersecurity across Europe have in common? They’re all part of the hilarious and unexpected journey of today’s guest, <a href="https://www.linkedin.com/in/oscar-burns/">Oscar Burns</a>! Oscar, the Senior Field Marketing Manager at <a href="https://www.linkedin.com/company/gitguardian/">GitGuardian</a>, joins us from France to spill the beans on his unconventional path from teaching in London to navigating the complexities of cybersecurity marketing in Europe.</p><p>From dealing with language barriers, cultural differences, and figuring out how to make marketing magic happen at Europe’s biggest cybersecurity events, Oscar brings a fresh perspective—packed with humor. Whether you’re curious about the differences between U.S. and European markets, or you’re just here for the stories about $48 sandwiches in Monaco, this episode has something for you!</p><p><br></p><p><strong>[2:00] - Oscar’s Background: From Teaching to Tech</strong></p><ul><li>Oscar shares his early career as a teacher in London and how a funny incident led him to switch careers, eventually moving to France for a business internship.</li></ul><p><br></p><p><strong>[6:30] - Moving into Marketing from Sales</strong></p><ul><li>After several years in sales at Powell Software, Oscar became interested in marketing. He recalls creating the company’s origin story as his first marketing task.</li></ul><p><br></p><p><strong>[9:30] - Transition to Cybersecurity and Joining GitGuardian</strong></p><ul><li>Oscar discusses his move into cybersecurity marketing at GitGuardian, where he currently works in field marketing, focused on code security solutions.</li></ul><p><br></p><p><strong>[13:00] - Working in Cybersecurity in Europe vs. the U.S.</strong></p><ul><li>Gianna and Oscar compare cybersecurity marketing in Europe and the U.S., noting differences in event size, budget, and business opportunities.</li></ul><p><br></p><p><strong>[16:45] - Event Marketing in Europe</strong></p><ul><li>Oscar explains how European companies approach events like <strong>Infosecurity Europe</strong> versus larger U.S. events like <strong>RSA Conference</strong>, with a focus on return on investment.</li></ul><p><br></p><p><strong>[18:30] - Les Assises in Monaco: The Premier European Cyber Event</strong></p><ul><li>Discussion of <strong>Les Assises</strong>, a high-end, CISO-only cybersecurity event in Monaco. Oscar highlights the exclusivity and success of the event for companies.</li></ul><p><br></p><p><strong>[24:00] - Living and Working in Europe as an American</strong></p><ul><li>Oscar shares practical tips on working in Europe, including the reality of lower salaries, cultural differences, and the perks of European work-life balance.</li></ul><p><br></p><h2>About our guests:</h2><p>👉Follow Oscar on <a href="https://www.linkedin.com/in/oscar-burns/">LinkedIn</a>. </p><p>👉Learn more about <a href="https://www.linkedin.com/company/gitguardian/">GitGuardian</a>. </p><p><br></p><h2>Links and Resources Mentioned in This Episode</h2><p><strong>Cyber Marketing Con 2024</strong> (December 8-11, 2024) – A Conference for Cybersecurity Marketers</p><p>If you’re serious about leveling up your marketing game in the cybersecurity industry, <em>Cyber Marketing Con</em> is a must-attend! Connect with top minds in the field, learn cutting-edge strategies, and swap ideas with fellow marketers who understand the unique challenges of our industry. The event is happening in Philadelphia, but you can join virtually too. Don’t wait—get your ticket before prices go up! <a href="https://www.cybermarketingconference.com/">Grab Your Ticket Here</a><strong>!</strong></p><p><br></p><h2>
<strong>Funniest Past Episodes Mentioned</strong>:</h2><p>Want more laughs and insights? Check out these fan-favorite episodes we mentioned:</p><p><br></p><ul>
<li>
<a href="https://www.thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/116/notes"><strong>Mastering Marketing Mayhem</strong></a> with Pam Cobb – Get ready for a wild ride through Pam’s journey of managing chaos while growing a brand.</li>
<li>
<a href="https://www.thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/110/notes"><strong>Art of Cyber Defense</strong>: Insights from a Theatrical-Minded CISO</a> with Kayne McGladrey – Dive into the intersection of creativity and cybersecurity with Kayne, and discover how theater and cybersecurity aren’t so different after all.</li>
</ul><p><br></p><h2>Be sure to also follow our hosts on LinkedIn:</h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1798</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c8b1aea-71df-11ef-89c7-67bad262af0b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3399324630.mp3?updated=1726590964" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside the Varonis Rebrand with Courtney Bernard</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/134/notes</link>
      <description>Thinking about rebranding your company but not sure where to start? Or maybe you’re wondering how to make your brand stand out in a crowded market like cybersecurity? Today’s we’re taking you behind the scenes of a major rebrand with one of the industry’s top players: Varonis!

We’re joined by Courtney Bernard, the Brand and Creative Director at Varonis, who recently led the company through a successful rebranding journey. We’ll be discussing everything from why Varonis knew it was time for a rebrand, to how they tackled common cybersecurity branding tropes, and how they ensured every aspect of their new identity resonates with their mission to protect data. 

If a rebrand is on your horizon, or you’re just curious about what it takes to pull one in cybersecurity, this episode is packed with tips, lessons, and inspiration. 

[01:25] - What’s Happening at Varonis?
Get the inside scoop on Varonis’ brand and creative team from Courtney. From the website to videos, the Varonis team touches everything that represents the company visually.

[03:30] - The Varonis Marketing Team: Bigger and Better
Varonis’ marketing team has grown a lot in the past five years—now over 60 strong! The brand and creative crew is right in the mix, working directly with the CMO, showing how important creativity is to the company’s strategy.

[05:00] - Keeping the Varonis Vibe Alive
With all that growth, how does Varonis keep the good vibes going? Courtney shares insights on how open communication, clear goals, and a strong sense of mission keep the team connected and energized.

[07:50] - How Branding Drives Varonis’ Success
The conversation shifts to how Varonis ensures that its brand initiatives align with their overall marketing goals. Courtney explains the challenge of measuring brand impact in cybersecurity and how the team balances qualitative and quantitative goals to ensure their efforts contribute to Varonis' overall business objectives.

[11:10] - The Big Decision: Why Varonis Rebranded
Why did Varonis decide to rebrand? It was driven by the company’s evolution in product offerings and market positioning. Courtney and the hosts talk about the extensive process that went into the rebrand, highlighting the importance of ensuring that the new brand identity accurately reflects Varonis' growth.

[14:30] - Tackling Design Headaches
Before the rebrand, Varonis faced several design challenges, including a limited color palette and inconsistent imagery. Courtney explains how the rebrand addressed these issues to  create a more cohesive and versatile visual identity.

[17:05] - Crafting the New Varonis Identity
Courtney emphasizes the importance of defining a clear brand persona and voice as the foundation for Varonis' rebrand. Using the brand archetype model, Varonis positioned itself as a "Hero" brand with elements of innovation, ensuring that its visual and verbal identity aligns with its mission to protect data.

[21:00] - Rolling Out the Rebrand: Who Was in the Loop?
Rebranding isn’t just a one-person job. Varonis started with a small team and then expanded to get feedback from sales, product, and leadership. The goal? To make sure everyone was on board and excited about the new direction.

About our guests:
👉Follow Courtney on LinkedIn. 
👉Learn more about Varonis. 
👉Read more about the strategy behind Varonis' rebrand that involved a full transition to a hero archetype and the introduction of Protector 22814 here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 11 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>Inside the Varonis Rebrand with Courtney Bernard</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>134</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thinking about rebranding your company but not sure where to start? Or maybe you’re wondering how to make your brand stand out in a crowded market like cybersecurity? Today’s we’re taking you behind the scenes of a major rebrand with one of the industry’s top players: Varonis!

We’re joined by Courtney Bernard, the Brand and Creative Director at Varonis, who recently led the company through a successful rebranding journey. We’ll be discussing everything from why Varonis knew it was time for a rebrand, to how they tackled common cybersecurity branding tropes, and how they ensured every aspect of their new identity resonates with their mission to protect data. 

If a rebrand is on your horizon, or you’re just curious about what it takes to pull one in cybersecurity, this episode is packed with tips, lessons, and inspiration. 

[01:25] - What’s Happening at Varonis?
Get the inside scoop on Varonis’ brand and creative team from Courtney. From the website to videos, the Varonis team touches everything that represents the company visually.

[03:30] - The Varonis Marketing Team: Bigger and Better
Varonis’ marketing team has grown a lot in the past five years—now over 60 strong! The brand and creative crew is right in the mix, working directly with the CMO, showing how important creativity is to the company’s strategy.

[05:00] - Keeping the Varonis Vibe Alive
With all that growth, how does Varonis keep the good vibes going? Courtney shares insights on how open communication, clear goals, and a strong sense of mission keep the team connected and energized.

[07:50] - How Branding Drives Varonis’ Success
The conversation shifts to how Varonis ensures that its brand initiatives align with their overall marketing goals. Courtney explains the challenge of measuring brand impact in cybersecurity and how the team balances qualitative and quantitative goals to ensure their efforts contribute to Varonis' overall business objectives.

[11:10] - The Big Decision: Why Varonis Rebranded
Why did Varonis decide to rebrand? It was driven by the company’s evolution in product offerings and market positioning. Courtney and the hosts talk about the extensive process that went into the rebrand, highlighting the importance of ensuring that the new brand identity accurately reflects Varonis' growth.

[14:30] - Tackling Design Headaches
Before the rebrand, Varonis faced several design challenges, including a limited color palette and inconsistent imagery. Courtney explains how the rebrand addressed these issues to  create a more cohesive and versatile visual identity.

[17:05] - Crafting the New Varonis Identity
Courtney emphasizes the importance of defining a clear brand persona and voice as the foundation for Varonis' rebrand. Using the brand archetype model, Varonis positioned itself as a "Hero" brand with elements of innovation, ensuring that its visual and verbal identity aligns with its mission to protect data.

[21:00] - Rolling Out the Rebrand: Who Was in the Loop?
Rebranding isn’t just a one-person job. Varonis started with a small team and then expanded to get feedback from sales, product, and leadership. The goal? To make sure everyone was on board and excited about the new direction.

About our guests:
👉Follow Courtney on LinkedIn. 
👉Learn more about Varonis. 
👉Read more about the strategy behind Varonis' rebrand that involved a full transition to a hero archetype and the introduction of Protector 22814 here!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thinking about rebranding your company but not sure where to start? Or maybe you’re wondering how to make your brand stand out in a crowded market like cybersecurity? Today’s we’re taking you behind the scenes of a major rebrand with one of the industry’s top players: Varonis!</p><p><br></p><p>We’re joined by <a href="https://www.linkedin.com/in/cbernarddesign/">Courtney Bernard</a>, the Brand and Creative Director at <a href="https://www.linkedin.com/company/varonis/">Varonis</a>, who recently led the company through a successful rebranding journey. We’ll be discussing everything from why Varonis knew it was time for a rebrand, to how they tackled common cybersecurity branding tropes, and how they ensured every aspect of their new identity resonates with their mission to protect data. </p><p><br></p><p>If a rebrand is on your horizon, or you’re just curious about what it takes to pull one in cybersecurity, this episode is packed with tips, lessons, and inspiration. </p><p><br></p><p><strong>[01:25] - What’s Happening at Varonis?</strong></p><p>Get the inside scoop on Varonis’ brand and creative team from Courtney. From the website to videos, the Varonis team touches everything that represents the company visually.</p><p><br></p><p><strong>[03:30] - The Varonis Marketing Team: Bigger and Better</strong></p><p>Varonis’ marketing team has grown a lot in the past five years—now over 60 strong! The brand and creative crew is right in the mix, working directly with the CMO, showing how important creativity is to the company’s strategy.</p><p><br></p><p><strong>[05:00] - Keeping the Varonis Vibe Alive</strong></p><p>With all that growth, how does Varonis keep the good vibes going? Courtney shares insights on how open communication, clear goals, and a strong sense of mission keep the team connected and energized.</p><p><br></p><p><strong>[07:50] - How Branding Drives Varonis’ Success</strong></p><p>The conversation shifts to how Varonis ensures that its brand initiatives align with their overall marketing goals. Courtney explains the challenge of measuring brand impact in cybersecurity and how the team balances qualitative and quantitative goals to ensure their efforts contribute to Varonis' overall business objectives.</p><p><br></p><p><strong>[11:10] - The Big Decision: Why Varonis Rebranded</strong></p><p>Why did Varonis decide to rebrand? It was driven by the company’s evolution in product offerings and market positioning. Courtney and the hosts talk about the extensive process that went into the rebrand, highlighting the importance of ensuring that the new brand identity accurately reflects Varonis' growth.</p><p><br></p><p><strong>[14:30] - Tackling Design Headaches</strong></p><p>Before the rebrand, Varonis faced several design challenges, including a limited color palette and inconsistent imagery. Courtney explains how the rebrand addressed these issues to  create a more cohesive and versatile visual identity.</p><p><br></p><p><strong>[17:05] - Crafting the New Varonis Identity</strong></p><p>Courtney emphasizes the importance of defining a clear brand persona and voice as the foundation for Varonis' rebrand. Using the brand archetype model, Varonis positioned itself as a "Hero" brand with elements of innovation, ensuring that its visual and verbal identity aligns with its mission to protect data.</p><p><br></p><p><strong>[21:00] - Rolling Out the Rebrand: Who Was in the Loop?</strong></p><p>Rebranding isn’t just a one-person job. Varonis started with a small team and then expanded to get feedback from sales, product, and leadership. The goal? To make sure everyone was on board and excited about the new direction.</p><p><br></p><h2><strong>About our guests:</strong></h2><p>👉Follow <a href="https://www.linkedin.com/in/cbernarddesign/">Courtney on LinkedIn</a>. </p><p>👉Learn more about <a href="https://www.linkedin.com/company/varonis/">Varonis</a>. </p><p>👉Read more about the strategy behind Varonis' rebrand that involved a full transition to a hero archetype and the introduction of Protector 22814 <a href="https://www.varonis.com/blog/behind-the-varonis-rebrand">here</a>!</p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1703</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e618f56c-6c55-11ef-9f75-571cf182b1c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1604933412.mp3?updated=1725987368" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Timing, Tenacity, and Triumph in Al Lakhani's Startup Journey</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/133/notes</link>
      <description>Failure is part of being human—it’s what you do next that really matters. Do you give up, feel stagnant, or do you push forward like Al Lakhani, the founder of IDEE? In this episode Al brings a blend of humor and honesty, sharing his self-described "PhD in failure" as he takes us on the rollercoaster ride of building a cybersecurity company from the ground up. With stories of exhilarating highs, unexpected setbacks, and the crucial role of timing, Al’s journey is filled with valuable lessons and lots of laughter. Whether you’re looking for actionable insights to apply to your own startup or just want to hear how someone turned failure into success, this episode has it all!
[05:00] - Al’s Rollercoaster Ride
Al shares the ups and downs of starting IDEE. From trying out ideas that flopped to finally finding success with the B2B approach.
[12:40] - Timing is Everything
Al explains why hitting the right timing in startups is like catching a wave—it's all about being in the right place at the right time, with a sprinkle of luck.
[15:10] - Cracking the Marketing Code
The hosts and Al get into what’s working (and what’s not) in IDEE’s marketing game. Al reveals that live demos have been successful, but getting people to check them out has been tricky.
[20:00] - Picking the Right Partners
Al talks about the importance of choosing the right partners to work with and how giving away free samples (NFR licenses) helps get their buy-in and feedback.
[27:45] - The Changing Customer Journey
Maria and Gianna chat about how customers do most of their research before even talking to a vendor, and Al shares his view on how the customer journey has shifted since COVID.

About our guests:
👉Follow Al on LinkedIn. 
👉Learn more about IDEE. 

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 04 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>Timing, Tenacity, and Triumph in Al Lakhani's Startup Journey</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>133</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Failure is part of being human—it’s what you do next that really matters. Do you give up, feel stagnant, or do you push forward like Al Lakhani, the founder of IDEE? In this episode Al brings a blend of humor and honesty, sharing his self-described "PhD in failure" as he takes us on the rollercoaster ride of building a cybersecurity company from the ground up. With stories of exhilarating highs, unexpected setbacks, and the crucial role of timing, Al’s journey is filled with valuable lessons and lots of laughter. Whether you’re looking for actionable insights to apply to your own startup or just want to hear how someone turned failure into success, this episode has it all!
[05:00] - Al’s Rollercoaster Ride
Al shares the ups and downs of starting IDEE. From trying out ideas that flopped to finally finding success with the B2B approach.
[12:40] - Timing is Everything
Al explains why hitting the right timing in startups is like catching a wave—it's all about being in the right place at the right time, with a sprinkle of luck.
[15:10] - Cracking the Marketing Code
The hosts and Al get into what’s working (and what’s not) in IDEE’s marketing game. Al reveals that live demos have been successful, but getting people to check them out has been tricky.
[20:00] - Picking the Right Partners
Al talks about the importance of choosing the right partners to work with and how giving away free samples (NFR licenses) helps get their buy-in and feedback.
[27:45] - The Changing Customer Journey
Maria and Gianna chat about how customers do most of their research before even talking to a vendor, and Al shares his view on how the customer journey has shifted since COVID.

About our guests:
👉Follow Al on LinkedIn. 
👉Learn more about IDEE. 

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Failure is part of being human—it’s what you do next that really matters. Do you give up, feel stagnant, or do you push forward like <a href="https://www.linkedin.com/in/getidee/">Al Lakhani</a>, the founder of <a href="https://www.linkedin.com/company/idee-gmbh/">IDEE</a>? In this episode Al brings a blend of humor and honesty, sharing his self-described "PhD in failure" as he takes us on the rollercoaster ride of building a cybersecurity company from the ground up. With stories of exhilarating highs, unexpected setbacks, and the crucial role of timing, Al’s journey is filled with valuable lessons and lots of laughter. Whether you’re looking for actionable insights to apply to your own startup or just want to hear how someone turned failure into success, this episode has it all!</p><p><strong>[05:00] - Al’s Rollercoaster Ride</strong></p><ul><li>Al shares the ups and downs of starting IDEE. From trying out ideas that flopped to finally finding success with the B2B approach.</li></ul><p><strong>[12:40] - Timing is Everything</strong></p><ul><li>Al explains why hitting the right timing in startups is like catching a wave—it's all about being in the right place at the right time, with a sprinkle of luck.</li></ul><p><strong>[15:10] - Cracking the Marketing Code</strong></p><ul><li>The hosts and Al get into what’s working (and what’s not) in IDEE’s marketing game. Al reveals that live demos have been successful, but getting people to check them out has been tricky.</li></ul><p><strong>[20:00] - Picking the Right Partners</strong></p><ul><li>Al talks about the importance of choosing the right partners to work with and how giving away free samples (NFR licenses) helps get their buy-in and feedback.</li></ul><p><strong>[27:45] - The Changing Customer Journey</strong></p><ul><li>Maria and Gianna chat about how customers do most of their research before even talking to a vendor, and Al shares his view on how the customer journey has shifted since COVID.</li></ul><p><br></p><h2><strong>About our guests:</strong></h2><p>👉Follow <a href="https://www.linkedin.com/in/getidee/">Al on LinkedIn</a>. </p><p>👉Learn more about <a href="https://www.linkedin.com/company/idee-gmbh/">IDEE</a>. </p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2188</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3e4d274-66e7-11ef-a732-1bd56fb85345]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6305396393.mp3?updated=1725384821" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mastering Marketing Ops with Rob Young.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/132/notes</link>
      <description>Ready to shake up your approach to cybersecurity marketing? In this episode of Breaking Through in Cybersecurity Marketing, Gianna and Maria bring on Rob Young, the amazing VP of Marketing at Cypago. Rob doesn't just talk strategy—he’s lived it, from the fast-paced world of startups to leading massive organizations. Tune in as he shares game-changing insights, the secrets behind his biggest wins, and why your marketing efforts need a serious upgrade. If you’re tired of the same old advice, this episode is your wake-up call.

[14:50] - Transition into Cybersecurity Marketing
Rob's early experience in the startup world began with the AI-platform, Astound, where he focused on building teams, and developing and executing strategies in a fast-paced environment. There are differences between marketing in startups, which requires quick decision-making and hands-on work, versus large companies, where processes are slower and more structured.

[20:25] - Advice for Marketing Leaders
Rob shares insights on staying agile in large organizations by building strong relationships across departments to speed up processes.

[25:45] - Setting Up a Marketing Org from Scratch
When Rob joins a new company, he focuses on messaging, positioning, and product marketing. He stresses the importance of aligning sales and marketing to ensure a clear and compelling value proposition for customers.

[30:15] - The Importance of Marketing Ops
Rob's first hire at Astound was in marketing ops due to its role in tracking data and optimizing strategies. Having a core team that includes marketing ops, digital marketing, and product marketing helps in driving the company's marketing effort. 

[39:40] - Low-Hanging Fruit in a New Marketing Role
Optimizing website content, implementing effective digital strategies, and steering clear of outdated marketing tactics are important quick wins in a new marketing role. Rob discusses the more challenging wins he focuses on, like managing leads and making sure they align with the ideal customer profile (ICP).  

[45:35] - The Changing Landscape of Sales and Marketing
Rob talks about the shift from high-volume to more targeted marketing, which has led to a reduced role for SDRs. He explores how to balance noise and signal in lead generation and shares his perspective on evolving trends in marketing strategies.

About our guests:
👉Follow Rob on LinkedIn. 
👉Learn more about Cypago.   

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 28 Aug 2024 10:47:00 -0000</pubDate>
      <itunes:title>Mastering Marketing Ops with Rob Young.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ready to shake up your approach to cybersecurity marketing? In this episode of Breaking Through in Cybersecurity Marketing, Gianna and Maria bring on Rob Young, the amazing VP of Marketing at Cypago. Rob doesn't just talk strategy—he’s lived it, from the fast-paced world of startups to leading massive organizations. Tune in as he shares game-changing insights, the secrets behind his biggest wins, and why your marketing efforts need a serious upgrade. If you’re tired of the same old advice, this episode is your wake-up call.

[14:50] - Transition into Cybersecurity Marketing
Rob's early experience in the startup world began with the AI-platform, Astound, where he focused on building teams, and developing and executing strategies in a fast-paced environment. There are differences between marketing in startups, which requires quick decision-making and hands-on work, versus large companies, where processes are slower and more structured.

[20:25] - Advice for Marketing Leaders
Rob shares insights on staying agile in large organizations by building strong relationships across departments to speed up processes.

[25:45] - Setting Up a Marketing Org from Scratch
When Rob joins a new company, he focuses on messaging, positioning, and product marketing. He stresses the importance of aligning sales and marketing to ensure a clear and compelling value proposition for customers.

[30:15] - The Importance of Marketing Ops
Rob's first hire at Astound was in marketing ops due to its role in tracking data and optimizing strategies. Having a core team that includes marketing ops, digital marketing, and product marketing helps in driving the company's marketing effort. 

[39:40] - Low-Hanging Fruit in a New Marketing Role
Optimizing website content, implementing effective digital strategies, and steering clear of outdated marketing tactics are important quick wins in a new marketing role. Rob discusses the more challenging wins he focuses on, like managing leads and making sure they align with the ideal customer profile (ICP).  

[45:35] - The Changing Landscape of Sales and Marketing
Rob talks about the shift from high-volume to more targeted marketing, which has led to a reduced role for SDRs. He explores how to balance noise and signal in lead generation and shares his perspective on evolving trends in marketing strategies.

About our guests:
👉Follow Rob on LinkedIn. 
👉Learn more about Cypago.   

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ready to shake up your approach to cybersecurity marketing? In this episode of Breaking Through in Cybersecurity Marketing, Gianna and Maria bring on <a href="https://www.linkedin.com/in/rob-young-19021113/">Rob Young</a>, the amazing VP of Marketing at <a href="https://www.linkedin.com/company/cypago/">Cypago</a>. Rob doesn't just talk strategy—he’s lived it, from the fast-paced world of startups to leading massive organizations. Tune in as he shares game-changing insights, the secrets behind his biggest wins, and why your marketing efforts need a serious upgrade. If you’re tired of the same old advice, this episode is your wake-up call.</p><p><br></p><p><strong>[14:50] - Transition into Cybersecurity Marketing</strong></p><p>Rob's early experience in the startup world began with the AI-platform, Astound, where he focused on building teams, and developing and executing strategies in a fast-paced environment. There are differences between marketing in startups, which requires quick decision-making and hands-on work, versus large companies, where processes are slower and more structured.</p><p><br></p><p><strong>[20:25] - Advice for Marketing Leaders</strong></p><p>Rob shares insights on staying agile in large organizations by building strong relationships across departments to speed up processes.</p><p><br></p><p><strong>[25:45] - Setting Up a Marketing Org from Scratch</strong></p><p>When Rob joins a new company, he focuses on messaging, positioning, and product marketing. He stresses the importance of aligning sales and marketing to ensure a clear and compelling value proposition for customers.</p><p><br></p><p><strong>[30:15] - The Importance of Marketing Ops</strong></p><p>Rob's first hire at Astound was in marketing ops due to its role in tracking data and optimizing strategies. Having a core team that includes marketing ops, digital marketing, and product marketing helps in driving the company's marketing effort. </p><p><br></p><p><strong>[39:40] - Low-Hanging Fruit in a New Marketing Role</strong></p><p>Optimizing website content, implementing effective digital strategies, and steering clear of outdated marketing tactics are important quick wins in a new marketing role. Rob discusses the more challenging wins he focuses on, like managing leads and making sure they align with the ideal customer profile (ICP).  </p><p><br></p><p><strong>[45:35] - The Changing Landscape of Sales and Marketing</strong></p><p>Rob talks about the shift from high-volume to more targeted marketing, which has led to a reduced role for SDRs. He explores how to balance noise and signal in lead generation and shares his perspective on evolving trends in marketing strategies.</p><p><br></p><h2><strong>About our guests:</strong></h2><p>👉Follow Rob on <a href="https://www.linkedin.com/in/rob-young-19021113/">LinkedIn</a>. </p><p>👉Learn more about <a href="https://www.linkedin.com/company/cypago/">Cypago</a>.   </p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2464</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8b7b03d2-6158-11ef-af3b-5f4d378ef3e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5684195230.mp3?updated=1724842327" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber CMO Confidential</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/131/notes</link>
      <description>We're excited to unveil our new segment, Cyber CMO Confidential, with Charles Gold, Chief Marketing Officer at ThreatConnect. This segment offers an inside look at the world of cybersecurity CMOs, featuring candid interviews with industry leaders who share their unique perspectives and insights. The co hosts and Charles dig into the challenges CMOs face in the fast-paced cybersecurity landscape and dissect the strategic decisions that drive success. Whether you're a new marketer or an aspiring CMO, Cyber CMO Confidential will provide inside knowledge straight from the experts. Tune in and discover what’s really happening in the C-suite!

[02:30] Introducing Cyber CMO Confidential:
Charles introduces the new segment, which will offer insights into the world of CMOs by interviewing industry leaders. The segment will explore the unique perspectives CMOs bring to the C-suite and the marketing challenges they encounter.

[06:00] The Importance of Understanding the CMO Role:
Maria and Charles explain how the segment will help marketers better understand and empathize with the CMO role, offering tips for managing and communicating effectively with CMOs.

[09:00] ThreatConnect’s Acquisition of Polarity:
Charles discusses ThreatConnect's recent acquisition of Polarity, highlighting its strategic value. He provides insights into the integration process and emphasizes the importance of cultural fit between the two companies.

[14:30] Managing the Integration as a CMO:
Why CMOs often play a key role in company integrations and how it aligns with their responsibilities as executive team members.

[18:00] Lessons Learned from Mergers and Acquisitions:
Charles discusses the challenges of sustaining momentum and ensuring successful integration post-acquisition. He shares his experiences and offers tips for maintaining team morale and alignment.

Key Takeaways


New Segment Launch: Cyber CMO Confidential will provide a unique look into the minds of CMOs, offering valuable insights for marketers at all levels.


Role of CMOs in Integrations: CMOs often wear multiple hats, contributing to corporate development and integration efforts following a merger.


Sustaining Momentum: Keeping excitement and alignment post-acquisition is crucial for realizing the strategic value of mergers.


Conference Strategy: Leveraging industry events like Black Hat can help maintain momentum and generate new opportunities.


About our guests:
👉Follow Charles on LinkedIn. 
👉Learn more about ThreatConnect

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 21 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cyber CMO Confidential</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We're excited to unveil our new segment, Cyber CMO Confidential, with Charles Gold, Chief Marketing Officer at ThreatConnect. This segment offers an inside look at the world of cybersecurity CMOs, featuring candid interviews with industry leaders who share their unique perspectives and insights. The co hosts and Charles dig into the challenges CMOs face in the fast-paced cybersecurity landscape and dissect the strategic decisions that drive success. Whether you're a new marketer or an aspiring CMO, Cyber CMO Confidential will provide inside knowledge straight from the experts. Tune in and discover what’s really happening in the C-suite!

[02:30] Introducing Cyber CMO Confidential:
Charles introduces the new segment, which will offer insights into the world of CMOs by interviewing industry leaders. The segment will explore the unique perspectives CMOs bring to the C-suite and the marketing challenges they encounter.

[06:00] The Importance of Understanding the CMO Role:
Maria and Charles explain how the segment will help marketers better understand and empathize with the CMO role, offering tips for managing and communicating effectively with CMOs.

[09:00] ThreatConnect’s Acquisition of Polarity:
Charles discusses ThreatConnect's recent acquisition of Polarity, highlighting its strategic value. He provides insights into the integration process and emphasizes the importance of cultural fit between the two companies.

[14:30] Managing the Integration as a CMO:
Why CMOs often play a key role in company integrations and how it aligns with their responsibilities as executive team members.

[18:00] Lessons Learned from Mergers and Acquisitions:
Charles discusses the challenges of sustaining momentum and ensuring successful integration post-acquisition. He shares his experiences and offers tips for maintaining team morale and alignment.

Key Takeaways


New Segment Launch: Cyber CMO Confidential will provide a unique look into the minds of CMOs, offering valuable insights for marketers at all levels.


Role of CMOs in Integrations: CMOs often wear multiple hats, contributing to corporate development and integration efforts following a merger.


Sustaining Momentum: Keeping excitement and alignment post-acquisition is crucial for realizing the strategic value of mergers.


Conference Strategy: Leveraging industry events like Black Hat can help maintain momentum and generate new opportunities.


About our guests:
👉Follow Charles on LinkedIn. 
👉Learn more about ThreatConnect

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We're excited to unveil our new segment, Cyber CMO Confidential, with <a href="https://www.linkedin.com/in/charlesgold/">Charles Gold</a>, Chief Marketing Officer at <a href="https://www.linkedin.com/company/threatconnect-inc/">ThreatConnect</a>. This segment offers an inside look at the world of cybersecurity CMOs, featuring candid interviews with industry leaders who share their unique perspectives and insights. The co hosts and Charles dig into the challenges CMOs face in the fast-paced cybersecurity landscape and dissect the strategic decisions that drive success. Whether you're a new marketer or an aspiring CMO, Cyber CMO Confidential will provide inside knowledge straight from the experts. Tune in and discover what’s really happening in the C-suite!</p><p><br></p><p><strong>[02:30] Introducing Cyber CMO Confidential:</strong></p><p>Charles introduces the new segment, which will offer insights into the world of CMOs by interviewing industry leaders. The segment will explore the unique perspectives CMOs bring to the C-suite and the marketing challenges they encounter.</p><p><br></p><p><strong>[06:00] The Importance of Understanding the CMO Role:</strong></p><p>Maria and Charles explain how the segment will help marketers better understand and empathize with the CMO role, offering tips for managing and communicating effectively with CMOs.</p><p><br></p><p><strong>[09:00] ThreatConnect’s Acquisition of Polarity:</strong></p><p>Charles discusses ThreatConnect's recent acquisition of Polarity, highlighting its strategic value. He provides insights into the integration process and emphasizes the importance of cultural fit between the two companies.</p><p><br></p><p><strong>[14:30] Managing the Integration as a CMO:</strong></p><p>Why CMOs often play a key role in company integrations and how it aligns with their responsibilities as executive team members.</p><p><br></p><p><strong>[18:00] Lessons Learned from Mergers and Acquisitions:</strong></p><p>Charles discusses the challenges of sustaining momentum and ensuring successful integration post-acquisition. He shares his experiences and offers tips for maintaining team morale and alignment.</p><p><br></p><h2>Key Takeaways</h2><ul>
<li>
<strong>New Segment Launch:</strong> Cyber CMO Confidential will provide a unique look into the minds of CMOs, offering valuable insights for marketers at all levels.</li>
<li>
<strong>Role of CMOs in Integrations:</strong> CMOs often wear multiple hats, contributing to corporate development and integration efforts following a merger.</li>
<li>
<strong>Sustaining Momentum:</strong> Keeping excitement and alignment post-acquisition is crucial for realizing the strategic value of mergers.</li>
<li>
<strong>Conference Strategy:</strong> Leveraging industry events like Black Hat can help maintain momentum and generate new opportunities.</li>
</ul><p><br></p><h2><strong>About our guests:</strong></h2><p>👉Follow Charles on <a href="https://www.linkedin.com/in/charlesgold/">LinkedIn</a>. </p><p>👉Learn more about <a href="https://www.linkedin.com/company/threatconnect-inc/">ThreatConnect</a></p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>891</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2eb918f0-5be0-11ef-8dae-8f29d024ee7b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6373067346.mp3?updated=1724174062" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MOPS Strategy with Maria Velasquez</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/130/notes</link>
      <description>We're flipping the script as our amazing co-host, Maria Velasquez, steps into the guest spotlight. She is the co-founder of the Cybersecurity Marketing Society and today she comes as the VP of Growth Marketing at NetSPI, bringing her years of experience from the pentesting world. Enjoy this candid chat as Maria shares her knowledge of marketing operations, revealing what it takes to choose the right platform and build a successful strategy. It's like having a chat with a good friend who just happens to be a MOPSexpert! Settle in and enjoy this informative episode, featuring our beloved co-host turned guest.

[06:00] Marketing Operations Insights:
When choosing a marketing automation platform, it’s crucial to consider factors such as company size, growth potential, and integration capabilities. Platforms like HubSpot, Marketo, and Pardot each offer unique features and benefits.

[12:30] Choosing the Right Marketing Automation Tool:
When choosing a marketing automation platform, prioritize:


Data Hygiene: Opt for platforms that facilitate effective data management to keep your information accurate.


CRM Integration: Ensure seamless integration with your current CRM system for consistent data flow and improved customer interactions.


[18:45] High-Level Strategy for Mops:
Implement lead scoring based on engagement and demographics to prioritize prospects, and design an ideal customer journey with defined lifecycle stages to guide leads from initial interest to conversion effectively.

[25:00] Best Practices for Marketing Automation:
Consult with experts during platform transitions to ensure a smooth process, focusing on the technical aspects of CRM and marketing tool integration for seamless data flow and functionality.

[31:15] Data Management and Reporting: 
Implement strategies to maintain data integrity and enhance reporting accuracy. Utilize UTM parameters to effectively track and measure campaign success.

[38:00] Future-Proofing Marketing Operations:
Plan for future reporting needs by identifying key metrics and setting up systems accordingly. Evaluate new tools for compatibility and seamless integration with existing systems.

Key Takeaways


Understand Your Needs: Evaluate your company's current and future growth needs when selecting marketing automation tools.


Data is Critical: Prioritize data integrity and set up workflows that ensure seamless integration with your CRM.


Lead Scoring &amp; Lifecycle Management: Establish clear criteria for lead scoring and understand the journey from MQL to SQL.


Consult Experts: Consider hiring a consultant to assist with technical integrations and strategic planning.


Stay Informed on Compliance: Be aware of recent changes in data privacy laws and cookie consent requirements to maintain compliance.


About our guests:
👉Follow Maria on LinkedIn. 
👉Learn more about NetSPI.  

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 14 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>MOPS Strategy with Maria Velasquez</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We're flipping the script as our amazing co-host, Maria Velasquez, steps into the guest spotlight. She is the co-founder of the Cybersecurity Marketing Society and today she comes as the VP of Growth Marketing at NetSPI, bringing her years of experience from the pentesting world. Enjoy this candid chat as Maria shares her knowledge of marketing operations, revealing what it takes to choose the right platform and build a successful strategy. It's like having a chat with a good friend who just happens to be a MOPSexpert! Settle in and enjoy this informative episode, featuring our beloved co-host turned guest.

[06:00] Marketing Operations Insights:
When choosing a marketing automation platform, it’s crucial to consider factors such as company size, growth potential, and integration capabilities. Platforms like HubSpot, Marketo, and Pardot each offer unique features and benefits.

[12:30] Choosing the Right Marketing Automation Tool:
When choosing a marketing automation platform, prioritize:


Data Hygiene: Opt for platforms that facilitate effective data management to keep your information accurate.


CRM Integration: Ensure seamless integration with your current CRM system for consistent data flow and improved customer interactions.


[18:45] High-Level Strategy for Mops:
Implement lead scoring based on engagement and demographics to prioritize prospects, and design an ideal customer journey with defined lifecycle stages to guide leads from initial interest to conversion effectively.

[25:00] Best Practices for Marketing Automation:
Consult with experts during platform transitions to ensure a smooth process, focusing on the technical aspects of CRM and marketing tool integration for seamless data flow and functionality.

[31:15] Data Management and Reporting: 
Implement strategies to maintain data integrity and enhance reporting accuracy. Utilize UTM parameters to effectively track and measure campaign success.

[38:00] Future-Proofing Marketing Operations:
Plan for future reporting needs by identifying key metrics and setting up systems accordingly. Evaluate new tools for compatibility and seamless integration with existing systems.

Key Takeaways


Understand Your Needs: Evaluate your company's current and future growth needs when selecting marketing automation tools.


Data is Critical: Prioritize data integrity and set up workflows that ensure seamless integration with your CRM.


Lead Scoring &amp; Lifecycle Management: Establish clear criteria for lead scoring and understand the journey from MQL to SQL.


Consult Experts: Consider hiring a consultant to assist with technical integrations and strategic planning.


Stay Informed on Compliance: Be aware of recent changes in data privacy laws and cookie consent requirements to maintain compliance.


About our guests:
👉Follow Maria on LinkedIn. 
👉Learn more about NetSPI.  

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We're flipping the script as our amazing co-host, <a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a>, steps into the guest spotlight. She is the co-founder of the Cybersecurity Marketing Society and today she comes as the VP of Growth Marketing at <a href="https://www.linkedin.com/company/netspi/">NetSPI</a>, bringing her years of experience from the pentesting world. Enjoy this candid chat as Maria shares her knowledge of marketing operations, revealing what it takes to choose the right platform and build a successful strategy. It's like having a chat with a good friend who just happens to be a MOPSexpert! Settle in and enjoy this informative episode, featuring our beloved co-host turned guest.</p><p><br></p><p><strong>[06:00] Marketing Operations Insights:</strong></p><p>When choosing a marketing automation platform, it’s crucial to consider factors such as company size, growth potential, and integration capabilities. Platforms like HubSpot, Marketo, and Pardot each offer unique features and benefits.</p><p><br></p><p><strong>[12:30] Choosing the Right Marketing Automation Tool:</strong></p><p>When choosing a marketing automation platform, prioritize:</p><ul>
<li>
<strong>Data Hygiene:</strong> Opt for platforms that facilitate effective data management to keep your information accurate.</li>
<li>
<strong>CRM Integration:</strong> Ensure seamless integration with your current CRM system for consistent data flow and improved customer interactions.</li>
</ul><p><br></p><p><strong>[18:45] High-Level Strategy for Mops:</strong></p><p>Implement lead scoring based on engagement and demographics to prioritize prospects, and design an ideal customer journey with defined lifecycle stages to guide leads from initial interest to conversion effectively.</p><p><br></p><p><strong>[25:00] Best Practices for Marketing Automation:</strong></p><p>Consult with experts during platform transitions to ensure a smooth process, focusing on the technical aspects of CRM and marketing tool integration for seamless data flow and functionality.</p><p><br></p><p><strong>[31:15] Data Management and Reporting: </strong></p><p>Implement strategies to maintain data integrity and enhance reporting accuracy. Utilize UTM parameters to effectively track and measure campaign success.</p><p><br></p><p><strong>[38:00] Future-Proofing Marketing Operations:</strong></p><p>Plan for future reporting needs by identifying key metrics and setting up systems accordingly. Evaluate new tools for compatibility and seamless integration with existing systems.</p><p><br></p><h2>Key Takeaways</h2><ul>
<li>
<strong>Understand Your Needs:</strong> Evaluate your company's current and future growth needs when selecting marketing automation tools.</li>
<li>
<strong>Data is Critical:</strong> Prioritize data integrity and set up workflows that ensure seamless integration with your CRM.</li>
<li>
<strong>Lead Scoring &amp; Lifecycle Management:</strong> Establish clear criteria for lead scoring and understand the journey from MQL to SQL.</li>
<li>
<strong>Consult Experts:</strong> Consider hiring a consultant to assist with technical integrations and strategic planning.</li>
<li>
<strong>Stay Informed on Compliance:</strong> Be aware of recent changes in data privacy laws and cookie consent requirements to maintain compliance.</li>
</ul><p><br></p><h2><strong>About our guests:</strong></h2><p>👉Follow Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>. </p><p>👉Learn more about <a href="https://www.linkedin.com/company/netspi/">NetSPI</a>.  </p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1929</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a69da378-559f-11ef-8a82-af9b68368f54]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7339994414.mp3?updated=1723562907" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influencer Marketing for Cyber with Yuliya Gorenko</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/129/notes</link>
      <description>Mascara and cybersecurity - what do they have in common? They’re both industries that are prime for influencer marketing! Yuliya Gorenko, founder of Mischka, is here to talk us through her journey from leading PR and digital efforts for top beauty brands like L'Oreal to navigating the tech-heavy world of cybersecurity influencer marketing. Both industries rely on creating relatable stories, addressing universal needs, and building trust with their audiences—whether it's striving for flawless skin with a skincare routine or online security against hackers. Both fields face the challenge of standing out in a crowded market and require innovative storytelling to connect with consumers. Join us to talk not only about these fascinating parallels, but to also explore the early stages of influencer marketing in cybersecurity, and to get tips on how you can engage influencers in the B2B space. Prepare your setting sprays and firewalls for an episode filled with the most interesting insights! 

Episode highlights: 
[04:30 - 06:00] Similarities Between Beauty and Cybersecurity
Yuliya discusses the universal needs shared by both the beauty and cybersecurity industries which is why it's important to create relatable stories around brands that connect with audiences. 
[08:30 - 09:15] Influencer Marketing in Cybersecurity
Yulia talks about the early stages of influencer marketing in the cybersecurity industry, noting how it has evolved over time. Platforms are increasingly incorporating consumer elements into the B2B space, making influencer marketing more dynamic and LinkedIn plays a big role in this marketing strategy.
[10:00 - 13:25] Successful Influencer Campaigns
Yulia’s work with Hotspot Shield VPN and early influencer programs, storytelling through influencers for VPN products, and collaboration with travel YouTubers and Instagrammers
[18:09 - 20:30] Creative Campaigns and Measuring Success
Example of Delete Me's campaign with a farmer YouTuber expanding influencer marketing beyond typical tech influencers. Also how you can measure success and tracking ROI in B2B influencer campaigns.
[22:00 - 25:23] Negotiation Tips for Brands
Yulia offers tips for brands on negotiating with influencers, having a budget in mind before approaching them and outlines deliverables and budget proposals clearly to avoid misunderstandings.Transpareny on brands about the FTC endorsement guidelines, especially in influencer partnerships.

About our guests:
👉Follow Yuliya on LinkedIn. 
👉Learn more Mischka. 

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 07 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>Influencer Marketing for Cyber with Yuliya Gorenko</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mascara and cybersecurity - what do they have in common? They’re both industries that are prime for influencer marketing! Yuliya Gorenko, founder of Mischka, is here to talk us through her journey from leading PR and digital efforts for top beauty brands like L'Oreal to navigating the tech-heavy world of cybersecurity influencer marketing. Both industries rely on creating relatable stories, addressing universal needs, and building trust with their audiences—whether it's striving for flawless skin with a skincare routine or online security against hackers. Both fields face the challenge of standing out in a crowded market and require innovative storytelling to connect with consumers. Join us to talk not only about these fascinating parallels, but to also explore the early stages of influencer marketing in cybersecurity, and to get tips on how you can engage influencers in the B2B space. Prepare your setting sprays and firewalls for an episode filled with the most interesting insights! 

Episode highlights: 
[04:30 - 06:00] Similarities Between Beauty and Cybersecurity
Yuliya discusses the universal needs shared by both the beauty and cybersecurity industries which is why it's important to create relatable stories around brands that connect with audiences. 
[08:30 - 09:15] Influencer Marketing in Cybersecurity
Yulia talks about the early stages of influencer marketing in the cybersecurity industry, noting how it has evolved over time. Platforms are increasingly incorporating consumer elements into the B2B space, making influencer marketing more dynamic and LinkedIn plays a big role in this marketing strategy.
[10:00 - 13:25] Successful Influencer Campaigns
Yulia’s work with Hotspot Shield VPN and early influencer programs, storytelling through influencers for VPN products, and collaboration with travel YouTubers and Instagrammers
[18:09 - 20:30] Creative Campaigns and Measuring Success
Example of Delete Me's campaign with a farmer YouTuber expanding influencer marketing beyond typical tech influencers. Also how you can measure success and tracking ROI in B2B influencer campaigns.
[22:00 - 25:23] Negotiation Tips for Brands
Yulia offers tips for brands on negotiating with influencers, having a budget in mind before approaching them and outlines deliverables and budget proposals clearly to avoid misunderstandings.Transpareny on brands about the FTC endorsement guidelines, especially in influencer partnerships.

About our guests:
👉Follow Yuliya on LinkedIn. 
👉Learn more Mischka. 

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mascara and cybersecurity - what do they have in common? They’re both industries that are prime for influencer marketing! <a href="https://www.linkedin.com/in/yuliya-gorenko/">Yuliya Gorenko</a>, founder of <a href="https://www.linkedin.com/company/mischka/">Mischka</a>, is here to talk us through her journey from leading PR and digital efforts for top beauty brands like L'Oreal to navigating the tech-heavy world of cybersecurity influencer marketing. Both industries rely on creating relatable stories, addressing universal needs, and building trust with their audiences—whether it's striving for flawless skin with a skincare routine or online security against hackers. Both fields face the challenge of standing out in a crowded market and require innovative storytelling to connect with consumers. Join us to talk not only about these fascinating parallels, but to also explore the early stages of influencer marketing in cybersecurity, and to get tips on how you can engage influencers in the B2B space. Prepare your setting sprays and firewalls for an episode filled with the most interesting insights! </p><p><br></p><h2><strong>Episode highlights: </strong></h2><p><strong>[04:30 - 06:00] Similarities Between Beauty and Cybersecurity</strong></p><p>Yuliya discusses the universal needs shared by both the beauty and cybersecurity industries which is why it's important to create relatable stories around brands that connect with audiences. </p><p><strong>[08:30 - 09:15] Influencer Marketing in Cybersecurity</strong></p><p>Yulia talks about the early stages of influencer marketing in the cybersecurity industry, noting how it has evolved over time. Platforms are increasingly incorporating consumer elements into the B2B space, making influencer marketing more dynamic and LinkedIn plays a big role in this marketing strategy.</p><p><strong>[10:00 - 13:25] Successful Influencer Campaigns</strong></p><p>Yulia’s work with Hotspot Shield VPN and early influencer programs, storytelling through influencers for VPN products, and collaboration with travel YouTubers and Instagrammers</p><p><strong>[18:09 - 20:30] Creative Campaigns and Measuring Success</strong></p><p>Example of <a href="https://www.youtube.com/watch?si=Gm4oakmFya2DMwwE&amp;t=466&amp;v=VDddNykepLc&amp;feature=youtu.be">Delete Me's campaign with a farmer YouTuber</a> expanding influencer marketing beyond typical tech influencers. Also how you can measure success and tracking ROI in B2B influencer campaigns.</p><p><strong>[22:00 - 25:23] Negotiation Tips for Brands</strong></p><p>Yulia offers tips for brands on negotiating with influencers, having a budget in mind before approaching them and outlines deliverables and budget proposals clearly to avoid misunderstandings.Transpareny on brands about the FTC endorsement guidelines, especially in influencer partnerships.</p><p><br></p><h2><strong>About our guests:</strong></h2><p>👉Follow Yuliya on<a href="https://www.linkedin.com/in/yuliya-gorenko/"> LinkedIn</a>. </p><p>👉Learn more <a href="https://www.linkedin.com/company/mischka/">Mischka</a>. </p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1936</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec13b49a-50e7-11ef-b45b-538ccfa997e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4206865355.mp3?updated=1723027013" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> From Intelligence Operative to Cybersecurity Evangelist with AJ Nash</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/128/notes</link>
      <description>AJ Nash has 19 years of experience in the intelligence community and 8 years in the private sector. He has successfully transitioned into a thought leader and evangelist in intelligence-driven security, making waves at several top-tier companies. AJ has a knack for turning complex intelligence topics into engaging and accessible content, and he’s also the charismatic host of the “Unspoken Security” podcast, which recently won the Cybersecurity Excellence award for Best Podcast. Beyond the mic, he is known for his candid takes on industry practices, his humorous approach to serious topics, and his dedication to authentic, no-nonsense communication. His journey is packed with intriguing stories—from unsanctioned magazine articles that catapulted his career to his bold stance on the misuse of AI in cybersecurity. Tune into this week’s episode to laugh, gain some knowledge on intelligence, and hear some hot takes!


Content Creation and Marketing: [07:46 - 14:20]
AJ talks about his love for creating content and how he went from intelligence briefings to public speaking and writing. 

﻿AJ’s Hot Takes on the Industry: [14:21 - 23:50]

Prioritizing the bottom line over security.

The misuse of AI in replacing human intelligence analysts and the potential dangers of misinformation and deepfakes.

AJ calls for better accountability and consequences for security breaches.


Government vs. Private Sector: [23:51 - 30:00]
AJ talks about the strengths and weaknesses of both the government and private sector in cybersecurity. Noting that the government excels in structured intelligence and long-term strategies, but sometimes lacks the agility and creativity found in the private sector. 

Career Path and Personal Brand: [30:01 - 37:40]
AJ talks about his journey from aspiring lawyer to intelligence professional and public speaker making sure that he was being authentic and that his work reflects his values.

Meet us at CyberMaketingCon: [37:41 - 40:00]

Save the Date for CyberMarketingCon2024


In Person &amp; Virtual

December 8-11, 2024

Philadelphia, PA

Get your ticket and meet us in Philadelphia from December 8-11.


About our guests:
👉Follow AJ on LinkedIn. 
👉More on the Unspoken Security podcast. 

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 31 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title> From Intelligence Operative to Cybersecurity Evangelist with AJ Nash</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>AJ Nash has 19 years of experience in the intelligence community and 8 years in the private sector. He has successfully transitioned into a thought leader and evangelist in intelligence-driven security, making waves at several top-tier companies. AJ has a knack for turning complex intelligence topics into engaging and accessible content, and he’s also the charismatic host of the “Unspoken Security” podcast, which recently won the Cybersecurity Excellence award for Best Podcast. Beyond the mic, he is known for his candid takes on industry practices, his humorous approach to serious topics, and his dedication to authentic, no-nonsense communication. His journey is packed with intriguing stories—from unsanctioned magazine articles that catapulted his career to his bold stance on the misuse of AI in cybersecurity. Tune into this week’s episode to laugh, gain some knowledge on intelligence, and hear some hot takes!


Content Creation and Marketing: [07:46 - 14:20]
AJ talks about his love for creating content and how he went from intelligence briefings to public speaking and writing. 

﻿AJ’s Hot Takes on the Industry: [14:21 - 23:50]

Prioritizing the bottom line over security.

The misuse of AI in replacing human intelligence analysts and the potential dangers of misinformation and deepfakes.

AJ calls for better accountability and consequences for security breaches.


Government vs. Private Sector: [23:51 - 30:00]
AJ talks about the strengths and weaknesses of both the government and private sector in cybersecurity. Noting that the government excels in structured intelligence and long-term strategies, but sometimes lacks the agility and creativity found in the private sector. 

Career Path and Personal Brand: [30:01 - 37:40]
AJ talks about his journey from aspiring lawyer to intelligence professional and public speaker making sure that he was being authentic and that his work reflects his values.

Meet us at CyberMaketingCon: [37:41 - 40:00]

Save the Date for CyberMarketingCon2024


In Person &amp; Virtual

December 8-11, 2024

Philadelphia, PA

Get your ticket and meet us in Philadelphia from December 8-11.


About our guests:
👉Follow AJ on LinkedIn. 
👉More on the Unspoken Security podcast. 

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/nashaj/">AJ Nash</a> has 19 years of experience in the intelligence community and 8 years in the private sector. He has successfully transitioned into a thought leader and evangelist in intelligence-driven security, making waves at several top-tier companies. AJ has a knack for turning complex intelligence topics into engaging and accessible content, and he’s also the charismatic host of the “<a href="https://www.zerofox.com/unspoken-security-podcast/">Unspoken Security</a>” podcast, which recently won the Cybersecurity Excellence award for Best Podcast. Beyond the mic, he is known for his candid takes on industry practices, his humorous approach to serious topics, and his dedication to authentic, no-nonsense communication. His journey is packed with intriguing stories—from unsanctioned magazine articles that catapulted his career to his bold stance on the misuse of AI in cybersecurity. Tune into this week’s episode to laugh, gain some knowledge on intelligence, and hear some hot takes!</p><p><br></p><p><br></p><p><strong>Content Creation and Marketing:</strong> [07:46 - 14:20]</p><ul><li>AJ talks about his love for creating content and how he went from intelligence briefings to public speaking and writing. </li></ul><p><br></p><p><strong>﻿AJ’s Hot Takes on the Industry:</strong> [14:21 - 23:50]</p><ul>
<li>Prioritizing the bottom line over security.</li>
<li>The misuse of AI in replacing human intelligence analysts and the potential dangers of misinformation and deepfakes.</li>
<li>AJ calls for better accountability and consequences for security breaches.</li>
</ul><p><br></p><p><strong>Government vs. Private Sector:</strong> [23:51 - 30:00]</p><ul><li>AJ talks about the strengths and weaknesses of both the government and private sector in cybersecurity. Noting that the government excels in structured intelligence and long-term strategies, but sometimes lacks the agility and creativity found in the private sector. </li></ul><p><br></p><p><strong>Career Path and Personal Brand:</strong> [30:01 - 37:40]</p><ul><li>AJ talks about his journey from aspiring lawyer to intelligence professional and public speaker making sure that he was being authentic and that his work reflects his values.</li></ul><p><br></p><p><strong>Meet us at CyberMaketingCon:</strong> [37:41 - 40:00]</p><ul>
<li>Save the Date for <a href="https://www.cybermarketingconference.com/">CyberMarketingCon2024</a>
</li>
<li>In Person &amp; Virtual</li>
<li>December 8-11, 2024</li>
<li>Philadelphia, PA</li>
<li>Get your ticket and meet us in Philadelphia from December 8-11.</li>
</ul><p><br></p><h2><strong>About our guests:</strong></h2><p><strong>👉</strong>Follow AJ on <a href="https://www.linkedin.com/in/nashaj/">LinkedIn</a>. </p><p><strong>👉</strong>More on the <a href="https://www.zerofox.com/unspoken-security-podcast/">Unspoken Security</a> podcast. </p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2459</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce577174-4b44-11ef-8a60-47e8a0c98e32]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5640015453.mp3?updated=1723027037" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Compelling Cyber Narratives with David J. Ebner</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/127/notes</link>
      <description>Storytelling in cybersecurity doesn't have to be dry. There are stories of espionage, state-sponsored attacks, and ransom scenarios that are dramatic and engaging when told well. Today's special guest, David J. Ebner, the president and founder of Content Workshop, a content agency specializing in cybersecurity companies, is an expert in taking these technical topics and turning them into compelling narratives. David is no stranger to our podcast and also has graced the stage at last year's CyberMarketingCon!
Today, David shares his findings on the state of cybersecurity content marketing, drawing from a report his team is currently developing. This week’s episode will be focusing on storytelling, why the human element in B2B marketing is so important, and strategies on how to make your content stand out and so much more. Tune in for authentic, story-driven content that can help your cybersecurity marketing.


[01:46 - 02:30] Introduction to the Cyber Security Content Report that David is developing

David talks about the upcoming state of cyber security content report and its expected release around Thanksgiving.

[03:31 - 05:00] Interviews and Insights Gathering

David explains the process of gathering insights from marketers and content creators in the cybersecurity industry for the report.

[06:01 - 07:00] B2B Content Marketing Trends

Gianna and David discuss the trend of creating comprehensive reports and then using smaller pieces of that content for extended engagement.

[07:01 - 08:30] Social Media Strategy

David shares insights about the declining impact of posting for the sake of posting on social media.

[10:31 - 12:00] Enterprise vs. Startup Approaches

Discussion on the differences between enterprise companies and startups in terms of building trust and presenting themselves.

[12:01 - 13:00] Human Element in B2B

David emphasizes the importance of the human element in B2B relationships and purchasing decisions.

[15:31 - 17:00] Internal AI Models

David suggests the future possibility of companies developing their own AI models to produce tailored content.

[17:01 - 18:00] Value-First Content

David and Gianna discuss the importance of producing content that offers real value and insight, not just answers.

[21:01 - 22:30] Applying Storytelling to Content Creation

David discusses how to incorporate storytelling techniques into content creation for cybersecurity companies.

[23:01 - 24:00] Finding Good Storytellers

David shares how Content Workshop looks for good storytellers who can apply these techniques to cybersecurity content.


About our guests:

👉Follow David on LinkedIn. 
👉Find Content Workshop on LinkedIn and their website.

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Fri, 26 Jul 2024 14:00:00 -0000</pubDate>
      <itunes:title>Compelling Cyber Narratives with David J. Ebner</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Storytelling in cybersecurity doesn't have to be dry. There are stories of espionage, state-sponsored attacks, and ransom scenarios that are dramatic and engaging when told well. Today's special guest, David J. Ebner, the president and founder of Content Workshop, a content agency specializing in cybersecurity companies, is an expert in taking these technical topics and turning them into compelling narratives. David is no stranger to our podcast and also has graced the stage at last year's CyberMarketingCon!
Today, David shares his findings on the state of cybersecurity content marketing, drawing from a report his team is currently developing. This week’s episode will be focusing on storytelling, why the human element in B2B marketing is so important, and strategies on how to make your content stand out and so much more. Tune in for authentic, story-driven content that can help your cybersecurity marketing.


[01:46 - 02:30] Introduction to the Cyber Security Content Report that David is developing

David talks about the upcoming state of cyber security content report and its expected release around Thanksgiving.

[03:31 - 05:00] Interviews and Insights Gathering

David explains the process of gathering insights from marketers and content creators in the cybersecurity industry for the report.

[06:01 - 07:00] B2B Content Marketing Trends

Gianna and David discuss the trend of creating comprehensive reports and then using smaller pieces of that content for extended engagement.

[07:01 - 08:30] Social Media Strategy

David shares insights about the declining impact of posting for the sake of posting on social media.

[10:31 - 12:00] Enterprise vs. Startup Approaches

Discussion on the differences between enterprise companies and startups in terms of building trust and presenting themselves.

[12:01 - 13:00] Human Element in B2B

David emphasizes the importance of the human element in B2B relationships and purchasing decisions.

[15:31 - 17:00] Internal AI Models

David suggests the future possibility of companies developing their own AI models to produce tailored content.

[17:01 - 18:00] Value-First Content

David and Gianna discuss the importance of producing content that offers real value and insight, not just answers.

[21:01 - 22:30] Applying Storytelling to Content Creation

David discusses how to incorporate storytelling techniques into content creation for cybersecurity companies.

[23:01 - 24:00] Finding Good Storytellers

David shares how Content Workshop looks for good storytellers who can apply these techniques to cybersecurity content.


About our guests:

👉Follow David on LinkedIn. 
👉Find Content Workshop on LinkedIn and their website.

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Storytelling in cybersecurity doesn't have to be dry. There are stories of espionage, state-sponsored attacks, and ransom scenarios that are dramatic and engaging when told well. Today's special guest, <a href="https://www.linkedin.com/in/davidjebner/">David J. Ebner</a>, the president and founder of <a href="https://www.linkedin.com/company/contentwriterworkshop/">Content Workshop</a>, a content agency specializing in cybersecurity companies, is an expert in taking these technical topics and turning them into compelling narratives. David is no stranger to our podcast and also has graced the stage at last year's <a href="https://www.cybermarketingconference.com/">CyberMarketingCon</a>!</p><p>Today, David shares his findings on the state of cybersecurity content marketing, drawing from a report his team is currently developing. This week’s episode will be focusing on storytelling, why the human element in B2B marketing is so important, and strategies on how to make your content stand out and so much more. Tune in for authentic, story-driven content that can help your cybersecurity marketing.</p><p><br></p><ul>
<li><strong>[01:46 - 02:30] Introduction to the Cyber Security Content Report that David is developing</strong></li>
<li>David talks about the upcoming state of cyber security content report and its expected release around Thanksgiving.</li>
<li><strong>[03:31 - 05:00] Interviews and Insights Gathering</strong></li>
<li>David explains the process of gathering insights from marketers and content creators in the cybersecurity industry for the report.</li>
<li><strong>[06:01 - 07:00] B2B Content Marketing Trends</strong></li>
<li>Gianna and David discuss the trend of creating comprehensive reports and then using smaller pieces of that content for extended engagement.</li>
<li><strong>[07:01 - 08:30] Social Media Strategy</strong></li>
<li>David shares insights about the declining impact of posting for the sake of posting on social media.</li>
<li><strong>[10:31 - 12:00] Enterprise vs. Startup Approaches</strong></li>
<li>Discussion on the differences between enterprise companies and startups in terms of building trust and presenting themselves.</li>
<li><strong>[12:01 - 13:00] Human Element in B2B</strong></li>
<li>David emphasizes the importance of the human element in B2B relationships and purchasing decisions.</li>
<li><strong>[15:31 - 17:00] Internal AI Models</strong></li>
<li>David suggests the future possibility of companies developing their own AI models to produce tailored content.</li>
<li><strong>[17:01 - 18:00] Value-First Content</strong></li>
<li>David and Gianna discuss the importance of producing content that offers real value and insight, not just answers.</li>
<li><strong>[21:01 - 22:30] Applying Storytelling to Content Creation</strong></li>
<li>David discusses how to incorporate storytelling techniques into content creation for cybersecurity companies.</li>
<li><strong>[23:01 - 24:00] Finding Good Storytellers</strong></li>
<li>David shares how Content Workshop looks for good storytellers who can apply these techniques to cybersecurity content.</li>
</ul><p><br></p><h2><strong>About our guests:</strong></h2><p><br></p><p><strong>👉</strong>Follow <a href="https://www.linkedin.com/in/davidjebner/">David</a> on LinkedIn. </p><p><strong>👉</strong>Find Content Workshop on <a href="https://www.linkedin.com/company/contentwriterworkshop/">LinkedIn</a> and <a href="https://contentworkshop.com/">their website</a>.</p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5666f04a-44e6-11ef-a677-df0c1dc47cc2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7760084664.mp3?updated=1723026839" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity Communications at Keeper Security with Anne Cutler</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/126/notes</link>
      <description>How does a TV news anchor end up in cybersecurity? Meet Anne Cutler, former journalist, anchor, ex-DHS and -CISA communications pro, and currently Director of Global Communications at Keeper Security!
Anne also shares other parts of her journey, like her early days breaking news in Casper, Wyoming, followed by reporting from a bar in New Orleans, and her deeply moving stories from inside Angola prison. Today, she navigates the world of cybersecurity with the same storytelling flair. Tune in for an episode filled with human stories, showcasing the depth of empathy and dignity Anne brings to her work, and how these experiences shaped her journey into cybersecurity 

Episode Highlights:

[02:31 - 05:40] Memorable Stories from Journalism

Anne shares experiences from her journalism career, including a unique show set in a bar in New Orleans and a powerful series at Angola prison.

[05:41 - 09:30] Transition to DHS &amp; CISA

Anne’s move to the Department of Homeland Security’s Science and Technology Directorate and then to CISA.

[09:31 - 13:45] Role at CISA and Key Incidents

Discussing major cybersecurity incidents Anne worked on, including Colonial Pipeline and the Shields Up campaign during the Russia-Ukraine conflict.

[17:21 - 21:15] Joining Keeper Security

Anne’s transition to the private sector and her role at Keeper Security as Director of Global Communications.

[21:16 - 24:00] Building a Communications Team

Anne’s efforts in building and expanding the communications team at Keeper Security, including global PR teams and internal staff.


[30:01 - 33:00] Social Media and Influencer Strategies


Challenges and strategies for managing organic and paid social media content, and the importance of authentic influencer partnerships.

[33:01 - 36:45] Sponsorship of Williams Racing

Keeper Security’s sponsorship of Williams Racing in Formula One, aligning with the company’s growth and global presence.


About our guests:
👉Follow Anne on LinkedIn. 
👉Learn more about Keeper Security on LinkedIn and their website. 

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 17 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>How does a TV news anchor end up in cybersecurity? Meet Anne Cutler, former journalist, anchor, ex-DHS and -CISA communications pro, and currently Director of Global Communications at Keeper Security!
Anne also shares other parts of her journey, like her early days breaking news in Casper, Wyoming, followed by reporting from a bar in New Orleans, and her deeply moving stories from inside Angola prison. Today, she navigates the world of cybersecurity with the same storytelling flair. Tune in for an episode filled with human stories, showcasing the depth of empathy and dignity Anne brings to her work, and how these experiences shaped her journey into cybersecurity 

Episode Highlights:

[02:31 - 05:40] Memorable Stories from Journalism

Anne shares experiences from her journalism career, including a unique show set in a bar in New Orleans and a powerful series at Angola prison.

[05:41 - 09:30] Transition to DHS &amp; CISA

Anne’s move to the Department of Homeland Security’s Science and Technology Directorate and then to CISA.

[09:31 - 13:45] Role at CISA and Key Incidents

Discussing major cybersecurity incidents Anne worked on, including Colonial Pipeline and the Shields Up campaign during the Russia-Ukraine conflict.

[17:21 - 21:15] Joining Keeper Security

Anne’s transition to the private sector and her role at Keeper Security as Director of Global Communications.

[21:16 - 24:00] Building a Communications Team

Anne’s efforts in building and expanding the communications team at Keeper Security, including global PR teams and internal staff.


[30:01 - 33:00] Social Media and Influencer Strategies


Challenges and strategies for managing organic and paid social media content, and the importance of authentic influencer partnerships.

[33:01 - 36:45] Sponsorship of Williams Racing

Keeper Security’s sponsorship of Williams Racing in Formula One, aligning with the company’s growth and global presence.


About our guests:
👉Follow Anne on LinkedIn. 
👉Learn more about Keeper Security on LinkedIn and their website. 

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>How does a TV news anchor end up in cybersecurity? Meet <a href="https://www.linkedin.com/in/anne-cutler-31282253/">Anne Cutler</a>, former journalist, anchor, ex-DHS and -CISA communications pro, and currently Director of Global Communications at <a href="https://www.keepersecurity.com/">Keeper Security</a>!</p><p>Anne also shares other parts of her journey, like her early days breaking news in Casper, Wyoming, followed by reporting from a bar in New Orleans, and her deeply moving stories from inside Angola prison. Today, she navigates the world of cybersecurity with the same storytelling flair. Tune in for an episode filled with human stories, showcasing the depth of empathy and dignity Anne brings to her work, and how these experiences shaped her journey into cybersecurity </p><p><br></p><h2><strong>Episode Highlights:</strong></h2><ul>
<li><strong>[02:31 - 05:40] Memorable Stories from Journalism</strong></li>
<li>Anne shares experiences from her journalism career, including a unique show set in a bar in New Orleans and a powerful series at Angola prison.</li>
<li><strong>[05:41 - 09:30] Transition to DHS &amp; CISA</strong></li>
<li>Anne’s move to the Department of Homeland Security’s Science and Technology Directorate and then to CISA.</li>
<li><strong>[09:31 - 13:45] Role at CISA and Key Incidents</strong></li>
<li>Discussing major cybersecurity incidents Anne worked on, including Colonial Pipeline and the Shields Up campaign during the Russia-Ukraine conflict.</li>
<li><strong>[17:21 - 21:15] Joining Keeper Security</strong></li>
<li>Anne’s transition to the private sector and her role at Keeper Security as Director of Global Communications.</li>
<li><strong>[21:16 - 24:00] Building a Communications Team</strong></li>
<li>Anne’s efforts in building and expanding the communications team at Keeper Security, including global PR teams and internal staff.</li>
<li>
<strong>[30:01 - 33:00</strong>] <strong>Social Media and Influencer Strategies</strong>
</li>
<li>Challenges and strategies for managing organic and paid social media content, and the importance of authentic influencer partnerships.</li>
<li><strong>[33:01 - 36:45] Sponsorship of Williams Racing</strong></li>
<li>Keeper Security’s sponsorship of Williams Racing in Formula One, aligning with the company’s growth and global presence.</li>
</ul><p><br></p><h2><strong>About our guests:</strong></h2><p>👉Follow Anne on <a href="https://www.linkedin.com/in/anne-cutler-31282253/">LinkedIn</a>. </p><p>👉Learn more about Keeper Security on <a href="https://www.linkedin.com/company/keeper-security-inc-/">LinkedIn</a> and their <a href="https://www.keepersecurity.com/">website</a>. </p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2623</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a78fef8-3f9a-11ef-80ba-5f8a67dc329f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9673683337.mp3?updated=1723026941" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Aligning Channel to Marketing &amp; Sales with CMO &amp; Channel Chief Charlene Ignacio</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/125/notes</link>
      <description>Class in session! Grab your pens and papers because we have Charlene Ignacio, Channel Chief, CMO, entrepreneur, multi-industry CEO, and Founder of Fornix Marketing. Yes, the list goes on and on—she's practically a one-woman business empire. But today she is here to talk about Fornix Marketing and to share her ultimate playbook on navigating the world of channel marketing leadership. You'll learn how to master the art of communication, set thresholds for change, and hire the right people for your team. Charlene also talks about dealing with imposter syndrome and strategies to overcome it. What's even better, Charlene shares her "Win to the Fourth Power'' strategy. This episode is jam packed - tune in for tips that can help you solve your current marketing alignment problems! 


[03:30] - Services Provided by Fornix Marketing

Fornix Marketing helps companies grow globally by making sure their products solve real problems. They focus on transforming Managed Service Providers (MSPs) into Managed Security Service Providers (MSSPs) - and helping security vendors build effective channel programs to reach these MSPs &amp; MSSPs. Fornix Marketing also provides coaching/training for marketing teams and aspiring channel chiefs.

[07:30] - Sharing Strategies and Competition

Charlene’s philosophy on sharing strategies and fostering collaboration.

[09:00] - Charlene’s Journey

Charlene’s upbringing in Hawaii and its influence on her career.

[11:00] - Overcoming Imposter Syndrome

Discussion on imposter syndrome and personal barriers to success.

[13:00] - Role Progression to Channel Chief

Charlene’s role as a Chief Marketing Officer before becoming a Channel Chief.

Talking more about the "Win to the Fourth Power" formula.

[15:00] - Alignment with Organizational Goals

The key to success: Aligning your goals with the CEO. Collaboration and teamwork are essential.

[17:30] - Communication and Clarification

Importance of over-communication and using the right tools.Ensuring there’s clarity in communication to avoid misunderstandings.

[19:00] - Collaboration and Asking Better Questions

The power of asking the right questions for better alignment and collaboration.

[20:30] - Managing Change and Setting Thresholds

Establishing a baseline and threshold for managing changes within the team and the importance of adaptability and having a clear threshold for changes.

[23:30] - Hiring for Agility and Team Building

Tips for hiring the right people who can adapt to change.

Realigning team members to ensure they are in the right roles for success.


About our guests:
👉Follow Charlene on LinkedIn.
👉Learn more about Fornix Marketing on their website and LinkedIn.

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</description>
      <pubDate>Wed, 10 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Aligning Channel to Marketing &amp; Sales with CMO &amp; Channel Chief Charlene Ignacio</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Class in session! Grab your pens and papers because we have Charlene Ignacio, Channel Chief, CMO, entrepreneur, multi-industry CEO, and Founder of Fornix Marketing. Yes, the list goes on and on—she's practically a one-woman business empire. But today she is here to talk about Fornix Marketing and to share her ultimate playbook on navigating the world of channel marketing leadership. You'll learn how to master the art of communication, set thresholds for change, and hire the right people for your team. Charlene also talks about dealing with imposter syndrome and strategies to overcome it. What's even better, Charlene shares her "Win to the Fourth Power'' strategy. This episode is jam packed - tune in for tips that can help you solve your current marketing alignment problems! 


[03:30] - Services Provided by Fornix Marketing

Fornix Marketing helps companies grow globally by making sure their products solve real problems. They focus on transforming Managed Service Providers (MSPs) into Managed Security Service Providers (MSSPs) - and helping security vendors build effective channel programs to reach these MSPs &amp; MSSPs. Fornix Marketing also provides coaching/training for marketing teams and aspiring channel chiefs.

[07:30] - Sharing Strategies and Competition

Charlene’s philosophy on sharing strategies and fostering collaboration.

[09:00] - Charlene’s Journey

Charlene’s upbringing in Hawaii and its influence on her career.

[11:00] - Overcoming Imposter Syndrome

Discussion on imposter syndrome and personal barriers to success.

[13:00] - Role Progression to Channel Chief

Charlene’s role as a Chief Marketing Officer before becoming a Channel Chief.

Talking more about the "Win to the Fourth Power" formula.

[15:00] - Alignment with Organizational Goals

The key to success: Aligning your goals with the CEO. Collaboration and teamwork are essential.

[17:30] - Communication and Clarification

Importance of over-communication and using the right tools.Ensuring there’s clarity in communication to avoid misunderstandings.

[19:00] - Collaboration and Asking Better Questions

The power of asking the right questions for better alignment and collaboration.

[20:30] - Managing Change and Setting Thresholds

Establishing a baseline and threshold for managing changes within the team and the importance of adaptability and having a clear threshold for changes.

[23:30] - Hiring for Agility and Team Building

Tips for hiring the right people who can adapt to change.

Realigning team members to ensure they are in the right roles for success.


About our guests:
👉Follow Charlene on LinkedIn.
👉Learn more about Fornix Marketing on their website and LinkedIn.

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Class in session! Grab your pens and papers because we have <a href="https://www.linkedin.com/in/charlene-ignacio/">Charlene Ignacio</a>, Channel Chief, CMO, entrepreneur, multi-industry CEO, and Founder of <a href="https://www.linkedin.com/company/fornix-marketing/">Fornix Marketing</a>. Yes, the list goes on and on—she's practically a one-woman business empire. But today she is here to talk about <a href="https://www.linkedin.com/company/fornix-marketing/">Fornix Marketing</a> and to share her ultimate playbook on navigating the world of channel marketing leadership. You'll learn how to master the art of communication, set thresholds for change, and hire the right people for your team. Charlene also talks about dealing with imposter syndrome and strategies to overcome it. What's even better, Charlene shares her <em>"Win to the Fourth Power''</em> strategy. This episode is jam packed - tune in for tips that can help you solve your current marketing alignment problems! </p><p><br></p><ul>
<li><strong>[03:30] - Services Provided by Fornix Marketing</strong></li>
<li>Fornix Marketing helps companies grow globally by making sure their products solve real problems. They focus on transforming Managed Service Providers (MSPs) into Managed Security Service Providers (MSSPs) - and helping security vendors build effective channel programs to reach these MSPs &amp; MSSPs. Fornix Marketing also provides coaching/training for marketing teams and aspiring channel chiefs.</li>
<li><strong>[07:30] - Sharing Strategies and Competition</strong></li>
<li>Charlene’s philosophy on sharing strategies and fostering collaboration.</li>
<li><strong>[09:00] - Charlene’s Journey</strong></li>
<li>Charlene’s upbringing in Hawaii and its influence on her career.</li>
<li><strong>[11:00] - Overcoming Imposter Syndrome</strong></li>
<li>Discussion on imposter syndrome and personal barriers to success.</li>
<li><strong>[13:00] - Role Progression to Channel Chief</strong></li>
<li>Charlene’s role as a Chief Marketing Officer before becoming a Channel Chief.</li>
<li>Talking more about the <em>"Win to the Fourth Power"</em> formula.</li>
<li><strong>[15:00] - Alignment with Organizational Goals</strong></li>
<li>The key to success: Aligning your goals with the CEO. Collaboration and teamwork are essential.</li>
<li><strong>[17:30] - Communication and Clarification</strong></li>
<li>Importance of over-communication and using the right tools.Ensuring there’s clarity in communication to avoid misunderstandings.</li>
<li><strong>[19:00] - Collaboration and Asking Better Questions</strong></li>
<li>The power of asking the right questions for better alignment and collaboration.</li>
<li><strong>[20:30] - Managing Change and Setting Thresholds</strong></li>
<li>Establishing a baseline and threshold for managing changes within the team and the importance of adaptability and having a clear threshold for changes.</li>
<li><strong>[23:30] - Hiring for Agility and Team Building</strong></li>
<li>Tips for hiring the right people who can adapt to change.</li>
<li>Realigning team members to ensure they are in the right roles for success.</li>
</ul><p><br></p><h2><strong>About our guests:</strong></h2><p>👉Follow Charlene on <a href="https://www.linkedin.com/in/charlene-ignacio/">LinkedIn</a>.</p><p>👉Learn more about Fornix Marketing on their <a href="https://fornixmarketing.com/">website</a> and <a href="https://www.linkedin.com/company/fornix-marketing/">LinkedIn</a>.</p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p><br></p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1801</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4771dbe-37e3-11ef-b483-f702c946a5ae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4420614766.mp3?updated=1723027010" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Double Trouble: Two Tims Tackle Cyber Marketing Challenges </title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/124/notes</link>
      <description>A pair of eyes, a pair of ears, a pair of socks—catching our drift? The best things come in pairs, and today, we have two Tims! Tim Golden, Chief Executive Officer/Founder of Compliance Scorecard &amp; Tim Schnurr, Security Awareness Coach / VCISO at Inquisitive IT. Today’s episode is truly a cyber marketer's (and cyber partner marketer’s!) treasure chest as we talk about the difficulties of selling cybersecurity solutions through Managed Service Providers (MSPs), the misconceptions vendors face in this space, and the Tims also share insights on enablement and empowerment strategies for MSPs. 


[6:15 ] - Compliance Scorecard Overview

Tim Golden describes Compliance Scorecard and its role in helping MSPs with risk conversations and compliance.

[8:00] - Cybersecurity in Regulated Industries

The impact of cyber liability insurance on compliance and cybersecurity and introducing "Cliff" - Cyber Liability Insurance Framework.


[10:00] - Selling Strategies and Go-To-Market Approaches

Tim Schnurr on targeting baby boomers and retirees for cybersecurity services.

[12:30] - Teaching and Empowering MSPs

Tim Golden talks about educating MSPs on packaging, pricing, and selling compliance services.

[16:45] - Challenges and Misconceptions in the Channel

Misconceptions enterprise cybersecurity vendors have when entering the MSP space.

[21:00] - Effective Enablement and Empowerment

Examples of successful enablement and empowerment in the channel and the importance of building community and providing hands-on support to MSPs.

[25:00] - Blue Ocean Strategy and Ecosystem Building

Creating an ecosystem of vendors that meet the needs of MSPs and end customers.


About our guests:

👉Follow Tim Golden on LinkedIn. 
👉Find Tim Schnurr on LinkedIn as well.
👉Check both Tims out on their podcast teamTimLive 

Be sure to also follow our hosts on LinkedIn:

👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 03 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Double Trouble: Two Tims Tackle Cyber Marketing Challenges </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A pair of eyes, a pair of ears, a pair of socks—catching our drift? The best things come in pairs, and today, we have two Tims! Tim Golden, Chief Executive Officer/Founder of Compliance Scorecard &amp; Tim Schnurr, Security Awareness Coach / VCISO at Inquisitive IT. Today’s episode is truly a cyber marketer's (and cyber partner marketer’s!) treasure chest as we talk about the difficulties of selling cybersecurity solutions through Managed Service Providers (MSPs), the misconceptions vendors face in this space, and the Tims also share insights on enablement and empowerment strategies for MSPs. 


[6:15 ] - Compliance Scorecard Overview

Tim Golden describes Compliance Scorecard and its role in helping MSPs with risk conversations and compliance.

[8:00] - Cybersecurity in Regulated Industries

The impact of cyber liability insurance on compliance and cybersecurity and introducing "Cliff" - Cyber Liability Insurance Framework.


[10:00] - Selling Strategies and Go-To-Market Approaches

Tim Schnurr on targeting baby boomers and retirees for cybersecurity services.

[12:30] - Teaching and Empowering MSPs

Tim Golden talks about educating MSPs on packaging, pricing, and selling compliance services.

[16:45] - Challenges and Misconceptions in the Channel

Misconceptions enterprise cybersecurity vendors have when entering the MSP space.

[21:00] - Effective Enablement and Empowerment

Examples of successful enablement and empowerment in the channel and the importance of building community and providing hands-on support to MSPs.

[25:00] - Blue Ocean Strategy and Ecosystem Building

Creating an ecosystem of vendors that meet the needs of MSPs and end customers.


About our guests:

👉Follow Tim Golden on LinkedIn. 
👉Find Tim Schnurr on LinkedIn as well.
👉Check both Tims out on their podcast teamTimLive 

Be sure to also follow our hosts on LinkedIn:

👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A pair of eyes, a pair of ears, a pair of socks—catching our drift? The best things come in pairs, and today, we have two Tims! <a href="https://www.linkedin.com/in/timothygolden/">Tim Golden</a>, Chief Executive Officer/Founder of<a href="https://www.linkedin.com/company/compliancescorecard/"> Compliance Scorecard</a> &amp; <a href="https://www.linkedin.com/in/timschnurr/">Tim Schnurr</a>, Security Awareness Coach / VCISO at <a href="https://www.linkedin.com/company/inquisitiveit/">Inquisitive IT</a>. Today’s episode is truly a cyber marketer's (and cyber partner marketer’s!) treasure chest as we talk about the difficulties of selling cybersecurity solutions through Managed Service Providers (MSPs), the misconceptions vendors face in this space, and the Tims also share insights on enablement and empowerment strategies for MSPs. </p><p><br></p><ul>
<li><strong>[6:15 ] - Compliance Scorecard Overview</strong></li>
<li>Tim Golden describes Compliance Scorecard and its role in helping MSPs with risk conversations and compliance.</li>
<li><strong>[8:00] - Cybersecurity in Regulated Industries</strong></li>
<li>The impact of cyber liability insurance on compliance and cybersecurity and introducing <em>"Cliff" - Cyber Liability Insurance Framework.</em>
</li>
<li><strong>[10:00] - Selling Strategies and Go-To-Market Approaches</strong></li>
<li>Tim Schnurr on targeting baby boomers and retirees for cybersecurity services.</li>
<li><strong>[12:30] - Teaching and Empowering MSPs</strong></li>
<li>Tim Golden talks about educating MSPs on packaging, pricing, and selling compliance services.</li>
<li><strong>[16:45] - Challenges and Misconceptions in the Channel</strong></li>
<li>Misconceptions enterprise cybersecurity vendors have when entering the MSP space.</li>
<li><strong>[21:00] - Effective Enablement and Empowerment</strong></li>
<li>Examples of successful enablement and empowerment in the channel and the importance of building community and providing hands-on support to MSPs.</li>
<li><strong>[25:00] - Blue Ocean Strategy and Ecosystem Building</strong></li>
<li>Creating an ecosystem of vendors that meet the needs of MSPs and end customers.</li>
</ul><p><br></p><h2><strong>About our guests:</strong></h2><p><br></p><p><strong>👉</strong>Follow <a href="https://www.linkedin.com/in/timothygolden/">Tim Golden</a> on LinkedIn. </p><p><strong>👉</strong>Find <a href="https://www.linkedin.com/in/timschnurr/">Tim Schnurr</a> on LinkedIn as well.</p><p><strong>👉</strong>Check both Tims out on their podcast <a href="https://teamtim.live/">teamTimLive</a> </p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><br></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc32956a-37b5-11ef-8ea9-7b01aa5c733a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6923626428.mp3?updated=1723027095" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Risky Business: Cary Tiernan's Take on Cyber Insurance and Security</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/122/notes</link>
      <description>Selling cyber to small businesses without leaning on FUD (fear, uncertainty, and doubt) is often a challenge. In this episode, Cary Tiernan, the Director of Product Marketing at At-Bay shares how At-Bay goes to market in a unique industry: cyber insurance! …without leaning on tired FUD tropes. At-Bay is all about proactive risk management, which they do by offering tools and services that help prevent cyber incidents before they happen, and building trust with their customers through personalized customer engagement. Listen to this episode for a goldmine of the value of cyber insurance and how Cary communicates the benefits without fear mongering.

Episode highlights: 


[02:00] - What’s At-Bay?: Cary breaks down what At-Bay does and how they’re different.


[04:00] - Cybersecurity + Insurance: The magic mix and why it matters.


[07:00] - Marketing Challenges: The unique hurdles of marketing cyber insurance.


[10:00] - Personalized Strategies: How ABM (Account-Based Marketing) is a game changer.


[12:30] - PLG Magic: Product-led growth and its impact on At-Bay's success.


[15:00] - Intuit Insights: Cary’s past experiences shaping current strategies.


[18:00] - Onboarding Essentials: Why the first customer touchpoint is critical.


[20:00] - Tool Talk: Utilizing Intercom for customer engagement.


[22:30] - Enterprise PLG: Adapting PLG for bigger fish in the sea.


[25:00] - Small Biz Focus: The big role small businesses play in cybersecurity.


Key Takeaways:

At-Bay isn’t just an insurance provider; they're your cyber guardian angels.

Personalized marketing and ABM are the secret weapons for reaching SMBs.

Product-led growth (PLG) is not just for SaaS—it's a powerhouse in cybersecurity too.

Nail that onboarding process—it’s your golden ticket to customer engagement.

Small businesses face huge cyber risks, and At-Bay is on a mission to protect them.


About our guest:
👉Follow Cary on LinkedIn
👉Find At-Bay on LinkedIn

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 26 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Risky Business: Cary Tiernan's Take on Cyber Insurance and Security</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Selling cyber to small businesses without leaning on FUD (fear, uncertainty, and doubt) is often a challenge. In this episode, Cary Tiernan, the Director of Product Marketing at At-Bay shares how At-Bay goes to market in a unique industry: cyber insurance! …without leaning on tired FUD tropes. At-Bay is all about proactive risk management, which they do by offering tools and services that help prevent cyber incidents before they happen, and building trust with their customers through personalized customer engagement. Listen to this episode for a goldmine of the value of cyber insurance and how Cary communicates the benefits without fear mongering.

Episode highlights: 


[02:00] - What’s At-Bay?: Cary breaks down what At-Bay does and how they’re different.


[04:00] - Cybersecurity + Insurance: The magic mix and why it matters.


[07:00] - Marketing Challenges: The unique hurdles of marketing cyber insurance.


[10:00] - Personalized Strategies: How ABM (Account-Based Marketing) is a game changer.


[12:30] - PLG Magic: Product-led growth and its impact on At-Bay's success.


[15:00] - Intuit Insights: Cary’s past experiences shaping current strategies.


[18:00] - Onboarding Essentials: Why the first customer touchpoint is critical.


[20:00] - Tool Talk: Utilizing Intercom for customer engagement.


[22:30] - Enterprise PLG: Adapting PLG for bigger fish in the sea.


[25:00] - Small Biz Focus: The big role small businesses play in cybersecurity.


Key Takeaways:

At-Bay isn’t just an insurance provider; they're your cyber guardian angels.

Personalized marketing and ABM are the secret weapons for reaching SMBs.

Product-led growth (PLG) is not just for SaaS—it's a powerhouse in cybersecurity too.

Nail that onboarding process—it’s your golden ticket to customer engagement.

Small businesses face huge cyber risks, and At-Bay is on a mission to protect them.


About our guest:
👉Follow Cary on LinkedIn
👉Find At-Bay on LinkedIn

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Selling cyber to small businesses without leaning on FUD (fear, uncertainty, and doubt) is often a challenge. In this episode, <a href="https://www.linkedin.com/in/carytiernan/">Cary Tiernan</a>, the Director of Product Marketing at <a href="https://www.linkedin.com/company/at-bay/">At-Bay</a> shares how At-Bay goes to market in a unique industry: cyber insurance! …without leaning on tired FUD tropes. At-Bay is all about proactive risk management, which they do by offering tools and services that help prevent cyber incidents before they happen, and building trust with their customers through personalized customer engagement. Listen to this episode for a goldmine of the value of cyber insurance and how Cary communicates the benefits without fear mongering.</p><p><br></p><h2><strong>Episode highlights: </strong></h2><ul>
<li>
<strong>[02:00] </strong>- What’s <a href="https://www.linkedin.com/company/at-bay/">At-Bay</a>?: Cary breaks down what At-Bay does and how they’re different.</li>
<li>
<strong>[04:00]</strong> - Cybersecurity + Insurance: The magic mix and why it matters.</li>
<li>
<strong>[07:00]</strong> - Marketing Challenges: The unique hurdles of marketing cyber insurance.</li>
<li>
<strong>[10:00]</strong> - Personalized Strategies: How ABM (Account-Based Marketing) is a game changer.</li>
<li>
<strong>[12:30]</strong> - PLG Magic: Product-led growth and its impact on At-Bay's success.</li>
<li>
<strong>[15:00] </strong>- Intuit Insights: Cary’s past experiences shaping current strategies.</li>
<li>
<strong>[18:00]</strong> - Onboarding Essentials: Why the first customer touchpoint is critical.</li>
<li>
<strong>[20:00]</strong> - Tool Talk: Utilizing Intercom for customer engagement.</li>
<li>
<strong>[22:30]</strong> - Enterprise PLG: Adapting PLG for bigger fish in the sea.</li>
<li>
<strong>[25:00]</strong> - Small Biz Focus: The big role small businesses play in cybersecurity.</li>
</ul><p><br></p><h2><strong>Key Takeaways:</strong></h2><ul>
<li>At-Bay isn’t just an insurance provider; they're your cyber guardian angels.</li>
<li>Personalized marketing and ABM are the secret weapons for reaching SMBs.</li>
<li>Product-led growth (PLG) is not just for SaaS—it's a powerhouse in cybersecurity too.</li>
<li>Nail that onboarding process—it’s your golden ticket to customer engagement.</li>
<li>Small businesses face huge cyber risks, and At-Bay is on a mission to protect them.</li>
</ul><p><br></p><h2><strong>About our guest:</strong></h2><p><strong>👉</strong>Follow Cary on <a href="https://www.linkedin.com/in/carytiernan/">LinkedIn</a></p><p><strong>👉</strong>Find At-Bay on <a href="https://www.linkedin.com/company/at-bay/">LinkedIn</a></p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1898</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c55ca6de-2a3d-11ef-9eb4-533fd641ebb2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3799516702.mp3?updated=1723027115" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> From Biggie vs. Tupac to Cybersecurity GTM Strategies: A Chat with Lord Ian L. Paterson</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/122/notes</link>
      <description>How many people can say they were joined by a Lord on their podcast? We certainly can! This week, we are joined by Lord Ian L. Paterson, CEO of Plurilock, a global cyber solutions provider and maker of Plurilock AI, a leading platform for SSO, CASB, DLP, AI identity + AI safety. During our discussion, Ian shares how Canadian holidays often turn into "inbox zero days" because of the lack of incoming emails from their American counterparts. And the hosts and Ian talk about a debate as old as time? East Coast vs. West Coast! Ian absolutely refused to pick between Biggie and Tupac but he did offer valuable insights on the difference in go-to-market strategies and cultural nuances between the coasts. 

Enjoy this episode to find out how Ian became a lord (it's a beautiful story)!😉



[04:00] - Ian talks about email volumes and meeting habits, comparing Canadian and American practices.


[06:00] - Overview of Plurilock's services and history.


[09:00] - Discussion on the industries Plurilock typically works with, including U.S. and Canadian federal governments.


[13:00] - Ian shares insights on the differences in go-to-market strategies across various regions.


[15:00] - East Coast vs. West Coast approaches in sales and marketing.


[25:00] - Impact of COVID-19 on the public listing timeline.


About our guest:
👉Follow Ian L. Paterson on Linkedin
👉Find Plurilock on Linkedin

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 19 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title> From Biggie vs. Tupac to Cybersecurity GTM Strategies: A Chat with Lord Ian L. Paterson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>How many people can say they were joined by a Lord on their podcast? We certainly can! This week, we are joined by Lord Ian L. Paterson, CEO of Plurilock, a global cyber solutions provider and maker of Plurilock AI, a leading platform for SSO, CASB, DLP, AI identity + AI safety. During our discussion, Ian shares how Canadian holidays often turn into "inbox zero days" because of the lack of incoming emails from their American counterparts. And the hosts and Ian talk about a debate as old as time? East Coast vs. West Coast! Ian absolutely refused to pick between Biggie and Tupac but he did offer valuable insights on the difference in go-to-market strategies and cultural nuances between the coasts. 

Enjoy this episode to find out how Ian became a lord (it's a beautiful story)!😉



[04:00] - Ian talks about email volumes and meeting habits, comparing Canadian and American practices.


[06:00] - Overview of Plurilock's services and history.


[09:00] - Discussion on the industries Plurilock typically works with, including U.S. and Canadian federal governments.


[13:00] - Ian shares insights on the differences in go-to-market strategies across various regions.


[15:00] - East Coast vs. West Coast approaches in sales and marketing.


[25:00] - Impact of COVID-19 on the public listing timeline.


About our guest:
👉Follow Ian L. Paterson on Linkedin
👉Find Plurilock on Linkedin

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>How many people can say they were joined by a Lord on their podcast? We certainly can! This week, we are joined by <a href="https://www.linkedin.com/in/ianlpaterson/">Lord Ian L. Paterson</a>, CEO of <a href="https://www.linkedin.com/company/plurilock-security-solutions-inc/">Plurilock</a>, a global cyber solutions provider and maker of Plurilock AI, a leading platform for SSO, CASB, DLP, AI identity + AI safety. During our discussion, Ian shares how Canadian holidays often turn into <strong><em>"inbox zero days" </em></strong>because of the lack of incoming emails from their American counterparts. And the hosts and Ian talk about a debate as old as time? East Coast vs. West Coast! Ian absolutely refused to pick between Biggie and Tupac but he did offer valuable insights on the difference in go-to-market strategies and cultural nuances between the coasts. </p><p><br></p><p>Enjoy this episode to find out how Ian became a lord (it's a beautiful story)!😉</p><p><br></p><ul>
<li>
<strong>[04:00]</strong> - Ian talks about email volumes and meeting habits, comparing Canadian and American practices.</li>
<li>
<strong>[06:00]</strong> - Overview of Plurilock's services and history.</li>
<li>
<strong>[09:00]</strong> - Discussion on the industries Plurilock typically works with, including U.S. and Canadian federal governments.</li>
<li>
<strong>[13:00]</strong> - Ian shares insights on the differences in go-to-market strategies across various regions.</li>
<li>
<strong>[15:00]</strong> - East Coast vs. West Coast approaches in sales and marketing.</li>
<li>
<strong>[25:00]</strong> - Impact of COVID-19 on the public listing timeline.</li>
</ul><p><br></p><h2><strong>About our guest:</strong></h2><p><strong>👉</strong>Follow Ian L. Paterson on<a href="https://www.linkedin.com/in/ianlpaterson/"> Linkedin</a></p><p><strong>👉</strong>Find <a href="https://www.linkedin.com/company/plurilock-security-solutions-inc/">Plurilock</a> on Linkedin</p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2215</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b0b0b0a-2a3d-11ef-9096-1f9c60e42974]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3639396508.mp3?updated=1723026988" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>dope.security Unplugged with CEO and Founder Kunal Agarwal</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/121/notes</link>
      <description>He’s fashionable, creative, and the dopest CEO/founder…he’s Kunal Agarwal of dope.security, the Fly Direct Secure Web Gateway! The hosts and Kunal unpack his unique journey and unique approach to GTM - from his time at Symantec and Forcepoint, to the inspiration behind the fashion-forward branding of dope.security, to the importance of design and user experience in cybersecurity products. The chat also goes into some seriously cool marketing strategies, the magic of organic growth, and why Kunal's team prefers keeping things flat and friendly. If you're looking for ways to be dope in cybersecurity, well then this episode is made for you!

[03:00] Journey into Cybersecurity


Kunal’s interest in cybersecurity began in childhood, even leading to a near brush with jail.

[05:15] Experiences at Symantec and Forcepoint


From engineer to product manager and leader, he talks about valuable lessons learned at Symantec and Forcepoint.

[07:30] Starting dope.security


He shares his initial reluctance to start a company and how his dream of working at Symantec led to founding dope.security.

[11:00] Global UX and Design


Discussing the universal importance of good UX, he explains how dope.security prioritizes user-friendly designs through collaboration with Erica.

[19:00] CISOs and Cars Getting Coffee


The creative marketing program, inspired by a customer conversation, is explained along with its organic growth and team collaboration.

[21:00] Unique Marketing Strategies


dope.security’s grassroots marketing strategies involve the whole team and avoid traditional executive roles like CMO.

[23:00] The Anti-Executive Philosophy


He talks about the flat hierarchy and the importance of leaders being deeply involved in product details.

[25:00] CEO in a Creative Company



Emphasizing passion and detail-oriented work, he highlights their role in achieving success.

About our guest:
👉Find Kunal on LinkedIn
👉Follow  dope.security

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 12 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>dope.security Unplugged with CEO and Founder Kunal Agarwal</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>He’s fashionable, creative, and the dopest CEO/founder…he’s Kunal Agarwal of dope.security, the Fly Direct Secure Web Gateway! The hosts and Kunal unpack his unique journey and unique approach to GTM - from his time at Symantec and Forcepoint, to the inspiration behind the fashion-forward branding of dope.security, to the importance of design and user experience in cybersecurity products. The chat also goes into some seriously cool marketing strategies, the magic of organic growth, and why Kunal's team prefers keeping things flat and friendly. If you're looking for ways to be dope in cybersecurity, well then this episode is made for you!

[03:00] Journey into Cybersecurity


Kunal’s interest in cybersecurity began in childhood, even leading to a near brush with jail.

[05:15] Experiences at Symantec and Forcepoint


From engineer to product manager and leader, he talks about valuable lessons learned at Symantec and Forcepoint.

[07:30] Starting dope.security


He shares his initial reluctance to start a company and how his dream of working at Symantec led to founding dope.security.

[11:00] Global UX and Design


Discussing the universal importance of good UX, he explains how dope.security prioritizes user-friendly designs through collaboration with Erica.

[19:00] CISOs and Cars Getting Coffee


The creative marketing program, inspired by a customer conversation, is explained along with its organic growth and team collaboration.

[21:00] Unique Marketing Strategies


dope.security’s grassroots marketing strategies involve the whole team and avoid traditional executive roles like CMO.

[23:00] The Anti-Executive Philosophy


He talks about the flat hierarchy and the importance of leaders being deeply involved in product details.

[25:00] CEO in a Creative Company



Emphasizing passion and detail-oriented work, he highlights their role in achieving success.

About our guest:
👉Find Kunal on LinkedIn
👉Follow  dope.security

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>He’s fashionable, creative, and the dopest CEO/founder…he’s <a href="https://www.linkedin.com/in/kunala/">Kunal Agarwal</a> of <a href="https://www.linkedin.com/company/dopesecurity/">dope.security</a>, the Fly Direct Secure Web Gateway! The hosts and Kunal unpack his unique journey and unique approach to GTM - from his time at <a href="https://www.linkedin.com/company/symantec/">Symantec</a> and <a href="https://www.linkedin.com/company/forcepoint/">Forcepoint</a>, to the inspiration behind the fashion-forward branding of dope.security, to the importance of design and user experience in cybersecurity products. The chat also goes into some seriously cool marketing strategies, the magic of organic growth, and why Kunal's team prefers keeping things <em>flat and friendly</em>. If you're looking for ways to be dope in cybersecurity, well then this episode is made for you!</p><ul>
<li>[03:00] <strong>Journey into Cybersecurity</strong>
</li>
<li>Kunal’s interest in cybersecurity began in childhood, even leading to a near brush with jail.</li>
<li>[05:15] <strong>Experiences at Symantec and Forcepoint</strong>
</li>
<li>From engineer to product manager and leader, he talks about valuable lessons learned at Symantec and Forcepoint.</li>
<li>[07:30]<strong> Starting dope.security</strong>
</li>
<li>He shares his initial reluctance to start a company and how his dream of working at Symantec led to founding dope.security.</li>
<li>[11:00] <strong>Global UX and Design</strong>
</li>
<li>Discussing the universal importance of good UX, he explains how dope.security prioritizes user-friendly designs through collaboration with Erica.</li>
<li>[19:00] <strong>CISOs and Cars Getting Coffee</strong>
</li>
<li>The creative marketing program, inspired by a customer conversation, is explained along with its organic growth and team collaboration.</li>
<li>[21:00] <strong>Unique Marketing Strategies</strong>
</li>
<li>dope.security’s grassroots marketing strategies involve the whole team and avoid traditional executive roles like CMO.</li>
<li>[23:00] <strong>The Anti-Executive Philosophy</strong>
</li>
<li>He talks about the flat hierarchy and the importance of leaders being deeply involved in product details.</li>
<li>[25:00] <strong>CEO in a Creative Company</strong>
</li>
</ul><p><br></p><p>Emphasizing passion and detail-oriented work, he highlights their role in achieving success.</p><p><br></p><h2><strong>About our guest:</strong></h2><p><strong>👉</strong>Find Kunal<strong> </strong>on <a href="https://www.linkedin.com/in/kunala/">LinkedIn</a></p><p><strong>👉</strong>Follow  <a href="https://www.linkedin.com/company/dopesecurity/">dope.security</a></p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1681</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c1c6d66a-24c1-11ef-bc10-7f9e5f7cc879]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3225553228.mp3?updated=1723026938" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Keys to Successful Cybersecurity Products with Nicholas Muy and guest co-host  Ross Haleliuk</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/120/notes</link>
      <description>As the podcast that keeps things fresh, this week our co-hosts Gianna Whitver and Maria Velasquez are handing over the reins to a guest host who is quite well-known: the author of the viral cyber bestseller Cyber for Builders, Ross Haleliuk! Ross is joined by the Chief Security Officer (CSO/CISO) at Scrut Automation, Nicholas Muy. Together they explore the intricacies of building cybersecurity products that truly matter. The episode dives into the challenges and strategies of product development in the cybersecurity industry, emphasizing the importance of genuine user feedback, real-world experience, and building trust within the community.

Key Takeaways:

[03:30] - Nick shares his background and current role at Scrut Automation

[05:15] - Common mistakes founders make in cybersecurity product development

[08:45] - The importance of engaging with the cybersecurity community

[12:30] - How to balance customer feedback with a founder’s vision

[16:00] - Real-world examples from Nick's experience as an investor and advisor

[20:15] - Practical advice for startup employees in evaluating early-stage startups


Guest hosts are new for us and we would appreciate your feedback, email your thoughts: podcasts@breakingthroughincybersecuritymarketing.com. 

Get to know our guest host and guest:
👉Reach out to Ross on LinkedIn.
👉Get your copy of Cyber for Builders on Amazon.
👉Connect with Nick Muy: LinkedIn.

Be sure to also follow our main show hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter. See you in the next episode!</description>
      <pubDate>Wed, 05 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>The Keys to Successful Cybersecurity Products with Nicholas Muy and guest co-host  Ross Haleliuk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As the podcast that keeps things fresh, this week our co-hosts Gianna Whitver and Maria Velasquez are handing over the reins to a guest host who is quite well-known: the author of the viral cyber bestseller Cyber for Builders, Ross Haleliuk! Ross is joined by the Chief Security Officer (CSO/CISO) at Scrut Automation, Nicholas Muy. Together they explore the intricacies of building cybersecurity products that truly matter. The episode dives into the challenges and strategies of product development in the cybersecurity industry, emphasizing the importance of genuine user feedback, real-world experience, and building trust within the community.

Key Takeaways:

[03:30] - Nick shares his background and current role at Scrut Automation

[05:15] - Common mistakes founders make in cybersecurity product development

[08:45] - The importance of engaging with the cybersecurity community

[12:30] - How to balance customer feedback with a founder’s vision

[16:00] - Real-world examples from Nick's experience as an investor and advisor

[20:15] - Practical advice for startup employees in evaluating early-stage startups


Guest hosts are new for us and we would appreciate your feedback, email your thoughts: podcasts@breakingthroughincybersecuritymarketing.com. 

Get to know our guest host and guest:
👉Reach out to Ross on LinkedIn.
👉Get your copy of Cyber for Builders on Amazon.
👉Connect with Nick Muy: LinkedIn.

Be sure to also follow our main show hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As the podcast that keeps things fresh, this week our co-hosts Gianna Whitver and Maria Velasquez are handing over the reins to a guest host who is quite well-known: the author of the viral cyber bestseller <em>Cyber for Builders</em>, Ross Haleliuk! Ross is joined by the Chief Security Officer (CSO/CISO) at <a href="https://www.linkedin.com/company/scrut-automation/">Scrut Automation</a>, <a href="https://www.linkedin.com/in/nicholasmuy/">Nicholas Muy</a>. Together they explore the intricacies of building cybersecurity products that truly matter. The episode dives into the challenges and strategies of product development in the cybersecurity industry, emphasizing the importance of genuine user feedback, real-world experience, and building trust within the community.</p><p><br></p><h2><strong>Key Takeaways:</strong></h2><ul>
<li>[03:30] - Nick shares his background and current role at Scrut Automation</li>
<li>[05:15] - Common mistakes founders make in cybersecurity product development</li>
<li>[08:45] - The importance of engaging with the cybersecurity community</li>
<li>[12:30] - How to balance customer feedback with a founder’s vision</li>
<li>[16:00] - Real-world examples from Nick's experience as an investor and advisor</li>
<li>[20:15] - Practical advice for startup employees in evaluating early-stage startups</li>
</ul><p><br></p><p>Guest hosts are new for us and we would appreciate your feedback, email your thoughts: <a href="mailto:podcasts@breakingthroughincybersecuritymarketing.com">podcasts@breakingthroughincybersecuritymarketing.com</a>. </p><p><br></p><h2>Get to know our guest host and guest:</h2><p>👉Reach out to Ross on <a href="https://www.linkedin.com/in/rosshaleliuk/">LinkedIn</a>.</p><p>👉Get your copy of Cyber for Builders on<a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/"> Amazon</a>.</p><p>👉Connect with Nick Muy: <a href="https://www.linkedin.com/in/nicholasmuy/">LinkedIn</a>.</p><p><br></p><h2>Be sure to also follow our main show hosts on LinkedIn:</h2><p>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2537</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f887c8d4-1f45-11ef-a2cd-17dda83caf76]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5747299292.mp3?updated=1723027067" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beekeeper Meets Codekeeper with Cody Browning</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/119/notes</link>
      <description>Today we are Buzzzzzzing Through in Cybersecurity Marketing, bringing you not just the buzz on cybersecurity but literal buzzing too! Meet Cody Browning, a Territory Account Executive at LogRhythm and an avid beekeeper. Cody shares how his peaceful pastime of beekeeping intersects with the high-stakes world of cybersecurity, drawing unexpected parallels between the two, inspired by none other than Jason Statham in ‘The Beekeeper’. 😉 Join us as we dive into a conversation that’s as intriguing as it is sweet as honey!

Episode Highlights:


[00:05:00] Journey into Cybersecurity: Cody recounts his intriguing start in cybersecurity, from managing live chats during critical ransomware attacks to evolving into a strategic, consultative role at LogRhythm.


[00:10:30] The Beekeeper Movie: Get the buzz on "The Beekeeper," a film starring Jason Statham that mirrors Cody’s own shift from beekeeping to battling cyber threats, illustrating the unexpected ways personal passions can intersect with professional life.


[00:15:00] Cody’s Professional Insights: Explore Cody's current role at LogRhythm, where he offers strategic and consultative support to enterprise customers, and discover why building strong relationships in sales is akin to managing a healthy bee colony.


[00:20:00] Cybersecurity and Channel Sales: Reflect on Cody's past experiences with channel sales at AT&amp;T Cybersecurity, shedding light on the crucial role of partnerships in the cybersecurity ecosystem.


Resources:
The Beekeeper movie starring Jason Statham 

About our guest:
👉Follow Cody on LinkedIn. 
👉Find LogRhythm on LinkedIn.

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 29 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Beekeeper Meets Codekeeper with Cody Browning</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Today we are Buzzzzzzing Through in Cybersecurity Marketing, bringing you not just the buzz on cybersecurity but literal buzzing too! Meet Cody Browning, a Territory Account Executive at LogRhythm and an avid beekeeper. Cody shares how his peaceful pastime of beekeeping intersects with the high-stakes world of cybersecurity, drawing unexpected parallels between the two, inspired by none other than Jason Statham in ‘The Beekeeper’. 😉 Join us as we dive into a conversation that’s as intriguing as it is sweet as honey!

Episode Highlights:


[00:05:00] Journey into Cybersecurity: Cody recounts his intriguing start in cybersecurity, from managing live chats during critical ransomware attacks to evolving into a strategic, consultative role at LogRhythm.


[00:10:30] The Beekeeper Movie: Get the buzz on "The Beekeeper," a film starring Jason Statham that mirrors Cody’s own shift from beekeeping to battling cyber threats, illustrating the unexpected ways personal passions can intersect with professional life.


[00:15:00] Cody’s Professional Insights: Explore Cody's current role at LogRhythm, where he offers strategic and consultative support to enterprise customers, and discover why building strong relationships in sales is akin to managing a healthy bee colony.


[00:20:00] Cybersecurity and Channel Sales: Reflect on Cody's past experiences with channel sales at AT&amp;T Cybersecurity, shedding light on the crucial role of partnerships in the cybersecurity ecosystem.


Resources:
The Beekeeper movie starring Jason Statham 

About our guest:
👉Follow Cody on LinkedIn. 
👉Find LogRhythm on LinkedIn.

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are Buzzzzzzing Through in Cybersecurity Marketing, bringing you not just the buzz on cybersecurity but literal buzzing too! Meet <a href="https://www.linkedin.com/in/codyalanbrowning/">Cody Browning</a>, a Territory Account Executive at <a href="https://www.linkedin.com/company/logrhythm/">LogRhythm</a> and an avid beekeeper. Cody shares how his peaceful pastime of beekeeping intersects with the high-stakes world of cybersecurity, drawing unexpected parallels between the two, inspired by none other than Jason Statham in ‘The Beekeeper’. 😉 Join us as we dive into a conversation that’s as intriguing as it is sweet as honey!</p><p><br></p><h2>Episode Highlights:</h2><ul>
<li>
<strong>[00:05:00] Journey into Cybersecurity: </strong>Cody recounts his intriguing start in cybersecurity, from managing live chats during critical ransomware attacks to evolving into a strategic, consultative role at LogRhythm.</li>
<li>
<strong>[00:10:30] The Beekeeper Movie: </strong>Get the buzz on "The Beekeeper," a film starring Jason Statham that mirrors Cody’s own shift from beekeeping to battling cyber threats, illustrating the unexpected ways personal passions can intersect with professional life.</li>
<li>
<strong>[00:15:00] Cody’s Professional Insights: </strong>Explore Cody's current role at LogRhythm, where he offers strategic and consultative support to enterprise customers, and discover why building strong relationships in sales is akin to managing a healthy bee colony.</li>
<li>
<strong>[00:20:00] Cybersecurity and Channel Sales: </strong>Reflect on Cody's past experiences with channel sales at AT&amp;T Cybersecurity, shedding light on the crucial role of partnerships in the cybersecurity ecosystem.</li>
</ul><p><br></p><h2><strong>Resources:</strong></h2><p><a href="https://www.imdb.com/title/tt15314262/">The Beekeeper</a> movie starring Jason Statham </p><p><br></p><h2><strong>About our guest:</strong></h2><p><strong>👉</strong>Follow Cody on <a href="https://www.linkedin.com/in/codyalanbrowning/">LinkedIn</a>. </p><p><strong>👉</strong>Find LogRhythm on <a href="https://www.linkedin.com/company/logrhythm/">LinkedIn</a>.</p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2061</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7453c88-12bc-11ef-a1dd-f7cc9ab0b376]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3494162711.mp3?updated=1723027154" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside RSA Conference 2024 with Gianna &amp; Maria</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/118/notes</link>
      <description>Join us for an live-recorded episode from RSA Conference 2024, where our hosts Gianna and Maria broadcasted directly from Moscone North in San Francisco. Our dynamic duo shares thrilling experiences, spotlights groundbreaking booths, and delivers fresh updates straight from the conference floor. They also unpack major announcements from NetSPI and celebrate the spirited community of cybersecurity marketers. Tune in for an episode packed with energy, innovation, and insider insights!

Episode Highlights:


[04:00] - RSA 2024 Theme: Overview of this year's conference theme, "The Art of Possible."



[08:25] - Notable Booths: Impressions of themed booths by Mend.io and Wiz.


[11:00] - NetSPI Announcements: Announcement of NetSPI’s new platform, brand, and website.


[14:40] - Marketer Party: Recap of the successful marketer party at RSA Conference.


[18:20] - Upcoming CyberMarketingCon24 in Philadelphia.


[21:00] - Acquisition News: News on the acquisition of NoName Security by Akamai.


[23:45] - Support for Startups: Discussion on RSA Innovation Sandbox and its impact on startups.


Quotes from the Episode:


"It's like the Super Bowl of cybersecurity, but it's also a place where we come to support each other, learn, and grow together as marketers." — Gianna


"Every booth tells a story, and it's our job to uncover and share these stories, making the art of possible a reality." — Maria


Resources:
👉Get your EARLY BIRD ticket to CyberMarketingCon24!
👉The call for speakers is also open until June 5th!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 22 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Inside RSA Conference 2024 with Gianna &amp; Maria</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Join us for an live-recorded episode from RSA Conference 2024, where our hosts Gianna and Maria broadcasted directly from Moscone North in San Francisco. Our dynamic duo shares thrilling experiences, spotlights groundbreaking booths, and delivers fresh updates straight from the conference floor. They also unpack major announcements from NetSPI and celebrate the spirited community of cybersecurity marketers. Tune in for an episode packed with energy, innovation, and insider insights!

Episode Highlights:


[04:00] - RSA 2024 Theme: Overview of this year's conference theme, "The Art of Possible."



[08:25] - Notable Booths: Impressions of themed booths by Mend.io and Wiz.


[11:00] - NetSPI Announcements: Announcement of NetSPI’s new platform, brand, and website.


[14:40] - Marketer Party: Recap of the successful marketer party at RSA Conference.


[18:20] - Upcoming CyberMarketingCon24 in Philadelphia.


[21:00] - Acquisition News: News on the acquisition of NoName Security by Akamai.


[23:45] - Support for Startups: Discussion on RSA Innovation Sandbox and its impact on startups.


Quotes from the Episode:


"It's like the Super Bowl of cybersecurity, but it's also a place where we come to support each other, learn, and grow together as marketers." — Gianna


"Every booth tells a story, and it's our job to uncover and share these stories, making the art of possible a reality." — Maria


Resources:
👉Get your EARLY BIRD ticket to CyberMarketingCon24!
👉The call for speakers is also open until June 5th!

Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Join us for an live-recorded episode from RSA Conference 2024, where our hosts Gianna and Maria broadcasted directly from Moscone North in San Francisco. Our dynamic duo shares thrilling experiences, spotlights groundbreaking booths, and delivers fresh updates straight from the conference floor. They also unpack major announcements from NetSPI and celebrate the spirited community of cybersecurity marketers. Tune in for an episode packed with energy, innovation, and insider insights!</p><p><br></p><h2>Episode Highlights:</h2><ul>
<li>
<strong>[04:00]</strong> - RSA 2024 Theme: Overview of this year's conference theme, <em>"The Art of Possible."</em>
</li>
<li>
<strong>[08:25]</strong> - Notable Booths: Impressions of themed booths by Mend.io and Wiz.</li>
<li>
<strong>[11:00]</strong> - NetSPI Announcements: Announcement of NetSPI’s new platform, brand, and website.</li>
<li>
<strong>[14:40] </strong>- Marketer Party: Recap of the successful marketer party at RSA Conference.</li>
<li>
<strong>[18:20] </strong>- Upcoming CyberMarketingCon24 in Philadelphia.</li>
<li>
<strong>[21:00]</strong> - Acquisition News: News on the acquisition of NoName Security by Akamai.</li>
<li>
<strong>[23:45] </strong>- Support for Startups: Discussion on RSA Innovation Sandbox and its impact on startups.</li>
</ul><p><br></p><h2>Quotes from the Episode:</h2><ul>
<li>
<em>"It's like the Super Bowl of cybersecurity, but it's also a place where we come to support each other, learn, and grow together as marketers." </em>— Gianna</li>
<li>
<em>"Every booth tells a story, and it's our job to uncover and share these stories, making the art of possible a reality." </em>— Maria</li>
</ul><p><br></p><h2><strong>Resources:</strong></h2><p><strong>👉</strong>Get your EARLY BIRD ticket to <a href="https://www.cybermarketingconference.com/">CyberMarketingCon24</a>!</p><p><strong>👉</strong>The call for speakers is also open <a href="https://www.cybermarketingconference.com/#speakers">until June 5th</a>!</p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1258</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[53cbdfb0-144b-11ef-9efd-df41ba4629c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1250069192.mp3?updated=1723026761" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Creating New Cyber Categories with CMO Michael Yehoshua</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/117/notes</link>
      <description>From the worlds of fashion photography to heavy metal to cybersecurity today, we sit down with Michael Yehoshua, CMO at Holistic Cyber and SAGE Cyber. Michael not only shares his transition into cyber, but also explains how he created his own playground by establishing a new category within Gartner—proving that the only deep pockets you need are those filled with creativity and grit. Buckle up for an inspiring journey through marketing tactics and the power of thinking outside the box. 


[00:02:15] Journey into Cybersecurity: Michael shares his unique path from the world of fashion to cybersecurity.


[00:10:00] Strategic Leadership: Insights into managing dual roles as CMO for two distinct companies.


[00:18:45] Innovative Market Creation: Discussing the creation of the Cyber Defense Planning and Optimization (CDPO) category.


[00:27:30] Marketing Strategies and Insights: Differences in marketing strategies between services and products.


[00:35:20] Creative Marketing Successes: Examples of unconventional marketing tactics that have propelled company growth.


Resources:
2024 Cybersecurity Buyers Report: Compiled by Actual Tech Media and the Cybersecurity Marketing Society, providing deep insights into buyer preferences and behaviors within the cybersecurity market. 
About  guest:
👉Follow Michael on LinkedIn. 
👉Find Holistic Cyber (HolistiCyber) on LinkedIn or their website.  
👉Follow SAGE Cyber on LinkedIn.
Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 15 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Creating New Cyber Categories with CMO Michael Yehoshua</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the worlds of fashion photography to heavy metal to cybersecurity today, we sit down with Michael Yehoshua, CMO at Holistic Cyber and SAGE Cyber. Michael not only shares his transition into cyber, but also explains how he created his own playground by establishing a new category within Gartner—proving that the only deep pockets you need are those filled with creativity and grit. Buckle up for an inspiring journey through marketing tactics and the power of thinking outside the box. 


[00:02:15] Journey into Cybersecurity: Michael shares his unique path from the world of fashion to cybersecurity.


[00:10:00] Strategic Leadership: Insights into managing dual roles as CMO for two distinct companies.


[00:18:45] Innovative Market Creation: Discussing the creation of the Cyber Defense Planning and Optimization (CDPO) category.


[00:27:30] Marketing Strategies and Insights: Differences in marketing strategies between services and products.


[00:35:20] Creative Marketing Successes: Examples of unconventional marketing tactics that have propelled company growth.


Resources:
2024 Cybersecurity Buyers Report: Compiled by Actual Tech Media and the Cybersecurity Marketing Society, providing deep insights into buyer preferences and behaviors within the cybersecurity market. 
About  guest:
👉Follow Michael on LinkedIn. 
👉Find Holistic Cyber (HolistiCyber) on LinkedIn or their website.  
👉Follow SAGE Cyber on LinkedIn.
Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the worlds of fashion photography to heavy metal to cybersecurity today, we sit down with Michael Yehoshua, CMO at <a href="https://www.linkedin.com/company/holisticyber/">Holistic Cyber </a>and <a href="https://www.linkedin.com/company/sage-cyber-1/">SAGE Cyber</a>. Michael not only shares his transition into cyber, but also explains how he created his own playground by establishing a new category within Gartner—proving that the only deep pockets you need are those filled with creativity and grit. Buckle up for an inspiring journey through marketing tactics and the power of thinking outside the box. </p><ul>
<li>
<strong>[00:02:15] Journey into Cybersecurity</strong>: Michael shares his unique path from the world of fashion to cybersecurity.</li>
<li>
<strong>[00:10:00] Strategic Leadership</strong>: Insights into managing dual roles as CMO for two distinct companies.</li>
<li>
<strong>[00:18:45] Innovative Market Creation</strong>: Discussing the creation of the Cyber Defense Planning and Optimization (CDPO) category.</li>
<li>
<strong>[00:27:30] Marketing Strategies and Insights</strong>: Differences in marketing strategies between services and products.</li>
<li>
<strong>[00:35:20] Creative Marketing Successes</strong>: Examples of unconventional marketing tactics that have propelled company growth.</li>
</ul><p><br></p><h2><strong>Resources:</strong></h2><p><a href="https://qrco.de/cms-atm">2024 Cybersecurity Buyers Report</a>: Compiled by Actual Tech Media and the Cybersecurity Marketing Society, providing deep insights into buyer preferences and behaviors within the cybersecurity market. </p><h2><strong>About  guest:</strong></h2><p><strong>👉</strong>Follow Michael on <a href="https://www.linkedin.com/in/michael-yehoshua/">LinkedIn</a>. </p><p><strong>👉</strong>Find Holistic Cyber (HolistiCyber) on <a href="https://www.linkedin.com/company/holisticyber/">LinkedIn</a> or their <a href="https://holisticyber.com/">website</a>.  </p><p>👉Follow SAGE Cyber on <a href="https://www.linkedin.com/company/sage-cyber-1/">LinkedIn</a>.</p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2127</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[860bab4c-112e-11ef-9229-cfa10121df33]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9661616771.mp3?updated=1723027027" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mastering Marketing Mayhem with Pam Cobb</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/116/notes</link>
      <description>This week, get ready to laugh until it hurts because we might just have our funniest episode ever. Earthquakes and spreadsheets are the names of the game as we welcome Pam Cobb, the hilariously jet-lagged (for this episode, not permanently, folks!) Director of Content Security at Akamai. Join hosts Gianna and Maria as they dive into how Pam not only survives natural disasters but also thrives amid the chaos of cybersecurity marketing. From smart marketing tactics to hilarious earthquake jokes, Pam keeps the tips and laughter rolling. Don’t miss out on this episode’s mix of awesome advice and entertaining stories from the wild world of marketing!
Timestamps:

[01:08] Pam's role at Akamai explained

[02:05] How Pam attributes revenue to security content

[03:36] The humor in marketing data struggles

[07:20] Pam's journey from engineering to marketing

[09:29] Transition to IBM and experiencing corporate acquisitions

[13:36] Creative content strategies and memorable marketing moments


Takeaways:

Content plays a crucial role in driving revenue and should be strategically managed.

Multi-touch attribution is a valuable tool for measuring the impact of content on revenue.

Creating engaging experiences at trade shows and events requires thoughtful planning and alignment with brand messaging.

Collaboration between different teams, such as content strategists and writers, is essential for successful content creation. Event planning is an important aspect of cybersecurity marketing, and creative ideas such as custom-named cocktails can make an event more memorable.

Resources:
Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
About  guest:
👉Link to Pam's blog post featuring the infamous orange kitten story.
👉Follow Pam on LinkedIn. 
👉Find Akamai on LinkedIn or their website.  
Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 08 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Mastering Marketing Mayhem with Pam Cobb</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, get ready to laugh until it hurts because we might just have our funniest episode ever. Earthquakes and spreadsheets are the names of the game as we welcome Pam Cobb, the hilariously jet-lagged (for this episode, not permanently, folks!) Director of Content Security at Akamai. Join hosts Gianna and Maria as they dive into how Pam not only survives natural disasters but also thrives amid the chaos of cybersecurity marketing. From smart marketing tactics to hilarious earthquake jokes, Pam keeps the tips and laughter rolling. Don’t miss out on this episode’s mix of awesome advice and entertaining stories from the wild world of marketing!
Timestamps:

[01:08] Pam's role at Akamai explained

[02:05] How Pam attributes revenue to security content

[03:36] The humor in marketing data struggles

[07:20] Pam's journey from engineering to marketing

[09:29] Transition to IBM and experiencing corporate acquisitions

[13:36] Creative content strategies and memorable marketing moments


Takeaways:

Content plays a crucial role in driving revenue and should be strategically managed.

Multi-touch attribution is a valuable tool for measuring the impact of content on revenue.

Creating engaging experiences at trade shows and events requires thoughtful planning and alignment with brand messaging.

Collaboration between different teams, such as content strategists and writers, is essential for successful content creation. Event planning is an important aspect of cybersecurity marketing, and creative ideas such as custom-named cocktails can make an event more memorable.

Resources:
Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
About  guest:
👉Link to Pam's blog post featuring the infamous orange kitten story.
👉Follow Pam on LinkedIn. 
👉Find Akamai on LinkedIn or their website.  
Be sure to also follow our hosts on LinkedIn:
👉Gianna Whitver
👉Maria Velasquez 
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, get ready to laugh until it hurts because we might just have our funniest episode ever. Earthquakes and spreadsheets are the names of the game as we welcome <a href="https://www.linkedin.com/in/pamelacobb/">Pam Cobb</a>, the hilariously jet-lagged (for this episode, not permanently, folks!) Director of Content Security at<a href="https://www.linkedin.com/company/akamai-technologies/"> Akamai</a>. Join hosts Gianna and Maria as they dive into how Pam not only survives natural disasters but also thrives amid the chaos of cybersecurity marketing. From smart marketing tactics to hilarious earthquake jokes, Pam keeps the tips and laughter rolling. Don’t miss out on this episode’s mix of awesome advice and entertaining stories from the wild world of marketing!</p><h2><strong>Timestamps:</strong></h2><ul>
<li>[01:08] Pam's role at Akamai explained</li>
<li>[02:05] How Pam attributes revenue to security content</li>
<li>[03:36] The humor in marketing data struggles</li>
<li>[07:20] Pam's journey from engineering to marketing</li>
<li>[09:29] Transition to IBM and experiencing corporate acquisitions</li>
<li>[13:36] Creative content strategies and memorable marketing moments</li>
</ul><p><br></p><h2><strong>Takeaways:</strong></h2><ul>
<li>Content plays a crucial role in driving revenue and should be strategically managed.</li>
<li>Multi-touch attribution is a valuable tool for measuring the impact of content on revenue.</li>
<li>Creating engaging experiences at trade shows and events requires thoughtful planning and alignment with brand messaging.</li>
<li>Collaboration between different teams, such as content strategists and writers, is essential for successful content creation. Event planning is an important aspect of cybersecurity marketing, and creative ideas such as custom-named cocktails can make an event more memorable.</li>
</ul><h2><strong>Resources:</strong></h2><p><strong>Join Us at RSA 2024:</strong></p><p>Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><h2><strong>About  guest:</strong></h2><p><strong>👉</strong><a href="https://securityintelligence.com/a-kitten-and-an-information-security-analyst-walk-into-a-bar/">Link </a>to Pam's blog post featuring the infamous orange kitten story.</p><p><strong>👉</strong>Follow Pam on <a href="https://www.linkedin.com/in/pamelacobb/">LinkedIn</a>. </p><p><strong>👉</strong>Find Akamai on <a href="https://www.linkedin.com/company/akamai-technologies/">LinkedIn</a> or their <a href="https://www.akamai.com/">website</a>.  </p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><strong>👉</strong><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><strong>👉</strong><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2859</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d15c7e6-0639-11ef-b867-d746e806fafd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6778289875.mp3?updated=1723027181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wiz’s Strategic Events with Jasmin Ozeri</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/115/notes</link>
      <description>This week, we are talking about all things cybersecurity events with Jasmin Ozeri, Strategic Events Manager at Wiz. While co-host Maria Velasquez couldn't join us, host Gianna Whitver explores how Jasmin brings creativity and strategic thinking to one of the hottest cloud security companies around. With a particular focus on the RSA Conference in this episode, discover how Jasmin's approach to bustling conference floors and strategic booth designs not only enhances Wiz's brand presence but also makes cybersecurity approachable and engaging.
Highlights:

[00:00:30] Introduction to the episode and today's guest, Jasmin Ozeri.

[00:01:50] Jasmin's journey from a wedding venue childhood to a cybersecurity event strategist.

[00:06:00] Inside Wiz's innovative event strategies: From Wizard of Oz to interactive booths.

[00:11:30] Preview of Wiz's plans for RSA Conference 2024.

[00:15:00] The strategic role of events in cybersecurity marketing.

[00:20:00] What would Jasmin be doing if not in cybersecurity? A surprising career alternative.

Takeaways:

Events are more than just logistical exercises; they're pivotal for brand building and creating meaningful customer engagement.

Bringing creativity into event planning can significantly enhance the attendee experience, making your booth and brand memorable.

Strategic event management involves careful planning and execution, ensuring every aspect aligns with the company’s marketing goals.


Join Us at RSAC 2024:
Remember to join the Cybersecurity Marketing Society's party at RSAC 2024 on May 5th, at Novela San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!

About Our Guest:

👉Follow Jasmin Ozeri on LinkedIn to keep up with her latest event strategies and insights into cybersecurity marketing.

👉Learn more about Wiz on their LinkedIn or website to see how they are revolutionizing cloud security (and RSAC booths!).


Connect with Our Hosts on LinkedIn:

👉Gianna Whitver


👉Maria Velasquez



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</description>
      <pubDate>Wed, 01 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Wiz’s Strategic Events with Jasmin Ozeri</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are talking about all things cybersecurity events with Jasmin Ozeri, Strategic Events Manager at Wiz. While co-host Maria Velasquez couldn't join us, host Gianna Whitver explores how Jasmin brings creativity and strategic thinking to one of the hottest cloud security companies around. With a particular focus on the RSA Conference in this episode, discover how Jasmin's approach to bustling conference floors and strategic booth designs not only enhances Wiz's brand presence but also makes cybersecurity approachable and engaging.
Highlights:

[00:00:30] Introduction to the episode and today's guest, Jasmin Ozeri.

[00:01:50] Jasmin's journey from a wedding venue childhood to a cybersecurity event strategist.

[00:06:00] Inside Wiz's innovative event strategies: From Wizard of Oz to interactive booths.

[00:11:30] Preview of Wiz's plans for RSA Conference 2024.

[00:15:00] The strategic role of events in cybersecurity marketing.

[00:20:00] What would Jasmin be doing if not in cybersecurity? A surprising career alternative.

Takeaways:

Events are more than just logistical exercises; they're pivotal for brand building and creating meaningful customer engagement.

Bringing creativity into event planning can significantly enhance the attendee experience, making your booth and brand memorable.

Strategic event management involves careful planning and execution, ensuring every aspect aligns with the company’s marketing goals.


Join Us at RSAC 2024:
Remember to join the Cybersecurity Marketing Society's party at RSAC 2024 on May 5th, at Novela San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!

About Our Guest:

👉Follow Jasmin Ozeri on LinkedIn to keep up with her latest event strategies and insights into cybersecurity marketing.

👉Learn more about Wiz on their LinkedIn or website to see how they are revolutionizing cloud security (and RSAC booths!).


Connect with Our Hosts on LinkedIn:

👉Gianna Whitver


👉Maria Velasquez



Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.
See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are talking about all things cybersecurity events with <a href="https://www.linkedin.com/in/jasmin-ozeri-267914128/">Jasmin Ozeri</a>, Strategic Events Manager at Wiz. While co-host Maria Velasquez couldn't join us, host Gianna Whitver explores how Jasmin brings creativity and strategic thinking to one of the hottest cloud security companies around. With a particular focus on the RSA Conference in this episode, discover how Jasmin's approach to bustling conference floors and strategic booth designs not only enhances Wiz's brand presence but also makes cybersecurity approachable and engaging.</p><h2><strong>Highlights:</strong></h2><ul>
<li>[00:00:30] Introduction to the episode and today's guest, Jasmin Ozeri.</li>
<li>[00:01:50] Jasmin's journey from a wedding venue childhood to a cybersecurity event strategist.</li>
<li>[00:06:00] Inside Wiz's innovative event strategies: From Wizard of Oz to interactive booths.</li>
<li>[00:11:30] Preview of Wiz's plans for RSA Conference 2024.</li>
<li>[00:15:00] The strategic role of events in cybersecurity marketing.</li>
<li>[00:20:00] What would Jasmin be doing if not in cybersecurity? A surprising career alternative.</li>
</ul><h2><strong>Takeaways:</strong></h2><ul>
<li>Events are more than just logistical exercises; they're pivotal for brand building and creating meaningful customer engagement.</li>
<li>Bringing creativity into event planning can significantly enhance the attendee experience, making your booth and brand memorable.</li>
<li>Strategic event management involves careful planning and execution, ensuring every aspect aligns with the company’s marketing goals.</li>
</ul><p><br></p><h2><strong>Join Us at RSAC 2024:</strong></h2><p>Remember to join the Cybersecurity Marketing Society's party at RSAC 2024 on May 5th, at Novela San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><p><br></p><h2><strong>About Our Guest:</strong></h2><ul>
<li>👉Follow <a href="https://www.linkedin.com/in/jasmin-ozeri-267914128/">Jasmin Ozeri</a> on LinkedIn to keep up with her latest event strategies and insights into cybersecurity marketing.</li>
<li>👉Learn more about Wiz on their<a href="https://www.linkedin.com/company/wizsecurity/"> LinkedIn</a> or <a href="https://www.wiz.io/">website</a> to see how they are revolutionizing cloud security (and RSAC booths!).</li>
</ul><p><br></p><h2>Connect with Our Hosts on LinkedIn:</h2><ul>
<li>👉<a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a>
</li>
<li>👉<a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a>
</li>
</ul><p><br></p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>1514</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[49f617aa-062f-11ef-bde4-3f7ea9dedd12]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4746078896.mp3?updated=1723026817" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Decoding Cyber Marketing with Illumio’s CMO, Gautam Mehandru</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/114/notes</link>
      <description>Today, the one and only Gautam Mehandru, CMO at Illumio, joins Maria and Gianna! In this episode, we crack open Gautam's playbook as he shares his insights and guides us through the complexities of marketing in cybersecurity. We'll explore everything from Gautam's unique journey from engineering roots to the pinnacle of marketing leadership to the intricate details of cybersecurity purchasing behaviors—including team compositions and vendor selection tactics. So, grab your pens and paper, or your digital notebooks if you fancy, and get ready to take some CMO notes!
Episode Highlights:

[1:20 - 5:30] Gautam's Journey to CMO

[12:30 - 4:55] Strategies for Effective Leadership as a CMO

[17:20 -20:05] Category Creation and Market Positioning

[23:40 - 25:50] Upcoming Plans for RSA Conference 2024

[28:15 - 30:40] Engaging with Analyst Firms and Utilizing Market Data


Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!

Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</description>
      <pubDate>Wed, 24 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title> Decoding Cyber Marketing with Illumio’s CMO, Gautam Mehandru</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Today, the one and only Gautam Mehandru, CMO at Illumio, joins Maria and Gianna! In this episode, we crack open Gautam's playbook as he shares his insights and guides us through the complexities of marketing in cybersecurity. We'll explore everything from Gautam's unique journey from engineering roots to the pinnacle of marketing leadership to the intricate details of cybersecurity purchasing behaviors—including team compositions and vendor selection tactics. So, grab your pens and paper, or your digital notebooks if you fancy, and get ready to take some CMO notes!
Episode Highlights:

[1:20 - 5:30] Gautam's Journey to CMO

[12:30 - 4:55] Strategies for Effective Leadership as a CMO

[17:20 -20:05] Category Creation and Market Positioning

[23:40 - 25:50] Upcoming Plans for RSA Conference 2024

[28:15 - 30:40] Engaging with Analyst Firms and Utilizing Market Data


Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!

Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today, the one and only <a href="https://www.linkedin.com/in/gautammehandru/">Gautam Mehandru</a>, CMO at<a href="https://www.linkedin.com/company/illumio/"> Illumio</a>, joins Maria and Gianna! In this episode, we crack open Gautam's playbook as he shares his insights and guides us through the complexities of marketing in cybersecurity. We'll explore everything from Gautam's unique journey from engineering roots to the pinnacle of marketing leadership to the intricate details of cybersecurity purchasing behaviors—including team compositions and vendor selection tactics. So, grab your pens and paper, or your digital notebooks if you fancy, and get ready to take some CMO notes!</p><h2><strong>Episode Highlights:</strong></h2><ul>
<li>[1:20 - 5:30] Gautam's Journey to CMO</li>
<li>[12:30 - 4:55] Strategies for Effective Leadership as a CMO</li>
<li>[17:20 -20:05] Category Creation and Market Positioning</li>
<li>[23:40 - 25:50] Upcoming Plans for RSA Conference 2024</li>
<li>[28:15 - 30:40] Engaging with Analyst Firms and Utilizing Market Data</li>
</ul><p><br></p><h2><strong>Join Us at RSA 2024:</strong></h2><p>Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><p><br></p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2355</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[964b527c-fe42-11ee-adbc-274940ae53b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2702477772.mp3?updated=1723027132" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building Island’s Brand with Ari Yablok </title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/113/notes</link>
      <description>What if there was a browser designed as an enterprise workspace from the outset? Imagine integrating all essential tools—spanning security, IT, and productivity—directly into the workspace where people operate. That is exactly what Island does, and when the brand came out of stealth in February 2022 with $100 million in funding, it launched with a new category and a splash (no pun intended)!
Today the Head of Brand at Island, Ari Yablok, joins us to talk more about Island, the intricacies of building a brand from the ground up, the strategic pivot from stealth mode to the public eye, and the art of storytelling in the cybersecurity landscape.
The best way to understand Island's impact is to see how simple yet profound changes in perspective, like the shift from seeing cybersecurity as a series of threats to viewing it as a secured environment, can fundamentally change the game." - Ari Yablok 
Episode Highlights:

[02:00] - Ari Yablok's Journey to Island:

[07:47] - Unpacking the Island Brand: Ari discusses the challenges and strategies behind launching Island's brand, emphasizing the importance of category creation and the deliberate avoidance of typical cybersecurity jargon to differentiate Island in the market.

[09:16] - The Launch Strategy: Detailing the preparation and execution of Island's exit from stealth mode, Ari outlines the foundational work that made their launch resonate with the cybersecurity community and the broader market.

[20:00] - Building Trust Through Branding: The conversation delves into the role of brand in building trust, especially in a new category, and how Island's approach to branding and customer experience sets them apart from traditional cybersecurity solutions.


Join Us at RSAC 2024:
Remember to join the Cybersecurity Marketing Society's party at RSAC 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!

Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</description>
      <pubDate>Wed, 17 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Building Island’s Brand with Ari Yablok </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>What if there was a browser designed as an enterprise workspace from the outset? Imagine integrating all essential tools—spanning security, IT, and productivity—directly into the workspace where people operate. That is exactly what Island does, and when the brand came out of stealth in February 2022 with $100 million in funding, it launched with a new category and a splash (no pun intended)!
Today the Head of Brand at Island, Ari Yablok, joins us to talk more about Island, the intricacies of building a brand from the ground up, the strategic pivot from stealth mode to the public eye, and the art of storytelling in the cybersecurity landscape.
The best way to understand Island's impact is to see how simple yet profound changes in perspective, like the shift from seeing cybersecurity as a series of threats to viewing it as a secured environment, can fundamentally change the game." - Ari Yablok 
Episode Highlights:

[02:00] - Ari Yablok's Journey to Island:

[07:47] - Unpacking the Island Brand: Ari discusses the challenges and strategies behind launching Island's brand, emphasizing the importance of category creation and the deliberate avoidance of typical cybersecurity jargon to differentiate Island in the market.

[09:16] - The Launch Strategy: Detailing the preparation and execution of Island's exit from stealth mode, Ari outlines the foundational work that made their launch resonate with the cybersecurity community and the broader market.

[20:00] - Building Trust Through Branding: The conversation delves into the role of brand in building trust, especially in a new category, and how Island's approach to branding and customer experience sets them apart from traditional cybersecurity solutions.


Join Us at RSAC 2024:
Remember to join the Cybersecurity Marketing Society's party at RSAC 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!

Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What if there was a browser designed as an enterprise workspace from the outset? Imagine integrating all essential tools—spanning security, IT, and productivity—directly into the workspace where people operate. That is exactly what <a href="https://www.island.io/">Island</a> does, and when the brand came out of stealth in February 2022 with $100 million in funding, it launched with a new category and a splash (no pun intended)!</p><p>Today the Head of Brand at Island,<a href="https://www.linkedin.com/in/ariyablok/"> Ari Yablok,</a> joins us to talk more about Island, the intricacies of building a brand from the ground up, the strategic pivot from stealth mode to the public eye, and the art of storytelling in the cybersecurity landscape.</p><p><em>The best way to understand Island's impact is to see how simple yet profound changes in perspective, like the shift from seeing cybersecurity as a series of threats to viewing it as a secured environment, can fundamentally change the game." </em>- Ari Yablok </p><h2><strong>Episode Highlights:</strong></h2><ul>
<li>[02:00] - Ari Yablok's Journey to Island:</li>
<li>[07:47] - Unpacking the Island Brand: Ari discusses the challenges and strategies behind launching Island's brand, emphasizing the importance of category creation and the deliberate avoidance of typical cybersecurity jargon to differentiate Island in the market.</li>
<li>[09:16] - The Launch Strategy: Detailing the preparation and execution of Island's exit from stealth mode, Ari outlines the foundational work that made their launch resonate with the cybersecurity community and the broader market.</li>
<li>[20:00] - Building Trust Through Branding: The conversation delves into the role of brand in building trust, especially in a new category, and how Island's approach to branding and customer experience sets them apart from traditional cybersecurity solutions.</li>
</ul><p><br></p><h2><strong>Join Us at RSAC 2024:</strong></h2><p>Remember to join the Cybersecurity Marketing Society's party at RSAC 2024 on May 5th, at Novella San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><p><br></p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2147</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7170bf56-f743-11ee-bb80-57d1b8adcbdd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5510396349.mp3?updated=1723026969" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Social Media Strategies with Matt Mullan</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/112/notes</link>
      <description>"Social media in cybersecurity is like walking a tightrope; you're balancing between being serious and injecting just the right amount of light-heartedness to crack a smile. That's how you get people to listen." - Matt Mullan 
This week, we're diving deep into the world of social media with none other than Matt Mullan, the Senior Social Media Manager at Illumio, a pioneering zero-trust segmentation company. Matt brings a treasure trove of insights from his journey—from starting in sales to mastering the art of social media in our complicated, technical, and fast-paced industry. Today, he's set to peel back the layers of the unique challenges and opportunities that come with marketing in the cybersecurity industry, drawing contrasts with his diverse experiences in sectors as varied as toy manufacturing and HR/payroll software. Prepare to learn from one of the best in navigating the complex currents of social media in the cybersecurity sector!

Highlight Reel:

[01:04] - Matt shares his professional background and transition into cybersecurity from sales and social media.

[03:56] - Discussing the unique challenges and opportunities in cybersecurity marketing.

[04:18] - Insights into engaging cybersecurity communities and leveraging humor in social media strategies.

[06:26] - The effectiveness and strategy behind using memes and light-hearted content to drive engagement.

[08:11] - The role of influencer marketing in cybersecurity and the potential shift towards micro-influencers.

[10:41] - Exploring social media's impact on brand awareness and lead generation within the cybersecurity sector.

[12:57] - The importance of diversifying social media strategies and not relying solely on one platform.

[17:29] - The concept of 'thought leadership' and its role in successful social media marketing.

[20:14] - The future of influencer marketing in cybersecurity and its challenges.


Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</description>
      <pubDate>Wed, 10 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cyber Social Media Strategies with Matt Mullan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>"Social media in cybersecurity is like walking a tightrope; you're balancing between being serious and injecting just the right amount of light-heartedness to crack a smile. That's how you get people to listen." - Matt Mullan 
This week, we're diving deep into the world of social media with none other than Matt Mullan, the Senior Social Media Manager at Illumio, a pioneering zero-trust segmentation company. Matt brings a treasure trove of insights from his journey—from starting in sales to mastering the art of social media in our complicated, technical, and fast-paced industry. Today, he's set to peel back the layers of the unique challenges and opportunities that come with marketing in the cybersecurity industry, drawing contrasts with his diverse experiences in sectors as varied as toy manufacturing and HR/payroll software. Prepare to learn from one of the best in navigating the complex currents of social media in the cybersecurity sector!

Highlight Reel:

[01:04] - Matt shares his professional background and transition into cybersecurity from sales and social media.

[03:56] - Discussing the unique challenges and opportunities in cybersecurity marketing.

[04:18] - Insights into engaging cybersecurity communities and leveraging humor in social media strategies.

[06:26] - The effectiveness and strategy behind using memes and light-hearted content to drive engagement.

[08:11] - The role of influencer marketing in cybersecurity and the potential shift towards micro-influencers.

[10:41] - Exploring social media's impact on brand awareness and lead generation within the cybersecurity sector.

[12:57] - The importance of diversifying social media strategies and not relying solely on one platform.

[17:29] - The concept of 'thought leadership' and its role in successful social media marketing.

[20:14] - The future of influencer marketing in cybersecurity and its challenges.


Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>"Social media in cybersecurity is like walking a tightrope; you're balancing between being serious and injecting just the right amount of light-heartedness to crack a smile. That's how you get people to listen."</em> - Matt Mullan </p><p>This week, we're diving deep into the world of social media with none other than <a href="https://www.linkedin.com/in/mullanmatthew/">Matt Mullan</a>, the Senior Social Media Manager at <a href="https://www.linkedin.com/company/illumio/">Illumio</a>, a pioneering zero-trust segmentation company. Matt brings a treasure trove of insights from his journey—from starting in sales to mastering the art of social media in our complicated, technical, and fast-paced industry. Today, he's set to peel back the layers of the unique challenges and opportunities that come with marketing in the cybersecurity industry, drawing contrasts with his diverse experiences in sectors as varied as toy manufacturing and HR/payroll software. Prepare to learn from one of the best in navigating the complex currents of social media in the cybersecurity sector!</p><h2>
<strong>Highlight Reel</strong>:</h2><ul>
<li>[01:04] - Matt shares his professional background and transition into cybersecurity from sales and social media.</li>
<li>[03:56] - Discussing the unique challenges and opportunities in cybersecurity marketing.</li>
<li>[04:18] - Insights into engaging cybersecurity communities and leveraging humor in social media strategies.</li>
<li>[06:26] - The effectiveness and strategy behind using memes and light-hearted content to drive engagement.</li>
<li>[08:11] - The role of influencer marketing in cybersecurity and the potential shift towards micro-influencers.</li>
<li>[10:41] - Exploring social media's impact on brand awareness and lead generation within the cybersecurity sector.</li>
<li>[12:57] - The importance of diversifying social media strategies and not relying solely on one platform.</li>
<li>[17:29] - The concept of 'thought leadership' and its role in successful social media marketing.</li>
<li>[20:14] - The future of influencer marketing in cybersecurity and its challenges.</li>
</ul><p><br></p><h2><strong>Join Us at RSA 2024:</strong></h2><p>Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ece30e4-f26c-11ee-8fd3-7350ba68f5e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7633107003.mp3?updated=1723026929" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threat Research and Marketing are Friends! with Tricia Howard</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/111/notes</link>
      <description>Enter the Cyber Guardians Galaxy! Yes, you heard that right! A universe where every byte and bit is a star in the digital cosmos, and lurking in the vast expanse are cosmic threats, darker than the void of space itself. But fear not, for we have our very own assembly of Avengers, the valiant warriors of the web, our cybersecurity practitioner superheroes!  Well, at least that is according to Tricia Howard, Senior Technical Writer II at Akamai Technologies, also known across the digital domains as "TriciaKicksSaaS."  Today, she joins Maria and Gianna to share tales of digital daring-do, and insights into how threat research and marketing can work together that sparkle brighter than infinity stones, all while bringing her unique blend of theatrical flair to the show!

Episode Takeaways:

Humor can be a powerful tool in cybersecurity marketing, helping to engage and connect with the audience.

Drawing inspiration from consumer brands can bring a fresh and creative approach to cybersecurity marketing.

Building trust and strong relationships with researchers is crucial for effective collaboration in cybersecurity marketing. 



Episode Highlights: 

[04:11] Using Humor in Cybersecurity Marketing

[05:29] Bringing Consumer Brand Inspiration to Cybersecurity Marketing

[07:20] Tricia's Role at Akamai and Building Trust with Researchers

[09:32] Working Internally with Researchers and Creating Partnerships

[11:23] Collaborating with Threat Researchers at Akamai

[18:24] Collaboration and Technical Expertise in Research

[19:20] Managing the Research Process and Protecting Researchers' Reputations

[20:36] The Importance of Researchers' Brand and Corporate Reputation

[22:00] The Excitement and Learning Opportunities in the Role

[24:26] Integrating Threat Research into Marketing at Startups

[26:43] Balancing Time Pressure and Content Creation in Threat Research


Links and References:
Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
For more insights and discussions from our guest:
About Tricia Howard:
Tricia Howard, a theatre degree holder, shares her unconventional journey into the cybersecurity world. Starting in inside sales and eventually finding her passion in cybersecurity marketing. Check her out on LinkedIn and YouTube.
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</description>
      <pubDate>Wed, 03 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Threat Research and Marketing are Friends! with Tricia Howard</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enter the Cyber Guardians Galaxy! Yes, you heard that right! A universe where every byte and bit is a star in the digital cosmos, and lurking in the vast expanse are cosmic threats, darker than the void of space itself. But fear not, for we have our very own assembly of Avengers, the valiant warriors of the web, our cybersecurity practitioner superheroes!  Well, at least that is according to Tricia Howard, Senior Technical Writer II at Akamai Technologies, also known across the digital domains as "TriciaKicksSaaS."  Today, she joins Maria and Gianna to share tales of digital daring-do, and insights into how threat research and marketing can work together that sparkle brighter than infinity stones, all while bringing her unique blend of theatrical flair to the show!

Episode Takeaways:

Humor can be a powerful tool in cybersecurity marketing, helping to engage and connect with the audience.

Drawing inspiration from consumer brands can bring a fresh and creative approach to cybersecurity marketing.

Building trust and strong relationships with researchers is crucial for effective collaboration in cybersecurity marketing. 



Episode Highlights: 

[04:11] Using Humor in Cybersecurity Marketing

[05:29] Bringing Consumer Brand Inspiration to Cybersecurity Marketing

[07:20] Tricia's Role at Akamai and Building Trust with Researchers

[09:32] Working Internally with Researchers and Creating Partnerships

[11:23] Collaborating with Threat Researchers at Akamai

[18:24] Collaboration and Technical Expertise in Research

[19:20] Managing the Research Process and Protecting Researchers' Reputations

[20:36] The Importance of Researchers' Brand and Corporate Reputation

[22:00] The Excitement and Learning Opportunities in the Role

[24:26] Integrating Threat Research into Marketing at Startups

[26:43] Balancing Time Pressure and Content Creation in Threat Research


Links and References:
Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
For more insights and discussions from our guest:
About Tricia Howard:
Tricia Howard, a theatre degree holder, shares her unconventional journey into the cybersecurity world. Starting in inside sales and eventually finding her passion in cybersecurity marketing. Check her out on LinkedIn and YouTube.
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enter the <em>Cyber Guardians Galaxy</em>! Yes, you heard that right! A universe where every byte and bit is a star in the digital cosmos, and lurking in the vast expanse are <em>cosmic threats</em>, darker than the void of space itself. But fear not, for we have our very own assembly of Avengers, the valiant warriors of the web, our cybersecurity practitioner superheroes!  Well, at least that is according to Tricia Howard, Senior Technical Writer II at <a href="https://www.akamai.com/">Akamai Technologies</a>, also known across the digital domains as <a href="https://www.linkedin.com/in/triciakickssaas/">"TriciaKicksSaaS." </a> Today, she joins Maria and Gianna to share tales of digital daring-do, and insights into how threat research and marketing can work together that sparkle brighter than infinity stones, all while bringing her unique blend of theatrical flair to the show!</p><p><br></p><h2><strong>Episode Takeaways:</strong></h2><ul>
<li>Humor can be a powerful tool in cybersecurity marketing, helping to engage and connect with the audience.</li>
<li>Drawing inspiration from consumer brands can bring a fresh and creative approach to cybersecurity marketing.</li>
<li>Building trust and strong relationships with researchers is crucial for effective collaboration in cybersecurity marketing.<strong> </strong>
</li>
</ul><p><br></p><h2><strong>Episode Highlights: </strong></h2><ul>
<li>[04:11] Using Humor in Cybersecurity Marketing</li>
<li>[05:29] Bringing Consumer Brand Inspiration to Cybersecurity Marketing</li>
<li>[07:20] Tricia's Role at Akamai and Building Trust with Researchers</li>
<li>[09:32] Working Internally with Researchers and Creating Partnerships</li>
<li>[11:23] Collaborating with Threat Researchers at Akamai</li>
<li>[18:24] Collaboration and Technical Expertise in Research</li>
<li>[19:20] Managing the Research Process and Protecting Researchers' Reputations</li>
<li>[20:36] The Importance of Researchers' Brand and Corporate Reputation</li>
<li>[22:00] The Excitement and Learning Opportunities in the Role</li>
<li>[24:26] Integrating Threat Research into Marketing at Startups</li>
<li>[26:43] Balancing Time Pressure and Content Creation in Threat Research</li>
</ul><p><br></p><h2><strong>Links and References:</strong></h2><p><strong>Join Us at RSA 2024:</strong></p><p>Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><p><strong>For more insights and discussions from our guest:</strong></p><p><strong><em>About Tricia Howard:</em></strong></p><p>Tricia Howard, a theatre degree holder, shares her unconventional journey into the cybersecurity world. Starting in inside sales and eventually finding her passion in cybersecurity marketing. Check her out on<a href="https://www.linkedin.com/in/triciakickssaas/"> LinkedIn</a> and<a href="https://www.youtube.com/@TriciaKicksSaaS"> YouTube</a>.</p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2079</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[17affba4-ecbb-11ee-88f1-cf8f032eb8fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4085462527.mp3?updated=1723026905" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Art of Cyber Defense: Insights from a Theatrical Minded CISO with Kayne McGladrey</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/110/notes</link>
      <description>Prepare to laugh until your stomach hurts with our most hilarious episode yet, featuring the one and only theater kid turned cybersecurity guru, Kayne McGladrey, Field CISO at Hyperproof. Join us for a rollercoaster of emotions as we dive into the absurdity of security info in 10K filings, engage in heated debates over the polarizing cinnamon sticky bun ale, and champion the cause for more singing and dancing in cybersecurity. Think of it as the "Cybersecurity's Got Talent" episode you never knew you needed! Kayne's journey is packed with invaluable insights and captivating stories that are as unique as they are engaging.

Key Episode Highlights:

[07:41] The Disclosure Rule and Made-up Cybersecurity Frameworks

[11:34] Kane's Podcasts and Discussion on FedRAMP

[12:36] Theater and its Influence on Cybersecurity and Marketing

[15:58] Engaging with CISOs in the Sales Process

[20:48] Balancing Technical and Business Perspectives as a CISO

[21:15] Challenges of Communication Between Business and Technical Teams

[21:58] Concerns of Technical CISOs and Board Alignment

[22:22] Tighter Integration of CISOs with the Board

[23:48] The Changing Role of CISOs and Personal Liability

[25:26] The Impact of Personal Liability on the Security Industry

[27:15] The Role of a Field CISO


Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
For more insights and discussions from our guest:

Connect with Kayne on LinkedIn. 

Listen to Kayne's podcasts, "Kayne's Five Under Five" and "Drafting Compliance," if you are interested in deep dives into specific cybersecurity topics.

Check out Kayne's analysis of 10K disclosures for understanding the landscape of cybersecurity reporting.


Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</description>
      <pubDate>Wed, 27 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>Art of Cyber Defense: Insights from a Theatrical Minded CISO with Kayne McGladrey</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Prepare to laugh until your stomach hurts with our most hilarious episode yet, featuring the one and only theater kid turned cybersecurity guru, Kayne McGladrey, Field CISO at Hyperproof. Join us for a rollercoaster of emotions as we dive into the absurdity of security info in 10K filings, engage in heated debates over the polarizing cinnamon sticky bun ale, and champion the cause for more singing and dancing in cybersecurity. Think of it as the "Cybersecurity's Got Talent" episode you never knew you needed! Kayne's journey is packed with invaluable insights and captivating stories that are as unique as they are engaging.

Key Episode Highlights:

[07:41] The Disclosure Rule and Made-up Cybersecurity Frameworks

[11:34] Kane's Podcasts and Discussion on FedRAMP

[12:36] Theater and its Influence on Cybersecurity and Marketing

[15:58] Engaging with CISOs in the Sales Process

[20:48] Balancing Technical and Business Perspectives as a CISO

[21:15] Challenges of Communication Between Business and Technical Teams

[21:58] Concerns of Technical CISOs and Board Alignment

[22:22] Tighter Integration of CISOs with the Board

[23:48] The Changing Role of CISOs and Personal Liability

[25:26] The Impact of Personal Liability on the Security Industry

[27:15] The Role of a Field CISO


Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
For more insights and discussions from our guest:

Connect with Kayne on LinkedIn. 

Listen to Kayne's podcasts, "Kayne's Five Under Five" and "Drafting Compliance," if you are interested in deep dives into specific cybersecurity topics.

Check out Kayne's analysis of 10K disclosures for understanding the landscape of cybersecurity reporting.


Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Prepare to laugh until your stomach hurts with our most hilarious episode yet, featuring the one and only theater kid turned cybersecurity guru, <a href="https://www.linkedin.com/in/kaynemcgladrey/">Kayne McGladrey</a>, Field CISO at <a href="https://www.linkedin.com/company/hyperproof/">Hyperproof</a>. Join us for a rollercoaster of emotions as we dive into the absurdity of security info in 10K filings, engage in heated debates over the polarizing cinnamon sticky bun ale, and champion the cause for more singing and dancing in cybersecurity. Think of it as the "Cybersecurity's Got Talent" episode you never knew you needed! Kayne's journey is packed with invaluable insights and captivating stories that are as unique as they are engaging.</p><p><br></p><h2><strong>Key Episode Highlights:</strong></h2><ul>
<li>[07:41] The Disclosure Rule and Made-up Cybersecurity Frameworks</li>
<li>[11:34] Kane's Podcasts and Discussion on FedRAMP</li>
<li>[12:36] Theater and its Influence on Cybersecurity and Marketing</li>
<li>[15:58] Engaging with CISOs in the Sales Process</li>
<li>[20:48] Balancing Technical and Business Perspectives as a CISO</li>
<li>[21:15] Challenges of Communication Between Business and Technical Teams</li>
<li>[21:58] Concerns of Technical CISOs and Board Alignment</li>
<li>[22:22] Tighter Integration of CISOs with the Board</li>
<li>[23:48] The Changing Role of CISOs and Personal Liability</li>
<li>[25:26] The Impact of Personal Liability on the Security Industry</li>
<li>[27:15] The Role of a Field CISO</li>
</ul><p><br></p><h2><strong>Join Us at RSA 2024:</strong></h2><p>Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><h2><strong>For more insights and discussions from our guest:</strong></h2><ul>
<li>Connect with Kayne on <a href="https://www.linkedin.com/in/kaynemcgladrey/">LinkedIn</a>. </li>
<li>Listen to Kayne's podcasts,<em> </em><a href="https://open.spotify.com/show/1N5HKRv5ab2VNbdDnyKMpt?si=63673ca359ac4bcc"><em>"Kayne's Five Under Five"</em></a> and <em>"</em><a href="https://open.spotify.com/show/3CYNuCBk7EzH6FqjscVbVt?si=0c1bbf8865244a2d"><em>Drafting Compliance</em></a><em>," </em>if you are interested in deep dives into specific cybersecurity topics.</li>
<li>Check out Kayne's analysis of 10K disclosures for understanding the landscape of cybersecurity reporting.</li>
</ul><p><br></p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2069</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9bfd5f40-e83e-11ee-a79b-939e8819884d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7434156888.mp3?updated=1723027026" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Palo Alto Networks is Leading with Optimism in Cybersecurity Marketing with Navneet Singh</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/109/notes</link>
      <description>It's refreshing to hear, especially in the world of AI, that the human element remains crucial. "There's no such thing as B2B marketing; it's B2H: Business to Human," because ultimately, humans are the ones making the decisions, says our guest, Navneet Singh, Vice President of Marketing for the Network Security Division at Palo Alto Networks. Navneet takes us through his fascinating transition from engineering to marketing, shining a light on the importance of positivity and putting the customer first when marketing in cybersecurity. Join us to find out how Palo Alto Networks is redefining the landscape with its fresh, optimistic approach to cybersecurity marketing.

Takeaways:

Focus on the customer and their needs in cybersecurity marketing.

Convey optimism and positivity in marketing to inspire confidence in customers.

Differentiate your company by being opposite to industry norms.

Avoid using fear as a marketing tactic in cybersecurity.

Create a culture of optimism and accountability within the marketing team.


Key Episode Highlights:

[00:06 - 01:20] Announcement of Cybersecurity Marketing Society's 2024 RSAC Party for Cyber Marketers! 

[01:32 - 04:23] Navneet Singh shares his career transition from engineering to marketing, emphasizing his passion for product management and marketing.

[04:27 - 07:42] The philosophical shift in cybersecurity marketing towards optimism and confidence, moving away from fear-based tactics.

[08:31 - 11:54] How Palo Alto Networks' marketing strategy is distinct, focusing on enabling businesses securely rather than instilling fear.

[12:21 - 17:39] The importance of focusing on the customer, humanizing B2B marketing, and the creative process behind the "We've Got Next" campaign.

[18:35 - 24:59] The significance of hope and education in cybersecurity, and the strategy behind avoiding fear-based marketing.

[25:29 - 31:09] How internal optimism and a positive company culture influence marketing strategies and customer interactions.

[31:14 - 35:21] Game Time: Guessing Nav's alternate career path, followed by Nav's revelation of his potential career in the armed forces if not in marketing.


﻿Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
Connect with Navneet Singh:
For more insights and discussions, connect with Nav on LinkedIn. Engage and share ideas on pushing the boundaries of cybersecurity marketing.
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of "Breaking Through in Cybersecurity Marketing." Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</description>
      <pubDate>Wed, 20 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>How Palo Alto Networks is Leading with Optimism in Cybersecurity Marketing with Navneet Singh</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>It's refreshing to hear, especially in the world of AI, that the human element remains crucial. "There's no such thing as B2B marketing; it's B2H: Business to Human," because ultimately, humans are the ones making the decisions, says our guest, Navneet Singh, Vice President of Marketing for the Network Security Division at Palo Alto Networks. Navneet takes us through his fascinating transition from engineering to marketing, shining a light on the importance of positivity and putting the customer first when marketing in cybersecurity. Join us to find out how Palo Alto Networks is redefining the landscape with its fresh, optimistic approach to cybersecurity marketing.

Takeaways:

Focus on the customer and their needs in cybersecurity marketing.

Convey optimism and positivity in marketing to inspire confidence in customers.

Differentiate your company by being opposite to industry norms.

Avoid using fear as a marketing tactic in cybersecurity.

Create a culture of optimism and accountability within the marketing team.


Key Episode Highlights:

[00:06 - 01:20] Announcement of Cybersecurity Marketing Society's 2024 RSAC Party for Cyber Marketers! 

[01:32 - 04:23] Navneet Singh shares his career transition from engineering to marketing, emphasizing his passion for product management and marketing.

[04:27 - 07:42] The philosophical shift in cybersecurity marketing towards optimism and confidence, moving away from fear-based tactics.

[08:31 - 11:54] How Palo Alto Networks' marketing strategy is distinct, focusing on enabling businesses securely rather than instilling fear.

[12:21 - 17:39] The importance of focusing on the customer, humanizing B2B marketing, and the creative process behind the "We've Got Next" campaign.

[18:35 - 24:59] The significance of hope and education in cybersecurity, and the strategy behind avoiding fear-based marketing.

[25:29 - 31:09] How internal optimism and a positive company culture influence marketing strategies and customer interactions.

[31:14 - 35:21] Game Time: Guessing Nav's alternate career path, followed by Nav's revelation of his potential career in the armed forces if not in marketing.


﻿Join Us at RSA 2024:
Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!
Connect with Navneet Singh:
For more insights and discussions, connect with Nav on LinkedIn. Engage and share ideas on pushing the boundaries of cybersecurity marketing.
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
Thank you for tuning in to another episode of "Breaking Through in Cybersecurity Marketing." Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It's refreshing to hear, especially in the world of AI, that the human element remains crucial. "<em>There's no such thing as B2B marketing; it's B2H: Business to Human,"</em> because ultimately, humans are the ones making the decisions, says our guest, <a href="https://www.linkedin.com/in/nasingh/">Navneet Singh</a>, Vice President of Marketing for the Network Security Division at <a href="https://www.paloaltonetworks.com/">Palo Alto Networks</a>. Navneet takes us through his fascinating transition from engineering to marketing, shining a light on the importance of positivity and putting the customer first when marketing in cybersecurity. Join us to find out how<a href="https://www.paloaltonetworks.com/"> Palo Alto Networks</a> is redefining the landscape with its fresh, optimistic approach to cybersecurity marketing.</p><p><br></p><h2><strong>Takeaways:</strong></h2><ul>
<li>Focus on the customer and their needs in cybersecurity marketing.</li>
<li>Convey optimism and positivity in marketing to inspire confidence in customers.</li>
<li>Differentiate your company by being opposite to industry norms.</li>
<li>Avoid using fear as a marketing tactic in cybersecurity.</li>
<li>Create a culture of optimism and accountability within the marketing team.</li>
</ul><p><br></p><h2><strong>Key Episode Highlights:</strong></h2><ul>
<li>[00:06 - 01:20] Announcement of Cybersecurity Marketing Society's <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">2024 RSAC Party</a> for Cyber Marketers! </li>
<li>[01:32 - 04:23] Navneet Singh shares his career transition from engineering to marketing, emphasizing his passion for product management and marketing.</li>
<li>[04:27 - 07:42] The philosophical shift in cybersecurity marketing towards optimism and confidence, moving away from fear-based tactics.</li>
<li>[08:31 - 11:54] How Palo Alto Networks' marketing strategy is distinct, focusing on enabling businesses securely rather than instilling fear.</li>
<li>[12:21 - 17:39] The importance of focusing on the customer, humanizing B2B marketing, and the creative process behind the "We've Got Next" campaign.</li>
<li>[18:35 - 24:59] The significance of hope and education in cybersecurity, and the strategy behind avoiding fear-based marketing.</li>
<li>[25:29 - 31:09] How internal optimism and a positive company culture influence marketing strategies and customer interactions.</li>
<li>[31:14 - 35:21] Game Time: Guessing Nav's alternate career path, followed by Nav's revelation of his potential career in the armed forces if not in marketing.</li>
</ul><p><br></p><h2><strong>﻿Join Us at RSA 2024:</strong></h2><p>Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. <a href="https://events.hubilo.com/rsac-2024-party-for-marketers/register">Secure your tickets</a> on our website and enjoy the best party for cybersecurity marketers!</p><h2><strong>Connect with Navneet Singh:</strong></h2><p>For more insights and discussions, connect with Nav on<a href="https://www.linkedin.com/in/nasingh/"> LinkedIn</a>. Engage and share ideas on pushing the boundaries of cybersecurity marketing.</p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p>Thank you for tuning in to another episode of "Breaking Through in Cybersecurity Marketing." Remember to subscribe for weekly insights and stories from the forefront of cybersecurity marketing. See you in the next episode!</p>]]>
      </content:encoded>
      <itunes:duration>2093</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a983db64-e1f7-11ee-9bdd-a3fd27ea64fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1602900859.mp3?updated=1723027078" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> The Journey of 'Cyber for Builders' with Ross Haleliuk.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/108/notes</link>
      <description>The author of the viral cyber bestseller Cyber for Builders joins us today! If you ever wanted to write a book, but couldn’t overcome time constraints, procrastination, or even resources, then this episode is tailor-made just for you. Meet Ross Haleliuk, Best Selling Author of Cyber for Builders, Head of Product at LimaCharlie, and Angel/Syndicate Co-Lead plus Blogger at Venture in Security. Ross started to write Cyber for Builders during the weekend and in his free time, inspired by a big gap he noticed in cybersecurity business advice. His story on today’s episode and the book itself aren't just a reflection of the challenges of starting a cybersecurity business, but also how writing can fill gaps and share crucial insights with others.

Key Episode Highlights:


[01:26] Ross Haleliuk’s Journey and inspiration for Writing his Book: 


Ross highlights the lack of resources on the business aspects of cybersecurity and his desire to fill this gap by providing a comprehensive guide to navigating the cybersecurity industry's complexities.

[03:38] Challenges Faced by Cybersecurity Founders and Some Advice:

Advice for cybersecurity founders and marketers and the importance of understanding the business side, including fundraising, go-to-market strategies, and customer focus, beyond just product development.

[06:04] The Importance of Collaboration and Building a Team: 

“It's quite rare to see a solo founder succeed,”

Ross advises against going solo and shares the challenges/pressures faced by solo founders in the industry. He also shares the benefits of having a partner when you are starting a new company. 


*You can join The Society if you are interested in community or finding a partner for your future ventures/career 😉


[08:40] Taking a First Principles Approach to Marketing: 

This approach emphasizes starting from the basics: understanding customer needs, behaviors, and preferences to guide marketing and positioning of security solutions.

[15:03] Ross's Book Writing Process and Advice for Aspiring Authors:

Ross shares how he used his blog posts and dedicated 8 to 12 hours each weekend to write. He advises future writers to grow their audience by regularly blogging, being active on social media, and speaking in public.




Reach out to Ross on LinkedIn.
Get your copy of Cyber for Builders on Amazon.
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 13 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title> The Journey of 'Cyber for Builders' with Ross Haleliuk.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The author of the viral cyber bestseller Cyber for Builders joins us today! If you ever wanted to write a book, but couldn’t overcome time constraints, procrastination, or even resources, then this episode is tailor-made just for you. Meet Ross Haleliuk, Best Selling Author of Cyber for Builders, Head of Product at LimaCharlie, and Angel/Syndicate Co-Lead plus Blogger at Venture in Security. Ross started to write Cyber for Builders during the weekend and in his free time, inspired by a big gap he noticed in cybersecurity business advice. His story on today’s episode and the book itself aren't just a reflection of the challenges of starting a cybersecurity business, but also how writing can fill gaps and share crucial insights with others.

Key Episode Highlights:


[01:26] Ross Haleliuk’s Journey and inspiration for Writing his Book: 


Ross highlights the lack of resources on the business aspects of cybersecurity and his desire to fill this gap by providing a comprehensive guide to navigating the cybersecurity industry's complexities.

[03:38] Challenges Faced by Cybersecurity Founders and Some Advice:

Advice for cybersecurity founders and marketers and the importance of understanding the business side, including fundraising, go-to-market strategies, and customer focus, beyond just product development.

[06:04] The Importance of Collaboration and Building a Team: 

“It's quite rare to see a solo founder succeed,”

Ross advises against going solo and shares the challenges/pressures faced by solo founders in the industry. He also shares the benefits of having a partner when you are starting a new company. 


*You can join The Society if you are interested in community or finding a partner for your future ventures/career 😉


[08:40] Taking a First Principles Approach to Marketing: 

This approach emphasizes starting from the basics: understanding customer needs, behaviors, and preferences to guide marketing and positioning of security solutions.

[15:03] Ross's Book Writing Process and Advice for Aspiring Authors:

Ross shares how he used his blog posts and dedicated 8 to 12 hours each weekend to write. He advises future writers to grow their audience by regularly blogging, being active on social media, and speaking in public.




Reach out to Ross on LinkedIn.
Get your copy of Cyber for Builders on Amazon.
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The author of the viral cyber bestseller <em>Cyber for Builders</em> joins us today! If you ever wanted to write a book, but couldn’t overcome time constraints, procrastination, or even resources, then this episode is tailor-made just for you. Meet Ross <a href="https://www.linkedin.com/in/rosshaleliuk/overlay/about-this-profile/">Haleliuk</a>, Best Selling Author of<a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/"> Cyber for Builders</a>, Head of Product at <a href="https://limacharlie.io/">LimaCharlie</a>, and Angel/Syndicate Co-Lead plus Blogger at <a href="https://ventureinsecurity.net/">Venture in Security</a>. Ross started to write <em>Cyber for Builders</em> during the weekend and in his free time, inspired by a big gap he noticed in cybersecurity business advice. His story on today’s episode and the book itself aren't just a reflection of the challenges of starting a cybersecurity business, but also how writing can fill gaps and share crucial insights with others.</p><p><br></p><h2>Key Episode Highlights:</h2><ul>
<li>
<strong>[01:26] Ross </strong><a href="https://www.linkedin.com/in/rosshaleliuk/overlay/about-this-profile/"><strong>Haleliuk</strong></a><strong>’s Journey and inspiration for Writing his Book: </strong>
</li>
<li>Ross highlights the lack of resources on the business aspects of cybersecurity and his desire to fill this gap by providing a comprehensive guide to navigating the cybersecurity industry's complexities.</li>
<li><strong>[03:38] Challenges Faced by Cybersecurity Founders and Some Advice:</strong></li>
<li>Advice for cybersecurity founders and marketers and the importance of understanding the business side, including fundraising, go-to-market strategies, and customer focus, beyond just product development.</li>
<li><strong>[06:04] The Importance of Collaboration and Building a Team: </strong></li>
<li><em>“It's quite rare to see a solo founder succeed,”</em></li>
<li>Ross advises against going solo and shares the challenges/pressures faced by solo founders in the industry. He also shares the benefits of having a partner when you are starting a new company. </li>
</ul><p><br></p><p><em>*You can join </em><a href="https://cybersecuritymarketingsociety.com/"><em>The Society</em></a><em> if you are interested in community or finding a partner for your future ventures/career 😉</em></p><p><br></p><ul>
<li><strong>[08:40] Taking a First Principles Approach to Marketing: </strong></li>
<li>This approach emphasizes starting from the basics: understanding customer needs, behaviors, and preferences to guide marketing and positioning of security solutions.</li>
<li><strong>[15:03] Ross's Book Writing Process and Advice for Aspiring Authors:</strong></li>
<li>Ross shares how he used his blog posts and dedicated 8 to 12 hours each weekend to write. He advises future writers to grow their audience by regularly blogging, being active on social media, and speaking in public.</li>
<li><br></li>
</ul><p><br></p><p>Reach out to Ross on <a href="https://www.linkedin.com/in/rosshaleliuk/">LinkedIn</a>.</p><p>Get your copy of <em>Cyber for Builders</em> on<a href="https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/"> Amazon</a>.</p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2079</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10c91e98-dd15-11ee-9d49-5f15692a4586]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8703978031.mp3?updated=1723026859" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Lemons into Lemonade: Life After Layoff with Jennifer Leggio.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/107/notes</link>
      <description>Just like Beyoncé transformed adversity into triumph with her iconic album, Lemonade, our guest this week masterfully turns lemons into the sweetest lemonade. In an economy where the mere thought of a layoff can be scary, thinking about the next steps can be daunting. Yet, Jennifer Leggio returns with unwavering resolve, not only to offer fearless guidance on navigating tough times but also to demonstrate how she's living the very principles she championed at CyberMarketingCon2023. Join us as Jennifer shares her journey from navigating a layoff to launching her startup, embodying effective leadership, and embracing her unique, leather-clad style.

Episode highlights:

[00:01- 01:50] Jennifer's Layoff Journey and the Power of Resilience

Jennifer talks about how she felt when she first lost her job and how she used her contacts to find new opportunities.

[01:50 - 03:22] Jennifer’s Keynote from CyberMarketingCon2023

Reflections on Jennifer's Cyber MarketingCon2023 keynote, where she discussed the potential for marketers to move up to executive roles while also challenging conventional career trajectories.

[03:22 - 05:08] A New Chapter 

Introduction to Moveable Feast, Jennifer’s new company 

[10:10 - 12:27] The Keys of Effective Leadership

A deep dive into the importance of empathy in leadership and the need for leaders to genuinely understand and support their team members on a personal and professional level.

[19:15 - 21:48] Authenticity in Style and SubstanceJennifer discusses the significance of personal style and branding, advocating for authenticity and the courage to express your true self both personally and professionally. 


You can follow Jennifer on LinkedIn
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Tue, 05 Mar 2024 23:00:00 -0000</pubDate>
      <itunes:title> Lemons into Lemonade: Life After Layoff with Jennifer Leggio.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Just like Beyoncé transformed adversity into triumph with her iconic album, Lemonade, our guest this week masterfully turns lemons into the sweetest lemonade. In an economy where the mere thought of a layoff can be scary, thinking about the next steps can be daunting. Yet, Jennifer Leggio returns with unwavering resolve, not only to offer fearless guidance on navigating tough times but also to demonstrate how she's living the very principles she championed at CyberMarketingCon2023. Join us as Jennifer shares her journey from navigating a layoff to launching her startup, embodying effective leadership, and embracing her unique, leather-clad style.

Episode highlights:

[00:01- 01:50] Jennifer's Layoff Journey and the Power of Resilience

Jennifer talks about how she felt when she first lost her job and how she used her contacts to find new opportunities.

[01:50 - 03:22] Jennifer’s Keynote from CyberMarketingCon2023

Reflections on Jennifer's Cyber MarketingCon2023 keynote, where she discussed the potential for marketers to move up to executive roles while also challenging conventional career trajectories.

[03:22 - 05:08] A New Chapter 

Introduction to Moveable Feast, Jennifer’s new company 

[10:10 - 12:27] The Keys of Effective Leadership

A deep dive into the importance of empathy in leadership and the need for leaders to genuinely understand and support their team members on a personal and professional level.

[19:15 - 21:48] Authenticity in Style and SubstanceJennifer discusses the significance of personal style and branding, advocating for authenticity and the courage to express your true self both personally and professionally. 


You can follow Jennifer on LinkedIn
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Just like Beyoncé transformed adversity into triumph with her iconic album, Lemonade, our guest this week masterfully turns lemons into the sweetest lemonade. In an economy where the mere thought of a layoff can be scary, thinking about the next steps can be daunting. Yet, Jennifer Leggio returns with unwavering resolve, not only to offer fearless guidance on navigating tough times but also to demonstrate how she's living the very principles she championed at CyberMarketingCon2023. Join us as Jennifer shares her journey from navigating a layoff to launching her startup, embodying effective leadership, and embracing her unique, leather-clad style.</p><p><br></p><h2><strong>Episode highlights:</strong></h2><ul>
<li>[00:01- 01:50] Jennifer's Layoff Journey and the Power of Resilience</li>
<li>Jennifer talks about how she felt when she first lost her job and how she used her contacts to find new opportunities.</li>
<li><strong>[01:50 - 03:22] Jennifer’s Keynote from CyberMarketingCon2023</strong></li>
<li>Reflections on Jennifer's Cyber MarketingCon2023 keynote, where she discussed the potential for marketers to move up to executive roles while also challenging conventional career trajectories.</li>
<li>[03:22 - 05:08] A New Chapter </li>
<li>Introduction to<a href="https://www.moveablefeast.info/"> Moveable Feast</a>, Jennifer’s new company </li>
<li><strong>[10:10 - 12:27] The Keys of Effective Leadership</strong></li>
<li>A deep dive into the importance of empathy in leadership and the need for leaders to genuinely understand and support their team members on a personal and professional level.</li>
<li>[19:15 - 21:48] Authenticity in Style and SubstanceJennifer discusses the significance of personal style and branding, advocating for authenticity and the courage to express your true self both personally and professionally. </li>
</ul><p><br></p><p>You can follow Jennifer on <a href="https://www.linkedin.com/in/jenniferleggio/">LinkedIn</a></p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1716</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d62e97de-d53c-11ee-804e-03d85fbed6da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8129233773.mp3?updated=1723027048" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Build Community Around Phishing with Dennis Legori.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/106/notes</link>
      <description>Nearly 1.2% of all emails sent are malicious, which translates to 3.4 billion phishing emails daily. For every 4,200 emails sent, 1 would be a phishing scam. Dennis Legori, the Associate Director of Security Awareness and Digital Communications at Carrier, is working to make malicious phishing campaigns less effective! Dennis shares his insights into his role, which involves developing security awareness programs and managing cybersecurity-related digital communications. He explains how he transitioned into security awareness when initially he was focused on project management. Legori also does a deep dive into how he was able to build a community during phishing simulations and security awareness training.

Today’s Episode Highlights:

[01:21] Role of Associate Director of Security Awareness and Digital Communications. 

[06:55] Building a Security Awareness Program from Scratch.

[07:28] Collaboration with Marketing and Internal Communications.  

[08:41] Phishing Awareness Campaign and Enterprise Defenders. 

[12:42] Crowdsourcing Cybersecurity. 

[14:53] Tools and Teams for Managing Phishing Awareness Program. 

[19:00] Considerations for Cultural Differences.  

[21:50] How to Create an Engaging and Fun Program.

[27:10] Tools to Use for Phishing. 


Reach out to Dennis on LinkedIn
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 28 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>How to Build Community Around Phishing with Dennis Legori.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nearly 1.2% of all emails sent are malicious, which translates to 3.4 billion phishing emails daily. For every 4,200 emails sent, 1 would be a phishing scam. Dennis Legori, the Associate Director of Security Awareness and Digital Communications at Carrier, is working to make malicious phishing campaigns less effective! Dennis shares his insights into his role, which involves developing security awareness programs and managing cybersecurity-related digital communications. He explains how he transitioned into security awareness when initially he was focused on project management. Legori also does a deep dive into how he was able to build a community during phishing simulations and security awareness training.

Today’s Episode Highlights:

[01:21] Role of Associate Director of Security Awareness and Digital Communications. 

[06:55] Building a Security Awareness Program from Scratch.

[07:28] Collaboration with Marketing and Internal Communications.  

[08:41] Phishing Awareness Campaign and Enterprise Defenders. 

[12:42] Crowdsourcing Cybersecurity. 

[14:53] Tools and Teams for Managing Phishing Awareness Program. 

[19:00] Considerations for Cultural Differences.  

[21:50] How to Create an Engaging and Fun Program.

[27:10] Tools to Use for Phishing. 


Reach out to Dennis on LinkedIn
Be sure also to follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nearly 1.2% of all emails sent are malicious, which translates to <a href="https://www.zdnet.com/article/three-billion-phishing-emails-are-sent-every-day-but-one-change-could-make-life-much-harder-for-scammers/">3.4 billion phishing emails</a> daily. For every 4,200 emails sent, 1 would be a phishing scam. Dennis Legori, the Associate Director of Security Awareness and Digital Communications at<a href="https://www.corporate.carrier.com/"> Carrier</a>, is working to make malicious phishing campaigns less effective! Dennis shares his insights into his role, which involves developing security awareness programs and managing cybersecurity-related digital communications. He explains how he transitioned into security awareness when initially he was focused on project management. Legori also does a deep dive into how he was able to build a community during phishing simulations and security awareness training.</p><p><br></p><h2><strong>Today’s Episode Highlights:</strong></h2><ul>
<li>[01:21] Role of Associate Director of Security Awareness and Digital Communications. </li>
<li>[06:55] Building a Security Awareness Program from Scratch.</li>
<li>[07:28] Collaboration with Marketing and Internal Communications.  </li>
<li>[08:41] Phishing Awareness Campaign and Enterprise Defenders. </li>
<li>[12:42] Crowdsourcing Cybersecurity. </li>
<li>[14:53] Tools and Teams for Managing Phishing Awareness Program. </li>
<li>[19:00] Considerations for Cultural Differences.  </li>
<li>[21:50] How to Create an Engaging and Fun Program.</li>
<li>[27:10] Tools to Use for Phishing. </li>
</ul><p><br></p><p><strong>Reach out to Dennis on</strong><a href="https://www.linkedin.com/in/dennislegori/"><strong> LinkedIn</strong></a></p><h2><strong>Be sure also to follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a312234a-cfbd-11ee-9ab6-b7ffddb8b06f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5082191392.mp3?updated=1723027158" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside the Mind of a CISO with Joe Evangelisto.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/105/notes</link>
      <description>In today's episode, Gianna and Maria are joined by a seasoned CISO from NetSPI, Joe Evangelisto. Joe shares his insights into the cybersecurity industry's challenges AND his passion for baking! Stay tuned to hear what organizations he recommends for support for CISOs, how to use content switching to your advantage, and how security events can better serve small firms, per his viral post about Black Hat. 

Episode Highlights:

[01:05] Joe expresses excitement and gratitude for joining NetSPI and leading the talented security team.

[03:01] Joe’s viral LinkedIn post about his decision not to attend Black Hat, and the unique challenges faced by SMB CISOs compared to those at larger enterprises. 

[08:15] Content Switching: Joe shares his experience balancing different responsibilities as a CISO at a smaller organization and balancing all his priorities while wearing different hats. 

[13:30] Why it's important to build strong internal relationships across the departments. 

[17:38] Joe recommends the supportive community of CISOs in his area with organizations like ISSA, ISC², and more!


Reach out to Joe on LinkedIn. 
Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 21 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Inside the Mind of a CISO with Joe Evangelisto.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In today's episode, Gianna and Maria are joined by a seasoned CISO from NetSPI, Joe Evangelisto. Joe shares his insights into the cybersecurity industry's challenges AND his passion for baking! Stay tuned to hear what organizations he recommends for support for CISOs, how to use content switching to your advantage, and how security events can better serve small firms, per his viral post about Black Hat. 

Episode Highlights:

[01:05] Joe expresses excitement and gratitude for joining NetSPI and leading the talented security team.

[03:01] Joe’s viral LinkedIn post about his decision not to attend Black Hat, and the unique challenges faced by SMB CISOs compared to those at larger enterprises. 

[08:15] Content Switching: Joe shares his experience balancing different responsibilities as a CISO at a smaller organization and balancing all his priorities while wearing different hats. 

[13:30] Why it's important to build strong internal relationships across the departments. 

[17:38] Joe recommends the supportive community of CISOs in his area with organizations like ISSA, ISC², and more!


Reach out to Joe on LinkedIn. 
Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's episode, Gianna and Maria are joined by a seasoned CISO from NetSPI, Joe Evangelisto. Joe shares his insights into the cybersecurity industry's challenges AND his passion for baking! Stay tuned to hear what organizations he recommends for support for CISOs, how to use content switching to your advantage, and how security events can better serve small firms, per his viral post about Black Hat. </p><p><br></p><h2><strong>Episode Highlights:</strong></h2><ul>
<li>[01:05] Joe expresses excitement and gratitude for joining <a href="https://www.netspi.com/">NetSPI</a> and leading the talented security team.</li>
<li>[03:01] Joe’s viral LinkedIn post about his decision not to attend Black Hat, and the unique challenges faced by SMB CISOs compared to those at larger enterprises. </li>
<li>[08:15] Content Switching: Joe shares his experience balancing different responsibilities as a CISO at a smaller organization and balancing all his priorities while wearing different hats. </li>
<li>[13:30] Why it's important to build strong internal relationships across the departments. </li>
<li>[17:38] Joe recommends the supportive community of CISOs in his area with organizations like <a href="https://www.issa.org/">ISSA</a>, I<a href="https://www.isc2.org/">SC²</a>, and more!</li>
</ul><p><br></p><p><strong>Reach out to Joe on </strong><a href="https://www.linkedin.com/in/joe-evangelisto/"><strong>LinkedIn. </strong></a></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16f5e4be-c694-11ee-8fa8-37b957d5f04b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2013097463.mp3?updated=1723026870" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Cyber Evangelist Turned Cyber Founder, with Benjamin Bohman.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/104/notes</link>
      <description>This week Gianna and Maria are joined by Benjamin Bohman, CTO and Founder of Stratishield AI. Benjamin has a background that includes cybersecurity engineering and evangelism, emphasizing the importance of understanding business outcomes in cybersecurity. Benjamin and the hosts discuss public speaking, the rising adoption of artificial intelligence in cybersecurity, his company Stratishield AI, and more!

Episode highlights:

[1:28] Benjamin shares Stratishield AI, a consulting firm he founded that demystifies AI for cybersecurity and business enhancement.

[7:30] Be a business expert, not a technology expert! Why this is important when selling to IT &amp; security.

[9:42] Benjamin shares insights on reaching potential clients by understanding their needs, utilizing predictive analytics, and addressing relevant cybersecurity concerns.

[13:47] Maria highlights the challenge many practitioners face in wanting to share their expertise in cybersecurity but feeling unsure how to do so effectively.

[18:30] Benjamin talks about why there is a need for technical professionals to learn to communicate effectively with non-technical audiences. He also shares some personal experiences of his public speaking and tips on how to overcome nervousness.

[29:30] Meet Atlas, an AI bot Benjamin has been developing to provide interactive product tours while increasing user engagement. You can learn more about Atlas here.


Reach out to Benjamin: 
You can get ahold of Benjamin on his cell phone: (702) 374-7920 
You can also email him at Ben@stratishield.ai 
Read Benjamin’s eBook on Leveraging AI in Business
Follow Stratishield AI on LinkedIn!
Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 14 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>The Cyber Evangelist Turned Cyber Founder, with Benjamin Bohman.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week Gianna and Maria are joined by Benjamin Bohman, CTO and Founder of Stratishield AI. Benjamin has a background that includes cybersecurity engineering and evangelism, emphasizing the importance of understanding business outcomes in cybersecurity. Benjamin and the hosts discuss public speaking, the rising adoption of artificial intelligence in cybersecurity, his company Stratishield AI, and more!

Episode highlights:

[1:28] Benjamin shares Stratishield AI, a consulting firm he founded that demystifies AI for cybersecurity and business enhancement.

[7:30] Be a business expert, not a technology expert! Why this is important when selling to IT &amp; security.

[9:42] Benjamin shares insights on reaching potential clients by understanding their needs, utilizing predictive analytics, and addressing relevant cybersecurity concerns.

[13:47] Maria highlights the challenge many practitioners face in wanting to share their expertise in cybersecurity but feeling unsure how to do so effectively.

[18:30] Benjamin talks about why there is a need for technical professionals to learn to communicate effectively with non-technical audiences. He also shares some personal experiences of his public speaking and tips on how to overcome nervousness.

[29:30] Meet Atlas, an AI bot Benjamin has been developing to provide interactive product tours while increasing user engagement. You can learn more about Atlas here.


Reach out to Benjamin: 
You can get ahold of Benjamin on his cell phone: (702) 374-7920 
You can also email him at Ben@stratishield.ai 
Read Benjamin’s eBook on Leveraging AI in Business
Follow Stratishield AI on LinkedIn!
Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week Gianna and Maria are joined by Benjamin Bohman, CTO and Founder of <a href="https://stratishield.ai/">Stratishield AI</a>. Benjamin has a background that includes cybersecurity engineering and evangelism, emphasizing the importance of understanding business outcomes in cybersecurity. Benjamin and the hosts discuss public speaking, the rising adoption of artificial intelligence in cybersecurity, his company Stratishield AI, and more!</p><p><br></p><h2><strong>Episode highlights:</strong></h2><ul>
<li>[1:28] Benjamin shares Stratishield AI, a consulting firm he founded that demystifies AI for cybersecurity and business enhancement.</li>
<li>[7:30] Be a business expert, not a technology expert! Why this is important when selling to IT &amp; security.</li>
<li>[9:42] Benjamin shares insights on reaching potential clients by understanding their needs, utilizing predictive analytics, and addressing relevant cybersecurity concerns.</li>
<li>[13:47] Maria highlights the challenge many practitioners face in wanting to share their expertise in cybersecurity but feeling unsure how to do so effectively.</li>
<li>[18:30] Benjamin talks about why there is a need for technical professionals to learn to communicate effectively with non-technical audiences. He also shares some personal experiences of his public speaking and tips on how to overcome nervousness.</li>
<li>[29:30] Meet Atlas, an AI bot Benjamin has been developing to provide interactive product tours while increasing user engagement. You can learn more about Atlas <a href="https://stratishield.ai/">here</a>.</li>
</ul><p><br></p><h2><strong>Reach out to Benjamin: </strong></h2><p>You can get ahold of Benjamin on his cell phone: (702) 374-7920 </p><p>You can also email him at <a href="mailto:Ben@Stratishield.ai">Ben@stratishield.ai</a> </p><p>Read Benjamin’s eBook on<a href="https://stratishield.ai/ebook-download/"> Leveraging AI in Business</a></p><p>Follow Stratishield AI on <a href="https://www.linkedin.com/company/stratishield-ai/">LinkedIn</a>!</p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1993</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[188f48ec-bf91-11ee-960f-fba645858058]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8975882662.mp3?updated=1723026858" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What is a Phantom CISO? With Mishaal Khan.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/103/notes</link>
      <description>Mishaal Khan, a serial entrepreneur, author, security expert, and VC shares his journey, from growing up around computers to becoming a cybersecurity expert and author of the book "The Phantom CISO." Listen to hear insights from the security practitioner’s point of view on marketing, brand-building, and book-publishing!
Episode highlights:

[01:07]	 Mishaal’s early career beginnings and influences.

[06:30] The Phantom CISO -  Mishaal's book and his approach to marketing it.

[16:40] How Mishaal used malware, phishing, and ransomware to market his company. 

[22:07] A look behind the promotion Mishaal used for his book, from the price to self-publishing.

[24:15] The evolution of fearmongering in cybersecurity and the need for practical solutions.

[28:40] More strategies Mishaal used to promote his book


Episode Links:
The Phantom CISO
You can catch Mishaal on LinkedIn
Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 07 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>What is a Phantom CISO? With Mishaal Khan.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mishaal Khan, a serial entrepreneur, author, security expert, and VC shares his journey, from growing up around computers to becoming a cybersecurity expert and author of the book "The Phantom CISO." Listen to hear insights from the security practitioner’s point of view on marketing, brand-building, and book-publishing!
Episode highlights:

[01:07]	 Mishaal’s early career beginnings and influences.

[06:30] The Phantom CISO -  Mishaal's book and his approach to marketing it.

[16:40] How Mishaal used malware, phishing, and ransomware to market his company. 

[22:07] A look behind the promotion Mishaal used for his book, from the price to self-publishing.

[24:15] The evolution of fearmongering in cybersecurity and the need for practical solutions.

[28:40] More strategies Mishaal used to promote his book


Episode Links:
The Phantom CISO
You can catch Mishaal on LinkedIn
Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mishaal Khan, a serial entrepreneur, author, security expert, and VC shares his journey, from growing up around computers to becoming a cybersecurity expert and author of the book "The Phantom CISO." Listen to hear insights from the security practitioner’s point of view on marketing, brand-building, and book-publishing!</p><h2><strong>Episode highlights:</strong></h2><ul>
<li>[01:07]	 Mishaal’s early career beginnings and influences.</li>
<li>[06:30] <a href="https://www.phantomciso.com/">The Phantom CISO</a> -  Mishaal's book and his approach to marketing it.</li>
<li>[16:40] How Mishaal used malware, phishing, and ransomware to market his company. </li>
<li>[22:07] A look behind the promotion Mishaal used for his book, from the price to self-publishing.</li>
<li>[24:15] The evolution of fearmongering in cybersecurity and the need for practical solutions.</li>
<li>[28:40] More strategies Mishaal used to promote his book</li>
</ul><p><br></p><h2><strong>Episode Links:</strong></h2><p><a href="https://www.phantomciso.com/">The Phantom CISO</a></p><p>You can catch Mishaal on <a href="https://www.linkedin.com/in/mish-aal/">LinkedIn</a></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast <a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/">LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2672</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a57c2f6-bf90-11ee-bfe9-9754999c0890]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5662287626.mp3?updated=1723027102" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> BIG NEWS! We’re Joining the CyberWire Network, Powered by N2K!</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/102/notes</link>
      <description>This week, we announce that the Cybersecurity Marketing Society’s Breaking Through in Cybersecurity Marketing podcast is joining the CyberWire network, powered by N2K. Yes, you heard that right! In this episode, hosts Gianna and Maria are joined by Bennett Moe, Vice President of Content &amp; Strategy at the CyberWire. The group discusses their excitement, the significance of the partnership, and its alignment with education and diversity in the cybersecurity community. Plus, they recap CyberMarketingCon 2023, talk about exciting upcoming announcements from both sides for 2024, and talk about Bennett Moe’s previous career as a cartographer. 

Below are some highlights from the conversation.

[01:53] - Expanding Audience and Cybersecurity Community

[06:30] Cyber Marketing Con 2023 Recap

[08:51] What makes CyberMarketingCon unique? Providing a safe space for collaboration and diversity

[11:43] Booths and Legos

[13:44] Plans for 2024


Connect with Bennett Moe on LinkedIn
To learn more about our new podcast partner: the CyberWire network, powered by N2K, visit their website or follow them on LinkedIn. 

Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</description>
      <pubDate>Wed, 31 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title> BIG NEWS! We’re Joining the CyberWire Network, Powered by N2K!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we announce that the Cybersecurity Marketing Society’s Breaking Through in Cybersecurity Marketing podcast is joining the CyberWire network, powered by N2K. Yes, you heard that right! In this episode, hosts Gianna and Maria are joined by Bennett Moe, Vice President of Content &amp; Strategy at the CyberWire. The group discusses their excitement, the significance of the partnership, and its alignment with education and diversity in the cybersecurity community. Plus, they recap CyberMarketingCon 2023, talk about exciting upcoming announcements from both sides for 2024, and talk about Bennett Moe’s previous career as a cartographer. 

Below are some highlights from the conversation.

[01:53] - Expanding Audience and Cybersecurity Community

[06:30] Cyber Marketing Con 2023 Recap

[08:51] What makes CyberMarketingCon unique? Providing a safe space for collaboration and diversity

[11:43] Booths and Legos

[13:44] Plans for 2024


Connect with Bennett Moe on LinkedIn
To learn more about our new podcast partner: the CyberWire network, powered by N2K, visit their website or follow them on LinkedIn. 

Be sure to also follow our hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we announce that the Cybersecurity Marketing Society’s <em>Breaking Through in Cybersecurity Marketing</em> podcast is joining the <a href="https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing">CyberWire network, powered by N2K</a>. Yes, you heard that right! In this episode, hosts Gianna and Maria are joined by Bennett Moe, Vice President of Content &amp; Strategy at the CyberWire. The group discusses their excitement, the significance of the partnership, and its alignment with education and diversity in the cybersecurity community. Plus, they recap CyberMarketingCon 2023, talk about exciting upcoming announcements from both sides for 2024, and talk about Bennett Moe’s previous career as a cartographer. </p><p><br></p><h2>Below are some highlights from the conversation.</h2><ul>
<li><strong>[01:53] - Expanding Audience and Cybersecurity Community</strong></li>
<li><strong>[06:30] Cyber Marketing Con 2023 Recap</strong></li>
<li><strong>[08:51] What makes CyberMarketingCon unique? Providing a safe space for collaboration and diversity</strong></li>
<li><strong>[11:43] Booths and Legos</strong></li>
<li><strong>[13:44] Plans for 2024</strong></li>
</ul><p><br></p><p>Connect with Bennett Moe on<a href="https://www.linkedin.com/in/bennettmoe/"> LinkedIn</a></p><p>To learn more about our new podcast partner: the CyberWire network, powered by N2K, visit their <a href="https://www.thecyberwire.com/">website</a> or follow them on <a href="https://www.linkedin.com/company/the-cyberwire/">LinkedIn</a>. </p><p><br></p><h2><strong>Be sure to also follow our hosts on LinkedIn:</strong></h2><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast<a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"> LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1569</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ee7f552-bf38-11ee-9c51-9fc43c389b67]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6197101492.mp3?updated=1723026829" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stop Thinking Statistics Tell Your Story! With Mitch Mayne</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/101/notes</link>
      <description>This week Gianna and Maria are joined by Mitch Mayne, Cybersecurity communicator and incident responder. Mitch talks about his career journey, and his philosophy on storytelling in cybersecurity while weaving in an important conversation about mental health in cybersecurity! 
 
Mitch's Non-Technical Beginnings:
Mitch accidentally entered into cybersecurity while working at IBM. His combination of skills like marketing, writing, and incident response have helped him to succeed. In college, Mitch majored in communication, journalism, and political science. He later joined the tech realm, which led him down the path to cybersecurity.
 
Philosophy on Storytelling in Cybersecurity:
“Stop thinking that statistics tell your story,”
Storytelling in cybersecurity should go beyond numbers. It's great to have facts but to speak directly to people, you need to tell a story that they understand. This is why Mitch highlights the importance of developing writing skills for cybersecurity professionals.
 
CyberMindz and Mental Health in Cybersecurity:
The conversation shifts some gears as the hosts and Mitch focus on the introduction to CyberMindz.org and its focus on the mental health of cybersecurity workers. CyberMindz identified 15 factors that contribute to stress for those working in cyber. Mitch also discusses coping mechanisms, including journaling, breathwork, and meditation.
 
Get to know Mitch:
Bio: 𝗜’𝗺 𝘁𝗵𝗮𝘁 𝗿𝗮𝗿𝗲 𝗵𝘆𝗯𝗿𝗶𝗱 𝘄𝗵𝗼’𝘀 𝗯𝗼𝘁𝗵 𝗮𝗻 𝗶𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝗿𝗲𝘀𝗽𝗼𝗻𝗱𝗲𝗿 𝗮𝗻𝗱 𝗮𝗰𝗰𝗼𝗺𝗽𝗹𝗶𝘀𝗵𝗲𝗱 𝗺𝗮𝗿𝗸𝗲𝘁𝗲𝗿 𝗼𝗳 𝗰𝘆𝗯𝗲𝗿 𝘀𝗲𝗿𝘃𝗶𝗰𝗲𝘀. For the better part of the last decade, I worked directly inside a cyber services organization—not at a distance in a marketing team—alongside hackers, incident responders, and threat intelligence officers. That granted me a level of deep expertise often not accomplished by sitting in a marketing organization alone. I know first-hand what cyber services teams do, how they do it, and why they do it—because I’ve done it, too. That, in turn, allows me to tell their stories in a way clients not only understand but want to hear. 
 
You can catch Mitch on LinkedIn
Follow our lovely hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
 </description>
      <pubDate>Wed, 24 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Stop Thinking Statistics Tell Your Story! With Mitch Mayne</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week Gianna and Maria are joined by Mitch Mayne, Cybersecurity communicator and incident responder. Mitch talks about his career journey, and his philosophy on storytelling in cybersecurity while weaving in an important conversation about mental health in cybersecurity! 
 
Mitch's Non-Technical Beginnings:
Mitch accidentally entered into cybersecurity while working at IBM. His combination of skills like marketing, writing, and incident response have helped him to succeed. In college, Mitch majored in communication, journalism, and political science. He later joined the tech realm, which led him down the path to cybersecurity.
 
Philosophy on Storytelling in Cybersecurity:
“Stop thinking that statistics tell your story,”
Storytelling in cybersecurity should go beyond numbers. It's great to have facts but to speak directly to people, you need to tell a story that they understand. This is why Mitch highlights the importance of developing writing skills for cybersecurity professionals.
 
CyberMindz and Mental Health in Cybersecurity:
The conversation shifts some gears as the hosts and Mitch focus on the introduction to CyberMindz.org and its focus on the mental health of cybersecurity workers. CyberMindz identified 15 factors that contribute to stress for those working in cyber. Mitch also discusses coping mechanisms, including journaling, breathwork, and meditation.
 
Get to know Mitch:
Bio: 𝗜’𝗺 𝘁𝗵𝗮𝘁 𝗿𝗮𝗿𝗲 𝗵𝘆𝗯𝗿𝗶𝗱 𝘄𝗵𝗼’𝘀 𝗯𝗼𝘁𝗵 𝗮𝗻 𝗶𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝗿𝗲𝘀𝗽𝗼𝗻𝗱𝗲𝗿 𝗮𝗻𝗱 𝗮𝗰𝗰𝗼𝗺𝗽𝗹𝗶𝘀𝗵𝗲𝗱 𝗺𝗮𝗿𝗸𝗲𝘁𝗲𝗿 𝗼𝗳 𝗰𝘆𝗯𝗲𝗿 𝘀𝗲𝗿𝘃𝗶𝗰𝗲𝘀. For the better part of the last decade, I worked directly inside a cyber services organization—not at a distance in a marketing team—alongside hackers, incident responders, and threat intelligence officers. That granted me a level of deep expertise often not accomplished by sitting in a marketing organization alone. I know first-hand what cyber services teams do, how they do it, and why they do it—because I’ve done it, too. That, in turn, allows me to tell their stories in a way clients not only understand but want to hear. 
 
You can catch Mitch on LinkedIn
Follow our lovely hosts on LinkedIn:
Gianna Whitver
Maria Velasquez 
Join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or on our podcast LinkedIn page, and keep up with us on Twitter.
 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week Gianna and Maria are joined by Mitch Mayne, Cybersecurity communicator and incident responder. Mitch talks about his career journey, and his philosophy on storytelling in cybersecurity while weaving in an important conversation about mental health in cybersecurity! </p><p> </p><p><strong>Mitch's Non-Technical Beginnings:</strong></p><p>Mitch accidentally entered into cybersecurity while working at IBM. His combination of skills like marketing, writing, and incident response have helped him to succeed. In college, Mitch majored in communication, journalism, and political science. He later joined the tech realm, which led him down the path to cybersecurity.</p><p> </p><p><strong>Philosophy on Storytelling in Cybersecurity:</strong></p><p><em>“Stop thinking that statistics tell your story,”</em></p><p>Storytelling in cybersecurity should go beyond numbers. It's great to have facts but to speak directly to people, you need to tell a story that they understand. This is why Mitch highlights the importance of developing writing skills for cybersecurity professionals.</p><p> </p><p><strong>CyberMindz and Mental Health in Cybersecurity:</strong></p><p>The conversation shifts some gears as the hosts and Mitch focus on the introduction to <a href="https://cybermindz.org/">CyberMindz.org</a> and its focus on the mental health of cybersecurity workers. CyberMindz identified <a href="https://cybermindz.org/f/getting-them-early">15 factors</a> that contribute to stress for those working in cyber. Mitch also discusses coping mechanisms, including journaling, breathwork, and meditation.</p><p> </p><p><strong>Get to know Mitch:</strong></p><p>Bio:<em> 𝗜’𝗺 𝘁𝗵𝗮𝘁 𝗿𝗮𝗿𝗲 𝗵𝘆𝗯𝗿𝗶𝗱 𝘄𝗵𝗼’𝘀 𝗯𝗼𝘁𝗵 𝗮𝗻 𝗶𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝗿𝗲𝘀𝗽𝗼𝗻𝗱𝗲𝗿 𝗮𝗻𝗱 𝗮𝗰𝗰𝗼𝗺𝗽𝗹𝗶𝘀𝗵𝗲𝗱 𝗺𝗮𝗿𝗸𝗲𝘁𝗲𝗿 𝗼𝗳 𝗰𝘆𝗯𝗲𝗿 𝘀𝗲𝗿𝘃𝗶𝗰𝗲𝘀. For the better part of the last decade, I worked directly inside a cyber services organization—not at a distance in a marketing team—alongside hackers, incident responders, and threat intelligence officers. That granted me a level of deep expertise often not accomplished by sitting in a marketing organization alone. I know first-hand what cyber services teams do, how they do it, and why they do it—because I’ve done it, too. That, in turn, allows me to tell their stories in a way clients not only understand but want to hear. </em></p><p> </p><p>You can catch Mitch on <a href="https://www.linkedin.com/in/mitchmayne/">LinkedIn</a></p><p><strong>Follow our lovely hosts on LinkedIn:</strong></p><p><a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a></p><p><a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez </a></p><p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, on our main <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn page</a>, or on our podcast<a href="https://www.linkedin.com/company/breaking-through-in-cybersecurity-marketing-podcast/"> LinkedIn</a> page, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p><p> </p>]]>
      </content:encoded>
      <itunes:duration>1361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f25ebdc-e2a2-11ee-89dd-4770897f875f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3122963777.mp3?updated=1723026788" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring Roles from the Trenches to Leadership with Corin Imai</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/100/notes</link>
      <description>In this episode, Cybersecurity Marketing Leader and Former Security Researcher, Corin Imai, joins Maria and Gianna to discuss the individual contributor vs. head of marketing and influencer marketing relationships.

Corin has been both head of marketing and an individual contributor (IC) throughout her career thus far. She initially joined Tromzo as an IC when the company was very young. From the time Corin joined, she was wearing lots of hats and constantly learning about different facets of marketing. She has found that being head of marketing usually does mean wearing a lot of hats, and that being an IC is her true passion.

The pandemic showcased that the traditional marketing methods were just not working as well as they could be. Corin believes we need to get away from the coldness we treat relationships with if we want an organization to be a true partner to us. Her passion is aligned with how to influence that decision from top to bottom.

Corin shares the successful approaches she has seen recently by organizations taking a softer approach to cybersecurity influencing. She believes that the fundamental shift in how we function as vendors will change how we are thinking about content as an industry. Organizations like the Information Security Content Creators Guild, Cybersecurity Marketing Society, and Indoor Labs are at the forefront of implementing fundamental changes. Building these influencer relationships takes time, advocacy, patience, and faith.

Corin shares that it would be wildly beneficial for marketing teams to allow for times of reflection in the midst of our busy schedules and long to-do lists. She also shares tips for finding successful influencer partnerships. Finally, our guest and hosts engage in a fun guessing game to reveal what career Corin would pursue outside of the cybersecurity marketing field.

 

Links:

Learn more about Corin Imai.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 17 Jan 2024 08:00:00 -0000</pubDate>
      <itunes:title>Exploring Roles from the Trenches to Leadership with Corin Imai</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>100</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Cybersecurity Marketing Leader and Former Security Researcher, Corin Imai, joins Maria and Gianna to discuss the individual contributor vs. head of marketing and influencer marketing relationships.
Corin has been both head of marketi...</itunes:subtitle>
      <itunes:summary>In this episode, Cybersecurity Marketing Leader and Former Security Researcher, Corin Imai, joins Maria and Gianna to discuss the individual contributor vs. head of marketing and influencer marketing relationships.

Corin has been both head of marketing and an individual contributor (IC) throughout her career thus far. She initially joined Tromzo as an IC when the company was very young. From the time Corin joined, she was wearing lots of hats and constantly learning about different facets of marketing. She has found that being head of marketing usually does mean wearing a lot of hats, and that being an IC is her true passion.

The pandemic showcased that the traditional marketing methods were just not working as well as they could be. Corin believes we need to get away from the coldness we treat relationships with if we want an organization to be a true partner to us. Her passion is aligned with how to influence that decision from top to bottom.

Corin shares the successful approaches she has seen recently by organizations taking a softer approach to cybersecurity influencing. She believes that the fundamental shift in how we function as vendors will change how we are thinking about content as an industry. Organizations like the Information Security Content Creators Guild, Cybersecurity Marketing Society, and Indoor Labs are at the forefront of implementing fundamental changes. Building these influencer relationships takes time, advocacy, patience, and faith.

Corin shares that it would be wildly beneficial for marketing teams to allow for times of reflection in the midst of our busy schedules and long to-do lists. She also shares tips for finding successful influencer partnerships. Finally, our guest and hosts engage in a fun guessing game to reveal what career Corin would pursue outside of the cybersecurity marketing field.

 

Links:

Learn more about Corin Imai.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Cybersecurity Marketing Leader and Former Security Researcher, Corin Imai, joins Maria and Gianna to discuss the individual contributor vs. head of marketing and influencer marketing relationships.</p>
<p>Corin has been both head of marketing and an individual contributor (IC) throughout her career thus far. She initially joined Tromzo as an IC when the company was very young. From the time Corin joined, she was wearing lots of hats and constantly learning about different facets of marketing. She has found that being head of marketing usually does mean wearing a lot of hats, and that being an IC is her true passion.</p>
<p>The pandemic showcased that the traditional marketing methods were just not working as well as they could be. Corin believes we need to get away from the coldness we treat relationships with if we want an organization to be a true partner to us. Her passion is aligned with how to influence that decision from top to bottom.</p>
<p>Corin shares the successful approaches she has seen recently by organizations taking a softer approach to cybersecurity influencing. She believes that the fundamental shift in how we function as vendors will change how we are thinking about content as an industry. Organizations like the Information Security Content Creators Guild, Cybersecurity Marketing Society, and Indoor Labs are at the forefront of implementing fundamental changes. Building these influencer relationships takes time, advocacy, patience, and faith.</p>
<p>Corin shares that it would be wildly beneficial for marketing teams to allow for times of reflection in the midst of our busy schedules and long to-do lists. She also shares tips for finding successful influencer partnerships. Finally, our guest and hosts engage in a fun guessing game to reveal what career Corin would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p>Learn more about<a href="https://www.linkedin.com/in/corinimai/"> Corin Imai</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2323</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/9b84d71b-03bf-3b1a-9c4b-0f85296a189b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2321581820.mp3?updated=1723026856" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Make a Viral Meme for Cybersecurity with Dean Pe’er</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/99/notes</link>
      <description>In this episode, Dean Pe'er, Head of Product Marketing at Entitle, joins Maria and Gianna to discuss his viral meme.

Several months ago, Dean posted a meme on LinkedIn about admin privileges, which promptly went viral. Within four days of the meme being posted, it had acquired over 130,000 reactions, 4,000 LinkedIn page visitors, and two demo requests. The meme was created around the time that King Charles was coronated, so the content was timely. It contains a picture of King Charles in full coronation regalia, and the text reads, “When IT finally approved the admin privileges you asked for 30 years ago.” [view the posted meme here]

During the podcast, Dean shares how he arrived at the idea for the meme. He realized how big of a deal the coronation was for so many people and decided it was an opportunity to do something that might resonate with people in the security industry. It took him about 25 minutes to find the picture, write the copy, and publish the post on social media. Dean discussed the fact that many companies may not allow an employee to post something so impulsively because they feel it is not brand-safe or consistent with their corporate voice. This, Dean identifies, is the largest gap between small startups and large enterprises. At Entitle, he did not encounter any hurdles, politics, opinions, or red tape regarding social media posts, and has been fully supported by the executive team at the early-stage startup.

Dean shares advice for podcast listeners looking to get into the meme game. To make impactful memes, you should first find a topic that many people can relate to. If it’s too “salesy” or overtly focused on your own product or brand, it will likely not resonate with people outside of your organization. Timeliness is also important, as exemplified by Dean taking advantage of the major event of the coronation in his own work. Marketers won’t want to miss this episode, as Dean also sheds light on the best platforms for posting memes if you’re part of a small-scale startup like Entitle. Shifting gears, Dean explains his role of solo-marketer at the company. He finds that not having a team is challenging, but can also be rewarding. His challenges have been lessened by finding the best independent contractors within Israel’s small network. Finally, our guest and hosts engage in a fun guessing game to reveal what career Dean would pursue outside of the cybersecurity marketing field. 

 

Learn more about Dean Pe'er.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 10 Jan 2024 08:00:00 -0000</pubDate>
      <itunes:title>How to Make a Viral Meme for Cybersecurity with Dean Pe’er</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>99</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Dean Pe'er, Head of Product Marketing at Entitle, joins Maria and Gianna to discuss his viral meme.
Several months ago, Dean posted a meme on LinkedIn about admin privileges, which promptly went viral. Within four days of the meme be...</itunes:subtitle>
      <itunes:summary>In this episode, Dean Pe'er, Head of Product Marketing at Entitle, joins Maria and Gianna to discuss his viral meme.

Several months ago, Dean posted a meme on LinkedIn about admin privileges, which promptly went viral. Within four days of the meme being posted, it had acquired over 130,000 reactions, 4,000 LinkedIn page visitors, and two demo requests. The meme was created around the time that King Charles was coronated, so the content was timely. It contains a picture of King Charles in full coronation regalia, and the text reads, “When IT finally approved the admin privileges you asked for 30 years ago.” [view the posted meme here]

During the podcast, Dean shares how he arrived at the idea for the meme. He realized how big of a deal the coronation was for so many people and decided it was an opportunity to do something that might resonate with people in the security industry. It took him about 25 minutes to find the picture, write the copy, and publish the post on social media. Dean discussed the fact that many companies may not allow an employee to post something so impulsively because they feel it is not brand-safe or consistent with their corporate voice. This, Dean identifies, is the largest gap between small startups and large enterprises. At Entitle, he did not encounter any hurdles, politics, opinions, or red tape regarding social media posts, and has been fully supported by the executive team at the early-stage startup.

Dean shares advice for podcast listeners looking to get into the meme game. To make impactful memes, you should first find a topic that many people can relate to. If it’s too “salesy” or overtly focused on your own product or brand, it will likely not resonate with people outside of your organization. Timeliness is also important, as exemplified by Dean taking advantage of the major event of the coronation in his own work. Marketers won’t want to miss this episode, as Dean also sheds light on the best platforms for posting memes if you’re part of a small-scale startup like Entitle. Shifting gears, Dean explains his role of solo-marketer at the company. He finds that not having a team is challenging, but can also be rewarding. His challenges have been lessened by finding the best independent contractors within Israel’s small network. Finally, our guest and hosts engage in a fun guessing game to reveal what career Dean would pursue outside of the cybersecurity marketing field. 

 

Learn more about Dean Pe'er.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Dean Pe'er, Head of Product Marketing at Entitle, joins Maria and Gianna to discuss his viral meme.</p>
<p>Several months ago, Dean posted a meme on LinkedIn about admin privileges, which promptly went viral. Within four days of the meme being posted, it had acquired over 130,000 reactions, 4,000 LinkedIn page visitors, and two demo requests. The meme was created around the time that King Charles was coronated, so the content was timely. It contains a picture of King Charles in full coronation regalia, and the text reads, <em>“When IT finally approved the admin privileges you asked for 30 years ago.” </em>[view the posted meme <a href="https://www.linkedin.com/posts/the-cyber-security-hub_via-entitle-activity-7060664073658478592-ml1i">here</a>]</p>
<p>During the podcast, Dean shares how he arrived at the idea for the meme. He realized how big of a deal the coronation was for so many people and decided it was an opportunity to do something that might resonate with people in the security industry. It took him about 25 minutes to find the picture, write the copy, and publish the post on social media. Dean discussed the fact that many companies may not allow an employee to post something so impulsively because they feel it is not brand-safe or consistent with their corporate voice. This, Dean identifies, is the largest gap between small startups and large enterprises. At Entitle, he did not encounter any hurdles, politics, opinions, or red tape regarding social media posts, and has been fully supported by the executive team at the early-stage startup.</p>
<p>Dean shares advice for podcast listeners looking to get into the meme game. To make impactful memes, you should first find a topic that many people can relate to. If it’s too “salesy” or overtly focused on your own product or brand, it will likely not resonate with people outside of your organization. Timeliness is also important, as exemplified by Dean taking advantage of the major event of the coronation in his own work. Marketers won’t want to miss this episode, as Dean also sheds light on the best platforms for posting memes if you’re part of a small-scale startup like Entitle. Shifting gears, Dean explains his role of solo-marketer at the company. He finds that not having a team is challenging, but can also be rewarding. His challenges have been lessened by finding the best independent contractors within Israel’s small network. Finally, our guest and hosts engage in a fun guessing game to reveal what career Dean would pursue outside of the cybersecurity marketing field. </p>
<p> </p>
<p>Learn more about<a href="https://www.linkedin.com/in/dean-strategic-marketing?originalSubdomain=il"> Dean Pe'er</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>1327</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/9987fa64-d88e-3a20-97b7-0aab7261c3fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7191773538.mp3?updated=1723026835" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unlocking Product Marketing Strategies with Andy Tzortzinis</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/98/notes</link>
      <description> In this episode, Andy Tzortzinis, product positioning and messaging mentor, joins Maria and Gianna to discuss product marketing.

Andy’s introduction to cybersecurity was several years ago as the Director of Marketing for a small startup where he wore many hats. From this experience, he gained firsthand knowledge of how everything connected within the startup and was able to transfer that generalist skillset into other roles. He began to notice that product marketers were highly coveted and often retained within organizations despite regular layoffs of other marketing roles.

Since he moved into the industry, Andy has become passionate about helping his fellow marketing professionals transition into roles that may be a better fit for their particular skills. Andy also shares about his journey from the roles of communication and director of marketing to becoming a product marketer. He found that the most difficult part of the interview process was convincing the interviewers that he was worth the risk because his experience as a generalist didn’t instantly translate into a product marketing fit (at least, not on paper). Andy unpacks the many different positions within the product marketing field. Recent cutbacks are causing those who remain to take on more responsibilities than ever before, so product marketing is becoming an increasingly more generalized role.

Andy also shares a “hot take” that startups don’t need a marketing program, they first need a solid comms program. It takes a good comms program to build trust for your startup. If you can do that successfully, you can then bring a marketing person in to further develop the existing pipeline. Finally, our guest and hosts engage in a fun guessing game to reveal what career Andy would pursue outside of the cybersecurity marketing field.

 

Andy is open to chatting with people 1:1 about pivoting to PMM roles, you can reach out to him either on LinkedIn.

 

You can also catch up with our hosts here: 

Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

 

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 03 Jan 2024 08:00:00 -0000</pubDate>
      <itunes:title>Unlocking Product Marketing Strategies with Andy Tzortzinis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>98</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle> In this episode, Andy Tzortzinis, product positioning and messaging mentor, joins Maria and Gianna to discuss product marketing.
Andy’s introduction to cybersecurity was several years ago as the Director of Marketing for a small startup where he wor...</itunes:subtitle>
      <itunes:summary> In this episode, Andy Tzortzinis, product positioning and messaging mentor, joins Maria and Gianna to discuss product marketing.

Andy’s introduction to cybersecurity was several years ago as the Director of Marketing for a small startup where he wore many hats. From this experience, he gained firsthand knowledge of how everything connected within the startup and was able to transfer that generalist skillset into other roles. He began to notice that product marketers were highly coveted and often retained within organizations despite regular layoffs of other marketing roles.

Since he moved into the industry, Andy has become passionate about helping his fellow marketing professionals transition into roles that may be a better fit for their particular skills. Andy also shares about his journey from the roles of communication and director of marketing to becoming a product marketer. He found that the most difficult part of the interview process was convincing the interviewers that he was worth the risk because his experience as a generalist didn’t instantly translate into a product marketing fit (at least, not on paper). Andy unpacks the many different positions within the product marketing field. Recent cutbacks are causing those who remain to take on more responsibilities than ever before, so product marketing is becoming an increasingly more generalized role.

Andy also shares a “hot take” that startups don’t need a marketing program, they first need a solid comms program. It takes a good comms program to build trust for your startup. If you can do that successfully, you can then bring a marketing person in to further develop the existing pipeline. Finally, our guest and hosts engage in a fun guessing game to reveal what career Andy would pursue outside of the cybersecurity marketing field.

 

Andy is open to chatting with people 1:1 about pivoting to PMM roles, you can reach out to him either on LinkedIn.

 

You can also catch up with our hosts here: 

Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

 

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p> In this episode, Andy Tzortzinis, product positioning and messaging mentor, joins Maria and Gianna to discuss product marketing.</p>
<p>Andy’s introduction to cybersecurity was several years ago as the Director of Marketing for a small startup where he wore many hats. From this experience, he gained firsthand knowledge of how everything connected within the startup and was able to transfer that generalist skillset into other roles. He began to notice that product marketers were highly coveted and often retained within organizations despite regular layoffs of other marketing roles.</p>
<p>Since he moved into the industry, Andy has become passionate about helping his fellow marketing professionals transition into roles that may be a better fit for their particular skills. Andy also shares about his journey from the roles of communication and director of marketing to becoming a product marketer. He found that the most difficult part of the interview process was convincing the interviewers that he was worth the risk because his experience as a generalist didn’t instantly translate into a product marketing fit (at least, not on paper). Andy unpacks the many different positions within the product marketing field. Recent cutbacks are causing those who remain to take on more responsibilities than ever before, so product marketing is becoming an increasingly more generalized role.</p>
<p>Andy also shares a “hot take” that startups don’t need a marketing program, they first need a solid comms program. It takes a good comms program to build trust for your startup. If you can do that successfully, you can then bring a marketing person in to further develop the existing pipeline. Finally, our guest and hosts engage in a fun guessing game to reveal what career Andy would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Andy is open to chatting with people 1:1 about pivoting to PMM roles, you can reach out to him either on <a href="https://www.linkedin.com/in/andy-tzortzinis-74876921/">LinkedIn</a>.</p>
<p> </p>
<p>You can also catch up with our hosts here: </p>
<p>Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p> </p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2195</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/e500a399-c11e-3a07-8b61-9e42acec156d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7978925245.mp3?updated=1723026991" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building Trust, Culture, and Communities with Tyler Shields</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/97/notes</link>
      <description>After about 90 podcast episodes published on Breaking Through In Cybersecurity Marketing, we are walking down memory lane with our very first episode ever!

Gianna and Maria are joined by self-proclaimed “accidental CMO,” Tyler Shields, Vice President of Product Marketing at Traceable. Tyler shares his three-step approach for building marketing programs at startups, establishing company culture remotely, setting realistic expectations with internal stakeholders when building community at companies, and why your company needs a “talking head.” Lastly, Tyler spills the beans on the true mastermind behind his Yeti swag and the marketing models and platforms he’s engaging in.   

Key takeaways:

00:40  Bio

02:10  Tyler’s 3 step Approach for startup marketing

06:39  Remote working - communication is key!

09:54  Trust building and authentic leadership 

11:06  Establishing company culture remotely

13:43  Accountability and teamwork 

15:35  What’s in store for JupiterOne in 2022?!

18:18  Building community - foundation first  

22:54  Setting realistic expectations 

24:28  Spokespeople and “talking heads”

27:03  Favorite swag and the true Yeti mastermind

31:35  Product-led growth and establishing value

34:10  Social media, podcasting, and modern marketing models

35:41  Platforms - YouTube, Shopify, Slack, and the whole gambit!

39:01  Stay in touch with Tyler

 

Stay in touch with Tyler on Twitter and LinkedIn

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website.

We are on hiatus after CyberMarketingCon and the holiday season. We will be back with everything fresh in January. Happy holidays everyone!</description>
      <pubDate>Wed, 27 Dec 2023 15:19:32 -0000</pubDate>
      <itunes:title>Building Trust, Culture, and Communities with Tyler Shields</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>97</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>After about 90 podcast episodes published on Breaking Through In Cybersecurity Marketing, we are walking down memory lane with our very first episode ever!
Gianna and Maria are joined by self-proclaimed “accidental CMO,” Tyler Shields, Vice President...</itunes:subtitle>
      <itunes:summary>After about 90 podcast episodes published on Breaking Through In Cybersecurity Marketing, we are walking down memory lane with our very first episode ever!

Gianna and Maria are joined by self-proclaimed “accidental CMO,” Tyler Shields, Vice President of Product Marketing at Traceable. Tyler shares his three-step approach for building marketing programs at startups, establishing company culture remotely, setting realistic expectations with internal stakeholders when building community at companies, and why your company needs a “talking head.” Lastly, Tyler spills the beans on the true mastermind behind his Yeti swag and the marketing models and platforms he’s engaging in.   

Key takeaways:

00:40  Bio

02:10  Tyler’s 3 step Approach for startup marketing

06:39  Remote working - communication is key!

09:54  Trust building and authentic leadership 

11:06  Establishing company culture remotely

13:43  Accountability and teamwork 

15:35  What’s in store for JupiterOne in 2022?!

18:18  Building community - foundation first  

22:54  Setting realistic expectations 

24:28  Spokespeople and “talking heads”

27:03  Favorite swag and the true Yeti mastermind

31:35  Product-led growth and establishing value

34:10  Social media, podcasting, and modern marketing models

35:41  Platforms - YouTube, Shopify, Slack, and the whole gambit!

39:01  Stay in touch with Tyler

 

Stay in touch with Tyler on Twitter and LinkedIn

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website.

We are on hiatus after CyberMarketingCon and the holiday season. We will be back with everything fresh in January. Happy holidays everyone!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>After about 90 podcast episodes published on Breaking Through In Cybersecurity Marketing, we are walking down memory lane with our very first episode ever!</p>
<p>Gianna and Maria are joined by self-proclaimed “accidental CMO,” Tyler Shields, Vice President of Product Marketing at Traceable. Tyler shares his three-step approach for building marketing programs at startups, establishing company culture remotely, setting realistic expectations with internal stakeholders when building community at companies, and why your company needs a “talking head.” Lastly, Tyler spills the beans on the true mastermind behind his Yeti swag and the marketing models and platforms he’s engaging in.   </p>
<p>Key takeaways:</p>
<p>00:40  Bio</p>
<p>02:10  Tyler’s 3 step Approach for startup marketing</p>
<p>06:39  Remote working - communication is key!</p>
<p>09:54  Trust building and authentic leadership </p>
<p>11:06  Establishing company culture remotely</p>
<p>13:43  Accountability and teamwork </p>
<p>15:35  What’s in store for JupiterOne in 2022?!</p>
<p>18:18  Building community - foundation first  </p>
<p>22:54  Setting realistic expectations </p>
<p>24:28  Spokespeople and “talking heads”</p>
<p>27:03  Favorite swag and the true Yeti mastermind</p>
<p>31:35  Product-led growth and establishing value</p>
<p>34:10  Social media, podcasting, and modern marketing models</p>
<p>35:41  Platforms - YouTube, Shopify, Slack, and the whole gambit!</p>
<p>39:01  Stay in touch with Tyler</p>
<p> </p>
<p>Stay in touch with Tyler on<a href="https://twitter.com/txs"> Twitter</a> and<a href="https://www.linkedin.com/in/tylershields/"> LinkedIn</a></p>
<p>Connect with Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a> </p>
<p>Connect with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on<a href="https://twitter.com/CyberMSociety"> Twitter</a> or learn more at the<a href="https://cybersecuritymarketingsociety.com/"> Cybersecurity Marketing Society</a> website.</p>
<p><em>We are on hiatus after CyberMarketingCon and the holiday season. We will be back with everything fresh in January. Happy holidays everyone!</em></p>
]]>
      </content:encoded>
      <itunes:duration>2637</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/c795435f-4f00-36fa-956b-88652ee67a42]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5578269462.mp3?updated=1723026998" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Episode Replay: Is Your Marketing Annoying to Security Folks? How to Fix It with Dani Woolf</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/96/notes</link>
      <description>CyberMarketingCon2023 has wrapped, and we are so grateful for the support we received from our speakers, sponsors, volunteers, and attendees. The week was jam-packed with networking and education, from demand gen and AI to CISO perspectives and vendor solutions. Stay tuned for more conference content from our podcast, website, and social media channels. 

In this episode replay, we are joined by the Founder and CEO of Audience 1st, Dani Woolf, who was also a speaker at CyberMarketingCon this year. 

In this episode, Dani discusses her core marketing values: 


Empathy 

Trust 

Loyalty 


Creating meaningful, customer-centric experiences and identifying customer challenges and buying motivations while also being able to ask the right questions can transform your marketing efforts. Dani also shares the story behind the uncomfortable encounter that sparked a great friendship with a cybersecurity practitioner.  

 

More on our guest, Dani: 

Dani Woolf is a swimmer turned marketer. She has been applying lessons learned as a distance freestyler to B2B organizational success for the past 10 years. Dani's core specialty is in digital marketing, focusing on net new customer acquisition via digital channels - website optimization, SEO, SEM, social media, conversion rate optimization, and marketing automation. Dani currently serves as the Founder and CEO of Audience 1st.

Get the book Buyer Personas: How to Gain Insight into Your Customer's Expectations, Align Your Marketing Strategies, and Win More Business by Adele Revella at Amazon or the bookstore of your choice!

Stay in touch with Dani Woolf on LinkedIn and Twitter

 

Keep up with our hosts on their social media channels:

Connect with Gianna on LinkedIn 

Chat with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or LinkedIn, and learn more at the Cybersecurity Marketing Society website. </description>
      <pubDate>Wed, 20 Dec 2023 08:00:00 -0000</pubDate>
      <itunes:title>Episode Replay: Is Your Marketing Annoying to Security Folks? How to Fix It with Dani Woolf</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>96</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>CyberMarketingCon2023 has wrapped, and we are so grateful for the support we received from our speakers, sponsors, volunteers, and attendees. The week was jam-packed with networking and education, from demand gen and AI to CISO perspectives and vendo...</itunes:subtitle>
      <itunes:summary>CyberMarketingCon2023 has wrapped, and we are so grateful for the support we received from our speakers, sponsors, volunteers, and attendees. The week was jam-packed with networking and education, from demand gen and AI to CISO perspectives and vendor solutions. Stay tuned for more conference content from our podcast, website, and social media channels. 

In this episode replay, we are joined by the Founder and CEO of Audience 1st, Dani Woolf, who was also a speaker at CyberMarketingCon this year. 

In this episode, Dani discusses her core marketing values: 


Empathy 

Trust 

Loyalty 


Creating meaningful, customer-centric experiences and identifying customer challenges and buying motivations while also being able to ask the right questions can transform your marketing efforts. Dani also shares the story behind the uncomfortable encounter that sparked a great friendship with a cybersecurity practitioner.  

 

More on our guest, Dani: 

Dani Woolf is a swimmer turned marketer. She has been applying lessons learned as a distance freestyler to B2B organizational success for the past 10 years. Dani's core specialty is in digital marketing, focusing on net new customer acquisition via digital channels - website optimization, SEO, SEM, social media, conversion rate optimization, and marketing automation. Dani currently serves as the Founder and CEO of Audience 1st.

Get the book Buyer Personas: How to Gain Insight into Your Customer's Expectations, Align Your Marketing Strategies, and Win More Business by Adele Revella at Amazon or the bookstore of your choice!

Stay in touch with Dani Woolf on LinkedIn and Twitter

 

Keep up with our hosts on their social media channels:

Connect with Gianna on LinkedIn 

Chat with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or LinkedIn, and learn more at the Cybersecurity Marketing Society website. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>CyberMarketingCon2023 has wrapped, and we are so grateful for the support we received from our speakers, sponsors, volunteers, and attendees. The week was jam-packed with networking and education, from demand gen and AI to CISO perspectives and vendor solutions. Stay tuned for more conference content from our podcast, website, and social media channels. </p>
<p>In this episode replay, we are joined by the Founder and CEO of Audience 1st, Dani Woolf, who was also a speaker at CyberMarketingCon this year. </p>
<p>In this episode, Dani discusses her core marketing values: </p>
<ul>
<li>Empathy </li>
<li>Trust </li>
<li>Loyalty </li>
</ul>
<p>Creating meaningful, customer-centric experiences and identifying customer challenges and buying motivations while also being able to ask the right questions can transform your marketing efforts. Dani also shares the story behind the uncomfortable encounter that sparked a great friendship with a cybersecurity practitioner.  </p>
<p> </p>
<p>More on our guest, Dani: </p>
<p>Dani Woolf is a swimmer turned marketer. She has been applying lessons learned as a distance freestyler to B2B organizational success for the past 10 years. Dani's core specialty is in digital marketing, focusing on net new customer acquisition via digital channels - website optimization, SEO, SEM, social media, conversion rate optimization, and marketing automation. Dani currently serves as the Founder and CEO of <a href="https://www.audience1st.fm/">Audience 1st.</a></p>
<p>Get the book <em>Buyer Personas: How to Gain Insight into Your Customer's Expectations, Align Your Marketing Strategies, and Win More Business</em> by Adele Revella at<a href="https://www.amazon.com/Buyer-Personas-Customers-Expectations-Strategies/dp/1118961501"> Amazon</a> or the bookstore of your choice!</p>
<p>Stay in touch with Dani Woolf on<a href="https://www.linkedin.com/in/daniarad/"> LinkedIn</a> and <a href="https://twitter.com/thedaniwoolf">Twitter</a></p>
<p> </p>
<p>Keep up with our hosts on their social media channels:</p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Chat with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on<a href="https://twitter.com/CyberMSociety"> Twitter</a> or <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">LinkedIn</a>, and learn more at the<a href="https://cybersecuritymarketingsociety.com/"> Cybersecurity Marketing Society</a> website. </p>
]]>
      </content:encoded>
      <itunes:duration>2331</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/36a072eb-e708-39c1-b790-861f855b6890]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5538152093.mp3?updated=1723026930" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Replay Episode: Life After Layoff With Amy Fair</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/95/notes</link>
      <description>Layoffs are always stressful. You can never truly be ready for it, but you have to pick up the pieces after it happens. During our podcast hiatus for CyberMarketingCon2023, we are replaying the “Life After Layoff With Amy Fair”  episode. Our hosts Gianna and Maria sit down with guest Amy Fair, Content Marketing Manager to discuss being laid off and how to navigate it in stride. 

Gianna and Maria ask Amy about her own experiences being laid off as they approach the rarely-discussed but important topic. Amy dives into what it means to be laid off in the cybersecurity content marketing industry and how she has turned layoffs into new opportunities within weeks. In their conversation, Maria, Gianna, and Amy highlight the importance of networking and community, and how crucial it is to maintain lasting relationships in the content marketing industry. Amy shares how these connections can lead to amazing opportunities. 

Timecoded Guide:

[8:50] The value of building a network and maintaining a community

[17:29] Using Slack in job hunting and making connections

[23:21] The value of mentors and keeping people in your corner

[25:48] Advice for those anticipating a layoff 

Links:

Spend some time with our guest Amy Fair on LinkedIn and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 13 Dec 2023 08:00:00 -0000</pubDate>
      <itunes:title>Replay Episode: Life After Layoff With Amy Fair</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>95</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Layoffs are always stressful. You can never truly be ready for it, but you have to pick up the pieces after it happens. During our podcast hiatus for CyberMarketingCon2023, we are replaying the “Life After Layoff With Amy Fair”  episode. Our hosts Gi...</itunes:subtitle>
      <itunes:summary>Layoffs are always stressful. You can never truly be ready for it, but you have to pick up the pieces after it happens. During our podcast hiatus for CyberMarketingCon2023, we are replaying the “Life After Layoff With Amy Fair”  episode. Our hosts Gianna and Maria sit down with guest Amy Fair, Content Marketing Manager to discuss being laid off and how to navigate it in stride. 

Gianna and Maria ask Amy about her own experiences being laid off as they approach the rarely-discussed but important topic. Amy dives into what it means to be laid off in the cybersecurity content marketing industry and how she has turned layoffs into new opportunities within weeks. In their conversation, Maria, Gianna, and Amy highlight the importance of networking and community, and how crucial it is to maintain lasting relationships in the content marketing industry. Amy shares how these connections can lead to amazing opportunities. 

Timecoded Guide:

[8:50] The value of building a network and maintaining a community

[17:29] Using Slack in job hunting and making connections

[23:21] The value of mentors and keeping people in your corner

[25:48] Advice for those anticipating a layoff 

Links:

Spend some time with our guest Amy Fair on LinkedIn and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Layoffs are always stressful. You can never truly be ready for it, but you have to pick up the pieces after it happens. During our podcast hiatus for <a href="https://www.cybermarketingconference.com/">CyberMarketingCon2023</a>, we are replaying<em> the “Life After Layoff With Amy Fair” </em> episode. Our hosts Gianna and Maria sit down with guest Amy Fair, Content Marketing Manager to discuss being laid off and how to navigate it in stride. </p>
<p>Gianna and Maria ask Amy about her own experiences being laid off as they approach the rarely-discussed but important topic. Amy dives into what it means to be laid off in the cybersecurity content marketing industry and how she has turned layoffs into new opportunities within weeks. In their conversation, Maria, Gianna, and Amy highlight the importance of networking and community, and how crucial it is to maintain lasting relationships in the content marketing industry. Amy shares how these connections can lead to amazing opportunities. </p>
<p>Timecoded Guide:</p>
<p>[8:50] The value of building a network and maintaining a community</p>
<p>[17:29] Using Slack in job hunting and making connections</p>
<p>[23:21] The value of mentors and keeping people in your corner</p>
<p>[25:48] Advice for those anticipating a layoff </p>
<p>Links:</p>
<p>Spend some time with our guest Amy Fair on<a href="https://www.linkedin.com/in/amy-fair/"> LinkedIn</a> and<a href="https://twitter.com/amylonghorn"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2080</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/a03bd9e4-e3da-39c3-9706-a3f75ccd6643]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8066354847.mp3?updated=1723027051" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Video Influencer Marketing: Keeper Security’s Strategies, Tactics, &amp; Results - Replay from CyberMarketingCon 2022</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/94/notes</link>
      <description>Social media gives us different ways to market, from influencers to gifs, or videos. You can use whatever is at your disposal to boost your company’s social media marketing strategies.  In this replay session from CyberMarketingCon2022 speaker Cait Hassett, Channel Manager at Blackpoint Cyber, will give you all that and more. She discusses various aspects of social media, influencer marketing, and cybersecurity. Cait also shares her journey transitioning from consumer-focused marketing to B2B strategies at Keeper Security.

Video is also incredibly significant,  the power of video in marketing and the challenges of brand awareness versus category awareness in promoting a password manager within the broader cybersecurity industry. Benchmarks are important, especially in creating regular content, like as memes, employee recognition, partnerships, and cyber news updates. These benchmarks help establish consistent content themes, making the brand recognizable and reliable.

Another big part of the session focuses on the creation of a "Cyber News Update," a video series covering cybersecurity-related topics beyond passwords. Cait shares insights into scripting, utilizing company ambassadors, and maintaining a standardized format to produce these updates efficiently. She also highlights the launch of "Keeper Live" on LinkedIn Live, which aims to bring Keeper Security into broader cybersecurity conversations. From the planning process, and the selection of influential guests, to the efforts made to template scripts for comfort and consistency.

By the end of the session, Cait emphasizes finding ambassadors within the organization, creating templates for content creation, and leveraging influential figures to engage audiences effectively. The emphasis is on using different platforms, video formats, and influencer marketing to broaden Keeper Security's reach within the cybersecurity space.

CyberMarketingcon2023 countdown is officially starting and we are so excited to see everyone virtually or in person so make sure you get that ticket. More on #CyberMarketingCon2023 here, see you in Texas! 🤠 

 

More about Cait:

Cait Hassett is a brand marketing professional with nearly a decade of experience in social media and influencer marketing. She got her start as a radio DJ after winning her job in an “American Idol” type contest and creating her on-air and social media persona to grow a community of engaged listeners in the South Georgia/North Florida Market. Soon, she was running the social media accounts for every major station in the area and consulting with other DJs on social media personal branding.

Since then, she has worked on social media and influencer marketing campaigns in-house and in agency settings, most recently creating these programs from the ground up at Keeper Security, a cybersecurity and password management platform with headquarters in Chicago, Illinois. Cait avidly believes that video is the most powerful marketing tool an organization or person can use.

Follow Cait Hassett on LinkedIn.

Be sure to follow our hosts on LinkedIn:

Say hi to Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

If you are looking for a community of support within cybersecurity, join our private Slack group,  the Cybersecurity Marketing Society on our website, and keep up with us on Twitter as well!</description>
      <pubDate>Wed, 06 Dec 2023 08:00:00 -0000</pubDate>
      <itunes:title>Video Influencer Marketing: Keeper Security’s Strategies, Tactics, &amp; Results - Replay from CyberMarketingCon 2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>94</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Social media gives us different ways to market, from influencers to gifs, or videos. You can use whatever is at your disposal to boost your company’s social media marketing strategies.  In this replay session from CyberMarketingCon2022 speaker Cait H...</itunes:subtitle>
      <itunes:summary>Social media gives us different ways to market, from influencers to gifs, or videos. You can use whatever is at your disposal to boost your company’s social media marketing strategies.  In this replay session from CyberMarketingCon2022 speaker Cait Hassett, Channel Manager at Blackpoint Cyber, will give you all that and more. She discusses various aspects of social media, influencer marketing, and cybersecurity. Cait also shares her journey transitioning from consumer-focused marketing to B2B strategies at Keeper Security.

Video is also incredibly significant,  the power of video in marketing and the challenges of brand awareness versus category awareness in promoting a password manager within the broader cybersecurity industry. Benchmarks are important, especially in creating regular content, like as memes, employee recognition, partnerships, and cyber news updates. These benchmarks help establish consistent content themes, making the brand recognizable and reliable.

Another big part of the session focuses on the creation of a "Cyber News Update," a video series covering cybersecurity-related topics beyond passwords. Cait shares insights into scripting, utilizing company ambassadors, and maintaining a standardized format to produce these updates efficiently. She also highlights the launch of "Keeper Live" on LinkedIn Live, which aims to bring Keeper Security into broader cybersecurity conversations. From the planning process, and the selection of influential guests, to the efforts made to template scripts for comfort and consistency.

By the end of the session, Cait emphasizes finding ambassadors within the organization, creating templates for content creation, and leveraging influential figures to engage audiences effectively. The emphasis is on using different platforms, video formats, and influencer marketing to broaden Keeper Security's reach within the cybersecurity space.

CyberMarketingcon2023 countdown is officially starting and we are so excited to see everyone virtually or in person so make sure you get that ticket. More on #CyberMarketingCon2023 here, see you in Texas! 🤠 

 

More about Cait:

Cait Hassett is a brand marketing professional with nearly a decade of experience in social media and influencer marketing. She got her start as a radio DJ after winning her job in an “American Idol” type contest and creating her on-air and social media persona to grow a community of engaged listeners in the South Georgia/North Florida Market. Soon, she was running the social media accounts for every major station in the area and consulting with other DJs on social media personal branding.

Since then, she has worked on social media and influencer marketing campaigns in-house and in agency settings, most recently creating these programs from the ground up at Keeper Security, a cybersecurity and password management platform with headquarters in Chicago, Illinois. Cait avidly believes that video is the most powerful marketing tool an organization or person can use.

Follow Cait Hassett on LinkedIn.

Be sure to follow our hosts on LinkedIn:

Say hi to Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

If you are looking for a community of support within cybersecurity, join our private Slack group,  the Cybersecurity Marketing Society on our website, and keep up with us on Twitter as well!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Social media gives us different ways to market, from influencers to gifs, or videos. You can use whatever is at your disposal to boost your company’s social media marketing strategies.  In this replay session from CyberMarketingCon2022 speaker Cait Hassett, Channel Manager at Blackpoint Cyber, will give you all that and more. She discusses various aspects of social media, influencer marketing, and cybersecurity. Cait also shares her journey transitioning from consumer-focused marketing to B2B strategies at Keeper Security.</p>
<p>Video is also incredibly significant,  the power of video in marketing and the challenges of brand awareness versus category awareness in promoting a password manager within the broader cybersecurity industry. Benchmarks are important, especially in creating regular content, like as memes, employee recognition, partnerships, and cyber news updates. These benchmarks help establish consistent content themes, making the brand recognizable and reliable.</p>
<p>Another big part of the session focuses on the creation of a "Cyber News Update," a video series covering cybersecurity-related topics beyond passwords. Cait shares insights into scripting, utilizing company ambassadors, and maintaining a standardized format to produce these updates efficiently. She also highlights the launch of "Keeper Live" on LinkedIn Live, which aims to bring Keeper Security into broader cybersecurity conversations. From the planning process, and the selection of influential guests, to the efforts made to template scripts for comfort and consistency.</p>
<p>By the end of the session, Cait emphasizes finding ambassadors within the organization, creating templates for content creation, and leveraging influential figures to engage audiences effectively. The emphasis is on using different platforms, video formats, and influencer marketing to broaden Keeper Security's reach within the cybersecurity space.</p>
<p>CyberMarketingcon2023 countdown is officially starting and we are so excited to see everyone virtually or in person so make sure you get that ticket. More on #CyberMarketingCon2023 <a href="https://www.cybermarketingconference.com/">here</a>, see you in Texas! 🤠 </p>
<p> </p>
<p><em>More about Cait:</em></p>
<p>Cait Hassett is a brand marketing professional with nearly a decade of experience in social media and influencer marketing. She got her start as a radio DJ after winning her job in an “American Idol” type contest and creating her on-air and social media persona to grow a community of engaged listeners in the South Georgia/North Florida Market. Soon, she was running the social media accounts for every major station in the area and consulting with other DJs on social media personal branding.</p>
<p>Since then, she has worked on social media and influencer marketing campaigns in-house and in agency settings, most recently creating these programs from the ground up at Keeper Security, a cybersecurity and password management platform with headquarters in Chicago, Illinois. Cait avidly believes that video is the most powerful marketing tool an organization or person can use.</p>
<p>Follow Cait Hassett on <a href="https://www.linkedin.com/in/caithassett/">LinkedIn</a>.</p>
<p><em>Be sure to follow our hosts on LinkedIn:</em></p>
<p>Say hi to Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>If you are looking for a community of support within cybersecurity, join our private Slack group,  the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a> as well!</p>
]]>
      </content:encoded>
      <itunes:duration>3414</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/c73ca999-780c-3256-8a1b-2111c3efb618]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1383545068.mp3?updated=1723027058" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Successes and Failures of Being a CMO with Charles Gold</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/93/notes</link>
      <description>In this episode, Charles Gold, Chief Marketing Officer at ThreatConnect, joins Maria and Gianna to discuss why CMOs fail or succeed. 

To begin, Charles shares his background in running global marketing organizations. He even started a technology company during the dot-com boom time period. 

Then the group discusses a ton of CMO topics, including how CMOs fail and succeed at the role, and how Charles conducted 30 interviews (!!!) to land the company a superstar employee. 

Charles' best advice for marketers in security?

"If you can understand what the product does and how people use it, that will help you communicate with engineers and have credibility with customers. If you don't have this understanding, it’s really limiting."

 

Links:

 

Learn more about Charles Gold.  

More on Gold's Rules

Check out the Washington Post that Charles mentions here.  

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 29 Nov 2023 08:00:00 -0000</pubDate>
      <itunes:title>The Successes and Failures of Being a CMO with Charles Gold</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>93</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Charles Gold, Chief Marketing Officer at ThreatConnect, joins Maria and Gianna to discuss why CMOs fail or succeed. 
To begin, Charles shares his background in running global marketing organizations. He even started a technology comp...</itunes:subtitle>
      <itunes:summary>In this episode, Charles Gold, Chief Marketing Officer at ThreatConnect, joins Maria and Gianna to discuss why CMOs fail or succeed. 

To begin, Charles shares his background in running global marketing organizations. He even started a technology company during the dot-com boom time period. 

Then the group discusses a ton of CMO topics, including how CMOs fail and succeed at the role, and how Charles conducted 30 interviews (!!!) to land the company a superstar employee. 

Charles' best advice for marketers in security?

"If you can understand what the product does and how people use it, that will help you communicate with engineers and have credibility with customers. If you don't have this understanding, it’s really limiting."

 

Links:

 

Learn more about Charles Gold.  

More on Gold's Rules

Check out the Washington Post that Charles mentions here.  

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Charles Gold, Chief Marketing Officer at ThreatConnect, joins Maria and Gianna to discuss why CMOs fail or succeed. </p>
<p>To begin, Charles shares his background in running global marketing organizations. He even started a technology company during the dot-com boom time period. </p>
<p>Then the group discusses a ton of CMO topics, including how CMOs fail and succeed at the role, and how Charles conducted 30 interviews (!!!) to land the company a superstar employee. </p>
<p>Charles' best advice for marketers in security?</p>
<p><em>"If you can understand what the product does and how people use it, that will help you communicate with engineers and have credibility with customers. If you don't have this understanding, it’s really limiting."</em></p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Learn more about <a href="https://www.linkedin.com/in/charlesgold/">Charles Gold.  </a></p>
<p>More on <a href="http://www.cgold.marketing/blog/2023/11/25/golds-rules-hard-earned-lessons-from-a-25-year-career-as-a-tech-marketing-leader">Gold's Rules</a></p>
<p>Check out the Washington Post that Charles mentions <a href="https://www.washingtonpost.com/archive/business/1996/02/05/directory-service-lets-modem-do-the-walking/847e0a3c-bd46-4a2e-8410-be1b7acde4d4/">here</a>.  </p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2300</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/a26b0a89-6065-3f5c-beb3-4825ecff85d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5835705493.mp3?updated=1723026866" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It’s Okay to Be Funny - Even in Marketing! Replay from CyberMarketingCon 2021</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/92/notes</link>
      <description>When you think humor, comedy, LOL, or even LMFAO if you are fancy, cybersecurity isn't typically the first thing that comes to mind. But who says talking about ROI, demand gen, and marketing has to be boring? Humor exists in everything, and with so much access to ridiculousness (memes, reaction videos, reviews, or TikTok hot takes), anything can be made funny. 

 

Which is why we are replaying: It's Okay to Be Funny - Even in Marketing, from CyberMarketingCon2021. A session by comedic wizard Tricia Howard, a.k.a. Tricia Kicks SaaS, Senior Technical Writer at Akamai Technologies. The session focuses on how to infuse humor into cybersecurity marketing. Tricia uses her background as a theater major and stand-up comedian turned marketer, diving into various joke formats, and emphasizing the importance of understanding the cybersecurity community.

 

Key points that Trisha discusses:

 

➡️ "Pun-liners" – a fusion of puns and one-liners.

➡️ Anatomy of a Joke, and Rule of Three – breaks the joke down into subject, setup, and punchline.

➡️ The popularity of memes in social media marketing and the need for quick turnaround due to meme time sensitivity.

➡️ Creativity and Adaptation – creativity in content creation and the adaptive repurposing of content across different platforms.

➡️ Legal Considerations – the importance of giving credit for borrowed content and being mindful of copyright issues.

➡️ ROI Measurement – Social media metrics, like impressions and engagement rates, are important for measuring the success of humorous content in marketing.

 

More great sessions at #CyberMarketingCon2023 here, see you in Texas! 🤠

Follow Tricia Kicks SaaS on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 22 Nov 2023 08:00:00 -0000</pubDate>
      <itunes:title>It’s Okay to Be Funny - Even in Marketing! Replay from CyberMarketingCon 2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>92</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>When you think humor, comedy, LOL, or even LMFAO if you are fancy, cybersecurity isn't typically the first thing that comes to mind. But who says talking about ROI, demand gen, and marketing has to be boring? Humor exists in everything, and with so m...</itunes:subtitle>
      <itunes:summary>When you think humor, comedy, LOL, or even LMFAO if you are fancy, cybersecurity isn't typically the first thing that comes to mind. But who says talking about ROI, demand gen, and marketing has to be boring? Humor exists in everything, and with so much access to ridiculousness (memes, reaction videos, reviews, or TikTok hot takes), anything can be made funny. 

 

Which is why we are replaying: It's Okay to Be Funny - Even in Marketing, from CyberMarketingCon2021. A session by comedic wizard Tricia Howard, a.k.a. Tricia Kicks SaaS, Senior Technical Writer at Akamai Technologies. The session focuses on how to infuse humor into cybersecurity marketing. Tricia uses her background as a theater major and stand-up comedian turned marketer, diving into various joke formats, and emphasizing the importance of understanding the cybersecurity community.

 

Key points that Trisha discusses:

 

➡️ "Pun-liners" – a fusion of puns and one-liners.

➡️ Anatomy of a Joke, and Rule of Three – breaks the joke down into subject, setup, and punchline.

➡️ The popularity of memes in social media marketing and the need for quick turnaround due to meme time sensitivity.

➡️ Creativity and Adaptation – creativity in content creation and the adaptive repurposing of content across different platforms.

➡️ Legal Considerations – the importance of giving credit for borrowed content and being mindful of copyright issues.

➡️ ROI Measurement – Social media metrics, like impressions and engagement rates, are important for measuring the success of humorous content in marketing.

 

More great sessions at #CyberMarketingCon2023 here, see you in Texas! 🤠

Follow Tricia Kicks SaaS on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>When you think humor, comedy, LOL, or even LMFAO if you are fancy, cybersecurity isn't typically the first thing that comes to mind. But who says talking about ROI, demand gen, and marketing has to be <em>boring</em>? Humor exists in everything, and with so much access to ridiculousness (memes, reaction videos, reviews, or TikTok hot takes), anything can be made funny. </p>
<p> </p>
<p>Which is why we are replaying:<a href="https://www.youtube.com/watch?v=aSkQby3boYw&amp;list=PLLj8jwUeIYnqlnAfd-iUdGlSSO-Uq-mFu"><em> It's Okay to Be Funny - Even in Marketing</em></a>, from CyberMarketingCon2021. A session by comedic wizard Tricia Howard, a.k.a. Tricia Kicks SaaS, Senior Technical Writer at Akamai Technologies. The session focuses on how to infuse humor into cybersecurity marketing. Tricia uses her background as a theater major and stand-up comedian turned marketer, diving into various joke formats, and emphasizing the importance of understanding the cybersecurity community.</p>
<p> </p>
<p><em>Key points that Trisha discusses:</em></p>
<p> </p>
<p>➡️ <em>"Pun-liners"</em> – a fusion of puns and one-liners.</p>
<p>➡️ Anatomy of a Joke, and Rule of Three – breaks the joke down into subject, setup, and punchline.</p>
<p>➡️ The popularity of memes in social media marketing and the need for quick turnaround due to meme time sensitivity.</p>
<p>➡️ Creativity and Adaptation – creativity in content creation and the adaptive repurposing of content across different platforms.</p>
<p>➡️ Legal Considerations – the importance of giving credit for borrowed content and being mindful of copyright issues.</p>
<p>➡️ ROI Measurement – Social media metrics, like impressions and engagement rates, are important for measuring the success of humorous content in marketing.</p>
<p> </p>
<p><em>More great sessions at #CyberMarketingCon2023 </em><a href="https://www.cybermarketingconference.com/"><em>here</em></a><em>, see you in Texas! </em>🤠</p>
<p>Follow Tricia Kicks SaaS on <a href="https://www.linkedin.com/in/triciakickssaas/">LinkedIn</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>3022</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/fa7586ce-0e59-3c2a-9564-4ab24b4952f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9169507393.mp3?updated=1723026942" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring Escaping Rooms and Branding Challenges with Amy Stokes-Waters</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/91/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Amy Stokes Waters, Founder and Chief Executive Officer of Esc, joins Maria and Gianna to discuss cybersecurity escape rooms and marketing.

Amy starts off today’s episode by explaining how marketing teams use Esc for team building activities and they are given different scenarios with clues where they have to get the data back. They also have some phishing exercises where participants can have a video call with an AI bot. This is not only fun, but also teaches you more about the dangers of cybersecurity mistakes! Right now, Esc is only available for hire in the United Kingdom since this company has been rebranding, but they are discussing the idea of expanding. Amy started in sales and has been in the industry for a long time. She remembers going to a Reframe women’s technology conference in England and in one session, the speaker said, “Don't just do cool stuff, but actually tell people you are doing cool stuff.” This discussion changed her whole outlook and trajected her into the marketing realm. They talk about the importance of investing in yourself to grow professionally.

Next, Amy discusses the challenges in marketing including branding. If the branding looks nice, it is so much easier to sell the product, and the company looks more professional and established. The other challenge is how to be different and to not have the same cookie cutter messaging. Amy says if people don't know what service you are selling, then how will they ever buy it? You need to make it as easy as humanly possible to buy from you. Personality is also a critical aspect for being successful, and there needs to be faces associated with the brand as well. Marketing makes the brand, but the sales team has to be the people vocalizing that. Both marketing and sales have to work as one and need to align with each other. They also discuss their favorite words in marketing and how to push the envelope in the field. Finally, our guest and hosts engage in a fun guessing game to reveal what career Amy would pursue outside of the cybersecurity marketing field.

 

Links:

Learn more about Amy Stokes Waters.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 15 Nov 2023 08:00:00 -0000</pubDate>
      <itunes:title>Exploring Escaping Rooms and Branding Challenges with Amy Stokes-Waters</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>91</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Amy Stokes Waters, Founder and Chief Executive Off...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Amy Stokes Waters, Founder and Chief Executive Officer of Esc, joins Maria and Gianna to discuss cybersecurity escape rooms and marketing.

Amy starts off today’s episode by explaining how marketing teams use Esc for team building activities and they are given different scenarios with clues where they have to get the data back. They also have some phishing exercises where participants can have a video call with an AI bot. This is not only fun, but also teaches you more about the dangers of cybersecurity mistakes! Right now, Esc is only available for hire in the United Kingdom since this company has been rebranding, but they are discussing the idea of expanding. Amy started in sales and has been in the industry for a long time. She remembers going to a Reframe women’s technology conference in England and in one session, the speaker said, “Don't just do cool stuff, but actually tell people you are doing cool stuff.” This discussion changed her whole outlook and trajected her into the marketing realm. They talk about the importance of investing in yourself to grow professionally.

Next, Amy discusses the challenges in marketing including branding. If the branding looks nice, it is so much easier to sell the product, and the company looks more professional and established. The other challenge is how to be different and to not have the same cookie cutter messaging. Amy says if people don't know what service you are selling, then how will they ever buy it? You need to make it as easy as humanly possible to buy from you. Personality is also a critical aspect for being successful, and there needs to be faces associated with the brand as well. Marketing makes the brand, but the sales team has to be the people vocalizing that. Both marketing and sales have to work as one and need to align with each other. They also discuss their favorite words in marketing and how to push the envelope in the field. Finally, our guest and hosts engage in a fun guessing game to reveal what career Amy would pursue outside of the cybersecurity marketing field.

 

Links:

Learn more about Amy Stokes Waters.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Amy Stokes Waters, Founder and Chief Executive Officer of Esc, joins Maria and Gianna to discuss cybersecurity escape rooms and marketing.</p>
<p>Amy starts off today’s episode by explaining how marketing teams use Esc for team building activities and they are given different scenarios with clues where they have to get the data back. They also have some phishing exercises where participants can have a video call with an AI bot. This is not only fun, but also teaches you more about the dangers of cybersecurity mistakes! Right now, Esc is only available for hire in the United Kingdom since this company has been rebranding, but they are discussing the idea of expanding. Amy started in sales and has been in the industry for a long time. She remembers going to a Reframe women’s technology conference in England and in one session, the speaker said, “Don't just do cool stuff, but actually tell people you are doing cool stuff.” This discussion changed her whole outlook and trajected her into the marketing realm. They talk about the importance of investing in yourself to grow professionally.</p>
<p>Next, Amy discusses the challenges in marketing including branding. If the branding looks nice, it is so much easier to sell the product, and the company looks more professional and established. The other challenge is how to be different and to not have the same cookie cutter messaging. Amy says if people don't know what service you are selling, then how will they ever buy it? You need to make it as easy as humanly possible to buy from you. Personality is also a critical aspect for being successful, and there needs to be faces associated with the brand as well. Marketing makes the brand, but the sales team has to be the people vocalizing that. Both marketing and sales have to work as one and need to align with each other. They also discuss their favorite words in marketing and how to push the envelope in the field. Finally, our guest and hosts engage in a fun guessing game to reveal what career Amy would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p>Learn more about <a href="https://www.linkedin.com/in/amystokeswaters/?originalSubdomain=uk">Amy Stokes Waters.</a></p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> </a><a href="https://hackervalley.com/">our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2367</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/e10f1bbd-000d-3367-af41-c33037ec8a98]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6852412581.mp3?updated=1723026962" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>3 Types of Competitive Intelligence All Cybersecurity Marketers Should Know! Replay from CyberMarketingCon 2022</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/90/notes</link>
      <description>Competitive intelligence programs can be reactionary and one-dimensional due to squeaky-wheel syndrome and we-just-lost-a-deal-to-so-and-so-itis. 

 

Learn from Alex Babar, Vice President of Solutions at Brinqa about 3 categories of competitive intel every marketer in cybersecurity should know about: Marketing, Business, and Technical. Additionally, learn which categories marketers are particularly well-suited to leading and which ones make better sense to collaborate on with other teams like product, customer success, or sales engineers.

 

In this session:

 


Cut through the competitive noise in cyber security!

Learn the right teams for the proper competitive responsibilities!

3 simple but powerful competitive analysis frameworks!


 

We have approximately 33 days until #CyberMarketingCon2023, held December 10-13! We can’t help but reminisce and replay some of the amazing sessions from previous conferences. This week’s episode is from CyberMarketingCon2022, with a session by Alex Babar, Vice President of Solutions at Brinqa. If you enjoy this session, you will enjoy this year’s lineup filled with education, the best speakers, hands-on workshops, and networking, networking, AND MORE networking!

 

More on #CyberMarketingCon2023 here, see you in Texas! 🤠

 

Be sure to watch a video version of this session here. 

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 08 Nov 2023 08:00:00 -0000</pubDate>
      <itunes:title>3 Types of Competitive Intelligence All Cybersecurity Marketers Should Know! Replay from CyberMarketingCon 2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>90</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Competitive intelligence programs can be reactionary and one-dimensional due to squeaky-wheel syndrome and we-just-lost-a-deal-to-so-and-so-itis. 
 
Learn from Alex Babar, Vice President of Solutions at Brinqa about 3 categories of competitive intel ...</itunes:subtitle>
      <itunes:summary>Competitive intelligence programs can be reactionary and one-dimensional due to squeaky-wheel syndrome and we-just-lost-a-deal-to-so-and-so-itis. 

 

Learn from Alex Babar, Vice President of Solutions at Brinqa about 3 categories of competitive intel every marketer in cybersecurity should know about: Marketing, Business, and Technical. Additionally, learn which categories marketers are particularly well-suited to leading and which ones make better sense to collaborate on with other teams like product, customer success, or sales engineers.

 

In this session:

 


Cut through the competitive noise in cyber security!

Learn the right teams for the proper competitive responsibilities!

3 simple but powerful competitive analysis frameworks!


 

We have approximately 33 days until #CyberMarketingCon2023, held December 10-13! We can’t help but reminisce and replay some of the amazing sessions from previous conferences. This week’s episode is from CyberMarketingCon2022, with a session by Alex Babar, Vice President of Solutions at Brinqa. If you enjoy this session, you will enjoy this year’s lineup filled with education, the best speakers, hands-on workshops, and networking, networking, AND MORE networking!

 

More on #CyberMarketingCon2023 here, see you in Texas! 🤠

 

Be sure to watch a video version of this session here. 

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Competitive intelligence programs can be reactionary and one-dimensional due to squeaky-wheel syndrome and we-just-lost-a-deal-to-so-and-so-itis. </p>
<p> </p>
<p>Learn from Alex Babar, Vice President of Solutions at Brinqa about 3 categories of competitive intel every marketer in cybersecurity should know about: Marketing, Business, and Technical. Additionally, learn which categories marketers are particularly well-suited to leading and which ones make better sense to collaborate on with other teams like product, customer success, or sales engineers.</p>
<p> </p>
<p>In this session:</p>
<p> </p>
<ul>
<li>Cut through the competitive noise in cyber security!</li>
<li>Learn the right teams for the proper competitive responsibilities!</li>
<li>3 simple but powerful competitive analysis frameworks!</li>
</ul>
<p> </p>
<p>We have approximately 33 days until #<a href="https://www.cybermarketingconference.com/">CyberMarketingCon2023</a>, held December 10-13! We can’t help but reminisce and replay some of the amazing sessions from previous conferences. This week’s episode is from CyberMarketingCon2022, with a session by Alex Babar, Vice President of Solutions at Brinqa. If you enjoy this session, you will enjoy this year’s lineup filled with education, the best speakers, hands-on workshops, and networking, networking, AND MORE networking!</p>
<p> </p>
<p>More on #CyberMarketingCon2023 <a href="https://www.cybermarketingconference.com/">here</a>, see you in Texas! 🤠</p>
<p> </p>
<p>Be sure to watch a video version of this session<a href="https://www.youtube.com/watch?v=7dNjiOoYfN0&amp;list=PLLj8jwUeIYnrlOGR0Y0vkRvtoodd9zRjM&amp;index=26"> here.</a> </p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>3011</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/4aadedb7-faf1-3e32-a651-f85951f696a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6555351656.mp3?updated=1723027060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From the Horse’s Mouth: CISO Q&amp;A - CyberMarketingCon2022 Replay Session</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/88/notes</link>
      <description>Since #CyberMarketingCon2023 is coming on December 10th through 13th. We can’t help but replay some of our sessions from previous conferences. This week’s episode is from CyberMarketingCon2022. If you enjoy this session, you will enjoy this year’s lineup filled with education, the best speakers, hands-on workshops, networking, networking, AND MORE networking!

We cannot wait to see you. Enjoy this episode and be sure to get your ticket by clicking ➡️➡️➡️here!

The From the Horse's Mouth: CISO Q&amp;A session is an in-depth conversation about reaching the unreachable buyer. Join us to hear security executives share their insights on why they buy, how they buy, and where they buy. 

 

The speakers are:

Michele Perry, Operating Partner at Elsewhere Partners 

Rick Howard, Chief Security Officer, Chief Analyst, and Senior Fellow at N2K Networks  

Jaclyn Miller,  Co-Founder and Chief Operations Officer(COO) at Stealth Startup

Ted Wagner, VP and CISO at SAP National Security Services

 

In this session you will find: 

1️⃣ What works and doesn’t work in getting a security executive’s attention? 

2️⃣ Message trust, message fatigue, and what you can do about it. 

3️⃣ Trusted information sources and how security executives use them. 

4️⃣ Positioning and messaging that is meaningful to decision-makers. 

5️⃣ The security executive’s purchasing behavior and why skepticism is the driving force. 

 

The speakers will talk more in-depth about the day in the life of a CISO, and how you can balance innovation and platform suites when considering products/services. From how do you develop trust with your vendors or potential vendors, the boundaries around when to how to contact a vendor and what is the acceptable amount of time for a call back from a potential vendor. The panelists also dive into who are the evangelists that people listen to and how a company can create their own evangelists. 

 

By the end, the host opened the floor for audience questions:  

 

How big is it a disadvantage to require an email/gate to download content? 

Any advice you have for vendor websites?

How involved would you be in a customer advisory board or executive retreat?

Why do you not give survey data much merit (to Rick)? 

Do you have a preference for virtual or live events?

 

More on #CyberMarketingCon2023 here, see you in Texas! 🤠

Be sure to watch a video version of this session here.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 25 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>From the Horse’s Mouth: CISO Q&amp;A - CyberMarketingCon2022 Replay Session</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>88</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Since #CyberMarketingCon2023 is coming on December 10th through 13th. We can’t help but replay some of our sessions from previous conferences. This week’s episode is from CyberMarketingCon2022. If you enjoy this session, you will enjoy this year’s li...</itunes:subtitle>
      <itunes:summary>Since #CyberMarketingCon2023 is coming on December 10th through 13th. We can’t help but replay some of our sessions from previous conferences. This week’s episode is from CyberMarketingCon2022. If you enjoy this session, you will enjoy this year’s lineup filled with education, the best speakers, hands-on workshops, networking, networking, AND MORE networking!

We cannot wait to see you. Enjoy this episode and be sure to get your ticket by clicking ➡️➡️➡️here!

The From the Horse's Mouth: CISO Q&amp;A session is an in-depth conversation about reaching the unreachable buyer. Join us to hear security executives share their insights on why they buy, how they buy, and where they buy. 

 

The speakers are:

Michele Perry, Operating Partner at Elsewhere Partners 

Rick Howard, Chief Security Officer, Chief Analyst, and Senior Fellow at N2K Networks  

Jaclyn Miller,  Co-Founder and Chief Operations Officer(COO) at Stealth Startup

Ted Wagner, VP and CISO at SAP National Security Services

 

In this session you will find: 

1️⃣ What works and doesn’t work in getting a security executive’s attention? 

2️⃣ Message trust, message fatigue, and what you can do about it. 

3️⃣ Trusted information sources and how security executives use them. 

4️⃣ Positioning and messaging that is meaningful to decision-makers. 

5️⃣ The security executive’s purchasing behavior and why skepticism is the driving force. 

 

The speakers will talk more in-depth about the day in the life of a CISO, and how you can balance innovation and platform suites when considering products/services. From how do you develop trust with your vendors or potential vendors, the boundaries around when to how to contact a vendor and what is the acceptable amount of time for a call back from a potential vendor. The panelists also dive into who are the evangelists that people listen to and how a company can create their own evangelists. 

 

By the end, the host opened the floor for audience questions:  

 

How big is it a disadvantage to require an email/gate to download content? 

Any advice you have for vendor websites?

How involved would you be in a customer advisory board or executive retreat?

Why do you not give survey data much merit (to Rick)? 

Do you have a preference for virtual or live events?

 

More on #CyberMarketingCon2023 here, see you in Texas! 🤠

Be sure to watch a video version of this session here.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Since #<a href="https://www.cybermarketingconference.com/">CyberMarketingCon2023</a> is coming on December 10th through 13th. We can’t help but replay some of our sessions from previous conferences. This week’s episode is from CyberMarketingCon2022. If you enjoy this session, you will enjoy this year’s lineup filled with education, the best speakers, hands-on workshops, networking, networking, AND MORE networking!</p>
<p>We cannot wait to see you. Enjoy this episode and be sure to get your ticket by clicking ➡️➡️➡️<a href="https://www.cybermarketingconference.com/">here</a>!</p>
<p>The <em>From the Horse's Mouth: CISO Q&amp;A </em>session is an in-depth conversation about reaching the unreachable buyer. Join us to hear security executives share their insights on why they buy, how they buy, and where they buy. </p>
<p> </p>
<p>The speakers are:</p>
<p><a href="https://www.linkedin.com/in/micheleperry/">Michele Perry</a>, Operating Partner at <a href="https://www.linkedin.com/company/elsewhere-partners/">Elsewhere Partners</a> </p>
<p><a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a>, Chief Security Officer, Chief Analyst, and Senior Fellow at<a href="https://www.linkedin.com/company/n2k-networks/"> N2K Networks </a> </p>
<p><a href="https://www.linkedin.com/in/jaclynimiller/">Jaclyn Miller</a>,  Co-Founder and Chief Operations Officer(COO) at Stealth Startup</p>
<p><a href="https://www.linkedin.com/in/ted-wagner-076aa11/">Ted Wagner</a>, VP and CISO at <a href="https://www.linkedin.com/company/sapns2/">SAP National Security Services</a></p>
<p> </p>
<p>In this session you will find: </p>
<p>1️⃣ What works and doesn’t work in getting a security executive’s attention? </p>
<p>2️⃣ Message trust, message fatigue, and what you can do about it. </p>
<p>3️⃣ Trusted information sources and how security executives use them. </p>
<p>4️⃣ Positioning and messaging that is meaningful to decision-makers. </p>
<p>5️⃣ The security executive’s purchasing behavior and why skepticism is the driving force. </p>
<p> </p>
<p>The speakers will talk more in-depth about the day in the life of a CISO, and how you can balance innovation and platform suites when considering products/services. From how do you develop trust with your vendors or potential vendors, the boundaries around when to how to contact a vendor and what is the acceptable amount of time for a call back from a potential vendor. The panelists also dive into who are the evangelists that people listen to and how a company can create their own evangelists. </p>
<p> </p>
<p>By the end, the host opened the floor for audience questions:  </p>
<p> </p>
<p>How big is it a disadvantage to require an email/gate to download content? </p>
<p>Any advice you have for vendor websites?</p>
<p>How involved would you be in a customer advisory board or executive retreat?</p>
<p>Why do you not give survey data much merit (to Rick)? </p>
<p>Do you have a preference for virtual or live events?</p>
<p> </p>
<p>More on #CyberMarketingCon2023 <a href="https://www.cybermarketingconference.com/">here</a>, see you in Texas! 🤠</p>
<p>Be sure to watch a video version of this session <a href="https://www.youtube.com/watch?v=cjFJh5sO1_0&amp;list=PLLj8jwUeIYnrlOGR0Y0vkRvtoodd9zRjM&amp;index=11">here.</a></p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>3217</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/1c52a2c2-ddbb-3a32-b87b-3d4ca9e8d8de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5734338360.mp3?updated=1723027007" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Demand Gen Strategies: Insights from Sonrai Security’s Joseph Barringhaus</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/87/notes</link>
      <description>In this episode, Joseph Barringhaus, Director of Demand Generation at Sonrai Security, joins Maria and Gianna to discuss all things demand gen.

Sonrai Security is a cloud security startup that focuses on identity, access, and permission in the cloud. To begin, Joseph shares that he has been in the world of cybersecurity and cloud for some time. The ability to build things from the ground up is what he has loved most about working at startups. Then, he explains his current role as Director of Demand Gen at Sonrai. He is responsible for creating awareness for the company’s products first and foremost, while also making sure that awareness is brought into the pipeline. Thanks to Sonrai’s close relationship with their sales team, Joseph is able to work closely with the entire funnel all the way through the customer journey. His strategy focuses on content syndication and later-stage funnel indicators. He clarifies that he is not in favor of un-gating everything. On the flip side, when things do come out that promote the company, like an e-book, Sonrai will typically un-gate the content to encourage more people to read it. More often than not, Joseph is an advocate for un-gating the things that he and his team put lots of time and effort into.

Then, Joseph unpacks MQL and demand gen. Sharing his perspective on brand awareness, Joseph stresses the importance of finding your market audience and the appropriate balance for your specific company. There is real value in knowing where someone remembers you from, which of your marketing strategies did and didn’t work, and how many touches it took for a customer to recognize the brand. Before wrapping up, Joseph shares his best advice for making time in the week for product knowledge and learning. In addition to keeping a detailed calendar, Joseph maintains a close relationship with the sales team to hear about what the market is saying through the team. Finally, our guest and hosts engage in a fun guessing game to reveal what career Joseph would pursue outside of the cybersecurity marketing field.

 

Links:

Learn more about Joseph Barringhaus.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 18 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>Demand Gen Strategies: Insights from Sonrai Security’s Joseph Barringhaus</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>87</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Joseph Barringhaus, Director of Demand Generation at Sonrai Security, joins Maria and Gianna to discuss all things demand gen.
Sonrai Security is a cloud security startup that focuses on identity, access, and permission in the cloud....</itunes:subtitle>
      <itunes:summary>In this episode, Joseph Barringhaus, Director of Demand Generation at Sonrai Security, joins Maria and Gianna to discuss all things demand gen.

Sonrai Security is a cloud security startup that focuses on identity, access, and permission in the cloud. To begin, Joseph shares that he has been in the world of cybersecurity and cloud for some time. The ability to build things from the ground up is what he has loved most about working at startups. Then, he explains his current role as Director of Demand Gen at Sonrai. He is responsible for creating awareness for the company’s products first and foremost, while also making sure that awareness is brought into the pipeline. Thanks to Sonrai’s close relationship with their sales team, Joseph is able to work closely with the entire funnel all the way through the customer journey. His strategy focuses on content syndication and later-stage funnel indicators. He clarifies that he is not in favor of un-gating everything. On the flip side, when things do come out that promote the company, like an e-book, Sonrai will typically un-gate the content to encourage more people to read it. More often than not, Joseph is an advocate for un-gating the things that he and his team put lots of time and effort into.

Then, Joseph unpacks MQL and demand gen. Sharing his perspective on brand awareness, Joseph stresses the importance of finding your market audience and the appropriate balance for your specific company. There is real value in knowing where someone remembers you from, which of your marketing strategies did and didn’t work, and how many touches it took for a customer to recognize the brand. Before wrapping up, Joseph shares his best advice for making time in the week for product knowledge and learning. In addition to keeping a detailed calendar, Joseph maintains a close relationship with the sales team to hear about what the market is saying through the team. Finally, our guest and hosts engage in a fun guessing game to reveal what career Joseph would pursue outside of the cybersecurity marketing field.

 

Links:

Learn more about Joseph Barringhaus.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Joseph Barringhaus, Director of Demand Generation at Sonrai Security, joins Maria and Gianna to discuss all things demand gen.</p>
<p>Sonrai Security is a cloud security startup that focuses on identity, access, and permission in the cloud. To begin, Joseph shares that he has been in the world of cybersecurity and cloud for some time. The ability to build things from the ground up is what he has loved most about working at startups. Then, he explains his current role as Director of Demand Gen at Sonrai. He is responsible for creating awareness for the company’s products first and foremost, while also making sure that awareness is brought into the pipeline. Thanks to Sonrai’s close relationship with their sales team, Joseph is able to work closely with the entire funnel all the way through the customer journey. His strategy focuses on content syndication and later-stage funnel indicators. He clarifies that he is not in favor of un-gating everything. On the flip side, when things do come out that promote the company, like an e-book, Sonrai will typically un-gate the content to encourage more people to read it. More often than not, Joseph is an advocate for un-gating the things that he and his team put lots of time and effort into.</p>
<p>Then, Joseph unpacks MQL and demand gen. Sharing his perspective on brand awareness, Joseph stresses the importance of finding your market audience and the appropriate balance for your specific company. There is real value in knowing where someone remembers you from, which of your marketing strategies did and didn’t work, and how many touches it took for a customer to recognize the brand. Before wrapping up, Joseph shares his best advice for making time in the week for product knowledge and learning. In addition to keeping a detailed calendar, Joseph maintains a close relationship with the sales team to hear about what the market is saying through the team. Finally, our guest and hosts engage in a fun guessing game to reveal what career Joseph would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p>Learn more about <a href="https://www.linkedin.com/in/josephbarringhaus/">Joseph Barringhaus</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>1589</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/59a86064-0f82-390b-85ee-a133ee12f591]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4662947967.mp3?updated=1723026877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Healthy &amp; Profitable Vendor-Reseller Relationships - Replay from CyberMarketingCon 2022</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/86/notes</link>
      <description>The time for #CyberMarketingCon2023 is fast approaching and we hope to see you in Austin in December. So mark those calendars and get your tickets, the conference will be from December 10th through 13th. It's filled with education, the best speakers, hands-on workshops, networking, networking, AND MORE networking. 

Maria and Gianna cannot wait to see you. Enjoy this episode and be sure to get your ticket by clicking ➡️➡️➡️here!

In this session, the focus was on understanding the dynamics of channel partner relationships in the cybersecurity industry. The two speakers, Amanda McLaughlin, Director of Mid-Atlantic Marketing at GuidePoint Security (Former Marketing Manager for GuidePoint Security), and David Brown, Head of Global Alliance and Partner Marketing at ReversingLabs (Former Director, Global Partner Marketing at ZEROFOX) are on a mission to educate and dispel misconceptions about VAR (Value-Added Reseller) and vendor relationships while also providing valuable tips and tricks on how to establish and maintain healthy VAR and vendor relationships. 

 

Here are the key points covered:


Promoting a better understanding of VAR and vendor relationships. Also highlighting their significance in the context of the cybersecurity industry.

An in-depth explanation of what a VAR is: “entities that offer not only products but also their expertise and services in conjunction with solutions provided by solution providers.” The speakers used GuidePoint Security as an example as it is a cybersecurity VAR offering its services and expertise to clients.

Addressing Misunderstandings: Amanda and David acknowledged that VAR and reseller relationships can be misunderstood, which is something similar to the classic sales and marketing relationship. But they also highlight how important it is to clear misunderstandings to establish effective partnerships.

To close the session the speakers also went into what a successful vendor looks like to a VAR. The key metrics for success and some tips if you feel like your reseller relationship is not working? They also opened the floor for some questions!


 

More on #CyberMarketingCon2023 here, see you in Texas! 🤠

Be sure to watch a video version of this session here

Follow Amanda on LinkedIn.

Check out David on LinkedIn. 

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 11 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>Healthy &amp; Profitable Vendor-Reseller Relationships - Replay from CyberMarketingCon 2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>86</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>The time for #CyberMarketingCon2023 is fast approaching and we hope to see you in Austin in December. So mark those calendars and get your tickets, the conference will be from December 10th through 13th. It's filled with education, the best speakers,...</itunes:subtitle>
      <itunes:summary>The time for #CyberMarketingCon2023 is fast approaching and we hope to see you in Austin in December. So mark those calendars and get your tickets, the conference will be from December 10th through 13th. It's filled with education, the best speakers, hands-on workshops, networking, networking, AND MORE networking. 

Maria and Gianna cannot wait to see you. Enjoy this episode and be sure to get your ticket by clicking ➡️➡️➡️here!

In this session, the focus was on understanding the dynamics of channel partner relationships in the cybersecurity industry. The two speakers, Amanda McLaughlin, Director of Mid-Atlantic Marketing at GuidePoint Security (Former Marketing Manager for GuidePoint Security), and David Brown, Head of Global Alliance and Partner Marketing at ReversingLabs (Former Director, Global Partner Marketing at ZEROFOX) are on a mission to educate and dispel misconceptions about VAR (Value-Added Reseller) and vendor relationships while also providing valuable tips and tricks on how to establish and maintain healthy VAR and vendor relationships. 

 

Here are the key points covered:


Promoting a better understanding of VAR and vendor relationships. Also highlighting their significance in the context of the cybersecurity industry.

An in-depth explanation of what a VAR is: “entities that offer not only products but also their expertise and services in conjunction with solutions provided by solution providers.” The speakers used GuidePoint Security as an example as it is a cybersecurity VAR offering its services and expertise to clients.

Addressing Misunderstandings: Amanda and David acknowledged that VAR and reseller relationships can be misunderstood, which is something similar to the classic sales and marketing relationship. But they also highlight how important it is to clear misunderstandings to establish effective partnerships.

To close the session the speakers also went into what a successful vendor looks like to a VAR. The key metrics for success and some tips if you feel like your reseller relationship is not working? They also opened the floor for some questions!


 

More on #CyberMarketingCon2023 here, see you in Texas! 🤠

Be sure to watch a video version of this session here

Follow Amanda on LinkedIn.

Check out David on LinkedIn. 

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The time for #<a href="https://www.cybermarketingconference.com/">CyberMarketingCon2023</a> is fast approaching and we hope to see you in Austin in December. So mark those calendars and get your tickets, the conference will be from December 10th through 13th. It's filled with education, the best speakers, hands-on workshops, networking, networking, AND MORE networking. </p>
<p>Maria and Gianna cannot wait to see you. Enjoy this episode and be sure to get your ticket by clicking ➡️➡️➡️<a href="https://www.cybermarketingconference.com/">here</a>!</p>
<p>In this session, the focus was on understanding the dynamics of channel partner relationships in the cybersecurity industry. The two speakers, Amanda McLaughlin, Director of Mid-Atlantic Marketing at GuidePoint Security (Former Marketing Manager for GuidePoint Security), and David Brown, Head of Global Alliance and Partner Marketing at ReversingLabs (Former Director, Global Partner Marketing at ZEROFOX) are on a mission to educate and dispel misconceptions about VAR (Value-Added Reseller) and vendor relationships while also providing valuable tips and tricks on how to establish and maintain healthy VAR and vendor relationships. </p>
<p> </p>
<p>Here are the key points covered:</p>
<ul>
<li>Promoting a better understanding of VAR and vendor relationships. Also highlighting their significance in the context of the cybersecurity industry.</li>
<li>An in-depth explanation of what a VAR is:<em> “entities that offer not only products but also their expertise and services in conjunction with solutions provided by solution providers.” </em>The speakers used GuidePoint Security as an example as it is a cybersecurity VAR offering its services and expertise to clients.</li>
<li>Addressing Misunderstandings: Amanda and David acknowledged that VAR and reseller relationships can be misunderstood, which is something similar to the classic sales and marketing relationship. But they also highlight how important it is to clear misunderstandings to establish effective partnerships.</li>
<li>To close the session the speakers also went into what a successful vendor looks like to a VAR. The key metrics for success and some tips if you feel like your reseller relationship is not working? They also opened the floor for some questions!</li>
</ul>
<p> </p>
<p>More on #CyberMarketingCon2023 <a href="https://www.cybermarketingconference.com/">here</a>, see you in Texas! 🤠</p>
<p>Be sure to watch a video version of this session <a href="https://www.youtube.com/watch?v=koAH_vxJO_s&amp;list=PLLj8jwUeIYnrlOGR0Y0vkRvtoodd9zRjM&amp;index=4">here</a></p>
<p>Follow Amanda on<a href="https://www.linkedin.com/in/amanda-mclaughlin-6744aa4b/"> LinkedIn</a>.</p>
<p>Check out David on <a href="https://www.linkedin.com/in/davidclbrown/">LinkedIn. </a></p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2709</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/e0a12e17-5ad2-3b55-a426-1e0e1e36c7ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6488548354.mp3?updated=1723027084" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Making Lead Gen Work with CMO Geordie Carswell</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/85/notes</link>
      <description>In this episode, Geordie Carswell, CMO at ActualTech Media joins Maria and Gianna to talk about the stuff no marketer wants to talk about right now: lead generation and content syndication! Can lead generation be a successful part of a demand generation strategy? Is there a right way to use content syndication for a cybersecurity audience? What are the strategies - and company qualities - needed to make these successful? Listen to find out!

The guest and hosts use their demand gen backgrounds to jam on webinars, content, and other forms of creating engagement with cybersecurity audiences: 


The relevance of different webinar topics 

Considering whether to go broad or niche based on specific goals. 

The importance of personalization and alignment in lead-generation efforts 


Plus…learn a little something about grocery store marketing 🤭

Listen for shop talk and laughs on today’s episode, and make sure to check out ActualTech Media! 

About ActualTech Media:

Lead generation in cybersecurity can be costly and finding an affordable webinar provider who can cover all your needs like one-of-a-kind post-event reporting, recordings, and analytics can be difficult. This is why our friends, one of our sponsors for #CyberMarketingCon2023, ActualTech Media might just be a perfect fit for your webinar needs! ActualTech has low CPL costs that will help you generate QUALITY cybersecurity buyer leads and sales opportunity pipeline😁! 

Links:

Learn more about ActualTech Media here: https://www.actualtechmedia.com/cms/ 

Follow Geordie on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Hope to see you at CyberMarketingCon this year! </description>
      <pubDate>Wed, 04 Oct 2023 11:39:38 -0000</pubDate>
      <itunes:title>Making Lead Gen Work with CMO Geordie Carswell</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>85</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Geordie Carswell, CMO at ActualTech Media joins Maria and Gianna to talk about the stuff no marketer wants to talk about right now: lead generation and content syndication! Can lead generation be a successful part of a demand generat...</itunes:subtitle>
      <itunes:summary>In this episode, Geordie Carswell, CMO at ActualTech Media joins Maria and Gianna to talk about the stuff no marketer wants to talk about right now: lead generation and content syndication! Can lead generation be a successful part of a demand generation strategy? Is there a right way to use content syndication for a cybersecurity audience? What are the strategies - and company qualities - needed to make these successful? Listen to find out!

The guest and hosts use their demand gen backgrounds to jam on webinars, content, and other forms of creating engagement with cybersecurity audiences: 


The relevance of different webinar topics 

Considering whether to go broad or niche based on specific goals. 

The importance of personalization and alignment in lead-generation efforts 


Plus…learn a little something about grocery store marketing 🤭

Listen for shop talk and laughs on today’s episode, and make sure to check out ActualTech Media! 

About ActualTech Media:

Lead generation in cybersecurity can be costly and finding an affordable webinar provider who can cover all your needs like one-of-a-kind post-event reporting, recordings, and analytics can be difficult. This is why our friends, one of our sponsors for #CyberMarketingCon2023, ActualTech Media might just be a perfect fit for your webinar needs! ActualTech has low CPL costs that will help you generate QUALITY cybersecurity buyer leads and sales opportunity pipeline😁! 

Links:

Learn more about ActualTech Media here: https://www.actualtechmedia.com/cms/ 

Follow Geordie on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Hope to see you at CyberMarketingCon this year! </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Geordie Carswell, CMO at <a href="https://www.actualtechmedia.com/cms/">ActualTech Media</a> joins Maria and Gianna to talk about the stuff no marketer wants to talk about right now: lead generation and content syndication! Can lead generation be a successful part of a demand generation strategy? Is there a right way to use content syndication for a cybersecurity audience? What are the strategies - and company qualities - needed to make these successful? Listen to find out!</p>
<p>The guest and hosts use their demand gen backgrounds to jam on webinars, content, and other forms of creating engagement with cybersecurity audiences: </p>
<ul>
<li>The relevance of different webinar topics </li>
<li>Considering whether to go broad or niche based on specific goals. </li>
<li>The importance of personalization and alignment in lead-generation efforts </li>
</ul>
<p>Plus…learn a little something about grocery store marketing 🤭</p>
<p>Listen for shop talk and laughs on today’s episode, and make sure to check out ActualTech Media! </p>
<p>About ActualTech Media:</p>
<p>Lead generation in cybersecurity can be costly and finding an affordable webinar provider who can cover all your needs like one-of-a-kind post-event reporting, recordings, and analytics can be difficult. This is why our friends, one of our sponsors for #CyberMarketingCon2023, ActualTech Media might just be a perfect fit for your webinar needs! ActualTech has low CPL costs that will help you generate QUALITY cybersecurity buyer leads and sales opportunity pipeline😁! </p>
<p>Links:</p>
<p>Learn more about ActualTech Media here: <a href="https://www.actualtechmedia.com/cms/">https://www.actualtechmedia.com/cms/</a> </p>
<p>Follow Geordie on <a href="https://www.linkedin.com/in/geordie-carswell/">LinkedIn</a>.</p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
<p>Hope to see you at <a href="https://www.cybermarketingconference.com/">CyberMarketingCon</a> this year! </p>
]]>
      </content:encoded>
      <itunes:duration>3370</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/17e598bd-7e21-3586-b252-8a2c2cc5df7a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6563589832.mp3?updated=1723027085" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring Underrepresented Cybersecurity Markets with Jake Milstein</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/84/notes</link>
      <description>In this episode, Jake Milstein, CRO, and CMO at Critical Insight, joins Maria and Gianna to discuss his unique perspective on serving underrepresented cybersecurity markets, the importance of establishing trust and personal connection with clients, and more.

To begin, Jake shares what makes his job different now that he has the additional role of CRO. One of his favorite parts about his unique perspective is that he can see operations through every step of the way, from the funnel and down the line to customer experience. His responsibilities include marketing, sales, and customer success. He finds that the best CMOs he knows are those who get involved in customer conversations and have a clear understanding of their product market fit. Jake spent 20 years in the journalism field of TV news broadcasting. He believes that where journalism and cybersecurity overlap is in their efforts to give people the facts to help them make educated decisions.

Next, Jake shares how Critical Insight came to focus specifically on the underserved cyber markets thanks to the experience of the company’s co-founders. They provide consulting services to help clients prepare for an attack, soft services to help detect an attack quickly, and the tools to respond decisively when an attack does happen. Hospitals in rural areas, for example, want a provider whom they can trust and have a personal relationship with. A major part of Critical Insight’s marketing strategy is showing up to conferences and events in these rural areas and following up with the people they meet there.

Then, Jake sheds light on how the company was able to scale at the rate it did by establishing personal connections and authenticity with the people it serves. He has found that showing up automatically makes you memorable by default. Any time a major national event occurs, Critical Insight hosts an urgent panel webinar in which they present the facts and then have a panel of experts discuss the topic. Before wrapping up, Jake and our hosts discuss the challenge of incorporating humor into cybersecurity. Finally, they engage in a fun guessing game to reveal what career Jake would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Jake on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 27 Sep 2023 09:00:00 -0000</pubDate>
      <itunes:title>Exploring Underrepresented Cybersecurity Markets with Jake Milstein</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>84</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Jake Milstein, CRO, and CMO at Critical Insight, joins Maria and Gianna to discuss his unique perspective on serving underrepresented cybersecurity markets, the importance of establishing trust and personal connection with clients, a...</itunes:subtitle>
      <itunes:summary>In this episode, Jake Milstein, CRO, and CMO at Critical Insight, joins Maria and Gianna to discuss his unique perspective on serving underrepresented cybersecurity markets, the importance of establishing trust and personal connection with clients, and more.

To begin, Jake shares what makes his job different now that he has the additional role of CRO. One of his favorite parts about his unique perspective is that he can see operations through every step of the way, from the funnel and down the line to customer experience. His responsibilities include marketing, sales, and customer success. He finds that the best CMOs he knows are those who get involved in customer conversations and have a clear understanding of their product market fit. Jake spent 20 years in the journalism field of TV news broadcasting. He believes that where journalism and cybersecurity overlap is in their efforts to give people the facts to help them make educated decisions.

Next, Jake shares how Critical Insight came to focus specifically on the underserved cyber markets thanks to the experience of the company’s co-founders. They provide consulting services to help clients prepare for an attack, soft services to help detect an attack quickly, and the tools to respond decisively when an attack does happen. Hospitals in rural areas, for example, want a provider whom they can trust and have a personal relationship with. A major part of Critical Insight’s marketing strategy is showing up to conferences and events in these rural areas and following up with the people they meet there.

Then, Jake sheds light on how the company was able to scale at the rate it did by establishing personal connections and authenticity with the people it serves. He has found that showing up automatically makes you memorable by default. Any time a major national event occurs, Critical Insight hosts an urgent panel webinar in which they present the facts and then have a panel of experts discuss the topic. Before wrapping up, Jake and our hosts discuss the challenge of incorporating humor into cybersecurity. Finally, they engage in a fun guessing game to reveal what career Jake would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Jake on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Jake Milstein, CRO, and CMO at Critical Insight, joins Maria and Gianna to discuss his unique perspective on serving underrepresented cybersecurity markets, the importance of establishing trust and personal connection with clients, and more.</p>
<p>To begin, Jake shares what makes his job different now that he has the additional role of CRO. One of his favorite parts about his unique perspective is that he can see operations through every step of the way, from the funnel and down the line to customer experience. His responsibilities include marketing, sales, and customer success. He finds that the best CMOs he knows are those who get involved in customer conversations and have a clear understanding of their product market fit. Jake spent 20 years in the journalism field of TV news broadcasting. He believes that where journalism and cybersecurity overlap is in their efforts to give people the facts to help them make educated decisions.</p>
<p>Next, Jake shares how Critical Insight came to focus specifically on the underserved cyber markets thanks to the experience of the company’s co-founders. They provide consulting services to help clients prepare for an attack, soft services to help detect an attack quickly, and the tools to respond decisively when an attack does happen. Hospitals in rural areas, for example, want a provider whom they can trust and have a personal relationship with. A major part of Critical Insight’s marketing strategy is showing up to conferences and events in these rural areas and following up with the people they meet there.</p>
<p>Then, Jake sheds light on how the company was able to scale at the rate it did by establishing personal connections and authenticity with the people it serves. He has found that showing up automatically makes you memorable by default. Any time a major national event occurs, Critical Insight hosts an urgent panel webinar in which they present the facts and then have a panel of experts discuss the topic. Before wrapping up, Jake and our hosts discuss the challenge of incorporating humor into cybersecurity. Finally, they engage in a fun guessing game to reveal what career Jake would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p>Follow Jake on <a href="https://www.linkedin.com/in/jakemilstein/">LinkedIn</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2512</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/312910f0-a11f-3a5d-8711-beb9a6fb2aa6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5521671373.mp3?updated=1723027004" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Insights into Cybersecurity: From the Economy, CMOs to Brand Awareness with Mandeep Khera</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/83/notes</link>
      <description>In this episode, Mandeep Khera, CMO of SecureAuth, joins Maria and Gianna to discuss the market and economy, changing responsibilities for CMOs, and the role of brand awareness from his perspective.

 

To begin, Mandeep shares the story of his role as CMO. His career began in finance before shifting to marketing and then cybersecurity. He recognized that the cybersecurity industry was here to stay and decided to devote his career to the field. His security work in the areas of email, application, network, and cloud led him to the authentication space where he is today. He highlights that we are going through a period of headwinds in the industry, but that it isn’t all doom and gloom. It is a matter of being patient, sticking with it, and continuing to do the right things. He predicts that in 6-9 months, the economy will start bouncing back. With that, he shares the pivots that he believes cybersecurity professionals should be taking to accommodate these budget changes while keeping their team focused and happy. This means eliminating things that don’t matter and increasing focus on the most critical areas.

 

Next, he offers his perspective on brand awareness, which is best done by thought leadership. He believes that brand awareness should be tied into different campaigns to be the most effective. On the other hand, the role of the CMO has become more challenging than ever. Most important, Mandeep reveals, is making sure you as the CMO are in tune with your CEO, CRO, CCO, and CFO. Another important mindset for CMOs right now is to be more quality and quantity-driven, focusing on ROI and thinking and acting out of the box to stand out. One of his main focuses right now is how to improve the website conversion rate. On the subject of edgy campaigns, Mandeep shares a few of his favorite campaigns he has worked on in his career. As a CMO, one of your responsibilities is to encourage your team to be bold in their risk-taking. All ideas are good ideas until ideas start to be filtered, and everyone can come up with a clever idea. Finally, our guest and hosts engage in a fun guessing game to reveal what career Mandeep would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Mandeep on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 20 Sep 2023 09:00:00 -0000</pubDate>
      <itunes:title>Insights into Cybersecurity: From the Economy, CMOs to Brand Awareness with Mandeep Khera</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>83</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Mandeep Khera, CMO of SecureAuth, joins Maria and Gianna to discuss the market and economy, changing responsibilities for CMOs, and the role of brand awareness from his perspective.
 
To begin, Mandeep shares the story of his role as...</itunes:subtitle>
      <itunes:summary>In this episode, Mandeep Khera, CMO of SecureAuth, joins Maria and Gianna to discuss the market and economy, changing responsibilities for CMOs, and the role of brand awareness from his perspective.

 

To begin, Mandeep shares the story of his role as CMO. His career began in finance before shifting to marketing and then cybersecurity. He recognized that the cybersecurity industry was here to stay and decided to devote his career to the field. His security work in the areas of email, application, network, and cloud led him to the authentication space where he is today. He highlights that we are going through a period of headwinds in the industry, but that it isn’t all doom and gloom. It is a matter of being patient, sticking with it, and continuing to do the right things. He predicts that in 6-9 months, the economy will start bouncing back. With that, he shares the pivots that he believes cybersecurity professionals should be taking to accommodate these budget changes while keeping their team focused and happy. This means eliminating things that don’t matter and increasing focus on the most critical areas.

 

Next, he offers his perspective on brand awareness, which is best done by thought leadership. He believes that brand awareness should be tied into different campaigns to be the most effective. On the other hand, the role of the CMO has become more challenging than ever. Most important, Mandeep reveals, is making sure you as the CMO are in tune with your CEO, CRO, CCO, and CFO. Another important mindset for CMOs right now is to be more quality and quantity-driven, focusing on ROI and thinking and acting out of the box to stand out. One of his main focuses right now is how to improve the website conversion rate. On the subject of edgy campaigns, Mandeep shares a few of his favorite campaigns he has worked on in his career. As a CMO, one of your responsibilities is to encourage your team to be bold in their risk-taking. All ideas are good ideas until ideas start to be filtered, and everyone can come up with a clever idea. Finally, our guest and hosts engage in a fun guessing game to reveal what career Mandeep would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Mandeep on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Mandeep Khera, CMO of SecureAuth, joins Maria and Gianna to discuss the market and economy, changing responsibilities for CMOs, and the role of brand awareness from his perspective.</p>
<p> </p>
<p>To begin, Mandeep shares the story of his role as CMO. His career began in finance before shifting to marketing and then cybersecurity. He recognized that the cybersecurity industry was here to stay and decided to devote his career to the field. His security work in the areas of email, application, network, and cloud led him to the authentication space where he is today. He highlights that we are going through a period of headwinds in the industry, but that it isn’t all doom and gloom. It is a matter of being patient, sticking with it, and continuing to do the right things. He predicts that in 6-9 months, the economy will start bouncing back. With that, he shares the pivots that he believes cybersecurity professionals should be taking to accommodate these budget changes while keeping their team focused and happy. This means eliminating things that don’t matter and increasing focus on the most critical areas.</p>
<p> </p>
<p>Next, he offers his perspective on brand awareness, which is best done by thought leadership. He believes that brand awareness should be tied into different campaigns to be the most effective. On the other hand, the role of the CMO has become more challenging than ever. Most important, Mandeep reveals, is making sure you as the CMO are in tune with your CEO, CRO, CCO, and CFO. Another important mindset for CMOs right now is to be more quality and quantity-driven, focusing on ROI and thinking and acting out of the box to stand out. One of his main focuses right now is how to improve the website conversion rate. On the subject of edgy campaigns, Mandeep shares a few of his favorite campaigns he has worked on in his career. As a CMO, one of your responsibilities is to encourage your team to be bold in their risk-taking. All ideas are good ideas until ideas start to be filtered, and everyone can come up with a clever idea. Finally, our guest and hosts engage in a fun guessing game to reveal what career Mandeep would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Mandeep on <a href="https://www.linkedin.com/in/mandeepkhera1">LinkedIn</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>1745</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/59fe8a37-24a4-3998-8992-385ccaad44d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2479225247.mp3?updated=1723026959" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unveiling the Magic in Cybersecurity Marketing with Terra Cooke</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/82/notes</link>
      <description>In this episode, Terra Cooke, Cybersecurity Governance and Risk Compliance Manager at Boom Supersonic. She is also a huge advocate for black women in tech.

To begin, Terra shares that she has been in the cybersecurity field for 15 years. She shares how she got interested in the cybersecurity field as a young person in the dial-up days. From a very early age, she knew she wanted to be in tech. Her background is in network security and she earned a very early cybersecurity degree at college. Her first job out of college was as a Information Systems Security Engineer at the NSA. In 2014, she was offered an auditing position elsewhere, where she stayed for several years. One of her favorite things about auditing is seeing people experience their own “aha moments”. Then, Tara gives listeners an idea of what a typical day for her looks like. As a GRC, she is often wearing many different hats throughout the day.

Then, Terra shares that she refers to herself as a “magical girl” because she is always able to execute the tasks she is faced with. Within the boundaries around her, she does whatever it takes to execute a vision. We all have our own strengths and weaknesses and Terra’s happens to be executing. She loves to collect data to assist her in this execution. She is also inspired by the Black Girl Magic movement several years ago. Then, she normalized the idea of setting professional boundaries. One of the most important things for GRC professionals to avoid while evaluating vendors is to buy tools simply for the sake of buying them, and ending up with poor implementations. Next, she shares her own process for looking at new vendors. Before wrapping up, she identifies the needs within the cybersecurity industry. Simply put, we should all be treating each other as humans with mutual respect when speaking with vendors. Finally, our guest and hosts engage in a fun guessing game to reveal what career Terra would pursue outside of the cybersecurity marketing field.  

 

Links:

 

Follow Terra on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 13 Sep 2023 09:00:00 -0000</pubDate>
      <itunes:title>Unveiling the Magic in Cybersecurity Marketing with Terra Cooke</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>82</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Terra Cooke, Cybersecurity Governance and Risk Compliance Manager at Boom Supersonic. She is also a huge advocate for black women in tech.
To begin, Terra shares that she has been in the cybersecurity field for 15 years. She shares h...</itunes:subtitle>
      <itunes:summary>In this episode, Terra Cooke, Cybersecurity Governance and Risk Compliance Manager at Boom Supersonic. She is also a huge advocate for black women in tech.

To begin, Terra shares that she has been in the cybersecurity field for 15 years. She shares how she got interested in the cybersecurity field as a young person in the dial-up days. From a very early age, she knew she wanted to be in tech. Her background is in network security and she earned a very early cybersecurity degree at college. Her first job out of college was as a Information Systems Security Engineer at the NSA. In 2014, she was offered an auditing position elsewhere, where she stayed for several years. One of her favorite things about auditing is seeing people experience their own “aha moments”. Then, Tara gives listeners an idea of what a typical day for her looks like. As a GRC, she is often wearing many different hats throughout the day.

Then, Terra shares that she refers to herself as a “magical girl” because she is always able to execute the tasks she is faced with. Within the boundaries around her, she does whatever it takes to execute a vision. We all have our own strengths and weaknesses and Terra’s happens to be executing. She loves to collect data to assist her in this execution. She is also inspired by the Black Girl Magic movement several years ago. Then, she normalized the idea of setting professional boundaries. One of the most important things for GRC professionals to avoid while evaluating vendors is to buy tools simply for the sake of buying them, and ending up with poor implementations. Next, she shares her own process for looking at new vendors. Before wrapping up, she identifies the needs within the cybersecurity industry. Simply put, we should all be treating each other as humans with mutual respect when speaking with vendors. Finally, our guest and hosts engage in a fun guessing game to reveal what career Terra would pursue outside of the cybersecurity marketing field.  

 

Links:

 

Follow Terra on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Terra Cooke, Cybersecurity Governance and Risk Compliance Manager at Boom Supersonic. She is also a huge advocate for black women in tech.</p>
<p>To begin, Terra shares that she has been in the cybersecurity field for 15 years. She shares how she got interested in the cybersecurity field as a young person in the dial-up days. From a very early age, she knew she wanted to be in tech. Her background is in network security and she earned a very early cybersecurity degree at college. Her first job out of college was as a Information Systems Security Engineer at the NSA. In 2014, she was offered an auditing position elsewhere, where she stayed for several years. One of her favorite things about auditing is seeing people experience their own “aha moments”. Then, Tara gives listeners an idea of what a typical day for her looks like. As a GRC, she is often wearing many different hats throughout the day.</p>
<p>Then, Terra shares that she refers to herself as a “magical girl” because she is always able to execute the tasks she is faced with. Within the boundaries around her, she does whatever it takes to execute a vision. We all have our own strengths and weaknesses and Terra’s happens to be executing. She loves to collect data to assist her in this execution. She is also inspired by the Black Girl Magic movement several years ago. Then, she normalized the idea of setting professional boundaries. One of the most important things for GRC professionals to avoid while evaluating vendors is to buy tools simply for the sake of buying them, and ending up with poor implementations. Next, she shares her own process for looking at new vendors. Before wrapping up, she identifies the needs within the cybersecurity industry. Simply put, we should all be treating each other as humans with mutual respect when speaking with vendors. Finally, our guest and hosts engage in a fun guessing game to reveal what career Terra would pursue outside of the cybersecurity marketing field.  </p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Terra on <a href="https://www.linkedin.com/in/terra-cooke-24552918/">LinkedIn</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2590</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/fb849314-01c5-3870-aa9c-808345e3225e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8045242188.mp3?updated=1723027015" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ChatGPT vs storytelling with David Ebner</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/81/notes</link>
      <description>In this episode, David Ebner, Founder of Content Workshop, joins Maria and Gianna to discuss the future of writing.

 

To begin, David offers his own thoughts on ChatGPT. Like any new form of technology, it is understandable that the initial launch of ChatGPT was met with hesitation. Simply put, ChatGPT is a language processing tool that works on probability. Davis sees it more as a muse than a replacement for genuine writing. Content Workshop, he explains, is a storytelling agency helping brands tell their stories to drive new business and leverage their goals. It has not been possible for them to leverage AI to help with their writing simply because AI is not able to convey empathy. Next, hear what storytelling means to David. What really makes storytelling a work of art is its ability to inspire connection and bring an audience to a place they were not at prior to reading the content. Every piece of content should entertain, elevate, and engage their audience in this exact order.

 

Shifting gears, David explains how engaging people makes for a loyal audience, and loyal audiences will think about your brand and look towards you for answers in times of need. It is so crucial to make content entertaining so that it doesn’t feel like a chore for audiences to read. Content workshop takes a unique approach in which they aim to embody the life of the individual, rather than the brand. What problem led them to the brand initially? How is the person's life better now that they have discovered the brand? A brand is not a color or logo, but rather what lives in the hearts and minds of the viewer. From a tone point of view, it’s important to have a brand identity and voice first. Finally, our guest and hosts engage in a fun guessing game to reveal what career David would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow David on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 06 Sep 2023 09:00:00 -0000</pubDate>
      <itunes:title>ChatGPT vs storytelling with David Ebner</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>81</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, David Ebner, Founder of Content Workshop, joins Maria and Gianna to discuss the future of writing.
 
To begin, David offers his own thoughts on ChatGPT. Like any new form of technology, it is understandable that the initial launch of...</itunes:subtitle>
      <itunes:summary>In this episode, David Ebner, Founder of Content Workshop, joins Maria and Gianna to discuss the future of writing.

 

To begin, David offers his own thoughts on ChatGPT. Like any new form of technology, it is understandable that the initial launch of ChatGPT was met with hesitation. Simply put, ChatGPT is a language processing tool that works on probability. Davis sees it more as a muse than a replacement for genuine writing. Content Workshop, he explains, is a storytelling agency helping brands tell their stories to drive new business and leverage their goals. It has not been possible for them to leverage AI to help with their writing simply because AI is not able to convey empathy. Next, hear what storytelling means to David. What really makes storytelling a work of art is its ability to inspire connection and bring an audience to a place they were not at prior to reading the content. Every piece of content should entertain, elevate, and engage their audience in this exact order.

 

Shifting gears, David explains how engaging people makes for a loyal audience, and loyal audiences will think about your brand and look towards you for answers in times of need. It is so crucial to make content entertaining so that it doesn’t feel like a chore for audiences to read. Content workshop takes a unique approach in which they aim to embody the life of the individual, rather than the brand. What problem led them to the brand initially? How is the person's life better now that they have discovered the brand? A brand is not a color or logo, but rather what lives in the hearts and minds of the viewer. From a tone point of view, it’s important to have a brand identity and voice first. Finally, our guest and hosts engage in a fun guessing game to reveal what career David would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow David on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, David Ebner, Founder of Content Workshop, joins Maria and Gianna to discuss the future of writing.</p>
<p> </p>
<p>To begin, David offers his own thoughts on ChatGPT. Like any new form of technology, it is understandable that the initial launch of ChatGPT was met with hesitation. Simply put, ChatGPT is a language processing tool that works on probability. Davis sees it more as a muse than a replacement for genuine writing. Content Workshop, he explains, is a storytelling agency helping brands tell their stories to drive new business and leverage their goals. It has not been possible for them to leverage AI to help with their writing simply because AI is not able to convey empathy. Next, hear what storytelling means to David. What really makes storytelling a work of art is its ability to inspire connection and bring an audience to a place they were not at prior to reading the content. Every piece of content should entertain, elevate, and engage their audience in this exact order.</p>
<p> </p>
<p>Shifting gears, David explains how engaging people makes for a loyal audience, and loyal audiences will think about your brand and look towards you for answers in times of need. It is so crucial to make content entertaining so that it doesn’t feel like a chore for audiences to read. Content workshop takes a unique approach in which they aim to embody the life of the individual, rather than the brand. What problem led them to the brand initially? How is the person's life better now that they have discovered the brand? A brand is not a color or logo, but rather what lives in the hearts and minds of the viewer. From a tone point of view, it’s important to have a brand identity and voice first. Finally, our guest and hosts engage in a fun guessing game to reveal what career David would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow David on <a href="https://www.linkedin.com/in/davidjebner?original_referer=https%3A%2F%2Fwww.google.com%2F">LinkedIn</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2484</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/5fba241e-9d57-3c68-a745-3e611dcfdee7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6367995170.mp3?updated=1723027072" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Conversion Rates at Checkpoint with Head of Digital Strategy and Operations at CheckPoint Technologies , Sean Mattson</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/80/notes</link>
      <description>In this episode, Sean Mattson, Head of Digital Strategy and Operations at Checkpoint Technologies, joins Maria and Gianna to discuss conversion rates and personalization.

 

To begin, Sean discusses his role at Checkpoint as the management of all digital channels including websites, outbound, marketing automation, digital intelligence, globalization, and SEOs. He has been doing marketing for 20+ years and has 15 people on his current team. Since the team is so small, they use tools like Marketo to help automate tasks. Sean built everything from the ground up in this company and Checkpoint was known as the firewall creator. They needed to work on SEOs and after two years of brand awareness, the traffic on their website went up by 700%. They cross linked all the pages on their own website. They also talk about how the quality over the quantity matters, and how to create leads that can be marketed. Checkpoint does progressive profiling and uses third party data services to do backend form enrichment. This created a 60% lift for Marketo landing page, but Sean asked, “why wait till I’m walking away before you show me any content?”

 

Then, Sean discusses how Checkpoint uses Hushly for self-nurturing landing pages that has been a game-changer for the company. Hushly sets a preview of the content as the landing page itself, so they are presented with content and value first. Then, the audience can decide whether you like it first. It is in a single field form, and you can set as many pages as you want. There is also a column on the side with alternate content if you don’t like the first page. Hushly provides the service, but Checkpoint also uses clear bit forms and zoom info forms. This is enriched in real time and there is a 25% conversion rate across the whole library. In addition, Checkpoint Technologies is rolling out resource hubs for geo sites in 11 languages and this will expand their reach. They are also using Smartling AI. Translating a website is easy, but the whole cycle is difficult to keep consistent and managed. Hushly will help translate all the PDFs and assets as well. There is a fine line between personalization and stock authorization; you need to personalize it without making it extremely obvious. Finally, our guest and hosts engage in a fun guessing game to reveal what career Sean would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Sean on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 30 Aug 2023 09:00:00 -0000</pubDate>
      <itunes:title>Conversion Rates at Checkpoint with Head of Digital Strategy and Operations at CheckPoint Technologies , Sean Mattson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>80</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Sean Mattson, Head of Digital Strategy and Operations at Checkpoint Technologies, joins Maria and Gianna to discuss conversion rates and personalization.
 
To begin, Sean discusses his role at Checkpoint as the management of all digi...</itunes:subtitle>
      <itunes:summary>In this episode, Sean Mattson, Head of Digital Strategy and Operations at Checkpoint Technologies, joins Maria and Gianna to discuss conversion rates and personalization.

 

To begin, Sean discusses his role at Checkpoint as the management of all digital channels including websites, outbound, marketing automation, digital intelligence, globalization, and SEOs. He has been doing marketing for 20+ years and has 15 people on his current team. Since the team is so small, they use tools like Marketo to help automate tasks. Sean built everything from the ground up in this company and Checkpoint was known as the firewall creator. They needed to work on SEOs and after two years of brand awareness, the traffic on their website went up by 700%. They cross linked all the pages on their own website. They also talk about how the quality over the quantity matters, and how to create leads that can be marketed. Checkpoint does progressive profiling and uses third party data services to do backend form enrichment. This created a 60% lift for Marketo landing page, but Sean asked, “why wait till I’m walking away before you show me any content?”

 

Then, Sean discusses how Checkpoint uses Hushly for self-nurturing landing pages that has been a game-changer for the company. Hushly sets a preview of the content as the landing page itself, so they are presented with content and value first. Then, the audience can decide whether you like it first. It is in a single field form, and you can set as many pages as you want. There is also a column on the side with alternate content if you don’t like the first page. Hushly provides the service, but Checkpoint also uses clear bit forms and zoom info forms. This is enriched in real time and there is a 25% conversion rate across the whole library. In addition, Checkpoint Technologies is rolling out resource hubs for geo sites in 11 languages and this will expand their reach. They are also using Smartling AI. Translating a website is easy, but the whole cycle is difficult to keep consistent and managed. Hushly will help translate all the PDFs and assets as well. There is a fine line between personalization and stock authorization; you need to personalize it without making it extremely obvious. Finally, our guest and hosts engage in a fun guessing game to reveal what career Sean would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Sean on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Sean Mattson, Head of Digital Strategy and Operations at Checkpoint Technologies, joins Maria and Gianna to discuss conversion rates and personalization.</p>
<p> </p>
<p>To begin, Sean discusses his role at Checkpoint as the management of all digital channels including websites, outbound, marketing automation, digital intelligence, globalization, and SEOs. He has been doing marketing for 20+ years and has 15 people on his current team. Since the team is so small, they use tools like Marketo to help automate tasks. Sean built everything from the ground up in this company and Checkpoint was known as the firewall creator. They needed to work on SEOs and after two years of brand awareness, the traffic on their website went up by 700%. They cross linked all the pages on their own website. They also talk about how the quality over the quantity matters, and how to create leads that can be marketed. Checkpoint does progressive profiling and uses third party data services to do backend form enrichment. This created a 60% lift for Marketo landing page, but Sean asked, “why wait till I’m walking away before you show me any content?”</p>
<p> </p>
<p>Then, Sean discusses how Checkpoint uses Hushly for self-nurturing landing pages that has been a game-changer for the company. Hushly sets a preview of the content as the landing page itself, so they are presented with content and value first. Then, the audience can decide whether you like it first. It is in a single field form, and you can set as many pages as you want. There is also a column on the side with alternate content if you don’t like the first page. Hushly provides the service, but Checkpoint also uses clear bit forms and zoom info forms. This is enriched in real time and there is a 25% conversion rate across the whole library. In addition, Checkpoint Technologies is rolling out resource hubs for geo sites in 11 languages and this will expand their reach. They are also using Smartling AI. Translating a website is easy, but the whole cycle is difficult to keep consistent and managed. Hushly will help translate all the PDFs and assets as well. There is a fine line between personalization and stock authorization; you need to personalize it without making it extremely obvious. Finally, our guest and hosts engage in a fun guessing game to reveal what career Sean would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p>Follow Sean on <a href="https://www.linkedin.com/in/seanmattson/">LinkedIn</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>3052</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/441b01c6-7149-36c8-9026-f52c3d1e32df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4293076480.mp3?updated=1723026950" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Have a Successful Funny Cybersecurity Campaign with Deidre Frith</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/79/notes</link>
      <description>In this episode, the hosts are joined by Deidre Frith, the Director of Marketing at Real Time IT. With over 15 years of experience in marketing, Deidre is a one-stop shop for all things creative, social media, graphic design, and PR. She is known for her innovative and humorous marketing campaigns that have garnered attention and success for her company.

 

The episode opens with a discussion of the success of the funny commercial campaign that Deidre created for her company, as well as her approach to cybersecurity marketing.

Deidre also shares insights into the idea and execution behind the campaign, and the results it has achieved, and emphasizes why word-of-mouth marketing is still so important. She also talks about her team and the challenges of tracking ROI for traditional media. 

 

Lastly, Deidre dives into her cybersecurity awareness initiatives that include a quarterly poster campaign and a dedicated cybersecurity website. 

 

The hosts close this episode with our favorite game where Gianna and Maria guess what Deidre would be doing if she wasn't in marketing. Who wins this time? All bets are on the table!

Links:

Follow Deidre on LinkedIn

Check out Hey Y’all Wraps on LinkedIn

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 23 Aug 2023 09:00:00 -0000</pubDate>
      <itunes:title>How to Have a Successful Funny Cybersecurity Campaign with Deidre Frith</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>79</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, the hosts are joined by Deidre Frith, the Director of Marketing at Real Time IT. With over 15 years of experience in marketing, Deidre is a one-stop shop for all things creative, social media, graphic design, and PR. She is known for...</itunes:subtitle>
      <itunes:summary>In this episode, the hosts are joined by Deidre Frith, the Director of Marketing at Real Time IT. With over 15 years of experience in marketing, Deidre is a one-stop shop for all things creative, social media, graphic design, and PR. She is known for her innovative and humorous marketing campaigns that have garnered attention and success for her company.

 

The episode opens with a discussion of the success of the funny commercial campaign that Deidre created for her company, as well as her approach to cybersecurity marketing.

Deidre also shares insights into the idea and execution behind the campaign, and the results it has achieved, and emphasizes why word-of-mouth marketing is still so important. She also talks about her team and the challenges of tracking ROI for traditional media. 

 

Lastly, Deidre dives into her cybersecurity awareness initiatives that include a quarterly poster campaign and a dedicated cybersecurity website. 

 

The hosts close this episode with our favorite game where Gianna and Maria guess what Deidre would be doing if she wasn't in marketing. Who wins this time? All bets are on the table!

Links:

Follow Deidre on LinkedIn

Check out Hey Y’all Wraps on LinkedIn

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, the hosts are joined by Deidre Frith, the Director of Marketing at Real Time IT. With over 15 years of experience in marketing, Deidre is a one-stop shop for all things creative, social media, graphic design, and PR. She is known for her innovative and humorous marketing campaigns that have garnered attention and success for her company.</p>
<p> </p>
<p>The episode opens with a discussion of the success of the funny commercial campaign that Deidre created for her company, as well as her approach to cybersecurity marketing.</p>
<p>Deidre also shares insights into the idea and execution behind the campaign, and the results it has achieved, and emphasizes why word-of-mouth marketing is still so important. She also talks about her team and the challenges of tracking ROI for traditional media. </p>
<p> </p>
<p>Lastly, Deidre dives into her cybersecurity awareness initiatives that include a quarterly poster campaign and a dedicated cybersecurity website. </p>
<p> </p>
<p>The hosts close this episode with our favorite game where Gianna and Maria guess what Deidre would be doing if she wasn't in marketing. Who wins this time? All bets are on the table!</p>
<p>Links:</p>
<p>Follow Deidre on <a href="https://www.linkedin.com/in/dpfrith/">LinkedIn</a></p>
<p>Check out Hey Y’all Wraps on <a href="https://www.linkedin.com/company/heyyallwraps/">LinkedIn</a></p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2150</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/85e25c8c-5670-3758-a547-e884e283c68e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6496983919.mp3?updated=1723026952" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Effective Email Marketing with Josh Feigenbaum</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/78/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Josh Feigenbaum, Marketing Manager at Sentra, joins Maria and Gianna to discuss effective email marketing.

 

To begin, Josh starts off by sharing how almost everyone in the industry has made the mistake where you have sent an email to the wrong chain or group. He gets his creativity from what people have been complaining about, including marketing, campaigns, sales, or what they wish existed. Josh also says he likes to play against what people expect to see in their inboxes by making his emails not look like every other email. The most creative thing he’s done was sending out a Merry Christmas email with a surprise at the very end. The surprise was that if they responded back with a time, they would give a fake cyber security phone call to get you out of something with your family over the holidays. They actually had two people participate in it! He also says creativity is not just the email itself, but the offer as well. He also likes to include gifs of himself that are new and different with a caption underneath. Josh shares that he will put emojis into the subject line if it adds to the email, but he doesn’t like emojis if they are pointless.

 

Then, Josh shares how with email marketing, there really is no specific time or day that is best to send out an email. He does say the subject line and content of the email matter more than when you send it. The last time he tried content indication leads, it was not successful but he would try it again. He did warm the lists up with a couple of emails, but they had zero idea what they read. In addition, Josh states it is best to benchmark against yourself with emails. You need to keep improving and the trend lines need to keep going up. They also discuss how companies are not strict enough with emailing only the people affected by that email subject– they do not need to include employees in emails when they opt out of them. They also say not to include people in the email chain list if they haven’t opened an email in the last 90 days. This could affect the sending quality if you don’t have reasonable open rates. Josh also shares how the cybersecurity marketing society is a great tool to use to see what other people say about vendors. He checks the Slack group to check reviews. Finally, our guest and hosts engage in a fun guessing game to reveal what career Josh would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Josh on LinkedIn. 

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 09 Aug 2023 09:00:00 -0000</pubDate>
      <itunes:title>Effective Email Marketing with Josh Feigenbaum</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>78</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Josh Feigenbaum, Marketing Manager at Sentra, joi...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Josh Feigenbaum, Marketing Manager at Sentra, joins Maria and Gianna to discuss effective email marketing.

 

To begin, Josh starts off by sharing how almost everyone in the industry has made the mistake where you have sent an email to the wrong chain or group. He gets his creativity from what people have been complaining about, including marketing, campaigns, sales, or what they wish existed. Josh also says he likes to play against what people expect to see in their inboxes by making his emails not look like every other email. The most creative thing he’s done was sending out a Merry Christmas email with a surprise at the very end. The surprise was that if they responded back with a time, they would give a fake cyber security phone call to get you out of something with your family over the holidays. They actually had two people participate in it! He also says creativity is not just the email itself, but the offer as well. He also likes to include gifs of himself that are new and different with a caption underneath. Josh shares that he will put emojis into the subject line if it adds to the email, but he doesn’t like emojis if they are pointless.

 

Then, Josh shares how with email marketing, there really is no specific time or day that is best to send out an email. He does say the subject line and content of the email matter more than when you send it. The last time he tried content indication leads, it was not successful but he would try it again. He did warm the lists up with a couple of emails, but they had zero idea what they read. In addition, Josh states it is best to benchmark against yourself with emails. You need to keep improving and the trend lines need to keep going up. They also discuss how companies are not strict enough with emailing only the people affected by that email subject– they do not need to include employees in emails when they opt out of them. They also say not to include people in the email chain list if they haven’t opened an email in the last 90 days. This could affect the sending quality if you don’t have reasonable open rates. Josh also shares how the cybersecurity marketing society is a great tool to use to see what other people say about vendors. He checks the Slack group to check reviews. Finally, our guest and hosts engage in a fun guessing game to reveal what career Josh would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Josh on LinkedIn. 

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Josh Feigenbaum, Marketing Manager at Sentra, joins Maria and Gianna to discuss effective email marketing.</p>
<p> </p>
<p>To begin, Josh starts off by sharing how almost everyone in the industry has made the mistake where you have sent an email to the wrong chain or group. He gets his creativity from what people have been complaining about, including marketing, campaigns, sales, or what they wish existed. Josh also says he likes to play against what people expect to see in their inboxes by making his emails not look like every other email. The most creative thing he’s done was sending out a Merry Christmas email with a surprise at the very end. The surprise was that if they responded back with a time, they would give a fake cyber security phone call to get you out of something with your family over the holidays. They actually had two people participate in it! He also says creativity is not just the email itself, but the offer as well. He also likes to include gifs of himself that are new and different with a caption underneath. Josh shares that he will put emojis into the subject line if it adds to the email, but he doesn’t like emojis if they are pointless.</p>
<p> </p>
<p>Then, Josh shares how with email marketing, there really is no specific time or day that is best to send out an email. He does say the subject line and content of the email matter more than when you send it. The last time he tried content indication leads, it was not successful but he would try it again. He did warm the lists up with a couple of emails, but they had zero idea what they read. In addition, Josh states it is best to benchmark against yourself with emails. You need to keep improving and the trend lines need to keep going up. They also discuss how companies are not strict enough with emailing only the people affected by that email subject– they do not need to include employees in emails when they opt out of them. They also say not to include people in the email chain list if they haven’t opened an email in the last 90 days. This could affect the sending quality if you don’t have reasonable open rates. Josh also shares how the cybersecurity marketing society is a great tool to use to see what other people say about vendors. He checks the Slack group to check reviews. Finally, our guest and hosts engage in a fun guessing game to reveal what career Josh would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p>Follow Josh on <a href="https://www.linkedin.com/in/josh-feigenbaum/?originalSubdomain=il">LinkedIn. </a></p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2958</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/c719fe8e-c9bc-3208-b181-aaaf49002f4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3203851313.mp3?updated=1723026975" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Have a Successful Webinar with Brian Whipple</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/77/notes</link>
      <description>In this episode, Brian Whipple, a longtime member of the Cybersecurity Marketing Society, joins Maria and Gianna to share his impressive knowledge on how to create successful, record-breaking webinars in the cybersecurity industry.

 

Brian Whipple is a Marketing Manager at Conetrix and Tandem. He highlights how important it is to treat webinars as a valuable product that provides value to the audience - not as simply something you “do” because you have to do it as part of the marketing mix.

 

Brian talks about the key factors that contribute to the success of their webinars, including:

 


Carefully selecting topics 

Having knowledgeable and engaging speakers 

Practice, practice, practice! (Yes, even for webinars)

And to constantly refine the content


 

According to Whipple, it's important to focus on positive signals and feedback rather than hard KPIs, while also looking at how making small tweaks to webinar formats can help improve lead generation from these activities. Brian and his team’s approach to webinars has led to significant growth in attendance and positive feedback from their audience.

​

The episode closes with the ladies going head to head on their favorite game of guessing what the guest might be if they didn't choose their current career path. Someone’s guilty conscience leads them to confess to cheating in the game. Brian also promises to write down what the hosts might say when they first meet him at the CyberMarketingCon2023 in Austin. Also to find Brian online, DO NOT google him as there’s another Brian who is more “Successful and slightly better looking,” Check out our guest Brian Whipple in our links below! 

 

Links:

Follow Brian Whipple on LinkedIn.Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 02 Aug 2023 16:40:00 -0000</pubDate>
      <itunes:title>How to Have a Successful Webinar with Brian Whipple</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>77</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Brian Whipple, a longtime member of the Cybersecurity Marketing Society, joins Maria and Gianna to share his impressive knowledge on how to create successful, record-breaking webinars in the cybersecurity industry.
 
Brian Whipple is...</itunes:subtitle>
      <itunes:summary>In this episode, Brian Whipple, a longtime member of the Cybersecurity Marketing Society, joins Maria and Gianna to share his impressive knowledge on how to create successful, record-breaking webinars in the cybersecurity industry.

 

Brian Whipple is a Marketing Manager at Conetrix and Tandem. He highlights how important it is to treat webinars as a valuable product that provides value to the audience - not as simply something you “do” because you have to do it as part of the marketing mix.

 

Brian talks about the key factors that contribute to the success of their webinars, including:

 


Carefully selecting topics 

Having knowledgeable and engaging speakers 

Practice, practice, practice! (Yes, even for webinars)

And to constantly refine the content


 

According to Whipple, it's important to focus on positive signals and feedback rather than hard KPIs, while also looking at how making small tweaks to webinar formats can help improve lead generation from these activities. Brian and his team’s approach to webinars has led to significant growth in attendance and positive feedback from their audience.

​

The episode closes with the ladies going head to head on their favorite game of guessing what the guest might be if they didn't choose their current career path. Someone’s guilty conscience leads them to confess to cheating in the game. Brian also promises to write down what the hosts might say when they first meet him at the CyberMarketingCon2023 in Austin. Also to find Brian online, DO NOT google him as there’s another Brian who is more “Successful and slightly better looking,” Check out our guest Brian Whipple in our links below! 

 

Links:

Follow Brian Whipple on LinkedIn.Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Brian Whipple, a longtime member of the Cybersecurity Marketing Society, joins Maria and Gianna to share his impressive knowledge on how to create successful, record-breaking webinars in the cybersecurity industry.</p>
<p> </p>
<p>Brian Whipple is a Marketing Manager at <a href="https://conetrix.com/">Conetrix</a> and <a href="https://www.tandem.net/">Tandem</a>. He highlights how important it is to treat webinars as a valuable product that provides value to the audience - not as simply something you “do” because you have to do it as part of the marketing mix.</p>
<p> </p>
<p>Brian talks about the key factors that contribute to the success of their webinars, including:</p>
<p> </p>
<ul>
<li>Carefully selecting topics </li>
<li>Having knowledgeable and engaging speakers </li>
<li>Practice, practice, practice! (Yes, even for webinars)</li>
<li>And to constantly refine the content</li>
</ul>
<p> </p>
<p>According to Whipple, it's important to focus on positive signals and feedback rather than hard KPIs, while also looking at how making small tweaks to webinar formats can help improve lead generation from these activities. Brian and his team’s approach to webinars has led to significant growth in attendance and positive feedback from their audience.</p>
<p>​</p>
<p>The episode closes with the ladies going head to head on their favorite game of guessing what the guest might be if they didn't choose their current career path. Someone’s guilty conscience leads them to confess to cheating in the game. Brian also promises to write down what the hosts might say when they first meet him at the <a href="https://www.cybermarketingconference.com/">CyberMarketingCon2023</a> in Austin. Also to find Brian online, DO NOT google him as there’s another Brian who is more “Successful and slightly better looking,” Check out our guest Brian Whipple in our links below! </p>
<p> </p>
<p>Links:</p>
<p>Follow Brian Whipple on <a href="https://www.linkedin.com/in/dbrianwhipple/">LinkedIn</a>.Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2455</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/beabd250-7591-3ca6-b889-550c39148eff]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8806994099.mp3?updated=1723027042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Becoming a Community Marketing Expert with Derek Weeks</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/76/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Derek Weeks, author and CEO of Unfair Mindshare, joins Maria and Gianna to discuss community.

 

To begin, Derek shares that he has been working in community marketing for many years. He found that many people did not understand what community marketing is or how to succeed. Unfair Mindshare is all about showing CMOs and marketing leaders how to integrate community marketing as part of an overall integrated marketing program in order to elevate their brands and increase customer retention. This is what Derek unpacks in his book, Unfair Mindshare. He describes marketing in 3 orbits: product-led, brand-led, and community-led. While the first two orbits are transactional,  the latter is really about collaboration and working together. The biggest red flag that you might be doing the community orbit wrong is if you find yourself talking about yourself often. As a CMO, your primary goal is to promote your company and products, build pipelines and drive revenue. However, Derek explains how CMOs can attract an even larger audience by not talking about themselves but being helpful from the beginning.

 

Next, Derek outlines how to build the best team for a successful community-building operation. He sees community marketing as another functional area within marketing that is equipped with dedicated staff. This function can be 5-10% of the total marketing budget. However, it requires at least 1,000 hours of work per year in order to make a large enough impact. This means that one person on your team should spend at least 50% of their time focusing on this one area. Your team is responsible for creating either a new community or leading within an existing community. Before wrapping up, Derek offers his best advice to listeners.

Finally, our guest and hosts engage in a fun guessing game to reveal what career Derek would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Derek on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 26 Jul 2023 09:00:00 -0000</pubDate>
      <itunes:title>Becoming a Community Marketing Expert with Derek Weeks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>76</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Derek Weeks, author and CEO of Unfair Mindshare, ...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Derek Weeks, author and CEO of Unfair Mindshare, joins Maria and Gianna to discuss community.

 

To begin, Derek shares that he has been working in community marketing for many years. He found that many people did not understand what community marketing is or how to succeed. Unfair Mindshare is all about showing CMOs and marketing leaders how to integrate community marketing as part of an overall integrated marketing program in order to elevate their brands and increase customer retention. This is what Derek unpacks in his book, Unfair Mindshare. He describes marketing in 3 orbits: product-led, brand-led, and community-led. While the first two orbits are transactional,  the latter is really about collaboration and working together. The biggest red flag that you might be doing the community orbit wrong is if you find yourself talking about yourself often. As a CMO, your primary goal is to promote your company and products, build pipelines and drive revenue. However, Derek explains how CMOs can attract an even larger audience by not talking about themselves but being helpful from the beginning.

 

Next, Derek outlines how to build the best team for a successful community-building operation. He sees community marketing as another functional area within marketing that is equipped with dedicated staff. This function can be 5-10% of the total marketing budget. However, it requires at least 1,000 hours of work per year in order to make a large enough impact. This means that one person on your team should spend at least 50% of their time focusing on this one area. Your team is responsible for creating either a new community or leading within an existing community. Before wrapping up, Derek offers his best advice to listeners.

Finally, our guest and hosts engage in a fun guessing game to reveal what career Derek would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Derek on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Derek Weeks, author and CEO of Unfair Mindshare, joins Maria and Gianna to discuss community.</p>
<p> </p>
<p>To begin, Derek shares that he has been working in community marketing for many years. He found that many people did not understand what community marketing is or how to succeed. Unfair Mindshare is all about showing CMOs and marketing leaders how to integrate community marketing as part of an overall integrated marketing program in order to elevate their brands and increase customer retention. This is what Derek unpacks in his book, <em>Unfair Mindshare</em>. He describes marketing in 3 orbits: product-led, brand-led, and community-led. While the first two orbits are transactional,  the latter is really about collaboration and working together. The biggest red flag that you might be doing the community orbit wrong is if you find yourself talking about yourself often. As a CMO, your primary goal is to promote your company and products, build pipelines and drive revenue. However, Derek explains how CMOs can attract an even larger audience by not talking about themselves but being helpful from the beginning.</p>
<p> </p>
<p>Next, Derek outlines how to build the best team for a successful community-building operation. He sees community marketing as another functional area within marketing that is equipped with dedicated staff. This function can be 5-10% of the total marketing budget. However, it requires at least 1,000 hours of work per year in order to make a large enough impact. This means that one person on your team should spend at least 50% of their time focusing on this one area. Your team is responsible for creating either a new community or leading within an existing community. Before wrapping up, Derek offers his best advice to listeners.</p>
<p>Finally, our guest and hosts engage in a fun guessing game to reveal what career Derek would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p>Follow Derek on <a href="https://www.linkedin.com/in/derekeweeks?challengeId=AQFZVxTJFhMaPQAAAYl7L_OOoDf8gQg5mRAbLCho9ia-_QsJOw3Q2WKQSHo0JsORH4XcYVT2YfnhcW97aW-gD61Nm-BX3iS5Kw&amp;submissionId=b8140158-f00b-7417-2fe6-c6495fb7a546&amp;challengeSource=AgEF5_Bhb5fvXwAAAYl7MFfjhmTig7ChuqOG_P_UtvVKRQtx43_CBOmI8JcHl2I&amp;challegeType=AgHenW5D6187QAAAAYl7MFfm87uzyuqOegbbNov8D8fpvnCoNNPKJZ0&amp;memberId=AgFbfLaFbagn_gAAAYl7MFfpxBCenkifoZNZUW8qz8_gT_k&amp;recognizeDevice=AgHEhqHRobpVMwAAAYl7MFftwDAkf1csaCudfflI-JMsliWlnjWB">LinkedIn</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2651</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/a3d9c84b-b222-3603-a13c-07808cd505ce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9639553913.mp3?updated=1723027097" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Creating and Being a Creator in Cybersecurity with Kenneth Ellington</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/75/notes</link>
      <description>In this episode, Kenneth Ellington, security consultant at Ernst &amp; Young and the founder of Ellington Cyber Academy, joins our hosts to discuss how to foster positive engagement. 

 
Kenneth Ellington is a security consultant at Ernst &amp; Young and the founder of Ellington Cyber Academy and has been in the cybersecurity field for over four years. Ellington talks to Gianna and Maria about his journey into cybersecurity, from starting out as an intern at Publix to becoming a security consultant at Ernst &amp; Young. In the age of social media, he emphasizes the importance of having your own voice and being unique to be able to stand out in the crowd when working on your personal brand. 

 

The years in the industry have taught him the power of networking and being able to build a community that you can always rely on:

 

"It's not what you know, it's who knows you." - Kenneth Ellington

 

He also highlights diversity and is especially passionate about advocating for more people of color to get into cybersecurity doing this through his Ellington Cyber Academy. He also offers tips for content creation and personal branding in the cybersecurity industry.

 

The episode closes with our usual favorite game where Gianna and Maria guess what Kenneth would be doing if he was not in cybersecurity. Who wins? Listen to the episode to find out!

 

The ladies can be quite competitive, it’s even hilarious as Maria tries and fails to convince Kenneth to join her on her quest to add him to her list of candidates to open a food truck with!

 

Links: 

Follow Kenneth on LinkedIn

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 19 Jul 2023 09:00:00 -0000</pubDate>
      <itunes:title>Creating and Being a Creator in Cybersecurity with Kenneth Ellington</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>75</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Kenneth Ellington, security consultant at Ernst &amp;amp; Young and the founder of Ellington Cyber Academy, joins our hosts to discuss how to foster positive engagement. 
 Kenneth Ellington is a security consultant at Ernst &amp;amp; Young a...</itunes:subtitle>
      <itunes:summary>In this episode, Kenneth Ellington, security consultant at Ernst &amp; Young and the founder of Ellington Cyber Academy, joins our hosts to discuss how to foster positive engagement. 

 
Kenneth Ellington is a security consultant at Ernst &amp; Young and the founder of Ellington Cyber Academy and has been in the cybersecurity field for over four years. Ellington talks to Gianna and Maria about his journey into cybersecurity, from starting out as an intern at Publix to becoming a security consultant at Ernst &amp; Young. In the age of social media, he emphasizes the importance of having your own voice and being unique to be able to stand out in the crowd when working on your personal brand. 

 

The years in the industry have taught him the power of networking and being able to build a community that you can always rely on:

 

"It's not what you know, it's who knows you." - Kenneth Ellington

 

He also highlights diversity and is especially passionate about advocating for more people of color to get into cybersecurity doing this through his Ellington Cyber Academy. He also offers tips for content creation and personal branding in the cybersecurity industry.

 

The episode closes with our usual favorite game where Gianna and Maria guess what Kenneth would be doing if he was not in cybersecurity. Who wins? Listen to the episode to find out!

 

The ladies can be quite competitive, it’s even hilarious as Maria tries and fails to convince Kenneth to join her on her quest to add him to her list of candidates to open a food truck with!

 

Links: 

Follow Kenneth on LinkedIn

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Kenneth Ellington, security consultant at Ernst &amp; Young and the founder of Ellington Cyber Academy, joins our hosts to discuss how to foster positive engagement. </p>
<p> <br>
Kenneth Ellington is a security consultant at Ernst &amp; Young and the founder of Ellington Cyber Academy and has been in the cybersecurity field for over four years. Ellington talks to Gianna and Maria about his journey into cybersecurity, from starting out as an intern at Publix to becoming a security consultant at Ernst &amp; Young. In the age of social media, he emphasizes the importance of having your own voice and being unique to be able to stand out in the crowd when working on your personal brand. </p>
<p> </p>
<p>The years in the industry have taught him the power of networking and being able to build a community that you can always rely on:</p>
<p> </p>
<p>"It's not what you know, it's who knows you." - Kenneth Ellington</p>
<p> </p>
<p>He also highlights diversity and is especially passionate about advocating for more people of color to get into cybersecurity doing this through his Ellington Cyber Academy. He also offers tips for content creation and personal branding in the cybersecurity industry.</p>
<p> </p>
<p>The episode closes with our usual favorite game where Gianna and Maria guess what Kenneth would be doing if he was not in cybersecurity. Who wins? Listen to the episode to find out!</p>
<p> </p>
<p>The ladies can be quite competitive, it’s even hilarious as Maria tries and fails to convince Kenneth to join her on her quest to add him to her list of candidates to open a food truck with!</p>
<p> </p>
<p>Links: </p>
<p>Follow Kenneth on <a href="https://www.linkedin.com/in/kenneth-ellington/">LinkedIn</a></p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2346</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/fc609a16-17de-3ba4-9a82-cceae8120c02]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1409233911.mp3?updated=1723027026" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unconventionally Breaking Through into Marketing with Marc Blackmer</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/74/notes</link>
      <description>In this episode, Marc Blackmer, VP of Marketing at Corero Network Security, joins Maria and Gianna to discuss breaking through into marketing, green and red flags in companies and so much more.

 

Corero Network Security is a leader in real-time with high-performance DDoS defense solutions. Service providers, hosting providers, and digital enterprises rely on Corero’s award-winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation. This industry-leading technology delivers flexible protection that scales to tens of terabits, on-premises and in the cloud, with a dramatically lower cost of ownership than previously possible.

 

Marc takes us on his journey of how he moved to California after deciding to take a year off from college to pursue music. He was involved in marketing for 10-12 years,  Marc said getting the job was easy however, but the actual job wasn’t easy. He wanted to be perfect from the beginning, but you can’t be when you are starting out and still learning.

 

Marc also tells Maria and Gianna about some red and green flags to look out for when doing interviews with companies. He states that alignment between marketing, sales, and the product team is extremely important in a company.

 

The leaders in each of these areas need to:


Communicate,

Agree on messaging and where the product is going.

While working together.


He also motivates people to listen to themselves more, when things don’t feel right, they likely aren’t. If companies ask people to do things that are not okay in interviews, then imagine what would it be like working for them.

When looking for green flags in leaders, he advises looking for leaders who are focused, friendly, energetic, and know what they want. Leaders who have a clear and realistic vision. While his advice to marketers is to get to know people, network, and be open to the idea that things that will change. There will be positives that come from change, and you will learn from it.

 

Links:

Follow Marc Blackmer on LinkedIn. 

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 12 Jul 2023 09:13:41 -0000</pubDate>
      <itunes:title>Unconventionally Breaking Through into Marketing with Marc Blackmer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>74</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Marc Blackmer, VP of Marketing at Corero Network Security, joins Maria and Gianna to discuss breaking through into marketing, green and red flags in companies and so much more.
 
Corero Network Security is a leader in real-time with ...</itunes:subtitle>
      <itunes:summary>In this episode, Marc Blackmer, VP of Marketing at Corero Network Security, joins Maria and Gianna to discuss breaking through into marketing, green and red flags in companies and so much more.

 

Corero Network Security is a leader in real-time with high-performance DDoS defense solutions. Service providers, hosting providers, and digital enterprises rely on Corero’s award-winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation. This industry-leading technology delivers flexible protection that scales to tens of terabits, on-premises and in the cloud, with a dramatically lower cost of ownership than previously possible.

 

Marc takes us on his journey of how he moved to California after deciding to take a year off from college to pursue music. He was involved in marketing for 10-12 years,  Marc said getting the job was easy however, but the actual job wasn’t easy. He wanted to be perfect from the beginning, but you can’t be when you are starting out and still learning.

 

Marc also tells Maria and Gianna about some red and green flags to look out for when doing interviews with companies. He states that alignment between marketing, sales, and the product team is extremely important in a company.

 

The leaders in each of these areas need to:


Communicate,

Agree on messaging and where the product is going.

While working together.


He also motivates people to listen to themselves more, when things don’t feel right, they likely aren’t. If companies ask people to do things that are not okay in interviews, then imagine what would it be like working for them.

When looking for green flags in leaders, he advises looking for leaders who are focused, friendly, energetic, and know what they want. Leaders who have a clear and realistic vision. While his advice to marketers is to get to know people, network, and be open to the idea that things that will change. There will be positives that come from change, and you will learn from it.

 

Links:

Follow Marc Blackmer on LinkedIn. 

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Marc Blackmer, VP of Marketing at Corero Network Security, joins Maria and Gianna to discuss breaking through into marketing, green and red flags in companies and so much more.</p>
<p> </p>
<p>Corero Network Security is a leader in real-time with high-performance DDoS defense solutions. Service providers, hosting providers, and digital enterprises rely on Corero’s award-winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation. This industry-leading technology delivers flexible protection that scales to tens of terabits, on-premises and in the cloud, with a dramatically lower cost of ownership than previously possible.</p>
<p> </p>
<p>Marc takes us on his journey of how he moved to California after deciding to take a year off from college to pursue music. He was involved in marketing for 10-12 years,  Marc said getting the job was easy however, but the actual job wasn’t easy. He wanted to be perfect from the beginning, but you can’t be when you are starting out and still learning.</p>
<p> </p>
<p>Marc also tells Maria and Gianna about some red and green flags to look out for when doing interviews with companies. He states that alignment between marketing, sales, and the product team is extremely important in a company.</p>
<p> </p>
<p>The leaders in each of these areas need to:</p>
<ul>
<li>Communicate,</li>
<li>Agree on messaging and where the product is going.</li>
<li>While working together.</li>
</ul>
<p>He also motivates people to listen to themselves more, when things don’t feel right, they likely aren’t. If companies ask people to do things that are not okay in interviews, then imagine what would it be like working for them.</p>
<p>When looking for green flags in leaders, he advises looking for leaders who are focused, friendly, energetic, and know what they want. Leaders who have a clear and realistic vision. While his advice to marketers is to get to know people, network, and be open to the idea that things that will change. There will be positives that come from change, and you will learn from it.</p>
<p> </p>
<p>Links:</p>
<p>Follow Marc Blackmer on <a href="https://www.linkedin.com/in/marcblackmer/">LinkedIn. </a></p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2480</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/9afca7cb-4970-3345-92d2-c33e61727b74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4892863207.mp3?updated=1723026993" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to Foster Positive Engagement with Steve LaChance</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/73/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Steve LaChance, Founder and CEO of discernr, joins Maria and Gianna to discuss how to foster positive engagement.

 

Discernr is a consultancy centered around product market fit for product led growth. They are currently building out some digital tools to make the process even more accessible. The company helps organizations at all stages of their PLG journey. Engagement, Steve explains, is a conversation that organizations of all sizes should be having. He also shares how he deals with burnout in the workplace. All leaders should be aware of the importance of maintaining a positive team dynamic in order to steer their staff away from burnout themselves. To do this, leaders and employees alike should each share their own expectations for their role and projected growth. While burnout typically means the employee is gone for good, disengagement is when an employee tends to stick with the bare minimum.

 

Then, Steve shares his best tactics to inspire change within his team. Step one is around daily communication of both expectations and outcomes. Listeners are reminded that when employees feel they are just doing tedious work, they tend to build up resentment for the work. Leaders should ensure their employees feel like they matter and that their work is appreciated and useful for someone. Sometimes, an employee’s lack of engagement can also be a result of a lack of career advancement opportunities. If a leader is not providing a path towards learning and knowing how to level up their skillset, the employee will end up providing those things for themselves and will ultimately leave your team. Steve explains that career advancement does not always mean a succession of higher job titles. Many people are much happier as senior analysts or marketers than they would be in a C-suite position. Before wrapping up, our hosts and guest reiterate the necessity of career advancement for employee retention. Finally, they engage in a fun guessing game to reveal what career Steve would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Steve LaChance on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 05 Jul 2023 09:00:00 -0000</pubDate>
      <itunes:title>How to Foster Positive Engagement with Steve LaChance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>73</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Steve LaChance, Founder and CEO of discernr, joins...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Steve LaChance, Founder and CEO of discernr, joins Maria and Gianna to discuss how to foster positive engagement.

 

Discernr is a consultancy centered around product market fit for product led growth. They are currently building out some digital tools to make the process even more accessible. The company helps organizations at all stages of their PLG journey. Engagement, Steve explains, is a conversation that organizations of all sizes should be having. He also shares how he deals with burnout in the workplace. All leaders should be aware of the importance of maintaining a positive team dynamic in order to steer their staff away from burnout themselves. To do this, leaders and employees alike should each share their own expectations for their role and projected growth. While burnout typically means the employee is gone for good, disengagement is when an employee tends to stick with the bare minimum.

 

Then, Steve shares his best tactics to inspire change within his team. Step one is around daily communication of both expectations and outcomes. Listeners are reminded that when employees feel they are just doing tedious work, they tend to build up resentment for the work. Leaders should ensure their employees feel like they matter and that their work is appreciated and useful for someone. Sometimes, an employee’s lack of engagement can also be a result of a lack of career advancement opportunities. If a leader is not providing a path towards learning and knowing how to level up their skillset, the employee will end up providing those things for themselves and will ultimately leave your team. Steve explains that career advancement does not always mean a succession of higher job titles. Many people are much happier as senior analysts or marketers than they would be in a C-suite position. Before wrapping up, our hosts and guest reiterate the necessity of career advancement for employee retention. Finally, they engage in a fun guessing game to reveal what career Steve would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Steve LaChance on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Steve LaChance, Founder and CEO of discernr, joins Maria and Gianna to discuss how to foster positive engagement.</p>
<p> </p>
<p>Discernr is a consultancy centered around product market fit for product led growth. They are currently building out some digital tools to make the process even more accessible. The company helps organizations at all stages of their PLG journey. Engagement, Steve explains, is a conversation that organizations of all sizes should be having. He also shares how he deals with burnout in the workplace. All leaders should be aware of the importance of maintaining a positive team dynamic in order to steer their staff away from burnout themselves. To do this, leaders and employees alike should each share their own expectations for their role and projected growth. While burnout typically means the employee is gone for good, disengagement is when an employee tends to stick with the bare minimum.</p>
<p> </p>
<p>Then, Steve shares his best tactics to inspire change within his team. Step one is around daily communication of both expectations and outcomes. Listeners are reminded that when employees feel they are just doing tedious work, they tend to build up resentment for the work. Leaders should ensure their employees feel like they matter and that their work is appreciated and useful for someone. Sometimes, an employee’s lack of engagement can also be a result of a lack of career advancement opportunities. If a leader is not providing a path towards learning and knowing how to level up their skillset, the employee will end up providing those things for themselves and will ultimately leave your team. Steve explains that career advancement does not always mean a succession of higher job titles. Many people are much happier as senior analysts or marketers than they would be in a C-suite position. Before wrapping up, our hosts and guest reiterate the necessity of career advancement for employee retention. Finally, they engage in a fun guessing game to reveal what career Steve would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Steve LaChance on <a href="https://www.linkedin.com/in/stevenlachance?challengeId=AQEFMxVb7oZoDwAAAYkJjz4tS5RAUCwCf9Zovsre-X5EMYCTGEOnQvaLT0ewk558GDYMR5L3On8ZRXMPvtL6xsE7T6kdDNYK_Q&amp;submissionId=b9c9efe3-1d46-6d17-297b-6b2c981e5c7e&amp;challengeSource=AgESSsGs1xfVCAAAAYkJkDzwm42MU-DLmsquZB0jVlPKq6eoZjdLNbS5lpJ2bVQ&amp;challegeType=AgF_2O9J4mWJPQAAAYkJkDz0TdCdHyXqLoP_8McRkXa_GID022l4Qpg&amp;memberId=AgF9kty7M8GLMwAAAYkJkDz32R1TDk--Qh2tuiQyJkkdnSA&amp;recognizeDevice=AgE6cxmwcwhgtQAAAYkJkDz8I0MuMZbhWuL9LoqIYGF0NgVpuyKl">LinkedIn</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2465</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/10a42352-2dbf-35a6-ac93-1c0511481c28]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4502287696.mp3?updated=1723027040" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Maximizing Your Branding Potential with Shlomi Ashkenazy</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/72/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Shlomi Ashkenazy, Head of Brand at Cybellum, joins Maria and Gianna to discuss how to maximize your branding potential.

 

To begin, Shlomi defines branding as the core narrative and story your organization wants to tell. This narrative can be uncovered by asking customers key driving questions to determine how their perception grows over time. These questions may include things like How well do you know our company? Who do you see us as? and What do we do? Brand momentum is typically generated from a combination of what you do as a founder and the work of the sales team. Next, Shlomi shares his story of tying brand into a venture capital investment. It all comes down to convincing investors that something big is in store for your idea. Shlomi sees branding as an engineering discipline as if you are building out a product scientifically. It requires less intuition and more customer feedback.

 

Next, Shlomi speaks to how companies can stand out in such a crowded market like cybersecurity. The first thing to do is try to simplify things as much as possible to help people better understand what you do. Then, try to find a niche and really stick with it. He also shares about the efforts he has made which didn’t work out as planned. As long as you remain agile and can afford to make mistakes, there is always something to be learned when things don’t work out. He also shares his discovery that a CEO is not important for a brand, but rather the CEO is the brand. The best way to know when your company’s story is not working is when the sales team is unhappy. If, after trying it out and it still isn’t sticking, it’s time to change direction. In the first few years of operations, around 30-40% of a brand’s budget should go to marketing. Finally, they engage in a fun guessing game to reveal what career Shlomi would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Shlomi Ashkenazy on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 28 Jun 2023 13:08:34 -0000</pubDate>
      <itunes:title>Maximizing Your Branding Potential with Shlomi Ashkenazy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Shlomi Ashkenazy, Head of Brand at Cybellum, joins...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Shlomi Ashkenazy, Head of Brand at Cybellum, joins Maria and Gianna to discuss how to maximize your branding potential.

 

To begin, Shlomi defines branding as the core narrative and story your organization wants to tell. This narrative can be uncovered by asking customers key driving questions to determine how their perception grows over time. These questions may include things like How well do you know our company? Who do you see us as? and What do we do? Brand momentum is typically generated from a combination of what you do as a founder and the work of the sales team. Next, Shlomi shares his story of tying brand into a venture capital investment. It all comes down to convincing investors that something big is in store for your idea. Shlomi sees branding as an engineering discipline as if you are building out a product scientifically. It requires less intuition and more customer feedback.

 

Next, Shlomi speaks to how companies can stand out in such a crowded market like cybersecurity. The first thing to do is try to simplify things as much as possible to help people better understand what you do. Then, try to find a niche and really stick with it. He also shares about the efforts he has made which didn’t work out as planned. As long as you remain agile and can afford to make mistakes, there is always something to be learned when things don’t work out. He also shares his discovery that a CEO is not important for a brand, but rather the CEO is the brand. The best way to know when your company’s story is not working is when the sales team is unhappy. If, after trying it out and it still isn’t sticking, it’s time to change direction. In the first few years of operations, around 30-40% of a brand’s budget should go to marketing. Finally, they engage in a fun guessing game to reveal what career Shlomi would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Shlomi Ashkenazy on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Shlomi Ashkenazy, Head of Brand at Cybellum, joins Maria and Gianna to discuss how to maximize your branding potential.</p>
<p> </p>
<p>To begin, Shlomi defines branding as the core narrative and story your organization wants to tell. This narrative can be uncovered by asking customers key driving questions to determine how their perception grows over time. These questions may include things like How well do you know our company? Who do you see us as? and What do we do? Brand momentum is typically generated from a combination of what you do as a founder and the work of the sales team. Next, Shlomi shares his story of tying brand into a venture capital investment. It all comes down to convincing investors that something big is in store for your idea. Shlomi sees branding as an engineering discipline as if you are building out a product scientifically. It requires less intuition and more customer feedback.</p>
<p> </p>
<p>Next, Shlomi speaks to how companies can stand out in such a crowded market like cybersecurity. The first thing to do is try to simplify things as much as possible to help people better understand what you do. Then, try to find a niche and really stick with it. He also shares about the efforts he has made which didn’t work out as planned. As long as you remain agile and can afford to make mistakes, there is always something to be learned when things don’t work out. He also shares his discovery that a CEO is not important for a brand, but rather the CEO is the brand. The best way to know when your company’s story is not working is when the sales team is unhappy. If, after trying it out and it still isn’t sticking, it’s time to change direction. In the first few years of operations, around 30-40% of a brand’s budget should go to marketing. Finally, they engage in a fun guessing game to reveal what career Shlomi would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Shlomi Ashkenazy on <a href="https://www.linkedin.com/in/shlomi-ashkenazy-9786b685/?originalSubdomain=il">LinkedIn</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2061</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/52885384-6fc2-3272-b757-a98415c0e7a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7721102683.mp3?updated=1723026928" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Partner Marketing: Strategies and Best Practices with Emily Cadwallader</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/71/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Emily Cadwallader, Partner Marketing Manager at Binary Defense, shares her expertise with Gianna and Maria.

 

Emily first joined Binary Defense as a marketing specialist wearing lots of hats. Once the company found its footing in channel strategy, Emily was able to focus all her efforts on that specific area. Channel marketing differs slightly from more traditional marketing, she explains, because it requires a more strategy-focused approach. When it comes to making things exciting, Emily believes that consistent contact with partners is super important. In terms of being there for marketing and collaboration, your partners can almost serve as an extension of your sales team.  Emily and her team at Binary Defense work closely with their partners to ensure they are involved in quarterly training and staying up to date with the latest offerings. 

 

Among Binary Defense’s partners include one tenure, several who are currently onboarding, and both regional and national partners. The first step of their most recent portal revamps was understanding what their ideal partner profile looked like. Next, Emily shares some of the company’s most successful field events. If a partner already has their year of marketing strategy planned out for the year, it can be a great opportunity to tie in with them. Many partners have a cyber-specific day in which they come to evaluate their clients and prospects. Then, she elaborated on centralizing communications and activities and why it is so important for a successful partner program. These come in two forms: centralizing your communications internally and keeping consistent, open communication with your partners.  

 

Emily received the Star Performer Award at Binary for her work as a partner marketer. She unpacks some of the qualities of someone who excels in partner marketing. First and foremost, you need to be a good communicator and have prior experience in the different avenues of marketing. This role can’t be done alone, so the ability to collaborate with others is key. Finally, they engage in a fun guessing game to reveal what career Jennifer would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Emily Cadwallader on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 21 Jun 2023 09:00:00 -0000</pubDate>
      <itunes:title>Partner Marketing: Strategies and Best Practices with Emily Cadwallader</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Emily Cadwallader, Partner Marketing Manager at B...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Emily Cadwallader, Partner Marketing Manager at Binary Defense, shares her expertise with Gianna and Maria.

 

Emily first joined Binary Defense as a marketing specialist wearing lots of hats. Once the company found its footing in channel strategy, Emily was able to focus all her efforts on that specific area. Channel marketing differs slightly from more traditional marketing, she explains, because it requires a more strategy-focused approach. When it comes to making things exciting, Emily believes that consistent contact with partners is super important. In terms of being there for marketing and collaboration, your partners can almost serve as an extension of your sales team.  Emily and her team at Binary Defense work closely with their partners to ensure they are involved in quarterly training and staying up to date with the latest offerings. 

 

Among Binary Defense’s partners include one tenure, several who are currently onboarding, and both regional and national partners. The first step of their most recent portal revamps was understanding what their ideal partner profile looked like. Next, Emily shares some of the company’s most successful field events. If a partner already has their year of marketing strategy planned out for the year, it can be a great opportunity to tie in with them. Many partners have a cyber-specific day in which they come to evaluate their clients and prospects. Then, she elaborated on centralizing communications and activities and why it is so important for a successful partner program. These come in two forms: centralizing your communications internally and keeping consistent, open communication with your partners.  

 

Emily received the Star Performer Award at Binary for her work as a partner marketer. She unpacks some of the qualities of someone who excels in partner marketing. First and foremost, you need to be a good communicator and have prior experience in the different avenues of marketing. This role can’t be done alone, so the ability to collaborate with others is key. Finally, they engage in a fun guessing game to reveal what career Jennifer would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Emily Cadwallader on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Emily Cadwallader, Partner Marketing Manager at Binary Defense, shares her expertise with Gianna and Maria.</p>
<p> </p>
<p>Emily first joined Binary Defense as a marketing specialist wearing lots of hats. Once the company found its footing in channel strategy, Emily was able to focus all her efforts on that specific area. Channel marketing differs slightly from more traditional marketing, she explains, because it requires a more strategy-focused approach. When it comes to making things exciting, Emily believes that consistent contact with partners is super important. In terms of being there for marketing and collaboration, your partners can almost serve as an extension of your sales team.  Emily and her team at Binary Defense work closely with their partners to ensure they are involved in quarterly training and staying up to date with the latest offerings. </p>
<p> </p>
<p>Among Binary Defense’s partners include one tenure, several who are currently onboarding, and both regional and national partners. The first step of their most recent portal revamps was understanding what their ideal partner profile looked like. Next, Emily shares some of the company’s most successful field events. If a partner already has their year of marketing strategy planned out for the year, it can be a great opportunity to tie in with them. Many partners have a cyber-specific day in which they come to evaluate their clients and prospects. Then, she elaborated on centralizing communications and activities and why it is so important for a successful partner program. These come in two forms: centralizing your communications internally and keeping consistent, open communication with your partners.  </p>
<p> </p>
<p>Emily received the Star Performer Award at Binary for her work as a partner marketer. She unpacks some of the qualities of someone who excels in partner marketing. First and foremost, you need to be a good communicator and have prior experience in the different avenues of marketing. This role can’t be done alone, so the ability to collaborate with others is key. Finally, they engage in a fun guessing game to reveal what career Jennifer would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Emily Cadwallader on <a href="https://www.linkedin.com/in/emilycadwallader">LinkedIn</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>1442</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/48fe9393-4ce8-372a-8e42-7bf69ec7b99a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5426321951.mp3?updated=1723026840" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CPF Coaching &amp; Breaking Into Cybersecurity with Christophe Foulon</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/70/notes</link>
      <description>In this episode, Christophe Foulon, cybersecurity manager at a Fortune 500 company and Founder of CPF Coaching, joins Maria and Gianna.

 

To begin, Christophe shares that his idea for CPF Coaching came from the pandemic when many cybersecurity employees moved from in-office to remote work. He noticed they struggled with communication, collaboration, and influence in the new setting. His marketing experience comes into play here as he must convince leaders that cybersecurity is crucial to their business. He would sum up his entire career as the connection between the people and the technical side. In addition, Christophe also hosts the Breaking Into Cybersecurity podcast, which stems from his own experience and challenges of breaking into cybersecurity. He is also the author of two books about cybersecurity.

 

Next, Christophe unpacks how marketers already have the skills needed to break into the cybersecurity field. These skills include communication, collaboration, influence, and prior knowledge of your industry. Together, all these skills can work together to help the business solve solutions in a different way than those from a purely technical standpoint. Today, Christophe’s clients as a consultant include different lines of business within a large credit card division, each looking to deliver solutions for their different types of clients. His job is to deliver solutions and ensure that their data is protected. Looking towards the future, his following vision is to lead a security program for a mid-large size organization to help influence the development of a great cybersecurity pipeline and help implement planned growth.

 

Christophe offers his best advice for navigating these tricky waters. Figure out what problems you want to solve, how you can solve them, and what might set you apart from the competition, and then work with leaders to see where they might be in their program and how your solution can help. Finally, they engage in a fun guessing game to reveal what career Christophe would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Christophe Foulon on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 

Christophe’s books:

Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at any Level

Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career

 

 </description>
      <pubDate>Thu, 15 Jun 2023 09:00:00 -0000</pubDate>
      <itunes:title>CPF Coaching &amp; Breaking Into Cybersecurity with Christophe Foulon</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Christophe Foulon, cybersecurity manager at a Fortune 500 company and Founder of CPF Coaching, joins Maria and Gianna.
 
To begin, Christophe shares that his idea for CPF Coaching came from the pandemic when many cybersecurity employ...</itunes:subtitle>
      <itunes:summary>In this episode, Christophe Foulon, cybersecurity manager at a Fortune 500 company and Founder of CPF Coaching, joins Maria and Gianna.

 

To begin, Christophe shares that his idea for CPF Coaching came from the pandemic when many cybersecurity employees moved from in-office to remote work. He noticed they struggled with communication, collaboration, and influence in the new setting. His marketing experience comes into play here as he must convince leaders that cybersecurity is crucial to their business. He would sum up his entire career as the connection between the people and the technical side. In addition, Christophe also hosts the Breaking Into Cybersecurity podcast, which stems from his own experience and challenges of breaking into cybersecurity. He is also the author of two books about cybersecurity.

 

Next, Christophe unpacks how marketers already have the skills needed to break into the cybersecurity field. These skills include communication, collaboration, influence, and prior knowledge of your industry. Together, all these skills can work together to help the business solve solutions in a different way than those from a purely technical standpoint. Today, Christophe’s clients as a consultant include different lines of business within a large credit card division, each looking to deliver solutions for their different types of clients. His job is to deliver solutions and ensure that their data is protected. Looking towards the future, his following vision is to lead a security program for a mid-large size organization to help influence the development of a great cybersecurity pipeline and help implement planned growth.

 

Christophe offers his best advice for navigating these tricky waters. Figure out what problems you want to solve, how you can solve them, and what might set you apart from the competition, and then work with leaders to see where they might be in their program and how your solution can help. Finally, they engage in a fun guessing game to reveal what career Christophe would pursue outside of the cybersecurity marketing field.

 

Links:

Follow Christophe Foulon on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 

Christophe’s books:

Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at any Level

Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career

 

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Christophe Foulon, cybersecurity manager at a Fortune 500 company and Founder of CPF Coaching, joins Maria and Gianna.</p>
<p> </p>
<p>To begin, Christophe shares that his idea for CPF Coaching came from the pandemic when many cybersecurity employees moved from in-office to remote work. He noticed they struggled with communication, collaboration, and influence in the new setting. His marketing experience comes into play here as he must convince leaders that cybersecurity is crucial to their business. He would sum up his entire career as the connection between the people and the technical side. In addition, Christophe also hosts the<em> Breaking Into Cybersecurity </em>podcast, which stems from his own experience and challenges of breaking into cybersecurity. He is also the author of two books about cybersecurity.</p>
<p> </p>
<p>Next, Christophe unpacks how marketers already have the skills needed to break into the cybersecurity field. These skills include communication, collaboration, influence, and prior knowledge of your industry. Together, all these skills can work together to help the business solve solutions in a different way than those from a purely technical standpoint. Today, Christophe’s clients as a consultant include different lines of business within a large credit card division, each looking to deliver solutions for their different types of clients. His job is to deliver solutions and ensure that their data is protected. Looking towards the future, his following vision is to lead a security program for a mid-large size organization to help influence the development of a great cybersecurity pipeline and help implement planned growth.</p>
<p> </p>
<p>Christophe offers his best advice for navigating these tricky waters. Figure out what problems you want to solve, how you can solve them, and what might set you apart from the competition, and then work with leaders to see where they might be in their program and how your solution can help. Finally, they engage in a fun guessing game to reveal what career Christophe would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p>Follow Christophe Foulon on <a href="https://www.linkedin.com/in/christophefoulon">LinkedIn</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p> </p>
<p>Christophe’s books:</p>
<p><a href="https://www.amazon.com/Develop-Your-Cybersecurity-Career-Path/dp/1955976007">Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at any Level</a></p>
<p><a href="https://www.amazon.com/Hack-Cybersecurity-Interview-jumpstarting-cybersecurity/dp/1801816638/ref=sr_1_1?keywords=Hack+your+cybersecurity+interview&amp;qid=1686726970&amp;s=books&amp;sr=1-1">Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career</a></p>
<p> </p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>1569</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/e1844e3d-ae52-3dd9-b5de-50aaf3368d20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5603738184.mp3?updated=1723026829" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber CMO Wisdom with Ashish Kuthiala</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/69/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Ashish Kuthiala, CMO of Traceable AI joins Maria and Gianna.

 

To begin, Ashish shares his path to his current role. He was raised in several different countries and was able to experience different cultures, countries and schooling systems firsthand. He moved to the U.S. for his studies 25 years ago and now calls the country home. He has since worked in computer science, computer engineering, code writing product development and in various roles on the business side. His introduction to marketing was in product marketing, where he was able to merge his engineering background and his love for connecting people. Traceable is Ashish’s fifth startup, which he came to in the very beginning stages of the launch.

 

Each company Asish has worked for has taught him value lessons and skills which he has brought on to the next. With the mindset of experimenting a lot, learning from your experiments and reiterating a lot to find out what does and doesn't work, he believes you will be successful in any role. As a leader, it is crucial to build a culture in which employees feel free to experiment and learn from their failures. A key goal of marketing is to build a sales pipeline, which takes time and patience. Each quarter, he and his team look at all of the data to determine where they are on their trajectory.

 

Next, Ashish unpacks his fundamental approach to marketing. Today, most IT buyers educate themselves before deciding on a software. They already know what problems they want to solve, who can do it best and how much they should be paying for the service. From a marketing perspective, the most critical pieces are to be transparent, trustworthy and know your stakeholders. Employees and customers alike should be passionate about what they are building and eager to talk about it. He also addresses the common privacy concerns that transparency entails. This all comes down to velocity and moving faster than our competitors. Finally, our hosts and guest engage in a fun guessing game to reveal what career Ashish would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Ashish Kuthiala on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 07 Jun 2023 09:00:00 -0000</pubDate>
      <itunes:title>Cyber CMO Wisdom with Ashish Kuthiala</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Ashish Kuthiala, CMO of Traceable AI joins Maria a...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Ashish Kuthiala, CMO of Traceable AI joins Maria and Gianna.

 

To begin, Ashish shares his path to his current role. He was raised in several different countries and was able to experience different cultures, countries and schooling systems firsthand. He moved to the U.S. for his studies 25 years ago and now calls the country home. He has since worked in computer science, computer engineering, code writing product development and in various roles on the business side. His introduction to marketing was in product marketing, where he was able to merge his engineering background and his love for connecting people. Traceable is Ashish’s fifth startup, which he came to in the very beginning stages of the launch.

 

Each company Asish has worked for has taught him value lessons and skills which he has brought on to the next. With the mindset of experimenting a lot, learning from your experiments and reiterating a lot to find out what does and doesn't work, he believes you will be successful in any role. As a leader, it is crucial to build a culture in which employees feel free to experiment and learn from their failures. A key goal of marketing is to build a sales pipeline, which takes time and patience. Each quarter, he and his team look at all of the data to determine where they are on their trajectory.

 

Next, Ashish unpacks his fundamental approach to marketing. Today, most IT buyers educate themselves before deciding on a software. They already know what problems they want to solve, who can do it best and how much they should be paying for the service. From a marketing perspective, the most critical pieces are to be transparent, trustworthy and know your stakeholders. Employees and customers alike should be passionate about what they are building and eager to talk about it. He also addresses the common privacy concerns that transparency entails. This all comes down to velocity and moving faster than our competitors. Finally, our hosts and guest engage in a fun guessing game to reveal what career Ashish would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Ashish Kuthiala on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Ashish Kuthiala, CMO of Traceable AI joins Maria and Gianna.</p>
<p> </p>
<p>To begin, Ashish shares his path to his current role. He was raised in several different countries and was able to experience different cultures, countries and schooling systems firsthand. He moved to the U.S. for his studies 25 years ago and now calls the country home. He has since worked in computer science, computer engineering, code writing product development and in various roles on the business side. His introduction to marketing was in product marketing, where he was able to merge his engineering background and his love for connecting people. Traceable is Ashish’s fifth startup, which he came to in the very beginning stages of the launch.</p>
<p> </p>
<p>Each company Asish has worked for has taught him value lessons and skills which he has brought on to the next. With the mindset of experimenting a lot, learning from your experiments and reiterating a lot to find out what does and doesn't work, he believes you will be successful in any role. As a leader, it is crucial to build a culture in which employees feel free to experiment and learn from their failures. A key goal of marketing is to build a sales pipeline, which takes time and patience. Each quarter, he and his team look at all of the data to determine where they are on their trajectory.</p>
<p> </p>
<p>Next, Ashish unpacks his fundamental approach to marketing. Today, most IT buyers educate themselves before deciding on a software. They already know what problems they want to solve, who can do it best and how much they should be paying for the service. From a marketing perspective, the most critical pieces are to be transparent, trustworthy and know your stakeholders. Employees and customers alike should be passionate about what they are building and eager to talk about it. He also addresses the common privacy concerns that transparency entails. This all comes down to velocity and moving faster than our competitors. Finally, our hosts and guest engage in a fun guessing game to reveal what career Ashish would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Ashish Kuthiala on <a href="https://www.linkedin.com/in/ashishkuthiala/">LinkedIn</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2220</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/dd73d2d0-eae1-346c-9df0-147e4edade26]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8738979756.mp3?updated=1723026962" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It’s 2008 Again…Everything Old &amp; Horrible is New Again with Jennifer Leggio</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/68/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Jennifer Leggio, CMO at Netography, joins Maria and Gianna to discuss the changes she has seen in marketing throughout her career.

 

To begin, Jennifer shares that she began her career in journalism. In 2000, she decided to make a change and moved to Silicon Valley. She first worked for a small PR agency specializing in cybersecurity for clients. Here, she was able to spin her journalism background into PR. She fell in love with working at startups. Then, Jennifer shares her perspective that comm is separate from marketing before unpacking her perspective of the current market shift. Marketing and the economy come and go in cycles. Throughout her career so far, Jennifer has found that security is very resilient and an always-needed market. 

 

After unpacking how the journey of buyers and marketers has changed, hear what marketers can do to make sure our heads are above water with these changes. Jennifer shares that, sadly, many companies have had to make major cutbacks for their marketing teams, and there will likely be even more to come. Some leaders are making these decisions based on 2008 principles of how marketing is done. Jennifer talks a lot about the importance of doing “outside-in” programs, meaning going where the buyers are. While a sales force is important to build a business, it can’t be the only area companies rely on for growth and scale. Cutting off the resources which are more difficult to track right away will nearly always backfire. 

 

 The best communications, Jennifer explains, include industry analysts. This all comes back to go where your buyers are rather than waiting for them to come to you. Getting the right type of content that ties into your values and will move a buyer persona in the right direction requires a strong communication team. Before wrapping up, Jennifer shares her best advice for sales and marketing alignment and tips for marketers who want to become CMOs one day. Finally, they engage in a fun guessing game to reveal what career Jennifer would pursue outside of the cybersecurity marketing field. 

 

Links:

 

Follow Jennifer Leggio on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 31 May 2023 09:00:00 -0000</pubDate>
      <itunes:title>It’s 2008 Again…Everything Old &amp; Horrible is New Again with Jennifer Leggio</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Jennifer Leggio, CMO at Netography, joins Maria a...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Jennifer Leggio, CMO at Netography, joins Maria and Gianna to discuss the changes she has seen in marketing throughout her career.

 

To begin, Jennifer shares that she began her career in journalism. In 2000, she decided to make a change and moved to Silicon Valley. She first worked for a small PR agency specializing in cybersecurity for clients. Here, she was able to spin her journalism background into PR. She fell in love with working at startups. Then, Jennifer shares her perspective that comm is separate from marketing before unpacking her perspective of the current market shift. Marketing and the economy come and go in cycles. Throughout her career so far, Jennifer has found that security is very resilient and an always-needed market. 

 

After unpacking how the journey of buyers and marketers has changed, hear what marketers can do to make sure our heads are above water with these changes. Jennifer shares that, sadly, many companies have had to make major cutbacks for their marketing teams, and there will likely be even more to come. Some leaders are making these decisions based on 2008 principles of how marketing is done. Jennifer talks a lot about the importance of doing “outside-in” programs, meaning going where the buyers are. While a sales force is important to build a business, it can’t be the only area companies rely on for growth and scale. Cutting off the resources which are more difficult to track right away will nearly always backfire. 

 

 The best communications, Jennifer explains, include industry analysts. This all comes back to go where your buyers are rather than waiting for them to come to you. Getting the right type of content that ties into your values and will move a buyer persona in the right direction requires a strong communication team. Before wrapping up, Jennifer shares her best advice for sales and marketing alignment and tips for marketers who want to become CMOs one day. Finally, they engage in a fun guessing game to reveal what career Jennifer would pursue outside of the cybersecurity marketing field. 

 

Links:

 

Follow Jennifer Leggio on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Jennifer Leggio, CMO at Netography, joins Maria and Gianna to discuss the changes she has seen in marketing throughout her career.</p>
<p> </p>
<p>To begin, Jennifer shares that she began her career in journalism. In 2000, she decided to make a change and moved to Silicon Valley. She first worked for a small PR agency specializing in cybersecurity for clients. Here, she was able to spin her journalism background into PR. She fell in love with working at startups. Then, Jennifer shares her perspective that comm is separate from marketing before unpacking her perspective of the current market shift. Marketing and the economy come and go in cycles. Throughout her career so far, Jennifer has found that security is very resilient and an always-needed market. </p>
<p> </p>
<p>After unpacking how the journey of buyers and marketers has changed, hear what marketers can do to make sure our heads are above water with these changes. Jennifer shares that, sadly, many companies have had to make major cutbacks for their marketing teams, and there will likely be even more to come. Some leaders are making these decisions based on 2008 principles of how marketing is done. Jennifer talks a lot about the importance of doing “outside-in” programs, meaning going where the buyers are. While a sales force is important to build a business, it can’t be the only area companies rely on for growth and scale. Cutting off the resources which are more difficult to track right away will nearly always backfire. </p>
<p> </p>
<p> The best communications, Jennifer explains, include industry analysts. This all comes back to go where your buyers are rather than waiting for them to come to you. Getting the right type of content that ties into your values and will move a buyer persona in the right direction requires a strong communication team. Before wrapping up, Jennifer shares her best advice for sales and marketing alignment and tips for marketers who want to become CMOs one day. Finally, they engage in a fun guessing game to reveal what career Jennifer would pursue outside of the cybersecurity marketing field. </p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Jennifer Leggio on <a href="https://www.linkedin.com/in/jenniferleggio/">LinkedIn</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2114</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/387a8633-9a55-3b03-93d9-33c9a955e38e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3722887045.mp3?updated=1723026986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Journey Into Security And Digital Experience: Exploring Different Personas And Strategies For AR Program with Ashish Malpani</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/67/notes</link>
      <description>! In this episode, Ashish Malpani, the head of global product marketing for DX, joins Maria and Gianna to discuss the journey into cyber security and digital experience for AR programs.

 

Ashish shares his thoughts on digital experience, how they provide the right tools to maintain good cyber hygiene, and how to improve the cyber security program. They also try to see what the customer experience is like. He goes on and explains how DX team is spread out in different parts, the types of content Ashish sees resonating so well with developers and technical customers. There are things you can do to reach out to the practitioner developer audience but still reach a high level of management in the IT space. Ashish explains that in the space of cyber security, we are either victims of it or itself serving the narrative.

 

Ashish further explains how he dealt with analyst relation programs in the past, He explains the different analyst firms and their categorization. Foresters spend a lot of the time in research doing analyst experience, which is the experience of your product to cybersecurity analyst within the company. He shares the tips to get the most out of your product analyst. Ashish shares his opinion on the employee-to-analyst ratio and why marketers need to know employee to analyst ratio. Ashish also tells us how many people are at his firm vs. employees. Market studies can be future looking, but it’s a challenge for product marketers to talk about the future and address today's reality. People need to evolve their cyber security programs to address the needs of tomorrow.

 

Before wrapping up, Ashish is engaged by our hosts in a fun guessing game to reveal what career he would pursue outside of the cybersecurity marketing field.

 

Follow Ashish Malponi on LinkedIn, Twitter, and  Website

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 24 May 2023 11:36:00 -0000</pubDate>
      <itunes:title>Journey Into Security And Digital Experience: Exploring Different Personas And Strategies For AR Program with Ashish Malpani</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>! In this episode, Ashish Malpani, the head of global product marketing for DX, joins Maria and Gianna to discuss the journey into cyber security and digital experience for AR programs.
 
Ashish shares his thoughts on digital experience, how they pro...</itunes:subtitle>
      <itunes:summary>! In this episode, Ashish Malpani, the head of global product marketing for DX, joins Maria and Gianna to discuss the journey into cyber security and digital experience for AR programs.

 

Ashish shares his thoughts on digital experience, how they provide the right tools to maintain good cyber hygiene, and how to improve the cyber security program. They also try to see what the customer experience is like. He goes on and explains how DX team is spread out in different parts, the types of content Ashish sees resonating so well with developers and technical customers. There are things you can do to reach out to the practitioner developer audience but still reach a high level of management in the IT space. Ashish explains that in the space of cyber security, we are either victims of it or itself serving the narrative.

 

Ashish further explains how he dealt with analyst relation programs in the past, He explains the different analyst firms and their categorization. Foresters spend a lot of the time in research doing analyst experience, which is the experience of your product to cybersecurity analyst within the company. He shares the tips to get the most out of your product analyst. Ashish shares his opinion on the employee-to-analyst ratio and why marketers need to know employee to analyst ratio. Ashish also tells us how many people are at his firm vs. employees. Market studies can be future looking, but it’s a challenge for product marketers to talk about the future and address today's reality. People need to evolve their cyber security programs to address the needs of tomorrow.

 

Before wrapping up, Ashish is engaged by our hosts in a fun guessing game to reveal what career he would pursue outside of the cybersecurity marketing field.

 

Follow Ashish Malponi on LinkedIn, Twitter, and  Website

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>! In this episode, Ashish Malpani, the head of global product marketing for DX, joins Maria and Gianna to discuss the journey into cyber security and digital experience for AR programs.</p>
<p> </p>
<p>Ashish shares his thoughts on digital experience, how they provide the right tools to maintain good cyber hygiene, and how to improve the cyber security program. They also try to see what the customer experience is like. He goes on and explains how DX team is spread out in different parts, the types of content Ashish sees resonating so well with developers and technical customers. There are things you can do to reach out to the practitioner developer audience but still reach a high level of management in the IT space. Ashish explains that in the space of cyber security, we are either victims of it or itself serving the narrative.</p>
<p> </p>
<p>Ashish further explains how he dealt with analyst relation programs in the past, He explains the different analyst firms and their categorization. Foresters spend a lot of the time in research doing analyst experience, which is the experience of your product to cybersecurity analyst within the company. He shares the tips to get the most out of your product analyst. Ashish shares his opinion on the employee-to-analyst ratio and why marketers need to know employee to analyst ratio. Ashish also tells us how many people are at his firm vs. employees. Market studies can be future looking, but it’s a challenge for product marketers to talk about the future and address today's reality. People need to evolve their cyber security programs to address the needs of tomorrow.</p>
<p> </p>
<p>Before wrapping up, Ashish is engaged by our hosts in a fun guessing game to reveal what career he would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Follow Ashish Malponi on <a href="http://linkedin.com/in/ashishmalpani">LinkedIn</a>, <a href="http://ashishmalpani">Twitter</a>, and  <a href="http://ashishmalpani.com">Website</a></p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2721</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/697ea3a8-5aca-36bf-9e79-f7a443d1c79d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3842890932.mp3?updated=1723027095" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sip some #RSAC2023 tea with Maria and Gianna... From Innovative Booths to the Reunion of Marketers and Co-Marketing Activities.</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/66/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Gianna and Maria share some powerful insights into cybersecurity marketing society, what they do, and what other cybersecurity marketing societies are doing.

Gianna and Mariana shed more light on the cyber security marketing society. It is the world’s largest community for cybersecurity marketers built by cybersecurity marketers for cybersecurity marketers. The cybersecurity community has created an opportunity to get together for those working hard in cybersecurity. They have provided an all-day marketer launch for people and also did a marketer party which was completely sold out. There were around 800 people on the waitlist. The party felt like a reunion where all marketers were coming together. Mariana and Gianna continue to talk more about the changes in cybersecurity since the previous year. They say that the cybersecurity industry lacks creativity. It is great to see vendors stepping up and thinking outside the box, pushing the envelope to get creative, and having fun doing what they are doing. This year there were a lot fewer outside activities than last year. The vibe overall, from the security perspective, feels normal and big again.

Maria and Gianna also discussed their favorite booths they had seen. There are fully immersive booths with screens on the ceiling above people’s heads. Nowadays, things are moving to screening and lighting. Games are also taking the floor. Multiple people are doing comic superheroes, which is appealing to the audience. Magicians are back, and they are also drawing the crowd. There are so many ways to do things to grab attention. Some other security vendors even use sneakers for everyone to wear. There is also a continuation of the axonious campaign, controlling complexity and more. Even No name security provides rides to go to places around the city. In the marketing community industry, we do not want to lead with fear, uncertainty, and doubt, this industry is stressed enough, and we do not need to add stress from our messaging and marketing perspective. Selling, educating, and helping is a way to market, and the cybersecurity marketing society is here to help you stand out.

Finally, Gianna and Maria conclude with conferences for more cybersecurity marketers where they say cybersecurity marketing will host an annual cyber marketing conference in Texas. Cybersecurity is ready to open opportunities for marketers in cybersecurity, cybersecurity agencies, and more. If you work with cybersecurity customers and have references for all customers who are happy with your services, members can find a free and open vendor directory.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 17 May 2023 09:00:00 -0000</pubDate>
      <itunes:title>Sip some #RSAC2023 tea with Maria and Gianna... From Innovative Booths to the Reunion of Marketers and Co-Marketing Activities.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Gianna and Maria share some powerful insights int...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Gianna and Maria share some powerful insights into cybersecurity marketing society, what they do, and what other cybersecurity marketing societies are doing.

Gianna and Mariana shed more light on the cyber security marketing society. It is the world’s largest community for cybersecurity marketers built by cybersecurity marketers for cybersecurity marketers. The cybersecurity community has created an opportunity to get together for those working hard in cybersecurity. They have provided an all-day marketer launch for people and also did a marketer party which was completely sold out. There were around 800 people on the waitlist. The party felt like a reunion where all marketers were coming together. Mariana and Gianna continue to talk more about the changes in cybersecurity since the previous year. They say that the cybersecurity industry lacks creativity. It is great to see vendors stepping up and thinking outside the box, pushing the envelope to get creative, and having fun doing what they are doing. This year there were a lot fewer outside activities than last year. The vibe overall, from the security perspective, feels normal and big again.

Maria and Gianna also discussed their favorite booths they had seen. There are fully immersive booths with screens on the ceiling above people’s heads. Nowadays, things are moving to screening and lighting. Games are also taking the floor. Multiple people are doing comic superheroes, which is appealing to the audience. Magicians are back, and they are also drawing the crowd. There are so many ways to do things to grab attention. Some other security vendors even use sneakers for everyone to wear. There is also a continuation of the axonious campaign, controlling complexity and more. Even No name security provides rides to go to places around the city. In the marketing community industry, we do not want to lead with fear, uncertainty, and doubt, this industry is stressed enough, and we do not need to add stress from our messaging and marketing perspective. Selling, educating, and helping is a way to market, and the cybersecurity marketing society is here to help you stand out.

Finally, Gianna and Maria conclude with conferences for more cybersecurity marketers where they say cybersecurity marketing will host an annual cyber marketing conference in Texas. Cybersecurity is ready to open opportunities for marketers in cybersecurity, cybersecurity agencies, and more. If you work with cybersecurity customers and have references for all customers who are happy with your services, members can find a free and open vendor directory.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts, and help you become a better cybersecurity marketer! In this episode, Gianna and Maria share some powerful insights into cybersecurity marketing society, what they do, and what other cybersecurity marketing societies are doing.</p>
<p>Gianna and Mariana shed more light on the cyber security marketing society. It is the world’s largest community for cybersecurity marketers built by cybersecurity marketers for cybersecurity marketers. The cybersecurity community has created an opportunity to get together for those working hard in cybersecurity. They have provided an all-day marketer launch for people and also did a marketer party which was completely sold out. There were around 800 people on the waitlist. The party felt like a reunion where all marketers were coming together. Mariana and Gianna continue to talk more about the changes in cybersecurity since the previous year. They say that the cybersecurity industry lacks creativity. It is great to see vendors stepping up and thinking outside the box, pushing the envelope to get creative, and having fun doing what they are doing. This year there were a lot fewer outside activities than last year. The vibe overall, from the security perspective, feels normal and big again.</p>
<p>Maria and Gianna also discussed their favorite booths they had seen. There are fully immersive booths with screens on the ceiling above people’s heads. Nowadays, things are moving to screening and lighting. Games are also taking the floor. Multiple people are doing comic superheroes, which is appealing to the audience. Magicians are back, and they are also drawing the crowd. There are so many ways to do things to grab attention. Some other security vendors even use sneakers for everyone to wear. There is also a continuation of the axonious campaign, controlling complexity and more. Even No name security provides rides to go to places around the city. In the marketing community industry, we do not want to lead with fear, uncertainty, and doubt, this industry is stressed enough, and we do not need to add stress from our messaging and marketing perspective. Selling, educating, and helping is a way to market, and the cybersecurity marketing society is here to help you stand out.</p>
<p>Finally, Gianna and Maria conclude with conferences for more cybersecurity marketers where they say cybersecurity marketing will host an annual cyber marketing conference in Texas. Cybersecurity is ready to open opportunities for marketers in cybersecurity, cybersecurity agencies, and more. If you work with cybersecurity customers and have references for all customers who are happy with your services, members can find a free and open vendor directory.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>1239</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/c30ec732-71ef-34a4-9ab8-7ffa347a63b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1657583659.mp3?updated=1723026898" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Marketing in FedGov: From Space Force to Security Consultant with Wesley Belleman</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/65/notes</link>
      <description>In this episode, Wesley Belleman, Consulting Engineer at Colossal LLC,  joins Maria and Gianna to discuss marketing in the federal government.

 

Wesley began his career in the military in acquisitions, specifically as a cybersecurity operations officer. Here, he was in charge of multi-million dollar programs, acquiring cybersecurity for the space force, and more. From there, he went into Palo Alto Networks and finally Colossal LLC, a value-added reseller providing services specific to the products they sell. Because he has advertised and marketed products internally as a customer in his previous roles, Wesley has a solid understanding of the challenges marketers face. Since the Department of Defense is the country’s largest employer, there is a ton of internal business that goes on within it overall. Wesley touches on Kraken, a newly released product that the Space Force is currently leveraging for public defense.  He worked with a team of engineers and contractors to design, build and deploy the product. It required marketing to get people within the space force on board with implementing the product. Wesley also highlights the various AFCEA events coming up nationwide.

 

When building Kraken, Wesley also had to build consensus internally to get the product off the ground. He began this process by getting certified on the product and fully understanding it inside out.  On that, he leveraged the strength of his colleagues on his team to fulfill different operational roles. The final step was to get to know the customers and what exactly they are looking for. It is crucial to leave your opinions and ideals at the door and understand what the customer wants from a cybersecurity product. He also recommends all founders use the resources and team members they already have. Although it is still growing, Kraken officially launched in 2019. Finally, our guest and hosts engage in a fun guessing game to reveal what career Wesley would pursue outside of the cybersecurity marketing field.

 

 

Links:

Visit Wesley on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 10 May 2023 09:00:00 -0000</pubDate>
      <itunes:title>Marketing in FedGov: From Space Force to Security Consultant with Wesley Belleman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Wesley Belleman, Consulting Engineer at Colossal LLC,  joins Maria and Gianna to discuss marketing in the federal government.
 
Wesley began his career in the military in acquisitions, specifically as a cybersecurity operations offic...</itunes:subtitle>
      <itunes:summary>In this episode, Wesley Belleman, Consulting Engineer at Colossal LLC,  joins Maria and Gianna to discuss marketing in the federal government.

 

Wesley began his career in the military in acquisitions, specifically as a cybersecurity operations officer. Here, he was in charge of multi-million dollar programs, acquiring cybersecurity for the space force, and more. From there, he went into Palo Alto Networks and finally Colossal LLC, a value-added reseller providing services specific to the products they sell. Because he has advertised and marketed products internally as a customer in his previous roles, Wesley has a solid understanding of the challenges marketers face. Since the Department of Defense is the country’s largest employer, there is a ton of internal business that goes on within it overall. Wesley touches on Kraken, a newly released product that the Space Force is currently leveraging for public defense.  He worked with a team of engineers and contractors to design, build and deploy the product. It required marketing to get people within the space force on board with implementing the product. Wesley also highlights the various AFCEA events coming up nationwide.

 

When building Kraken, Wesley also had to build consensus internally to get the product off the ground. He began this process by getting certified on the product and fully understanding it inside out.  On that, he leveraged the strength of his colleagues on his team to fulfill different operational roles. The final step was to get to know the customers and what exactly they are looking for. It is crucial to leave your opinions and ideals at the door and understand what the customer wants from a cybersecurity product. He also recommends all founders use the resources and team members they already have. Although it is still growing, Kraken officially launched in 2019. Finally, our guest and hosts engage in a fun guessing game to reveal what career Wesley would pursue outside of the cybersecurity marketing field.

 

 

Links:

Visit Wesley on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Wesley Belleman, Consulting Engineer at Colossal LLC,  joins Maria and Gianna to discuss marketing in the federal government.</p>
<p> </p>
<p>Wesley began his career in the military in acquisitions, specifically as a cybersecurity operations officer. Here, he was in charge of multi-million dollar programs, acquiring cybersecurity for the space force, and more. From there, he went into Palo Alto Networks and finally Colossal LLC, a value-added reseller providing services specific to the products they sell. Because he has advertised and marketed products internally as a customer in his previous roles, Wesley has a solid understanding of the challenges marketers face. Since the Department of Defense is the country’s largest employer, there is a ton of internal business that goes on within it overall. Wesley touches on Kraken, a newly released product that the Space Force is currently leveraging for public defense.  He worked with a team of engineers and contractors to design, build and deploy the product. It required marketing to get people within the space force on board with implementing the product. Wesley also highlights the various AFCEA events coming up nationwide.</p>
<p> </p>
<p>When building Kraken, Wesley also had to build consensus internally to get the product off the ground. He began this process by getting certified on the product and fully understanding it inside out.  On that, he leveraged the strength of his colleagues on his team to fulfill different operational roles. The final step was to get to know the customers and what exactly they are looking for. It is crucial to leave your opinions and ideals at the door and understand what the customer wants from a cybersecurity product. He also recommends all founders use the resources and team members they already have. Although it is still growing, Kraken officially launched in 2019. Finally, our guest and hosts engage in a fun guessing game to reveal what career Wesley would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p> </p>
<p>Links:</p>
<p>Visit Wesley on <a href="https://www.linkedin.com/in/cyberwes/">LinkedIn</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2414</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/f886eca1-82c0-3f24-a94b-a6cb5af35e7e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5111137543.mp3?updated=1723027050" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Empathetic Product Marketing, from Product Launches to CABs with Beth Barach</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/64/notes</link>
      <description>This week, Beth Barach, the Director of Product Marketing at Onapsis, joins the hosts to discuss the intersection of product marketing with product launches, Cabs, and eCabs. With over 20 years of experience in tech, Beth began her career working with channel and technology partner programs, which ultimately led to her pivot into product marketing.

Beth also shares that to execute a successful product launch, it's important to create a plan and synchronize the different teams and departments involved, such as sales, marketing, customer success, and product. getting into the idea of using product launch as an opportunity to educate customers and partners on the value and benefits of the product. Lastly, Beth stressed the importance of using marketing channels to create a buzz and engage the target audience.

The conversation also touches on the importance of getting executive buy-in for a product launch. Beth gave an example of someone on the team who is often overlooked but should be included, the support team. While Maria highlighted that product marketers should aim to think beyond their usual suspects when planning a launch. Finally, Beth provided a story about a manager who was great at recognizing the importance of executive support.

Timecoded guide:

0:02:44

Product Launch at a Billion Dollar Company: People, Process, and Performance

0:04:43

Conversation on Securing Executive Buy-In for Product Launches

0:07:42

Presenting to the Executive Team: A Successful Product Launch Story

0:09:43

Conversation on Applying the RACI Model to Product Launches

0:11:51

Discussion on Detailed Content Planning for Product Launch

0:13:39

Conversation on Adapting to Delays and Roadblocks in Product Launches

0:16:05

Conversation on Empathy, Cabs, and Testimonials in the Cybersecurity Industry

0:18:04

Exploring the Benefits of Customer Advisory Boards for Product Marketers

0:25:21

Conversation Summary: Potential Career Paths for Product Marketer Beth

0:27:38

Interview with Beth Barach: Exploring the Intersection of Coaching and Entrepreneurship

Links:

Check out Beth on LinkedIn

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 03 May 2023 09:00:00 -0000</pubDate>
      <itunes:title>Empathetic Product Marketing, from Product Launches to CABs with Beth Barach</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>This week, Beth Barach, the Director of Product Marketing at Onapsis, joins the hosts to discuss the intersection of product marketing with product launches, Cabs, and eCabs. With over 20 years of experience in tech, Beth began her career working wit...</itunes:subtitle>
      <itunes:summary>This week, Beth Barach, the Director of Product Marketing at Onapsis, joins the hosts to discuss the intersection of product marketing with product launches, Cabs, and eCabs. With over 20 years of experience in tech, Beth began her career working with channel and technology partner programs, which ultimately led to her pivot into product marketing.

Beth also shares that to execute a successful product launch, it's important to create a plan and synchronize the different teams and departments involved, such as sales, marketing, customer success, and product. getting into the idea of using product launch as an opportunity to educate customers and partners on the value and benefits of the product. Lastly, Beth stressed the importance of using marketing channels to create a buzz and engage the target audience.

The conversation also touches on the importance of getting executive buy-in for a product launch. Beth gave an example of someone on the team who is often overlooked but should be included, the support team. While Maria highlighted that product marketers should aim to think beyond their usual suspects when planning a launch. Finally, Beth provided a story about a manager who was great at recognizing the importance of executive support.

Timecoded guide:

0:02:44

Product Launch at a Billion Dollar Company: People, Process, and Performance

0:04:43

Conversation on Securing Executive Buy-In for Product Launches

0:07:42

Presenting to the Executive Team: A Successful Product Launch Story

0:09:43

Conversation on Applying the RACI Model to Product Launches

0:11:51

Discussion on Detailed Content Planning for Product Launch

0:13:39

Conversation on Adapting to Delays and Roadblocks in Product Launches

0:16:05

Conversation on Empathy, Cabs, and Testimonials in the Cybersecurity Industry

0:18:04

Exploring the Benefits of Customer Advisory Boards for Product Marketers

0:25:21

Conversation Summary: Potential Career Paths for Product Marketer Beth

0:27:38

Interview with Beth Barach: Exploring the Intersection of Coaching and Entrepreneurship

Links:

Check out Beth on LinkedIn

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Beth Barach, the Director of Product Marketing at Onapsis, joins the hosts to discuss the intersection of product marketing with product launches, Cabs, and eCabs. With over 20 years of experience in tech, Beth began her career working with channel and technology partner programs, which ultimately led to her pivot into product marketing.</p>
<p>Beth also shares that to execute a successful product launch, it's important to create a plan and synchronize the different teams and departments involved, such as sales, marketing, customer success, and product. getting into the idea of using product launch as an opportunity to educate customers and partners on the value and benefits of the product. Lastly, Beth stressed the importance of using marketing channels to create a buzz and engage the target audience.</p>
<p>The conversation also touches on the importance of getting executive buy-in for a product launch. Beth gave an example of someone on the team who is often overlooked but should be included, the support team. While Maria highlighted that product marketers should aim to think beyond their usual suspects when planning a launch. Finally, Beth provided a story about a manager who was great at recognizing the importance of executive support.</p>
<p>Timecoded guide:</p>
<p>0:02:44</p>
<p>Product Launch at a Billion Dollar Company: People, Process, and Performance</p>
<p>0:04:43</p>
<p>Conversation on Securing Executive Buy-In for Product Launches</p>
<p>0:07:42</p>
<p>Presenting to the Executive Team: A Successful Product Launch Story</p>
<p>0:09:43</p>
<p>Conversation on Applying the RACI Model to Product Launches</p>
<p>0:11:51</p>
<p>Discussion on Detailed Content Planning for Product Launch</p>
<p>0:13:39</p>
<p>Conversation on Adapting to Delays and Roadblocks in Product Launches</p>
<p>0:16:05</p>
<p>Conversation on Empathy, Cabs, and Testimonials in the Cybersecurity Industry</p>
<p>0:18:04</p>
<p>Exploring the Benefits of Customer Advisory Boards for Product Marketers</p>
<p>0:25:21</p>
<p>Conversation Summary: Potential Career Paths for Product Marketer Beth</p>
<p>0:27:38</p>
<p>Interview with Beth Barach: Exploring the Intersection of Coaching and Entrepreneurship</p>
<p>Links:</p>
<p>Check out Beth on <a href="https://www.linkedin.com/in/bethbarach/">LinkedIn</a></p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com/">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>1929</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/95cb7481-cca1-35e2-ac94-bfcd8bea6a6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9497036887.mp3?updated=1723026986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Israeli vs American Cyber Marketing with Daniella Alpher</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/63/notes</link>
      <description>In this episode, Daniella Alpher, VP of Marketing at RevealSecurity joins Maria and Gianna to discuss Israeli vs American cyber marketing.

 

To begin, Daniella shares that she began her career in film and television as a producer for ABC News. In the early 2000s, tech began threatening the television industry. This inspired her to get a degree in business administration and enter the tech sector, specifically focusing on marketing. Next, Daniella highlights the differences she has noticed working as a marketer in Israel vs. America. 10% of attacks at a national level are directed at Israel, 40% of investments in cybersecurity go to Israeli companies and 16% of  cybersecurity vendors are Israeli. Compared to the size and population of Israel tech (specifically cybersecurity) is a huge income-driving sector for the country.  In the last 20-30 years, Israel also built a large strength in product and development of cybersecurity products. In more recent years, it has naturally become a hub for cybersecurity marketing.

 

For most Israeli startups, the sales portion is often based in the U.S. Marketing, however, is often a mix between the two companies. In Daniela’s experience, American marketing tends to have a more long-term philosophy, while Israelis often have a much shorter-term strategy for survival. Israeli marketers are still learning the importance of branding over performance. Most Israeli marketers are focused on selling in the U.S., but it is rare for a U.S.-based company to consider marketing in other countries. Stereotypically, Daniela shares, Israelis tend to come off rude, aggressive, and emotional to American analysts, whereas Americans are the opposite. Then, there are those smaller, technical differences like the use of WhatsApp vs. Slack for digital communication and group messages.

 

Before wrapping up, Daniela engages alongside our hosts in a fun guessing game to reveal what career she would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Daniella on Linkedin.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 26 Apr 2023 09:00:00 -0000</pubDate>
      <itunes:title>Israeli vs American Cyber Marketing with Daniella Alpher</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Daniella Alpher, VP of Marketing at RevealSecurity joins Maria and Gianna to discuss Israeli vs American cyber marketing.
 
To begin, Daniella shares that she began her career in film and television as a producer for ABC News. In the...</itunes:subtitle>
      <itunes:summary>In this episode, Daniella Alpher, VP of Marketing at RevealSecurity joins Maria and Gianna to discuss Israeli vs American cyber marketing.

 

To begin, Daniella shares that she began her career in film and television as a producer for ABC News. In the early 2000s, tech began threatening the television industry. This inspired her to get a degree in business administration and enter the tech sector, specifically focusing on marketing. Next, Daniella highlights the differences she has noticed working as a marketer in Israel vs. America. 10% of attacks at a national level are directed at Israel, 40% of investments in cybersecurity go to Israeli companies and 16% of  cybersecurity vendors are Israeli. Compared to the size and population of Israel tech (specifically cybersecurity) is a huge income-driving sector for the country.  In the last 20-30 years, Israel also built a large strength in product and development of cybersecurity products. In more recent years, it has naturally become a hub for cybersecurity marketing.

 

For most Israeli startups, the sales portion is often based in the U.S. Marketing, however, is often a mix between the two companies. In Daniela’s experience, American marketing tends to have a more long-term philosophy, while Israelis often have a much shorter-term strategy for survival. Israeli marketers are still learning the importance of branding over performance. Most Israeli marketers are focused on selling in the U.S., but it is rare for a U.S.-based company to consider marketing in other countries. Stereotypically, Daniela shares, Israelis tend to come off rude, aggressive, and emotional to American analysts, whereas Americans are the opposite. Then, there are those smaller, technical differences like the use of WhatsApp vs. Slack for digital communication and group messages.

 

Before wrapping up, Daniela engages alongside our hosts in a fun guessing game to reveal what career she would pursue outside of the cybersecurity marketing field.

 

Links:

 

Follow Daniella on Linkedin.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Daniella Alpher, VP of Marketing at RevealSecurity joins Maria and Gianna to discuss Israeli vs American cyber marketing.</p>
<p> </p>
<p>To begin, Daniella shares that she began her career in film and television as a producer for ABC News. In the early 2000s, tech began threatening the television industry. This inspired her to get a degree in business administration and enter the tech sector, specifically focusing on marketing. Next, Daniella highlights the differences she has noticed working as a marketer in Israel vs. America. 10% of attacks at a national level are directed at Israel, 40% of investments in cybersecurity go to Israeli companies and 16% of  cybersecurity vendors are Israeli. Compared to the size and population of Israel tech (specifically cybersecurity) is a huge income-driving sector for the country.  In the last 20-30 years, Israel also built a large strength in product and development of cybersecurity products. In more recent years, it has naturally become a hub for cybersecurity marketing.</p>
<p> </p>
<p>For most Israeli startups, the sales portion is often based in the U.S. Marketing, however, is often a mix between the two companies. In Daniela’s experience, American marketing tends to have a more long-term philosophy, while Israelis often have a much shorter-term strategy for survival. Israeli marketers are still learning the importance of branding over performance. Most Israeli marketers are focused on selling in the U.S., but it is rare for a U.S.-based company to consider marketing in other countries. Stereotypically, Daniela shares, Israelis tend to come off rude, aggressive, and emotional to American analysts, whereas Americans are the opposite. Then, there are those smaller, technical differences like the use of WhatsApp vs. Slack for digital communication and group messages.</p>
<p> </p>
<p>Before wrapping up, Daniela engages alongside our hosts in a fun guessing game to reveal what career she would pursue outside of the cybersecurity marketing field.</p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Daniella on <a href="https://www.linkedin.com/in/daniellaalpher/?originalSubdomain=il">Linkedin</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2655</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/7b6e9f2a-6495-33df-9460-8ba527353c68]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9648341911.mp3?updated=1723027099" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wearing Many Marketing Hats with OxEye VP Marketing, Brandon Hoe</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/62/notes</link>
      <description>This week, Brandon Hoe joins hosts Gianna and Maria to discuss controversial topics related to cybersecurity marketing. Brandon is the VP of Marketing at Oxeye and has held CMO and head of marketing positions at multiple cybersecurity companies, including SCYTHE, HackEDU, and StrongKey.

Brandon and the hosts also discuss in depth the idea that demand generation as a marketing discipline is the key to success. How while the funnel is still alive, the timelines associated with each step have changed, and the idea that companies often think that bringing on a demand gen wizard will solve all their problems. They concluded that the marketing environment is much more challenging for everyone involved, especially in the cybersecurity world.

 

Timecoded Guide:

 

[06:29] Cybersecurity Regulations and Market Trends

[12:17] Advice for Marketers Considering Joining an Israeli Startup at the Seed Stage

[16:30] Balancing Strategy and Volume of Activity in Early-Stage Leadership Positions

[17:59] Demand Generation and Critical Hires

[27:35] Pizza Toppings and Alternative Careers

[33:28] Starting a YouTube Channel and Noodle Shop Business

[34:52] Exploring the Journey of Launching a Product Company

-----------

LINKS:

Follow Brandon on LinkedIn

Check out and follow Oxeye on LinkedIn

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Thu, 20 Apr 2023 09:00:00 -0000</pubDate>
      <itunes:title>Wearing Many Marketing Hats with OxEye VP Marketing, Brandon Hoe</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>This week, Brandon Hoe joins hosts Gianna and Maria to discuss controversial topics related to cybersecurity marketing. Brandon is the VP of Marketing at Oxeye and has held CMO and head of marketing positions at multiple cybersecurity companies, incl...</itunes:subtitle>
      <itunes:summary>This week, Brandon Hoe joins hosts Gianna and Maria to discuss controversial topics related to cybersecurity marketing. Brandon is the VP of Marketing at Oxeye and has held CMO and head of marketing positions at multiple cybersecurity companies, including SCYTHE, HackEDU, and StrongKey.

Brandon and the hosts also discuss in depth the idea that demand generation as a marketing discipline is the key to success. How while the funnel is still alive, the timelines associated with each step have changed, and the idea that companies often think that bringing on a demand gen wizard will solve all their problems. They concluded that the marketing environment is much more challenging for everyone involved, especially in the cybersecurity world.

 

Timecoded Guide:

 

[06:29] Cybersecurity Regulations and Market Trends

[12:17] Advice for Marketers Considering Joining an Israeli Startup at the Seed Stage

[16:30] Balancing Strategy and Volume of Activity in Early-Stage Leadership Positions

[17:59] Demand Generation and Critical Hires

[27:35] Pizza Toppings and Alternative Careers

[33:28] Starting a YouTube Channel and Noodle Shop Business

[34:52] Exploring the Journey of Launching a Product Company

-----------

LINKS:

Follow Brandon on LinkedIn

Check out and follow Oxeye on LinkedIn

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Brandon Hoe joins hosts Gianna and Maria to discuss controversial topics related to cybersecurity marketing. Brandon is the VP of Marketing at Oxeye and has held CMO and head of marketing positions at multiple cybersecurity companies, including SCYTHE, HackEDU, and StrongKey.</p>
<p>Brandon and the hosts also discuss in depth the idea that demand generation as a marketing discipline is the key to success. How while the funnel is still alive, the timelines associated with each step have changed, and the idea that companies often think that bringing on a demand gen wizard will solve all their problems. They concluded that the marketing environment is much more challenging for everyone involved, especially in the cybersecurity world.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p> </p>
<p>[06:29] Cybersecurity Regulations and Market Trends</p>
<p>[12:17] Advice for Marketers Considering Joining an Israeli Startup at the Seed Stage</p>
<p>[16:30] Balancing Strategy and Volume of Activity in Early-Stage Leadership Positions</p>
<p>[17:59] Demand Generation and Critical Hires</p>
<p>[27:35] Pizza Toppings and Alternative Careers</p>
<p>[33:28] Starting a YouTube Channel and Noodle Shop Business</p>
<p>[34:52] Exploring the Journey of Launching a Product Company</p>
<p>-----------</p>
<p>LINKS:</p>
<p>Follow Brandon on <a href="https://www.linkedin.com/in/marketingwiz/">LinkedIn</a></p>
<p>Check out and follow Oxeye on <a href="https://www.linkedin.com/company/72734261/admin/%20https:/twitter.com/oxeyesecurity">LinkedIn</a></p>
<p>Keep up with Hacker Valley on <a href="https://hackervalley.com">our website</a>, <a href="https://www.linkedin.com/company/hackervalleystudio/">LinkedIn</a>, <a href="https://www.instagram.com/hackervalleymedia/">Instagram</a>, and <a href="https://twitter.com/TheHackerValley">Twitter</a>.</p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2370</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/cdf6bd06-43e3-3b25-88f3-57d634465650]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1886455925.mp3?updated=1723027038" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building Cyber Community with Luke Tucker</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/61/notes</link>
      <description>In this episode, Luke Tucker, VP of Marketing at Lightspin, joins Maria and Gianna to discuss building cyber community.

 

To begin, Luke unpacks his cautious optimism for the current market and shares why startups need to celebrate even the smallest wins. Prior to his current position, Luke held leadership roles in marketing at HackerOne as well as an executive role in the community side. As his very first VP marketing role, he is focused on making the lives of end users and cloud engineers better. Lightspin understands that the most efficient way to secure a cloud is to think like an attacker, then build like a graph. This is how they make their mission, to best support cloud engineers along every stage of their journey, possible.

 

Community is a popular topic within cybersecurity lately. Luke explains Hackerone’s flywheel model. It is the outliers on the fringes of communities that need to be focused on at all times. Having moderation, best practices, and onboarding experiences early on will help to instill company culture. Luke defines community as people who consistently show up to collaborate together on a common cause. It took a physical location to really collaborate on the platform. Luke recounts what it was like seeing the security team face-to-face with the hacker community. It all began with allowing collaboration as bounty sharing and reward sharing within the platform itself. Thankfully due to some of the early adopters, Hackerone was able to build some momentum As the business began to scale, it became necessary to stay up to date with the CFO. The next step was asking users what they wanted to see next on the platform. The majority of users were there to further their careers, so they were given Hacker 101 and CTF. Luke shares that the majority of these hackers just want to have a safe space to share their discoveries with other people. Another key component of community, and where a mission really accelerates, is to give your community members the stage.

 

Before wrapping up, Luke encourages listeners to join the Cybersecurity Marketing Society.  Finally, he engages in a fun guessing game and reveals what career he would pursue outside of the cybersecurity field.

 

Links:

 

Follow Luke on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.</description>
      <pubDate>Wed, 12 Apr 2023 09:00:00 -0000</pubDate>
      <itunes:title>Building Cyber Community with Luke Tucker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Luke Tucker, VP of Marketing at Lightspin, joins Maria and Gianna to discuss building cyber community.
 
To begin, Luke unpacks his cautious optimism for the current market and shares why startups need to celebrate even the smallest ...</itunes:subtitle>
      <itunes:summary>In this episode, Luke Tucker, VP of Marketing at Lightspin, joins Maria and Gianna to discuss building cyber community.

 

To begin, Luke unpacks his cautious optimism for the current market and shares why startups need to celebrate even the smallest wins. Prior to his current position, Luke held leadership roles in marketing at HackerOne as well as an executive role in the community side. As his very first VP marketing role, he is focused on making the lives of end users and cloud engineers better. Lightspin understands that the most efficient way to secure a cloud is to think like an attacker, then build like a graph. This is how they make their mission, to best support cloud engineers along every stage of their journey, possible.

 

Community is a popular topic within cybersecurity lately. Luke explains Hackerone’s flywheel model. It is the outliers on the fringes of communities that need to be focused on at all times. Having moderation, best practices, and onboarding experiences early on will help to instill company culture. Luke defines community as people who consistently show up to collaborate together on a common cause. It took a physical location to really collaborate on the platform. Luke recounts what it was like seeing the security team face-to-face with the hacker community. It all began with allowing collaboration as bounty sharing and reward sharing within the platform itself. Thankfully due to some of the early adopters, Hackerone was able to build some momentum As the business began to scale, it became necessary to stay up to date with the CFO. The next step was asking users what they wanted to see next on the platform. The majority of users were there to further their careers, so they were given Hacker 101 and CTF. Luke shares that the majority of these hackers just want to have a safe space to share their discoveries with other people. Another key component of community, and where a mission really accelerates, is to give your community members the stage.

 

Before wrapping up, Luke encourages listeners to join the Cybersecurity Marketing Society.  Finally, he engages in a fun guessing game and reveals what career he would pursue outside of the cybersecurity field.

 

Links:

 

Follow Luke on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Luke Tucker, VP of Marketing at Lightspin, joins Maria and Gianna to discuss building cyber community.</p>
<p> </p>
<p>To begin, Luke unpacks his cautious optimism for the current market and shares why startups need to celebrate even the smallest wins. Prior to his current position, Luke held leadership roles in marketing at HackerOne as well as an executive role in the community side. As his very first VP marketing role, he is focused on making the lives of end users and cloud engineers better. Lightspin understands that the most efficient way to secure a cloud is to think like an attacker, then build like a graph. This is how they make their mission, to best support cloud engineers along every stage of their journey, possible.</p>
<p> </p>
<p>Community is a popular topic within cybersecurity lately. Luke explains Hackerone’s flywheel model. It is the outliers on the fringes of communities that need to be focused on at all times. Having moderation, best practices, and onboarding experiences early on will help to instill company culture. Luke defines community as people who consistently show up to collaborate together on a common cause. It took a physical location to really collaborate on the platform. Luke recounts what it was like seeing the security team face-to-face with the hacker community. It all began with allowing collaboration as bounty sharing and reward sharing within the platform itself. Thankfully due to some of the early adopters, Hackerone was able to build some momentum As the business began to scale, it became necessary to stay up to date with the CFO. The next step was asking users what they wanted to see next on the platform. The majority of users were there to further their careers, so they were given Hacker 101 and CTF. Luke shares that the majority of these hackers just want to have a safe space to share their discoveries with other people. Another key component of community, and where a mission really accelerates, is to give your community members the stage.</p>
<p> </p>
<p>Before wrapping up, Luke encourages listeners to join the Cybersecurity Marketing Society.  Finally, he engages in a fun guessing game and reveals what career he would pursue outside of the cybersecurity field.</p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Luke on <a href="https://www.linkedin.com/in/lukettucker/">LinkedIn</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2945</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/6e04a1d1-a166-30f8-990e-4ba8f90815cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3694428347.mp3?updated=1723027063" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Meeting SDR Goals as a Marketing Leader with Cami Ragano, VP Marketing at SightGain</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/60/notes</link>
      <description>This week, Cami Ragano, VP of Marketing at SightGain, joins Maria and Gianna to share her expertise as a marketing leader managing SDRs so that SDRs over-achieve their goals!  In fact, Cami’s SDR program has helped SightGain achieve significant increases in: 

 

Demos Booked: ⬆

Demos Complete: ⬆

Pipeline Growth: ⬆ 

 

From Washington DC to Australia to London, Cami has led digital demand generation and brand campaigns that touch nearly every corner of the globe. With a focus on start-up cybersecurity SaaS enterprise software, she has built a career around innovative digital marketing campaigns and customer-focused events that drive revenue. Prior to joining SightGain, Cami was a marketing and business development leader at Cybrary, Endgame, Invincea (acquired by Sophos), and Risk Analytics—where she developed go-to-market strategies that disrupted and dominated the cybersecurity industry. Cami graduated from Radford University with a B.S. in Communications specializing in Public Relations and a minor in Marketing. In her free time she enjoys spending time with her wife and three golden doodles in Richmond, VA hiking, exploring, and brewery hopping.

 

Connect with Cami on LinkedIn.

Visit the SightGain website or the company LinkedIn page. 

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 05 Apr 2023 09:00:00 -0000</pubDate>
      <itunes:title>Meeting SDR Goals as a Marketing Leader with Cami Ragano, VP Marketing at SightGain</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>This week, Cami Ragano, VP of Marketing at SightGain, joins Maria and Gianna to share her expertise as a marketing leader managing SDRs so that SDRs over-achieve their goals!  In fact, Cami’s SDR program has helped SightGain achieve significant incre...</itunes:subtitle>
      <itunes:summary>This week, Cami Ragano, VP of Marketing at SightGain, joins Maria and Gianna to share her expertise as a marketing leader managing SDRs so that SDRs over-achieve their goals!  In fact, Cami’s SDR program has helped SightGain achieve significant increases in: 

 

Demos Booked: ⬆

Demos Complete: ⬆

Pipeline Growth: ⬆ 

 

From Washington DC to Australia to London, Cami has led digital demand generation and brand campaigns that touch nearly every corner of the globe. With a focus on start-up cybersecurity SaaS enterprise software, she has built a career around innovative digital marketing campaigns and customer-focused events that drive revenue. Prior to joining SightGain, Cami was a marketing and business development leader at Cybrary, Endgame, Invincea (acquired by Sophos), and Risk Analytics—where she developed go-to-market strategies that disrupted and dominated the cybersecurity industry. Cami graduated from Radford University with a B.S. in Communications specializing in Public Relations and a minor in Marketing. In her free time she enjoys spending time with her wife and three golden doodles in Richmond, VA hiking, exploring, and brewery hopping.

 

Connect with Cami on LinkedIn.

Visit the SightGain website or the company LinkedIn page. 

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Cami Ragano, VP of Marketing at <a href="https://sightgain.com/">SightGain,</a> joins Maria and Gianna to share her expertise as a marketing leader managing SDRs so that SDRs over-achieve their goals!  In fact, Cami’s SDR program has helped SightGain achieve significant increases in: </p>
<p> </p>
<p>Demos Booked: ⬆</p>
<p>Demos Complete: ⬆</p>
<p>Pipeline Growth: ⬆ </p>
<p> </p>
<p>From Washington DC to Australia to London, Cami has led digital demand generation and brand campaigns that touch nearly every corner of the globe. With a focus on start-up cybersecurity SaaS enterprise software, she has built a career around innovative digital marketing campaigns and customer-focused events that drive revenue. Prior to joining SightGain, Cami was a marketing and business development leader at Cybrary, Endgame, Invincea (acquired by Sophos), and Risk Analytics—where she developed go-to-market strategies that disrupted and dominated the cybersecurity industry. Cami graduated from Radford University with a B.S. in Communications specializing in Public Relations and a minor in Marketing. In her free time she enjoys spending time with her wife and three golden doodles in Richmond, VA hiking, exploring, and brewery hopping.</p>
<p> </p>
<p>Connect with Cami on <a href="https://www.linkedin.com/in/cameron-ragano/">LinkedIn</a>.</p>
<p>Visit the <a href="https://sightgain.com/">SightGain website</a> or the company <a href="https://www.linkedin.com/company/sightgain/">LinkedIn page. </a></p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2367</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/96f1d38a-24a8-3a0f-91be-38b90f506a0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2233142154.mp3?updated=1723027020" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Creating Digital Experiences from Prospect to Upsell with James Kessinger, CMO at Hushly</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/59/notes</link>
      <description>This week, Hushly CMO James Kessinger joins hosts Gianna and Maria to talk about the "bowtie" funnel and marketing's new(er) role in creating upsell and cross-sell opportunities. They discuss ABM, the unique buyer in cybersecurity, and tying experiences across the digital journey. James also gives them a peek under the hood into how Hushly uses their integrated experience cloud to market to marketers like us, and shares the data that Hushly has aggregated from their platform on ABM for cybersecurity buying.

About James: James Kessinger has been the CMO at Hushly over the past 5 years.  He’s expanded his responsibilities and taken on the title of COO with overarching responsibilities for Marketing, Customer Success, Sales, Partnerships, and Revenue Operations. James has built a 20+ year career working at global enterprise technology companies in hardware, software, security, virtualization, SaaS and Cloud. He has held leadership and executive roles across marketing functions such as brand, demand generation, corporate marketing, digital marketing, segment marketing, product marketing, services marketing, along with field and partner marketing where he has led both large marketing organizations and smaller teams.  

Connect with James on LinkedIn: https://www.linkedin.com/in/jamesbkessinger/

Reach out at james [at] hushly.com 

Grab the Hushly cybersecurity marketing report, and learn more about how Hushly helps marketers improve demand generation and ABM results: https://www.hushly.com/solution-cybersecurity-marketing/ 

Learn about the Cybersecurity Marketing Society Party for Marketers at RSAC2023 here: https://cybersecuritymarketingsociety.com/event/party-rsa-2023/

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Thu, 30 Mar 2023 10:00:00 -0000</pubDate>
      <itunes:title>Creating Digital Experiences from Prospect to Upsell with James Kessinger, CMO at Hushly</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>This week, Hushly CMO James Kessinger joins hosts Gianna and Maria to talk about the "bowtie" funnel and marketing's new(er) role in creating upsell and cross-sell opportunities. They discuss ABM, the unique buyer in cybersecurity, and tying experien...</itunes:subtitle>
      <itunes:summary>This week, Hushly CMO James Kessinger joins hosts Gianna and Maria to talk about the "bowtie" funnel and marketing's new(er) role in creating upsell and cross-sell opportunities. They discuss ABM, the unique buyer in cybersecurity, and tying experiences across the digital journey. James also gives them a peek under the hood into how Hushly uses their integrated experience cloud to market to marketers like us, and shares the data that Hushly has aggregated from their platform on ABM for cybersecurity buying.

About James: James Kessinger has been the CMO at Hushly over the past 5 years.  He’s expanded his responsibilities and taken on the title of COO with overarching responsibilities for Marketing, Customer Success, Sales, Partnerships, and Revenue Operations. James has built a 20+ year career working at global enterprise technology companies in hardware, software, security, virtualization, SaaS and Cloud. He has held leadership and executive roles across marketing functions such as brand, demand generation, corporate marketing, digital marketing, segment marketing, product marketing, services marketing, along with field and partner marketing where he has led both large marketing organizations and smaller teams.  

Connect with James on LinkedIn: https://www.linkedin.com/in/jamesbkessinger/

Reach out at james [at] hushly.com 

Grab the Hushly cybersecurity marketing report, and learn more about how Hushly helps marketers improve demand generation and ABM results: https://www.hushly.com/solution-cybersecurity-marketing/ 

Learn about the Cybersecurity Marketing Society Party for Marketers at RSAC2023 here: https://cybersecuritymarketingsociety.com/event/party-rsa-2023/

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, <a href="https://www.hushly.com/solution-cybersecurity-marketing/">Hushly</a> CMO <a href="https://www.linkedin.com/in/jamesbkessinger/">James Kessinger</a> joins hosts Gianna and Maria to talk about the "bowtie" funnel and marketing's new(er) role in creating upsell and cross-sell opportunities. They discuss ABM, the unique buyer in cybersecurity, and tying experiences across the digital journey. James also gives them a peek under the hood into how Hushly uses their integrated experience cloud to market to marketers like us, and shares the data that Hushly has aggregated from their platform on ABM for cybersecurity buying.</p>
<p>About James: James Kessinger has been the CMO at Hushly over the past 5 years.  He’s expanded his responsibilities and taken on the title of COO with overarching responsibilities for Marketing, Customer Success, Sales, Partnerships, and Revenue Operations. James has built a 20+ year career working at global enterprise technology companies in hardware, software, security, virtualization, SaaS and Cloud. He has held leadership and executive roles across marketing functions such as brand, demand generation, corporate marketing, digital marketing, segment marketing, product marketing, services marketing, along with field and partner marketing where he has led both large marketing organizations and smaller teams.  </p>
<p>Connect with James on LinkedIn: <a href="https://www.linkedin.com/in/jamesbkessinger/">https://www.linkedin.com/in/jamesbkessinger/</a></p>
<p>Reach out at james [at] hushly.com </p>
<p>Grab the Hushly cybersecurity marketing report, and learn more about how Hushly helps marketers improve demand generation and ABM results: <a href="https://www.hushly.com/solution-cybersecurity-marketing/">https://www.hushly.com/solution-cybersecurity-marketing/</a> </p>
<p>Learn about the Cybersecurity Marketing Society Party for Marketers at RSAC2023 here:<a href="https://cybersecuritymarketingsociety.com/event/party-rsa-2023/"> https://cybersecuritymarketingsociety.com/event/party-rsa-2023/</a></p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2316</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/18a933dc-41eb-3ec1-ab66-a800fc147871]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2229657116.mp3?updated=1723026963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Demand Gen: The Most Misunderstood Marketing Title</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/58/notes</link>
      <description>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Tom Kish, Director of Growth Marketing at CardinalOps, joins Maria and Gianna to discuss demand gen and more!

 

To begin, Tom unpacks the difference between the titles demand gen and growth, both of which he has held at various points in his career. Demand gen is a time-consuming role and requires balancing quick wins with long term strategies. Typically, a marketing team will come in to build some foundational elements before demand gen enters the scene to scale up. Since demand gen is so closely tied to pipeline, it is also easily and quickly measured. Tom shares the benefits of working for organizations who were operating with a tight budget and how he has carried that mindset with him to larger organizations. While the goal of demand gen is to create opportunities and revenue, the process of getting there is still part of demand gen, too. There is no one size fits all when it comes to demand gen. Marketers should be constantly adding new things to their toolbox and know when (and when to!) not apply them.

 

Next, Tom shares the strategies which he has found most successful in his demand gen roles. They all come back to finding the proper balance among the fundamentals goals of creating demand, identifying demand and capturing demand. A successful framework not only finds the proper balance of these things, but ensures that they all flow together seamlessly while covering all of their bases. Checking your social engagement is also really important. Tom’s team has designated people who manually identify the individuals who regularly interact with their posts. Building off this, he elaborates on the lack of innovation and creativity he often sees in marketing as a result of the rise of automation and data. His most successful marketing campaigns have been those that were totally creative and were not based on previous engagement.

 

Before wrapping up, Tom reveals his favorite thing about being a member of the Cybersecurity Marketing Society now that he has been a member for two years. Finally, he engages in a fun guessing game and reveals what career he would pursue outside of the cybersecurity field.

 

Links:

 

Follow Tom on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Thu, 16 Mar 2023 10:00:00 -0000</pubDate>
      <itunes:title>Demand Gen: The Most Misunderstood Marketing Title</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Tom Kish, Director of Growth Marketing at Cardinal...</itunes:subtitle>
      <itunes:summary>Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Tom Kish, Director of Growth Marketing at CardinalOps, joins Maria and Gianna to discuss demand gen and more!

 

To begin, Tom unpacks the difference between the titles demand gen and growth, both of which he has held at various points in his career. Demand gen is a time-consuming role and requires balancing quick wins with long term strategies. Typically, a marketing team will come in to build some foundational elements before demand gen enters the scene to scale up. Since demand gen is so closely tied to pipeline, it is also easily and quickly measured. Tom shares the benefits of working for organizations who were operating with a tight budget and how he has carried that mindset with him to larger organizations. While the goal of demand gen is to create opportunities and revenue, the process of getting there is still part of demand gen, too. There is no one size fits all when it comes to demand gen. Marketers should be constantly adding new things to their toolbox and know when (and when to!) not apply them.

 

Next, Tom shares the strategies which he has found most successful in his demand gen roles. They all come back to finding the proper balance among the fundamentals goals of creating demand, identifying demand and capturing demand. A successful framework not only finds the proper balance of these things, but ensures that they all flow together seamlessly while covering all of their bases. Checking your social engagement is also really important. Tom’s team has designated people who manually identify the individuals who regularly interact with their posts. Building off this, he elaborates on the lack of innovation and creativity he often sees in marketing as a result of the rise of automation and data. His most successful marketing campaigns have been those that were totally creative and were not based on previous engagement.

 

Before wrapping up, Tom reveals his favorite thing about being a member of the Cybersecurity Marketing Society now that he has been a member for two years. Finally, he engages in a fun guessing game and reveals what career he would pursue outside of the cybersecurity field.

 

Links:

 

Follow Tom on LinkedIn.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Welcome to Breaking Through in Cybersecurity Marketing, </em>where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Tom Kish, Director of Growth Marketing at <a href="https://www.cardinalops.com/">CardinalOps</a>, joins Maria and Gianna to discuss demand gen and more!</p>
<p> </p>
<p>To begin, Tom unpacks the difference between the titles demand gen and growth, both of which he has held at various points in his career. Demand gen is a time-consuming role and requires balancing quick wins with long term strategies. Typically, a marketing team will come in to build some foundational elements before demand gen enters the scene to scale up. Since demand gen is so closely tied to pipeline, it is also easily and quickly measured. Tom shares the benefits of working for organizations who were operating with a tight budget and how he has carried that mindset with him to larger organizations. While the goal of demand gen is to create opportunities and revenue, the process of getting there is still part of demand gen, too. There is no one size fits all when it comes to demand gen. Marketers should be constantly adding new things to their toolbox and know when (and when to!) not apply them.</p>
<p> </p>
<p>Next, Tom shares the strategies which he has found most successful in his demand gen roles. They all come back to finding the proper balance among the fundamentals goals of creating demand, identifying demand and capturing demand. A successful framework not only finds the proper balance of these things, but ensures that they all flow together seamlessly while covering all of their bases. Checking your social engagement is also really important. Tom’s team has designated people who manually identify the individuals who regularly interact with their posts. Building off this, he elaborates on the lack of innovation and creativity he often sees in marketing as a result of the rise of automation and data. His most successful marketing campaigns have been those that were totally creative and were not based on previous engagement.</p>
<p> </p>
<p>Before wrapping up, Tom reveals his favorite thing about being a member of the Cybersecurity Marketing Society now that he has been a member for two years. Finally, he engages in a fun guessing game and reveals what career he would pursue outside of the cybersecurity field.</p>
<p> </p>
<p>Links:</p>
<p> </p>
<p>Follow Tom on <a href="https://www.linkedin.com/in/tom-kish/">LinkedIn</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com/"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2202</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/bbf9090a-cb13-36e3-8f0f-428614f13b8c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1930798301.mp3?updated=1723026933" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building Relationships with Security Practitioners in Cybersecurity with Samara Williams</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/57/notes</link>
      <description>In this episode, Samara Williams, Senior Manager of Security Engineering at New Relic, joins Maria and Gianna to share her insights on building relationships and making strategic partnerships in the cybersecurity industry. She talks about the importance of trust and transparency in building successful partnerships, and how working with vendors and other industry players can help organizations make informed decisions and stay ahead of emerging threats.

Samara also shares her perspective on the role of VARs and how they can serve as an extension of a security team, providing valuable feedback on tools and partnerships. She emphasizes the need for VARs to understand an organization's goals and pain points in order to provide the best possible solutions, and stresses the importance of transparency in the VAR-buyer relationship.

This episode provides valuable insights and practical advice on building successful partnerships and collaborations in the cybersecurity industry. Whether you're a security practitioner, vendor, or partner, Samara's experiences and perspectives can help guide you towards more effective and mutually beneficial relationships





 
Follow Samara on LinkedIn

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 08 Mar 2023 14:12:10 -0000</pubDate>
      <itunes:title>Building Relationships with Security Practitioners in Cybersecurity with Samara Williams</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>





In this episode, Samara Williams, Senior Manager of Security Engineering at New Relic, joins Maria and Gianna to share her insights on building relationships and making strategic partnerships in the cybersecurity industry. She talks about the i...</itunes:subtitle>
      <itunes:summary>In this episode, Samara Williams, Senior Manager of Security Engineering at New Relic, joins Maria and Gianna to share her insights on building relationships and making strategic partnerships in the cybersecurity industry. She talks about the importance of trust and transparency in building successful partnerships, and how working with vendors and other industry players can help organizations make informed decisions and stay ahead of emerging threats.

Samara also shares her perspective on the role of VARs and how they can serve as an extension of a security team, providing valuable feedback on tools and partnerships. She emphasizes the need for VARs to understand an organization's goals and pain points in order to provide the best possible solutions, and stresses the importance of transparency in the VAR-buyer relationship.

This episode provides valuable insights and practical advice on building successful partnerships and collaborations in the cybersecurity industry. Whether you're a security practitioner, vendor, or partner, Samara's experiences and perspectives can help guide you towards more effective and mutually beneficial relationships





 
Follow Samara on LinkedIn

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[





<p>In this episode, Samara Williams, Senior Manager of Security Engineering at New Relic, joins Maria and Gianna to share her insights on building relationships and making strategic partnerships in the cybersecurity industry. She talks about the importance of trust and transparency in building successful partnerships, and how working with vendors and other industry players can help organizations make informed decisions and stay ahead of emerging threats.</p>
<p>Samara also shares her perspective on the role of VARs and how they can serve as an extension of a security team, providing valuable feedback on tools and partnerships. She emphasizes the need for VARs to understand an organization's goals and pain points in order to provide the best possible solutions, and stresses the importance of transparency in the VAR-buyer relationship.</p>
<p>This episode provides valuable insights and practical advice on building successful partnerships and collaborations in the cybersecurity industry. Whether you're a security practitioner, vendor, or partner, Samara's experiences and perspectives can help guide you towards more effective and mutually beneficial relationships</p>




 
Follow Samara on <a href="https://www.linkedin.com/in/samara-r-williams-%F0%9F%94%B8%EF%B8%8F-9aa24247/">LinkedIn</a>

<p>Keep up with Hacker Valley on<a href="https://hackervalley.com"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>




]]>
      </content:encoded>
      <itunes:duration>2411</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/7c583706-9812-3495-ba86-b92b59b19ea7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2157130731.mp3?updated=1723027035" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Driving Business Value Through Field Marketing with Michelle Radlowski</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/56/notes</link>
      <description>In this episode, Gianna and Maria interview Michelle Radlowski, Sr. Director, AMS &amp; EMEA Regional Marketing and ABM at DigiCert, Inc. (former Director of Regional Marketing at Zscaler). Michelle shares her experience of working in the IT tech space for over 15 years, starting in a small startup that got acquired twice and ultimately became part of Dell Software Group, before joining Zscaler as employee 240, and now the company has almost 6,000 employees globally. She explains that field marketing, which she started doing at Zscaler, is not just about planning events but driving campaign execution in-region, focusing on account engagement, and landing campaigns from corporate marketing. Michelle discusses the misconception about field marketing being solely administrative and event planning, and how her role has evolved to encompass much more. 

 

Michelle talks about the importance of aligning with the sales team and building relationships with them to drive business value. She explains that it is essential to understand the sales team's objectives, pain points, accounts, and personas to align marketing plans with them. She also emphasizes the significance of tracking data to measure the success of field marketing programs. Michelle shares her journey of transitioning from being a marketer who focused on lead generation to a marketer who aligned with the sales team's goals of revenue and pipeline creation. Michelle also highlights the significance of partner ecosystems, and she talks about how Zscaler has a large partner ecosystem, including strategic alliance partners, service providers, and system integrators. She emphasizes the need for a strategic approach to partner marketing that involves sales leadership alignment, account mapping, messaging, and training. Michelle concludes that a better-together story with partners that focuses on bettering the customer experience is a powerful message.





Follow Michelle on LinkedIn

The Concert in the Clouds

Michelle’s Non-profit Experience

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 01 Mar 2023 10:00:00 -0000</pubDate>
      <itunes:title>Driving Business Value Through Field Marketing with Michelle Radlowski</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Gianna and Maria interview Michelle Radlowski, Sr. Director, AMS &amp; EMEA Regional Marketing and ABM at DigiCert, Inc. (former Director of Regional Marketing at Zscaler). Michelle shares her experience of working in the IT tech space f...</itunes:subtitle>
      <itunes:summary>In this episode, Gianna and Maria interview Michelle Radlowski, Sr. Director, AMS &amp; EMEA Regional Marketing and ABM at DigiCert, Inc. (former Director of Regional Marketing at Zscaler). Michelle shares her experience of working in the IT tech space for over 15 years, starting in a small startup that got acquired twice and ultimately became part of Dell Software Group, before joining Zscaler as employee 240, and now the company has almost 6,000 employees globally. She explains that field marketing, which she started doing at Zscaler, is not just about planning events but driving campaign execution in-region, focusing on account engagement, and landing campaigns from corporate marketing. Michelle discusses the misconception about field marketing being solely administrative and event planning, and how her role has evolved to encompass much more. 

 

Michelle talks about the importance of aligning with the sales team and building relationships with them to drive business value. She explains that it is essential to understand the sales team's objectives, pain points, accounts, and personas to align marketing plans with them. She also emphasizes the significance of tracking data to measure the success of field marketing programs. Michelle shares her journey of transitioning from being a marketer who focused on lead generation to a marketer who aligned with the sales team's goals of revenue and pipeline creation. Michelle also highlights the significance of partner ecosystems, and she talks about how Zscaler has a large partner ecosystem, including strategic alliance partners, service providers, and system integrators. She emphasizes the need for a strategic approach to partner marketing that involves sales leadership alignment, account mapping, messaging, and training. Michelle concludes that a better-together story with partners that focuses on bettering the customer experience is a powerful message.





Follow Michelle on LinkedIn

The Concert in the Clouds

Michelle’s Non-profit Experience

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Gianna and Maria interview Michelle Radlowski, Sr. Director, AMS &amp; EMEA Regional Marketing and ABM at DigiCert, Inc. (former Director of Regional Marketing at Zscaler). Michelle shares her experience of working in the IT tech space for over 15 years, starting in a small startup that got acquired twice and ultimately became part of Dell Software Group, before joining Zscaler as employee 240, and now the company has almost 6,000 employees globally. She explains that field marketing, which she started doing at Zscaler, is not just about planning events but driving campaign execution in-region, focusing on account engagement, and landing campaigns from corporate marketing. Michelle discusses the misconception about field marketing being solely administrative and event planning, and how her role has evolved to encompass much more. </p>
<p> </p>
<p>Michelle talks about the importance of aligning with the sales team and building relationships with them to drive business value. She explains that it is essential to understand the sales team's objectives, pain points, accounts, and personas to align marketing plans with them. She also emphasizes the significance of tracking data to measure the success of field marketing programs. Michelle shares her journey of transitioning from being a marketer who focused on lead generation to a marketer who aligned with the sales team's goals of revenue and pipeline creation. Michelle also highlights the significance of partner ecosystems, and she talks about how Zscaler has a large partner ecosystem, including strategic alliance partners, service providers, and system integrators. She emphasizes the need for a strategic approach to partner marketing that involves sales leadership alignment, account mapping, messaging, and training. Michelle concludes that a better-together story with partners that focuses on bettering the customer experience is a powerful message.</p>
<p><br>
<br>
</p>
<p>Follow Michelle on <a href="https://www.linkedin.com/in/michelleradlowski/">LinkedIn</a></p>
<p><a href="https://www.zscaler.com/blogs/zscaler-life/day-cloud-education-and-entertainment-good-cause">The Concert in the Clouds</a></p>
<p><a href="https://firstdescents.org/">Michelle’s Non-profit Experience</a></p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2103</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/0c588701-9f84-3729-ac46-39c60138e586]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8523429041.mp3?updated=1723026998" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Empathy and Marketing Soft Skills with Kelsey LaBelle</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/55/notes</link>
      <description>This week, Kelsey LaBelle joins hosts Gianna and Maria to talk about marketing soft skills and returning to empathy in the workplace. Kelsey, who is the VP of Marketing at DomainTools, also shares how she works soft skills in her role at the company. Along with the emotional skills, Kelsey goes into creative ways to generate lead pipelines, why you should build trust with an audience, and shares the nuts and bolts of podcast production. Listen in for some deep talk on marketing—and lots of puns!

 

Timecoded Guide:

[07:28] Wrapping uniqueness and empathy into marketing

[15:26] Building lead pipelines with domain blooms 

[32:00] Podcast workflow and process of production 

[34:45] Can you be happy at work?  

[36:04] Closing with the guessing game  

----------

Definitions: 

DDoS: DDoS or DDoS’ing stands for ‘denial of service attack.” This is a cyberattack in which the perpetrator attempts to render a network resource unavailable to its users by disrupting the services of a host connected to the network. 

SANS: SANS stands for SysAdmin, Audit, Network, and Security and is the world’s largest cybersecurity research and training organization.

DNS: DNS stands for Domain Name System which makes the internet accessible by allowing the use of domain names.

-----------

Links:

Spend some time with Kelsey on Mastodon and Twitter @punsandrosess

Follow Kelsey on LinkedIn.

Visit DomainTools on LinkedIn and Twitter.

Check out the DomainTools website.

Tune into the Breaking Badness podcast.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 22 Feb 2023 10:00:00 -0000</pubDate>
      <itunes:title>Empathy and Marketing Soft Skills with Kelsey LaBelle</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>This week, Kelsey LaBelle joins hosts Gianna and Maria to talk about marketing soft skills and returning to empathy in the workplace. Kelsey, who is the VP of Marketing at DomainTools, also shares how she works soft skills in her role at the company....</itunes:subtitle>
      <itunes:summary>This week, Kelsey LaBelle joins hosts Gianna and Maria to talk about marketing soft skills and returning to empathy in the workplace. Kelsey, who is the VP of Marketing at DomainTools, also shares how she works soft skills in her role at the company. Along with the emotional skills, Kelsey goes into creative ways to generate lead pipelines, why you should build trust with an audience, and shares the nuts and bolts of podcast production. Listen in for some deep talk on marketing—and lots of puns!

 

Timecoded Guide:

[07:28] Wrapping uniqueness and empathy into marketing

[15:26] Building lead pipelines with domain blooms 

[32:00] Podcast workflow and process of production 

[34:45] Can you be happy at work?  

[36:04] Closing with the guessing game  

----------

Definitions: 

DDoS: DDoS or DDoS’ing stands for ‘denial of service attack.” This is a cyberattack in which the perpetrator attempts to render a network resource unavailable to its users by disrupting the services of a host connected to the network. 

SANS: SANS stands for SysAdmin, Audit, Network, and Security and is the world’s largest cybersecurity research and training organization.

DNS: DNS stands for Domain Name System which makes the internet accessible by allowing the use of domain names.

-----------

Links:

Spend some time with Kelsey on Mastodon and Twitter @punsandrosess

Follow Kelsey on LinkedIn.

Visit DomainTools on LinkedIn and Twitter.

Check out the DomainTools website.

Tune into the Breaking Badness podcast.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Kelsey LaBelle joins hosts Gianna and Maria to talk about marketing soft skills and returning to empathy in the workplace. Kelsey, who is the VP of Marketing at DomainTools, also shares how she works soft skills in her role at the company. Along with the emotional skills, Kelsey goes into creative ways to generate lead pipelines, why you should build trust with an audience, and shares the nuts and bolts of podcast production. Listen in for some deep talk on marketing—and lots of puns!</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[07:28] Wrapping uniqueness and empathy into marketing</p>
<p>[15:26] Building lead pipelines with domain blooms </p>
<p>[32:00] Podcast workflow and process of production </p>
<p>[34:45] Can you be happy at work?  </p>
<p>[36:04] Closing with the guessing game  </p>
<p>----------</p>
<p>Definitions: </p>
<p>DDoS: DDoS or DDoS’ing stands for ‘denial of service attack.” This is a cyberattack in which the perpetrator attempts to render a network resource unavailable to its users by disrupting the services of a host connected to the network. </p>
<p>SANS: SANS stands for SysAdmin, Audit, Network, and Security and is the world’s largest cybersecurity research and training organization.</p>
<p>DNS: DNS stands for Domain Name System which makes the internet accessible by allowing the use of domain names.</p>
<p>-----------</p>
<p>Links:</p>
<p>Spend some time with Kelsey on <a href="https://joinmastodon.org/">Mastodon</a> and <a href="https://twitter.com/punsandrosess">Twitter</a> @punsandrosess</p>
<p>Follow Kelsey on <a href="https://www.linkedin.com/in/kelsey-labelle-b53b2038/">LinkedIn</a>.</p>
<p>Visit DomainTools on <a href="https://www.linkedin.com/company/domaintools/">LinkedIn</a> and <a href="https://twitter.com/DomainTools">Twitter</a>.</p>
<p>Check out the DomainTools <a href="https://www.domaintools.com/">website</a>.</p>
<p>Tune into the Breaking Badness <a href="https://podcasts.apple.com/us/podcast/breaking-badness/id1456143419">podcast</a>.</p>
<p>Keep up with Hacker Valley on <a href="https://hackervalley.com">our website</a>, <a href="https://www.linkedin.com/company/hackervalleystudio/">LinkedIn</a>, <a href="https://www.instagram.com/hackervalleymedia/">Instagram</a>, and <a href="https://twitter.com/TheHackerValley">Twitter</a>.</p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2861</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/55ac325e-5519-3948-bd4d-5e682bed7c6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7195627605.mp3?updated=1723027200" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building A Media Program with Claire McKenna and Michelle Rawlings</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/54/notes</link>
      <description>This week, Claire Mckenna and Michelle Rawlings join us from BARR Advisory to talk about their roles and how they work with numerous people in the field to bolster their company’s goals. Claire is the senior writer and researcher at BARR while Michelle is the media coordinator. Together, they discuss communicating with SMEs, connecting experts in the field, and how they get everyone in their company involved with outreach through a curated media program. 

 

Timecoded Guide:

[06:09] Incentivizing SMEs and finding content

[10:46] The Media BARR Program

[14:12] Choosing content for the program

[18:43] Challenges met with the BARR program

[23:45] ROI on the Media BARR Program 



----------

Links:

Follow Claire on LinkedIn.

Spend some time with Michelle on Twitter and LinkedIn.

Visit BARR Advisory on LinkedIn and Twitter.

Check out the BARR Advisory website

Go back and listen to our previous episode on recycling brand content.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 15 Feb 2023 10:00:00 -0000</pubDate>
      <itunes:title>Building A Media Program with Claire McKenna and Michelle Rawlings</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>This week, Claire Mckenna and Michelle Rawlings join us from BARR Advisory to talk about their roles and how they work with numerous people in the field to bolster their company’s goals. Claire is the senior writer and researcher at BARR while Michel...</itunes:subtitle>
      <itunes:summary>This week, Claire Mckenna and Michelle Rawlings join us from BARR Advisory to talk about their roles and how they work with numerous people in the field to bolster their company’s goals. Claire is the senior writer and researcher at BARR while Michelle is the media coordinator. Together, they discuss communicating with SMEs, connecting experts in the field, and how they get everyone in their company involved with outreach through a curated media program. 

 

Timecoded Guide:

[06:09] Incentivizing SMEs and finding content

[10:46] The Media BARR Program

[14:12] Choosing content for the program

[18:43] Challenges met with the BARR program

[23:45] ROI on the Media BARR Program 



----------

Links:

Follow Claire on LinkedIn.

Spend some time with Michelle on Twitter and LinkedIn.

Visit BARR Advisory on LinkedIn and Twitter.

Check out the BARR Advisory website

Go back and listen to our previous episode on recycling brand content.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Claire Mckenna and Michelle Rawlings join us from BARR Advisory to talk about their roles and how they work with numerous people in the field to bolster their company’s goals. Claire is the senior writer and researcher at BARR while Michelle is the media coordinator. Together, they discuss communicating with SMEs, connecting experts in the field, and how they get everyone in their company involved with outreach through a curated media program. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[06:09] Incentivizing SMEs and finding content</p>
<p>[10:46] The Media BARR Program</p>
<p>[14:12] Choosing content for the program</p>
<p>[18:43] Challenges met with the BARR program</p>
<p>[23:45] ROI on the Media BARR Program <br>
<br>
</p>
<p>----------</p>
<p>Links:</p>
<p>Follow Claire on <a href="https://www.linkedin.com/in/clairemckenna98/">LinkedIn</a>.</p>
<p>Spend some time with Michelle on <a href="https://twitter.com/MichelleRawlngs">Twitter</a> and <a href="https://www.linkedin.com/in/michellerawlngs/">LinkedIn</a>.</p>
<p>Visit BARR Advisory on <a href="https://www.linkedin.com/company/barradvisory/">LinkedIn</a> and <a href="https://twitter.com/barradvisory">Twitter</a>.</p>
<p>Check out the BARR Advisory <a href="https://www.barradvisory.com/">website</a></p>
<p>Go back and listen to our previous <a href="https://hackervalley.com/breaking-through-in-cybersecurity-marketing/recycling-and-marketing-brand-content-with-brittany-geronimo/">episode</a> on recycling brand content.</p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>1958</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/e84cafe9-31f0-37bf-94e2-8274faf5a71b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2926175513.mp3?updated=1723026966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Be a Pro at Generating Demand with Chris Spellman</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/53/notes</link>
      <description>Joining us this week is Chris Spellman, Senior Demand Generation Manager at SCYTHE. Chris has been in cybersecurity marketing for over six years and has also worked in marketing operations and analytics. Gianna and Maria ask Chris about his marketing expertise as they cover gated vs ungated content, demand gen, analytics, and much more. Also, listen in to hear about Chris’s fantasy novel trilogy that he authors with his wife!

 

Timecoded Guide:

[06:49] Creative ways to generate demand

[09:58] Gated or ungated content?

[11:51] Big failure or success in cyber marketing

[16:26] Where Chris does analytics

[18:32] How Chris does attribution



----------

Links:

Follow Chris on LinkedIn.

Check out the Spellman Books website, LinkedIn, and Facebook.

Keep up with SCYTHE on LinkedIn and Twitter.

Visit the SCYTHE website.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 08 Feb 2023 10:00:00 -0000</pubDate>
      <itunes:title>Be a Pro at Generating Demand with Chris Spellman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Joining us this week is Chris Spellman, Senior Demand Generation Manager at SCYTHE. Chris has been in cybersecurity marketing for over six years and has also worked in marketing operations and analytics. Gianna and Maria ask Chris about his marketing...</itunes:subtitle>
      <itunes:summary>Joining us this week is Chris Spellman, Senior Demand Generation Manager at SCYTHE. Chris has been in cybersecurity marketing for over six years and has also worked in marketing operations and analytics. Gianna and Maria ask Chris about his marketing expertise as they cover gated vs ungated content, demand gen, analytics, and much more. Also, listen in to hear about Chris’s fantasy novel trilogy that he authors with his wife!

 

Timecoded Guide:

[06:49] Creative ways to generate demand

[09:58] Gated or ungated content?

[11:51] Big failure or success in cyber marketing

[16:26] Where Chris does analytics

[18:32] How Chris does attribution



----------

Links:

Follow Chris on LinkedIn.

Check out the Spellman Books website, LinkedIn, and Facebook.

Keep up with SCYTHE on LinkedIn and Twitter.

Visit the SCYTHE website.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joining us this week is Chris Spellman, Senior Demand Generation Manager at SCYTHE. Chris has been in cybersecurity marketing for over six years and has also worked in marketing operations and analytics. Gianna and Maria ask Chris about his marketing expertise as they cover gated vs ungated content, demand gen, analytics, and much more. Also, listen in to hear about Chris’s fantasy novel trilogy that he authors with his wife!</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[06:49] Creative ways to generate demand</p>
<p>[09:58] Gated or ungated content?</p>
<p>[11:51] Big failure or success in cyber marketing</p>
<p>[16:26] Where Chris does analytics</p>
<p>[18:32] How Chris does attribution<br>
<br>
</p>
<p>----------</p>
<p>Links:</p>
<p>Follow Chris on <a href="https://www.linkedin.com/in/cspellman/">LinkedIn</a>.</p>
<p>Check out the Spellman Books <a href="https://spellmanbooks.com/about-the-authors/">website</a>, <a href="https://www.linkedin.com/company/spellman-books/">LinkedIn</a>, and <a href="https://www.facebook.com/SpellmanBooks">Facebook</a>.</p>
<p>Keep up with SCYTHE on <a href="https://www.linkedin.com/company/scythe_io/">LinkedIn</a> and <a href="https://twitter.com/scythe_io">Twitter</a>.</p>
<p>Visit the SCYTHE <a href="https://scythe.io/">website</a>.</p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>1831</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/32bc9568-bcca-3d21-8f56-7f18365d3ec6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8441326434.mp3?updated=1723027067" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Broadway to B2B with Joshua Gonzalez</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/52/notes</link>
      <description>Along with your hosts Gianna and Maria, this week we have Joshua Gonzalez joining us from Beyond Identity to talk shop in creativity. Joshua comes from years of experience as an actor on broadway and on screens—you may have even seen him on the Travel Channel! As the Media Producer, Joshua and his team put a twist on marketing at Beyond Identity and he shares some tips that you won’t want to miss. This is also the record number of times the word “corn” has appeared in an episode here: tune in to find out why! Hint: it has to do with creative marketing.

 

Timecoded Guide:

[04:21] Applying an acting background to marketing 

[06:59] How to sell a product with a story

[11:05] Tips on pitching story ideas

[14:29] Things learned while catering to a cybersecurity audience

[25:47] Advice for companies taking on creatives

----------

Links:

Spend some time with Joshua on Twitter.

Check out Joshua’s memoir! 

Tune in to Joshua’s podcast.

Pictures of Joshua performing Midsummer Night’s Dream on broadway.

Joshua and his team’s latest cyber ad music video.

Visit Beyond Identity on LinkedIn and Twitter and on their website.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </description>
      <pubDate>Wed, 01 Feb 2023 10:00:00 -0000</pubDate>
      <itunes:title>From Broadway to B2B with Joshua Gonzalez</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Along with your hosts Gianna and Maria, this week we have Joshua Gonzalez joining us from Beyond Identity to talk shop in creativity. Joshua comes from years of experience as an actor on broadway and on screens—you may have even seen him on the Trave...</itunes:subtitle>
      <itunes:summary>Along with your hosts Gianna and Maria, this week we have Joshua Gonzalez joining us from Beyond Identity to talk shop in creativity. Joshua comes from years of experience as an actor on broadway and on screens—you may have even seen him on the Travel Channel! As the Media Producer, Joshua and his team put a twist on marketing at Beyond Identity and he shares some tips that you won’t want to miss. This is also the record number of times the word “corn” has appeared in an episode here: tune in to find out why! Hint: it has to do with creative marketing.

 

Timecoded Guide:

[04:21] Applying an acting background to marketing 

[06:59] How to sell a product with a story

[11:05] Tips on pitching story ideas

[14:29] Things learned while catering to a cybersecurity audience

[25:47] Advice for companies taking on creatives

----------

Links:

Spend some time with Joshua on Twitter.

Check out Joshua’s memoir! 

Tune in to Joshua’s podcast.

Pictures of Joshua performing Midsummer Night’s Dream on broadway.

Joshua and his team’s latest cyber ad music video.

Visit Beyond Identity on LinkedIn and Twitter and on their website.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Along with your hosts Gianna and Maria, this week we have Joshua Gonzalez joining us from Beyond Identity to talk shop in creativity. Joshua comes from years of experience as an actor on broadway and on screens—you may have even seen him on the Travel Channel! As the Media Producer, Joshua and his team put a twist on marketing at Beyond Identity and he shares some tips that you won’t want to miss. This is also the record number of times the word “corn” has appeared in an episode here: tune in to find out why! Hint: it has to do with creative marketing.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[04:21] Applying an acting background to marketing </p>
<p>[06:59] How to sell a product with a story</p>
<p>[11:05] Tips on pitching story ideas</p>
<p>[14:29] Things learned while catering to a cybersecurity audience</p>
<p>[25:47] Advice for companies taking on creatives</p>
<p>----------</p>
<p>Links:</p>
<p>Spend some time with Joshua on <a href="https://twitter.com/joshwadam">Twitter</a>.</p>
<p>Check out Joshua’s <a href="https://www.barnesandnoble.com/w/keep-sweet-joshua-gonzales/1142805929">memoir</a>! </p>
<p>Tune in to Joshua’s <a href="https://podcasts.apple.com/us/podcast/keep-sweet-the-positive-world-podcast/id1552972021">podcast</a>.</p>
<p><a href="https://newyorktheater.me/2019/07/27/midsummer-a-banquet-review-shortened-shakespeare-and-finger-food-via-third-rail-projects/">Pictures</a> of Joshua performing Midsummer Night’s Dream on broadway.</p>
<p>Joshua and his team’s latest cyber ad <a href="https://www.linkedin.com/feed/update/urn:li:activity:7018579298768891904/">music video</a>.</p>
<p>Visit Beyond Identity on <a href="https://www.linkedin.com/company/beyond-identity-inc/">LinkedIn</a> and <a href="https://twitter.com/beyondidentity">Twitter</a> and on their <a href="https://www.beyondidentity.com/">website</a>.</p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2044</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/0243a756-d3a6-3975-b9aa-1ef4180f932a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3413780249.mp3?updated=1723027158" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Researching for the Best Products with Wade Wells</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/51/notes</link>
      <description>This week, Wade Wells joins us to talk about being on the board of BSides San Diego, being a brand ambassador, and being on a podcast—all while also being a mentor and working his day job. Gianna and Maria ask Wade about his research workflow and why marketing to CISOs isn’t always the best route for leads. Tune in for a mini-lesson on what the “pyramid of pain” is in cybersecurity and to hear how Wade picked up some valuable cybersecurity marketing tips from working at In-N’-Out. 

 

Timecoded Guide:

[11:19] Searching for new products and evaluating them 

[13:06] The significance of POV (Point of Value)

[16:24] Marketing to the CISO’s team

[17:36] Integration and why it’s important 

[23:36] Wade’s favorite part about his job 

 

Researching new products

With the market being saturated with products, it can get tedious, sifting through everything online. Wade has spent a lot of time researching products and Maria asks him about his workflow. First, he says that he lists what they’re good and not so good at and evaluates from there. He goes through Google, Twitter, and LinkedIn and pings people about the product, seeking more information. Wade also evaluates through POV for every product and his company tests each one before they put it to use. 

 “So the first thing we'll do is we'll talk to them, we'll go through and understand: what does it do? How does it do it? ”

 

Why marketing to the CISO isn’t always the best route

Maria stresses to Wade that marketers are taught to seek out the CISO. Wade offers some insight into more effective marketing routes. In practice, Wade says that it’s often a team that will decide whether or not a particular product would be worth it in their company—and that the CISO just signs it off. So, often, targeting an audience made up of team members rather than only the CISO is a much more effective method of marketing.

“It may come down to they just do the check mark to okay, but if we're the ones in the trenches using the product every day, it better be us who really like it.”

----------

Links:

Follow Wade on LinkedIn.

Reach out to Wade at wade@bsidessd.org

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 25 Jan 2023 10:00:00 -0000</pubDate>
      <itunes:title>Researching for the Best Products with Wade Wells</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>This week, Wade Wells joins us to talk about being on the board of BSides San Diego, being a brand ambassador, and being on a podcast—all while also being a mentor and working his day job. Gianna and Maria ask Wade about his research workflow and why...</itunes:subtitle>
      <itunes:summary>This week, Wade Wells joins us to talk about being on the board of BSides San Diego, being a brand ambassador, and being on a podcast—all while also being a mentor and working his day job. Gianna and Maria ask Wade about his research workflow and why marketing to CISOs isn’t always the best route for leads. Tune in for a mini-lesson on what the “pyramid of pain” is in cybersecurity and to hear how Wade picked up some valuable cybersecurity marketing tips from working at In-N’-Out. 

 

Timecoded Guide:

[11:19] Searching for new products and evaluating them 

[13:06] The significance of POV (Point of Value)

[16:24] Marketing to the CISO’s team

[17:36] Integration and why it’s important 

[23:36] Wade’s favorite part about his job 

 

Researching new products

With the market being saturated with products, it can get tedious, sifting through everything online. Wade has spent a lot of time researching products and Maria asks him about his workflow. First, he says that he lists what they’re good and not so good at and evaluates from there. He goes through Google, Twitter, and LinkedIn and pings people about the product, seeking more information. Wade also evaluates through POV for every product and his company tests each one before they put it to use. 

 “So the first thing we'll do is we'll talk to them, we'll go through and understand: what does it do? How does it do it? ”

 

Why marketing to the CISO isn’t always the best route

Maria stresses to Wade that marketers are taught to seek out the CISO. Wade offers some insight into more effective marketing routes. In practice, Wade says that it’s often a team that will decide whether or not a particular product would be worth it in their company—and that the CISO just signs it off. So, often, targeting an audience made up of team members rather than only the CISO is a much more effective method of marketing.

“It may come down to they just do the check mark to okay, but if we're the ones in the trenches using the product every day, it better be us who really like it.”

----------

Links:

Follow Wade on LinkedIn.

Reach out to Wade at wade@bsidessd.org

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Wade Wells joins us to talk about being on the board of BSides San Diego, being a brand ambassador, and being on a podcast—all while also being a mentor and working his day job. Gianna and Maria ask Wade about his research workflow and why marketing to CISOs isn’t always the best route for leads. Tune in for a mini-lesson on what the “pyramid of pain” is in cybersecurity and to hear how Wade picked up some valuable cybersecurity marketing tips from working at In-N’-Out. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[11:19] Searching for new products and evaluating them </p>
<p>[13:06] The significance of POV (Point of Value)</p>
<p>[16:24] Marketing to the CISO’s team</p>
<p>[17:36] Integration and why it’s important </p>
<p>[23:36] Wade’s favorite part about his job </p>
<p> </p>
<p>Researching new products</p>
<p>With the market being saturated with products, it can get tedious, sifting through everything online. Wade has spent a lot of time researching products and Maria asks him about his workflow. First, he says that he lists what they’re good and not so good at and evaluates from there. He goes through Google, Twitter, and LinkedIn and pings people about the product, seeking more information. Wade also evaluates through POV for every product and his company tests each one before they put it to use. </p>
<p><em> “So the first thing we'll do is we'll talk to them, we'll go through and understand: what does it do? How does it do it? ”</em></p>
<p> </p>
<p>Why marketing to the CISO isn’t always the best route</p>
<p>Maria stresses to Wade that marketers are taught to seek out the CISO. Wade offers some insight into more effective marketing routes. In practice, Wade says that it’s often a team that will decide whether or not a particular product would be worth it in their company—and that the CISO just signs it off. So, often, targeting an audience made up of team members rather than only the CISO is a much more effective method of marketing.</p>
<p><em>“It may come down to they just do the check mark to okay, but if we're the ones in the trenches using the product every day, it better be us who really like it.”</em></p>
<p>----------</p>
<p>Links:</p>
<p>Follow Wade on <a href="https://www.linkedin.com/in/wadingthrulogs/">LinkedIn</a>.</p>
<p>Reach out to Wade at wade@bsidessd.org</p>
<p>Keep up with Hacker Valley on <a href="https://hackervalley.com">our website</a>, <a href="https://www.linkedin.com/company/hackervalleystudio/">LinkedIn</a>, <a href="https://www.instagram.com/hackervalleymedia/">Instagram</a>, and <a href="https://twitter.com/TheHackerValley">Twitter</a>.</p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>1956</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/8bd8b491-b967-3dd4-903d-f001312efcd4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4191596514.mp3?updated=1723027055" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Marketing Con Live Episode</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/49/notes</link>
      <description>Join Gianna and Maria for a crazy live episode with their very own audience at Cyber Marketing Con! Hear your hosts discuss the cybermarketing industry as they also try to say a few nice things about sales. Also, listen in to hear a few audience members talk about their roles in the industry. 

 

Timecoded Guide:

[00:00] Start of episode

[01:52] Welcome to Cyber Marketing Con

[07:59] Building rapport with sales

[11:47] Cyber marketing industry, hearing from the audience

[14:46] Interviewing CSO’s

[15:30] Closing out





Building a solid relationship with sales

While Maria was setting up for Cyber Marketing Con, she overheard conversations about marketers and salespeople working together. She found that trying to work out communication between the two roles is a pretty common theme everywhere and that many people are facing the same challenges in building solid relationships with sales. She emphasizes that, aside from bribing salespeople with cookies, automating as much of the process as possible between marketers and salespeople is important. 

“Automate as much as possible. I think I heard one time someone made a joke that salespeople would rather clean toilets than enter data into Salesforce.”





Onward and Upward

Maria discusses the theme of the first Cyber Marketing Con.

“We've seen some of the crazy ups and downs in our industry lately, lots of layoffs, lots of really weird signals, confusing signals on what's happening in the market. And so we're hoping that these two days that on the marketing team, we can come together and take a little glimpse of hope that it's probably going to be okay and we'll keep going together.”

----------

Links:

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</description>
      <pubDate>Wed, 11 Jan 2023 10:00:00 -0000</pubDate>
      <itunes:title>Cyber Marketing Con Live Episode</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Join Gianna and Maria for a crazy live episode with their very own audience at Cyber Marketing Con! Hear your hosts discuss the cybermarketing industry as they also try to say a few nice things about sales. Also, listen in to hear a few audience memb...</itunes:subtitle>
      <itunes:summary>Join Gianna and Maria for a crazy live episode with their very own audience at Cyber Marketing Con! Hear your hosts discuss the cybermarketing industry as they also try to say a few nice things about sales. Also, listen in to hear a few audience members talk about their roles in the industry. 

 

Timecoded Guide:

[00:00] Start of episode

[01:52] Welcome to Cyber Marketing Con

[07:59] Building rapport with sales

[11:47] Cyber marketing industry, hearing from the audience

[14:46] Interviewing CSO’s

[15:30] Closing out





Building a solid relationship with sales

While Maria was setting up for Cyber Marketing Con, she overheard conversations about marketers and salespeople working together. She found that trying to work out communication between the two roles is a pretty common theme everywhere and that many people are facing the same challenges in building solid relationships with sales. She emphasizes that, aside from bribing salespeople with cookies, automating as much of the process as possible between marketers and salespeople is important. 

“Automate as much as possible. I think I heard one time someone made a joke that salespeople would rather clean toilets than enter data into Salesforce.”





Onward and Upward

Maria discusses the theme of the first Cyber Marketing Con.

“We've seen some of the crazy ups and downs in our industry lately, lots of layoffs, lots of really weird signals, confusing signals on what's happening in the market. And so we're hoping that these two days that on the marketing team, we can come together and take a little glimpse of hope that it's probably going to be okay and we'll keep going together.”

----------

Links:

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Join Gianna and Maria for a crazy live episode with their very own audience at Cyber Marketing Con! Hear your hosts discuss the cybermarketing industry as they also try to say a few nice things about sales. Also, listen in to hear a few audience members talk about their roles in the industry. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Start of episode</p>
<p>[01:52] Welcome to Cyber Marketing Con</p>
<p>[07:59] Building rapport with sales</p>
<p>[11:47] Cyber marketing industry, hearing from the audience</p>
<p>[14:46] Interviewing CSO’s</p>
<p>[15:30] Closing out</p>
<p><br>
<br>
</p>
<p>Building a solid relationship with sales</p>
<p>While Maria was setting up for Cyber Marketing Con, she overheard conversations about marketers and salespeople working together. She found that trying to work out communication between the two roles is a pretty common theme everywhere and that many people are facing the same challenges in building solid relationships with sales. She emphasizes that, aside from bribing salespeople with cookies, automating as much of the process as possible between marketers and salespeople is important. </p>
<p>“Automate as much as possible. I think I heard one time someone made a joke that salespeople would rather clean toilets than enter data into Salesforce.”</p>
<p><br>
<br>
</p>
<p>Onward and Upward</p>
<p>Maria discusses the theme of the first Cyber Marketing Con.</p>
<p>“We've seen some of the crazy ups and downs in our industry lately, lots of layoffs, lots of really weird signals, confusing signals on what's happening in the market. And so we're hoping that these two days that on the marketing team, we can come together and take a little glimpse of hope that it's probably going to be okay and we'll keep going together.”</p>
<p>----------</p>
<p>Links:</p>
<p>Keep up with Hacker Valley on <a href="https://hackervalley.com">our website</a>, <a href="https://www.linkedin.com/company/hackervalleystudio/">LinkedIn</a>, <a href="https://www.instagram.com/hackervalleymedia/">Instagram</a>, and <a href="https://twitter.com/TheHackerValley">Twitter</a>.</p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a>.</p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>1178</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/b47f145a-79af-3433-b970-e2a3cfd8c7a0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3002392740.mp3?updated=1723026943" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Content Marketing Strategy with Chris Cochran &amp; Ron Eddings</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/37/notes</link>
      <description>Chris Cochran and Ron Eddings are two very special guests on this episode of Breaking Through in Cybersecurity Marketing. Chris and Ron are from Hacker Valley Media, the producers and sponsors of this podcast. Gianna and Maria chat with them about successful content strategy and marketing in cybersecurity, digital marketing successes and failures, and they drop hints about what to expect in their workshop at Cyber Marketing Con 2022.

Timecoded Guide:

[01:51] Successful content marketing strategy in cybersecurity

[05:32] Successes and failures in cybersecurity marketing strategy


[15:01] Cyber Marketing Con workshop hints and teasers
 

What does a successful content marketing strategy look like in cybersecurity?
Putting out content, including audio files, is just the beginning. You have to put out valuable content that’s not always looking to make the sale or fill the sales funnel. It’s also important to know that content strategy and successful marketing campaigns will change over time. You might be completely sold on your cybersecurity marketing strategy only to realize a few months later that you need to pivot. So putting out valuable content but staying flexible is key.

“Everyone should have a content strategy. If you're in business, you have to do content. That's just the name of the game these days.” –Chris Cochran



What are some successes and failures in cybersecurity marketing strategy?
One of the biggest failures in content marketing strategy is when you’re trying to entice someone to come to an event but don’t give them any more information. The company tells the audience when and where but leaves out exactly what the event is about. That’s not enticing, that feels like the company is simply trying to fill out their sales funnel. They're not addressing pain points.

One of the biggest content marketing strategy successes is giving value to your community. Yes, you need to think about business objectives. But if all you’re doing is selling, it’s not a two-way conversation with your audience. It’s an inauthentic ad campaign when it's not offering value.

“So you have, whether it's a lead, whether it's me signing up for a demo, but I don't necessarily feel invited to this event, I feel invited to your funnel.” –Ron Eddings

“We can also serve people instead of sell to them in order to really build that community, build that engagement with everyone that you're trying to speak to.” –Chris Cochran

 

What kinds of things can Cyber Marketing Con attendees expect from Chris and Ron’s workshop?

Everyone wants to start a podcast, but not everyone will be successful at it. There are so many details to figure out, from platform to people to solutions to problems. Chris and Ron are going to help people learn how to start and submit your podcast effectively. And even more importantly, how to record and edit a popular podcast that actually has meaning and value to podcast listeners. You’ll learn the tips and tricks Chris and Ron didn’t know when they launched their first podcast.

“I would say the thing that we're going to talk about the most, some might say that it's harder than it looks: making a podcast that has impact. I would say podcasting is more nuanced than it looks.” –Chris Cochran

---------- 

Links: 

Get tickets for our upcoming Cyber Marketing Con 2022. 

Spend some time with our guests Chris and Ron on their website.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. </description>
      <pubDate>Wed, 05 Oct 2022 09:00:00 -0000</pubDate>
      <itunes:title>Content Marketing Strategy with Chris Cochran &amp; Ron Eddings</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Chris Cochran and Ron Eddings are two very special guests on this episode of Breaking Through in Cybersecurity Marketing. Chris and Ron are from Hacker Valley Media, the producers and sponsors of this podcast. Gianna and Maria chat with them about su...</itunes:subtitle>
      <itunes:summary>Chris Cochran and Ron Eddings are two very special guests on this episode of Breaking Through in Cybersecurity Marketing. Chris and Ron are from Hacker Valley Media, the producers and sponsors of this podcast. Gianna and Maria chat with them about successful content strategy and marketing in cybersecurity, digital marketing successes and failures, and they drop hints about what to expect in their workshop at Cyber Marketing Con 2022.

Timecoded Guide:

[01:51] Successful content marketing strategy in cybersecurity

[05:32] Successes and failures in cybersecurity marketing strategy


[15:01] Cyber Marketing Con workshop hints and teasers
 

What does a successful content marketing strategy look like in cybersecurity?
Putting out content, including audio files, is just the beginning. You have to put out valuable content that’s not always looking to make the sale or fill the sales funnel. It’s also important to know that content strategy and successful marketing campaigns will change over time. You might be completely sold on your cybersecurity marketing strategy only to realize a few months later that you need to pivot. So putting out valuable content but staying flexible is key.

“Everyone should have a content strategy. If you're in business, you have to do content. That's just the name of the game these days.” –Chris Cochran



What are some successes and failures in cybersecurity marketing strategy?
One of the biggest failures in content marketing strategy is when you’re trying to entice someone to come to an event but don’t give them any more information. The company tells the audience when and where but leaves out exactly what the event is about. That’s not enticing, that feels like the company is simply trying to fill out their sales funnel. They're not addressing pain points.

One of the biggest content marketing strategy successes is giving value to your community. Yes, you need to think about business objectives. But if all you’re doing is selling, it’s not a two-way conversation with your audience. It’s an inauthentic ad campaign when it's not offering value.

“So you have, whether it's a lead, whether it's me signing up for a demo, but I don't necessarily feel invited to this event, I feel invited to your funnel.” –Ron Eddings

“We can also serve people instead of sell to them in order to really build that community, build that engagement with everyone that you're trying to speak to.” –Chris Cochran

 

What kinds of things can Cyber Marketing Con attendees expect from Chris and Ron’s workshop?

Everyone wants to start a podcast, but not everyone will be successful at it. There are so many details to figure out, from platform to people to solutions to problems. Chris and Ron are going to help people learn how to start and submit your podcast effectively. And even more importantly, how to record and edit a popular podcast that actually has meaning and value to podcast listeners. You’ll learn the tips and tricks Chris and Ron didn’t know when they launched their first podcast.

“I would say the thing that we're going to talk about the most, some might say that it's harder than it looks: making a podcast that has impact. I would say podcasting is more nuanced than it looks.” –Chris Cochran

---------- 

Links: 

Get tickets for our upcoming Cyber Marketing Con 2022. 

Spend some time with our guests Chris and Ron on their website.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chris Cochran and Ron Eddings are two very special guests on this episode of Breaking Through in Cybersecurity Marketing. Chris and Ron are from Hacker Valley Media, the producers and sponsors of this podcast. Gianna and Maria chat with them about successful content strategy and marketing in cybersecurity, digital marketing successes and failures, and they drop hints about what to expect in their workshop at Cyber Marketing Con 2022.<br>
<br>
Timecoded Guide:<br>
<br>
[01:51] Successful content marketing strategy in cybersecurity</p>
<p>[05:32] Successes and failures in cybersecurity marketing strategy<br>
</p>
<p>[15:01] Cyber Marketing Con workshop hints and teasers<br>
 </p>
<p>What does a successful content marketing strategy look like in cybersecurity?<br>
Putting out content, including audio files, is just the beginning. You have to put out valuable content that’s not always looking to make the sale or fill the sales funnel. It’s also important to know that content strategy and successful marketing campaigns will change over time. You might be completely sold on your cybersecurity marketing strategy only to realize a few months later that you need to pivot. So putting out valuable content but staying flexible is key.</p>
<p><em>“Everyone should have a content strategy. If you're in business, you have to do content. That's just the name of the game these days.” –Chris Cochran</em><br>
<br>
</p>
<p>What are some successes and failures in cybersecurity marketing strategy?<br>
One of the biggest failures in content marketing strategy is when you’re trying to entice someone to come to an event but don’t give them any more information. The company tells the audience when and where but leaves out exactly what the event is about. That’s not enticing, that feels like the company is simply trying to fill out their sales funnel. They're not addressing pain points.</p>
<p>One of the biggest content marketing strategy successes is giving value to your community. Yes, you need to think about business objectives. But if all you’re doing is selling, it’s not a two-way conversation with your audience. It’s an inauthentic ad campaign when it's not offering value.</p>
<p><em>“So you have, whether it's a lead, whether it's me signing up for a demo, but I don't necessarily feel invited to this event, I feel invited to your funnel.” –Ron Eddings</em></p>
<p><em>“We can also serve people instead of sell to them in order to really build that community, build that engagement with everyone that you're trying to speak to.” –Chris Cochran</em></p>
<p> </p>
<p>What kinds of things can Cyber Marketing Con attendees expect from Chris and Ron’s workshop?</p>
<p>Everyone wants to start a podcast, but not everyone will be successful at it. There are so many details to figure out, from platform to people to solutions to problems. Chris and Ron are going to help people learn how to start and submit your podcast effectively. And even more importantly, how to record and edit a popular podcast that actually has meaning and value to podcast listeners. You’ll learn the tips and tricks Chris and Ron didn’t know when they launched their first podcast.</p>
<p><em>“I would say the thing that we're going to talk about the most, some might say that it's harder than it looks: making a podcast that has impact. I would say podcasting is more nuanced than it looks.” –Chris Cochran</em></p>
<p>---------- </p>
<p>Links: </p>
<p>Get tickets for our upcoming <a href="https://cybersecuritymarketingsociety.com/conference2022/">Cyber Marketing Con 2022</a>. </p>
<p>Spend some time with our guests Chris and Ron on their<a href="https://www.hackervalleymedia.com"> website</a>.</p>
<p>Follow Gianna on<a href="https://www.linkedin.com/in/giannawhitver/"> LinkedIn</a>.</p>
<p>Catch up with Maria on<a href="https://www.linkedin.com/in/maria-vepa/"> LinkedIn</a>.</p>
<p>Join the Cybersecurity Marketing Society on<a href="https://cybersecuritymarketingsociety.com"> our website</a>, and keep up with us on<a href="https://twitter.com/CyberMSociety"> Twitter</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>. </p>
]]>
      </content:encoded>
      <itunes:duration>1523</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/0813ec0f-5686-3ea4-950e-5d189d368b71]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6786619770.mp3?updated=1723026972" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Overcoming Startup Go-To-Market Hurdles with CMO &amp; Advisory Board Member Carol Meyers</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/29/notes</link>
      <description>Carol Meyers is an Independent Board Director, Advisor, and Investor. She has held CMO positions at companies like Rapid7 and LogMeIn, along with numerous consulting and advisory positions at cyber startups. Carol develops go-to-market plans that drive growth and strategy in businesses. In this episode, she shares her wisdom for building a successful go-to-market strategy…and career, covering inbound marketing, target audience development, start-up hiring, and career self-confidence.  

 

Timecoded Guide: 

[01:59] Struggles faced and advice for young women starting out in tech

[03:28] Carol’s components of a go-to marketing plan

[12:10] Who to pick for your team at a start-up

[19:41] Ways to measure success

[28:41] How advisory boards can be your cheerleaders

 

What are the ingredients of a go-to marketing plan?

Carol says to have a solid plan, you have to have the resources and information prepared to best support your channels. If you are unable to tell your channels who you are and what you’re selling, then your business isn’t ready. It’s all about knowing your buyer; who they are and how you can solve their problem. It's also important to consider why they should choose you to solve it. Once you have a clear plan and ways to measure and test it, you will be better suited for taking the first step.

“It's not that someone has to spend money to buy your solution, but they have to invest their personal time to evaluate your solution and to think about the problem that you're solving for them.”

 

What are the most important metrics to keep an eye on? 

The most important metric is also the most obvious; that customers are buying and using your products and services. You might see your audience in varying stages that may not match the one you’re in. Be sure to look at all the stages of conversion. Some that are not on the traditional pipeline might get overlooked when they play a big part in lead generation. Carol reminds us to keep a sharp eye on micro-conversions; while they may not be counted in the pipeline, they can still play a huge factor in a sale or lead.

“Your number one goal in marketing is you've got to be a part of revenue, you've got to be driving revenue.”

 

What is the role of an advisory board? 

Carol explains that the role of an advisory board can look different from company to company. In her experience, a set of challenges are brought to the board, and then they present possible solutions and advice for that problem. There is also a one-on-one side to being an advisor, which is one of her favorite aspects. Talking through roadblocks and bouncing ideas creates a valuable and intimate relationship between advisors and company leaders.

“Having a group of advisers around you and people who can even just be a cheerleader for you can be really helpful.”

______

Links: 

Connect with Carol Meyers on LinkedIn.

Catch up with Maria on LinkedIn.

Follow Gianna on LinkedIn.

Grab your ticket to the Cyber Marketing Con 2022.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. 

Additional resources: BlackKite Security, Security ScoreCard</description>
      <pubDate>Wed, 17 Aug 2022 09:00:00 -0000</pubDate>
      <itunes:title>Overcoming Startup Go-To-Market Hurdles with CMO &amp; Advisory Board Member Carol Meyers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Carol Meyers is an Independent Board Director, Advisor, and Investor. She has held CMO positions at companies like Rapid7 and LogMeIn, along with numerous consulting and advisory positions at cyber startups. Carol develops go-to-market plans that dri...</itunes:subtitle>
      <itunes:summary>Carol Meyers is an Independent Board Director, Advisor, and Investor. She has held CMO positions at companies like Rapid7 and LogMeIn, along with numerous consulting and advisory positions at cyber startups. Carol develops go-to-market plans that drive growth and strategy in businesses. In this episode, she shares her wisdom for building a successful go-to-market strategy…and career, covering inbound marketing, target audience development, start-up hiring, and career self-confidence.  

 

Timecoded Guide: 

[01:59] Struggles faced and advice for young women starting out in tech

[03:28] Carol’s components of a go-to marketing plan

[12:10] Who to pick for your team at a start-up

[19:41] Ways to measure success

[28:41] How advisory boards can be your cheerleaders

 

What are the ingredients of a go-to marketing plan?

Carol says to have a solid plan, you have to have the resources and information prepared to best support your channels. If you are unable to tell your channels who you are and what you’re selling, then your business isn’t ready. It’s all about knowing your buyer; who they are and how you can solve their problem. It's also important to consider why they should choose you to solve it. Once you have a clear plan and ways to measure and test it, you will be better suited for taking the first step.

“It's not that someone has to spend money to buy your solution, but they have to invest their personal time to evaluate your solution and to think about the problem that you're solving for them.”

 

What are the most important metrics to keep an eye on? 

The most important metric is also the most obvious; that customers are buying and using your products and services. You might see your audience in varying stages that may not match the one you’re in. Be sure to look at all the stages of conversion. Some that are not on the traditional pipeline might get overlooked when they play a big part in lead generation. Carol reminds us to keep a sharp eye on micro-conversions; while they may not be counted in the pipeline, they can still play a huge factor in a sale or lead.

“Your number one goal in marketing is you've got to be a part of revenue, you've got to be driving revenue.”

 

What is the role of an advisory board? 

Carol explains that the role of an advisory board can look different from company to company. In her experience, a set of challenges are brought to the board, and then they present possible solutions and advice for that problem. There is also a one-on-one side to being an advisor, which is one of her favorite aspects. Talking through roadblocks and bouncing ideas creates a valuable and intimate relationship between advisors and company leaders.

“Having a group of advisers around you and people who can even just be a cheerleader for you can be really helpful.”

______

Links: 

Connect with Carol Meyers on LinkedIn.

Catch up with Maria on LinkedIn.

Follow Gianna on LinkedIn.

Grab your ticket to the Cyber Marketing Con 2022.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. 

Additional resources: BlackKite Security, Security ScoreCard</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Carol Meyers is an Independent Board Director, Advisor, and Investor. She has held CMO positions at companies like Rapid7 and LogMeIn, along with numerous consulting and advisory positions at cyber startups. Carol develops go-to-market plans that drive growth and strategy in businesses. In this episode, she shares her wisdom for building a successful go-to-market strategy…and career, covering inbound marketing, target audience development, start-up hiring, and career self-confidence.  </p>
<p> </p>
<p>Timecoded Guide: </p>
<p>[01:59] Struggles faced and advice for young women starting out in tech</p>
<p>[03:28] Carol’s components of a go-to marketing plan</p>
<p>[12:10] Who to pick for your team at a start-up</p>
<p>[19:41] Ways to measure success</p>
<p>[28:41] How advisory boards can be your cheerleaders</p>
<p> </p>
<p>What are the ingredients of a go-to marketing plan?</p>
<p>Carol says to have a solid plan, you have to have the resources and information prepared to best support your channels. If you are unable to tell your channels who you are and what you’re selling, then your business isn’t ready. It’s all about knowing your buyer; who they are and how you can solve their problem. It's also important to consider why they should choose you to solve it. Once you have a clear plan and ways to measure and test it, you will be better suited for taking the first step.</p>
<p><em>“It's not that someone has to spend money to buy your solution, but they have to invest their personal time to evaluate your solution and to think about the problem that you're solving for them.”</em></p>
<p> </p>
<p>What are the most important metrics to keep an eye on? </p>
<p>The most important metric is also the most obvious; that customers are buying and using your products and services. You might see your audience in varying stages that may not match the one you’re in. Be sure to look at all the stages of conversion. Some that are not on the traditional pipeline might get overlooked when they play a big part in lead generation. Carol reminds us to keep a sharp eye on micro-conversions; while they may not be counted in the pipeline, they can still play a huge factor in a sale or lead.</p>
<p><em>“Your number one goal in marketing is you've got to be a part of revenue, you've got to be driving revenue.”</em></p>
<p> </p>
<p>What is the role of an advisory board? </p>
<p>Carol explains that the role of an advisory board can look different from company to company. In her experience, a set of challenges are brought to the board, and then they present possible solutions and advice for that problem. There is also a one-on-one side to being an advisor, which is one of her favorite aspects. Talking through roadblocks and bouncing ideas creates a valuable and intimate relationship between advisors and company leaders.</p>
<p><em>“Having a group of advisers around you and people who can even just be a cheerleader for you can be really helpful.”</em></p>
<p>______</p>
<p>Links: </p>
<p>Connect with <a href="https://www.linkedin.com/in/caroljmeyers/">Carol Meyers </a>on LinkedIn.</p>
<p>Catch up with <a href="https://www.linkedin.com/in/maria-vepa/">Maria</a> on LinkedIn.</p>
<p>Follow <a href="https://www.linkedin.com/in/giannawhitver/">Gianna</a> on LinkedIn.</p>
<p>Grab your ticket to the <a href="http://cybersecuritymarketingsociety.com/conference2022/">Cyber Marketing Con 2022.</a></p>
<p>Join the Cybersecurity Marketing Society on our <a href="https://cybersecuritymarketingsociety.com/">website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>. </p>
<p>Additional resources: <a href="https://blackkite.com/">BlackKite Security</a>, <a href="https://securityscorecard.com">Security ScoreCard</a></p>
]]>
      </content:encoded>
      <itunes:duration>2498</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/cd3b9a67-e659-3243-96b9-5b3dc5aca33c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1757494057.mp3?updated=1723027204" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence as Currency in Modern Marketing: Channel Partnerships ft David Brown</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/28/notes</link>
      <description>David Brown is the Director of Global Partner Marketing for ZeroFox, a computer and network security company based out of Baltimore, MD. David has over fifteen years of experience in the international B2B marketing field. He joins us as we discuss partnership channel marketing. David believes it's a positive direction for businesses to go in the future of marketing.

Timecoded Guide: 

In this podcast, David covers: 


[1:06] The breakdown and variables of channel partner marketing

[13:36] Where your program partners are and what they need from you

[21:24] Tactics to enlist new partners for small companies

[35:19] How David’s early career prepared him for cybersecurity marketing


 

What is channel partner marketing?

This fresh approach to marketing allows for a broader market and network, while also increasing revenue for the companies involved. When partnering with another company through channel partnership, both remain independent. They share the benefits of re-selling and distributing each other’s products. Not only that, the partners act as influencers for each other’s brands.

 

“Really, what we're looking at with partner marketing is working with another organization in order to amplify your sales and marketing capabilities.”

 

Why is channel partnership the future of marketing? 

David thinks everyone can benefit from a channel marketing partnership, especially when it comes to inbound marketing. This may be his hot-take in the industry, but he has seen the growth and advantage of inviting other companies to endorse your products. With these channels comes influence, and David believes that influence is the new currency of business.

 

“And when the channel team in the partnership team is more integrated into sales, marketing, and product, it seems to be a lot more successful.”

 

How does this fit into sales?

Your channels are out there building brand awareness, relationships, and networking. As they drive engagement up, leads will follow suit. It also gives the sales team more resources to get the job done. By creating a partnership program that works alongside your sales team, hitting target goals becomes much easier.

 

“My job, and people that I work with on the marketing team, is to take our limited resources and direct them at those partners that are starting to build that momentum and go out there.” 

______

Links: 

If you have questions or want to chat, email David at dabrown@zerofox.com or message him on the Cybersecurity Marketing Society Slack!

Find David Brown on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Grab your ticket to the Cyber Marketing Con 2022.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. 

Additional resources: ZeroFox, Crossbeam, Cybersecurity Marketing Con, Forrester, Menlo Security, Tierra Security

 </description>
      <pubDate>Wed, 10 Aug 2022 09:00:00 -0000</pubDate>
      <itunes:title>Influence as Currency in Modern Marketing: Channel Partnerships ft David Brown</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>David Brown is the Director of Global Partner Marketing for ZeroFox, a computer and network security company based out of Baltimore, MD. David has over fifteen years of experience in the international B2B marketing field. He joins us as we discuss pa...</itunes:subtitle>
      <itunes:summary>David Brown is the Director of Global Partner Marketing for ZeroFox, a computer and network security company based out of Baltimore, MD. David has over fifteen years of experience in the international B2B marketing field. He joins us as we discuss partnership channel marketing. David believes it's a positive direction for businesses to go in the future of marketing.

Timecoded Guide: 

In this podcast, David covers: 


[1:06] The breakdown and variables of channel partner marketing

[13:36] Where your program partners are and what they need from you

[21:24] Tactics to enlist new partners for small companies

[35:19] How David’s early career prepared him for cybersecurity marketing


 

What is channel partner marketing?

This fresh approach to marketing allows for a broader market and network, while also increasing revenue for the companies involved. When partnering with another company through channel partnership, both remain independent. They share the benefits of re-selling and distributing each other’s products. Not only that, the partners act as influencers for each other’s brands.

 

“Really, what we're looking at with partner marketing is working with another organization in order to amplify your sales and marketing capabilities.”

 

Why is channel partnership the future of marketing? 

David thinks everyone can benefit from a channel marketing partnership, especially when it comes to inbound marketing. This may be his hot-take in the industry, but he has seen the growth and advantage of inviting other companies to endorse your products. With these channels comes influence, and David believes that influence is the new currency of business.

 

“And when the channel team in the partnership team is more integrated into sales, marketing, and product, it seems to be a lot more successful.”

 

How does this fit into sales?

Your channels are out there building brand awareness, relationships, and networking. As they drive engagement up, leads will follow suit. It also gives the sales team more resources to get the job done. By creating a partnership program that works alongside your sales team, hitting target goals becomes much easier.

 

“My job, and people that I work with on the marketing team, is to take our limited resources and direct them at those partners that are starting to build that momentum and go out there.” 

______

Links: 

If you have questions or want to chat, email David at dabrown@zerofox.com or message him on the Cybersecurity Marketing Society Slack!

Find David Brown on LinkedIn.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Grab your ticket to the Cyber Marketing Con 2022.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. 

Additional resources: ZeroFox, Crossbeam, Cybersecurity Marketing Con, Forrester, Menlo Security, Tierra Security

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>David Brown is the Director of Global Partner Marketing for ZeroFox, a computer and network security company based out of Baltimore, MD. David has over fifteen years of experience in the international B2B marketing field. He joins us as we discuss partnership channel marketing. David believes it's a positive direction for businesses to go in the future of marketing.</p>
<p>Timecoded Guide: </p>
<p>In this podcast, David covers: </p>
<ul>
<li>[1:06] The breakdown and variables of channel partner marketing</li>
<li>[13:36] Where your program partners are and what they need from you</li>
<li>[21:24] Tactics to enlist new partners for small companies</li>
<li>[35:19] How David’s early career prepared him for cybersecurity marketing</li>
</ul>
<p> </p>
<p>What is channel partner marketing?</p>
<p>This fresh approach to marketing allows for a broader market and network, while also increasing revenue for the companies involved. When partnering with another company through channel partnership, both remain independent. They share the benefits of re-selling and distributing each other’s products. Not only that, the partners act as influencers for each other’s brands.</p>
<p> </p>
<p><em>“Really, what we're looking at with partner marketing is working with another organization in order to amplify your sales and marketing capabilities.”</em></p>
<p><em> </em></p>
<p>Why is channel partnership the future of marketing? </p>
<p>David thinks everyone can benefit from a channel marketing partnership, especially when it comes to inbound marketing. This may be his hot-take in the industry, but he has seen the growth and advantage of inviting other companies to endorse your products. With these channels comes influence, and David believes that influence is the new currency of business.</p>
<p> </p>
<p><em>“And when the channel team in the partnership team is more integrated into sales, marketing, and product, it seems to be a lot more successful.”</em></p>
<p> </p>
<p>How does this fit into sales?</p>
<p>Your channels are out there building brand awareness, relationships, and networking. As they drive engagement up, leads will follow suit. It also gives the sales team more resources to get the job done. By creating a partnership program that works alongside your sales team, hitting target goals becomes much easier.</p>
<p> </p>
<p><em>“My job, and people that I work with on the marketing team, is to take our limited resources and direct them at those partners that are starting to build that momentum and go out there.” </em></p>
<p>______</p>
<p>Links: </p>
<p>If you have questions or want to chat, email David at <a href="mailto:dabrown@zerofox.com">dabrown@zerofox.com</a> or message him on the Cybersecurity Marketing Society Slack!</p>
<p><a href="https://www.linkedin.com/in/davidclbrown/">Find David Brown on LinkedIn.</a></p>
<p>Follow <a href="https://www.linkedin.com/in/giannawhitver/">Gianna</a> on LinkedIn.</p>
<p>Catch up with <a href="https://www.linkedin.com/in/maria-vepa/">Maria</a> on LinkedIn.</p>
<p>Grab your ticket to the <a href="https://cybersecuritymarketingsociety.com/">Cyber Marketing Con 2022.</a></p>
<p>Join the Cybersecurity Marketing Society on our <a href="https://cybersecuritymarketingsociety.com/">website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>. </p>
<p>Additional resources: <a href="https://www.zerofox.com/">ZeroFox</a>, <a href="https://www.crossbeam.com/">Crossbeam</a>, <a href="http://cybersecuritymarketingsociety.com/conference2022/">Cybersecurity Marketing Con</a>, <a href="https://www.forrester.com/">Forrester</a>, <a href="https://www.menlosecurity.com/">Menlo Security</a>, <a href="https://www.tierra.net/security">Tierra Security</a></p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2541</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/48e95f22-ee3a-339e-9b66-7bca5e588a9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4364070548.mp3?updated=1723027118" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Marketers are Ethical Hackers Prove Me Wrong with Clark Barron</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/27/notes</link>
      <description>Joining Maria and Gianna this week is Clark Barron, the Demand Generation Manager at Nisos. He has a background in cybersecurity marketing, photography, and independent film, and is an avid gamer. Clark shares his unconventional ways of lead generation through websites. Every marketing campaign might feel like it says the same thing, but Clark defies the user’s expectations to bring in user interest and stand out in the field.

 

Timecoded Guide: 

[05:48] Marketers are hackers of different colors

[09:14] Campaigns that changed the game

[15:08] How Clark tracks his unprecedented marketing campaigns

[22:31] Communicating with leadership to try your ideas



How can marketers apply this approach to messaging branding?

Marketers have more influence and power than they often realize. The similarity between hackers and marketers is that marketers are gathering data in an ethical manner. Both are building personas, exploiting pain points, researching, and reaching vulnerabilities. Clark believes that is the power of choice to be good ethical marketers. 

“Marketers, a lot of times, don't realize the kind of powers that they have, they have to make a choice to use them for good. That's the way I look at it.”

 

How have specific campaigns you’ve implemented changed the game?

Clark started his process by evaluating voice and brand identity. He sat back and watched what others were doing. Noticing that all the cybersecurity websites were saying the same thing over and over, Clark decided to take action in a wacky way. He developed a marketing strategy that changed the game.

“Subvert their expectations from the very beginning. They're expecting one thing, and they're getting something completely different. We know what they're expecting, but instead, what we're gonna do is, we're gonna say, ‘Enjoy a completely different cybersecurity landing page.’”

 

 How do you have conversations with leadership to go along with these ideas?

The first step is to have those conversations. If the CEO or higher-up doesn’t understand marketing processes, then you need to have those conversations with them. Long-term growth is what you should be working toward. Before you cast out the big campaigns, you have to have small wins so you’re better prepared for a marketing plan with bigger risks.

“A lot of bigger organizations are not going to be able to do this. I have that level of self-awareness that I know that, however, what you can do is change the way you look at conversations with leadership.”

______

Links: 

Find Clark Barron on his website or LinkedIn and check out his blog here! 

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Grab your ticket to the Cyber Marketing Con 2022.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. 

Additional resources: Nisos, PhishFirewall, DEF CON, Cybersecurity Marketing Society, Celeste</description>
      <pubDate>Wed, 03 Aug 2022 09:00:00 -0000</pubDate>
      <itunes:title>Marketers are Ethical Hackers Prove Me Wrong with Clark Barron</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Joining Maria and Gianna this week is Clark Barron, the Demand Generation Manager at Nisos. He has a background in cybersecurity marketing, photography, and independent film, and is an avid gamer. Clark shares his unconventional ways of lead generati...</itunes:subtitle>
      <itunes:summary>Joining Maria and Gianna this week is Clark Barron, the Demand Generation Manager at Nisos. He has a background in cybersecurity marketing, photography, and independent film, and is an avid gamer. Clark shares his unconventional ways of lead generation through websites. Every marketing campaign might feel like it says the same thing, but Clark defies the user’s expectations to bring in user interest and stand out in the field.

 

Timecoded Guide: 

[05:48] Marketers are hackers of different colors

[09:14] Campaigns that changed the game

[15:08] How Clark tracks his unprecedented marketing campaigns

[22:31] Communicating with leadership to try your ideas



How can marketers apply this approach to messaging branding?

Marketers have more influence and power than they often realize. The similarity between hackers and marketers is that marketers are gathering data in an ethical manner. Both are building personas, exploiting pain points, researching, and reaching vulnerabilities. Clark believes that is the power of choice to be good ethical marketers. 

“Marketers, a lot of times, don't realize the kind of powers that they have, they have to make a choice to use them for good. That's the way I look at it.”

 

How have specific campaigns you’ve implemented changed the game?

Clark started his process by evaluating voice and brand identity. He sat back and watched what others were doing. Noticing that all the cybersecurity websites were saying the same thing over and over, Clark decided to take action in a wacky way. He developed a marketing strategy that changed the game.

“Subvert their expectations from the very beginning. They're expecting one thing, and they're getting something completely different. We know what they're expecting, but instead, what we're gonna do is, we're gonna say, ‘Enjoy a completely different cybersecurity landing page.’”

 

 How do you have conversations with leadership to go along with these ideas?

The first step is to have those conversations. If the CEO or higher-up doesn’t understand marketing processes, then you need to have those conversations with them. Long-term growth is what you should be working toward. Before you cast out the big campaigns, you have to have small wins so you’re better prepared for a marketing plan with bigger risks.

“A lot of bigger organizations are not going to be able to do this. I have that level of self-awareness that I know that, however, what you can do is change the way you look at conversations with leadership.”

______

Links: 

Find Clark Barron on his website or LinkedIn and check out his blog here! 

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Grab your ticket to the Cyber Marketing Con 2022.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. 

Additional resources: Nisos, PhishFirewall, DEF CON, Cybersecurity Marketing Society, Celeste</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joining Maria and Gianna this week is Clark Barron, the Demand Generation Manager at Nisos. He has a background in cybersecurity marketing, photography, and independent film, and is an avid gamer. Clark shares his unconventional ways of lead generation through websites. Every marketing campaign might feel like it says the same thing, but Clark defies the user’s expectations to bring in user interest and stand out in the field.</p>
<p> </p>
<p>Timecoded Guide: </p>
<p>[05:48] Marketers are hackers of different colors</p>
<p>[09:14] Campaigns that changed the game</p>
<p>[15:08] How Clark tracks his unprecedented marketing campaigns</p>
<p>[22:31] Communicating with leadership to try your ideas<br>
<br>
</p>
<p>How can marketers apply this approach to messaging branding?</p>
<p>Marketers have more influence and power than they often realize. The similarity between hackers and marketers is that marketers are gathering data in an ethical manner. Both are building personas, exploiting pain points, researching, and reaching vulnerabilities. Clark believes that is the power of choice to be good ethical marketers. </p>
<p><em>“Marketers, a lot of times, don't realize the kind of powers that they have, they have to make a choice to use them for good. That's the way I look at it.”</em></p>
<p> </p>
<p>How have specific campaigns you’ve implemented changed the game?</p>
<p>Clark started his process by evaluating voice and brand identity. He sat back and watched what others were doing. Noticing that all the cybersecurity websites were saying the same thing over and over, Clark decided to take action in a wacky way. He developed a marketing strategy that changed the game.</p>
<p><em>“Subvert their expectations from the very beginning. They're expecting one thing, and they're getting something completely different. We know what they're expecting, but instead, what we're gonna do is, we're gonna say, ‘Enjoy a completely different cybersecurity landing page.’”</em></p>
<p> </p>
<p> How do you have conversations with leadership to go along with these ideas?</p>
<p>The first step is to have those conversations. If the CEO or higher-up doesn’t understand marketing processes, then you need to have those conversations with them. Long-term growth is what you should be working toward. Before you cast out the big campaigns, you have to have small wins so you’re better prepared for a marketing plan with bigger risks.</p>
<p><em>“A lot of bigger organizations are not going to be able to do this. I have that level of self-awareness that I know that, however, what you can do is change the way you look at conversations with leadership.”</em></p>
<p>______</p>
<p>Links: </p>
<p>Find Clark Barron on his <a href="https://www.linkedin.com/in/clark-barron-12065728/">website</a> or <a href="https://www.linkedin.com/in/clark-barron-12065728/">LinkedIn</a> and check out his blog <a href="https://cybersecuritymarketingsociety.com/in-cyber-security-marketing-you-are-the-threat">here</a>! </p>
<p>Follow <a href="https://www.linkedin.com/in/giannawhitver/">Gianna</a> on LinkedIn.</p>
<p>Catch up with <a href="https://www.linkedin.com/in/maria-vepa/">Maria</a> on LinkedIn.</p>
<p>Grab your ticket to the <a href="http://cybersecuritymarketingsociety.com/conference2022/">Cyber Marketing Con 2022.</a></p>
<p>Join the Cybersecurity Marketing Society on our <a href="https://cybersecuritymarketingsociety.com/">website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a>.</p>
<p>Keep up with Hacker Valley on<a href="https://hackervalley.com/"> our website</a>,<a href="https://www.linkedin.com/company/hackervalleystudio/"> LinkedIn</a>,<a href="https://www.instagram.com/hackervalleymedia/"> Instagram</a>, and<a href="https://twitter.com/TheHackerValley"> Twitter</a>. </p>
<p>Additional resources: <a href="https://www.nisos.com/">Nisos</a>, <a href="https://www.phishfirewall.com/">PhishFirewall</a>, <a href="https://defcon.org/">DEF CON</a>, <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a>, <a href="http://www.celestegame.com/">Celeste</a></p>
]]>
      </content:encoded>
      <itunes:duration>2220</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/e4feb629-5cd8-3cc2-a3ab-75854b53c6d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8855404049.mp3?updated=1723027114" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Intersection of Marketing, Tech, &amp; Sales with CMO David Leichner</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/16/notes</link>
      <description>This week, we interview David Leichner, the CMO of Cybellum, currently residing in Tel Aviv, Israel. We talk to David about his move from America to Israel, his admiration for Israel’s focus on cyber startups, his decades of experience in sales and marketing, and his dedication to relationship building -- no matter what he’s marketing!

Timecoded Guide:

[01:17] David’s personal and professional journey to Cybellum

[05:03] Israel’s transformation into a cybersecurity startup mecca

[08:44] Creation and mission of the Cyber Elite

[18:32] Tying together marketing and sales in the cyber world

[31:27] Passions David has outside of being a CMO

 

How did you get to where you are today to be the CMO of Cybellum?

From his start on Wall Street to his current position in Tel Aviv, David has worn many hats. After taking advice from a VP of Engineering in Israel who advised him that marketing may be a better place for him, he realized his unique perspective and experience working hands-on in cybersecurity and software gave him a leg up and made him a very well-rounded marketer.

“One of the things I realized was that most marketeers at the time didn't really understand technology. I had an advantage that I understood technology on one side, and then I also understood marketing and then, later on, sales.”

 

How has Israel evolved into a place known for very successful cybersecurity vendors?

As a kid, David dreamed of living in a country like Israel, and his dream became a reality when he moved to Tel Aviv to work for the Bezeq. He quickly learned about how much energy Israel focuses on hands-on cybersecurity and tech training, especially in the army. With many resources available for this education, it's clear how Israel has risen to the top of this industry.

“Israel is cultivating, not just in cyber, also in data analytics, also in a lot of biomed technology. There are all kinds of technologies that have come from military bases, and then are commercialized for use in industry.”

 

Can you give us some of your secrets to making a relationship between marketing and sales successful?

With experience in marketing and sales, David is our expert in where those roles need to intersect to be successful. Throughout our discussion, David explains that marketing is a creative role, but the credit to closing deals and making profits can be equally divided between sales and marketing for them to thrive together.

“I mean, we have a fun profession here in marketing, we get to try new things, we get to innovate, we get to be creative, we get to go out to conferences, and to meet people all over the world. It's a great profession.”

 

What are some other things that marketing can learn from sales?

David’s tips and tricks don’t stop with sales and marketing collaboration, they extend also to the relationships cultivated between you and your clients. David has realized that through being genuinely interested in learning about his clients and their problems, he forms an authentic connection and a real sales relationship beyond a quick pitch.

“I think, whether you're doing email sequences, or you're doing events, or you're doing podcasts, whatever it is, you should always have in mind that you have to build the relationship. You're not selling features, you're selling benefits, you're selling value.”

---------

Spend some time with our guest David Leichner on LinkedIn and on the Cybellum website

Follow Gianna on LinkedIn

Catch up with Maria on LinkedIn

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter</description>
      <pubDate>Wed, 25 May 2022 09:00:00 -0000</pubDate>
      <itunes:title>The Intersection of Marketing, Tech, &amp; Sales with CMO David Leichner</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>This week, we interview David Leichner, the CMO of Cybellum, currently residing in Tel Aviv, Israel. We talk to David about his move from America to Israel, his admiration for Israel’s focus on cyber startups, his decades of experience in sales and m...</itunes:subtitle>
      <itunes:summary>This week, we interview David Leichner, the CMO of Cybellum, currently residing in Tel Aviv, Israel. We talk to David about his move from America to Israel, his admiration for Israel’s focus on cyber startups, his decades of experience in sales and marketing, and his dedication to relationship building -- no matter what he’s marketing!

Timecoded Guide:

[01:17] David’s personal and professional journey to Cybellum

[05:03] Israel’s transformation into a cybersecurity startup mecca

[08:44] Creation and mission of the Cyber Elite

[18:32] Tying together marketing and sales in the cyber world

[31:27] Passions David has outside of being a CMO

 

How did you get to where you are today to be the CMO of Cybellum?

From his start on Wall Street to his current position in Tel Aviv, David has worn many hats. After taking advice from a VP of Engineering in Israel who advised him that marketing may be a better place for him, he realized his unique perspective and experience working hands-on in cybersecurity and software gave him a leg up and made him a very well-rounded marketer.

“One of the things I realized was that most marketeers at the time didn't really understand technology. I had an advantage that I understood technology on one side, and then I also understood marketing and then, later on, sales.”

 

How has Israel evolved into a place known for very successful cybersecurity vendors?

As a kid, David dreamed of living in a country like Israel, and his dream became a reality when he moved to Tel Aviv to work for the Bezeq. He quickly learned about how much energy Israel focuses on hands-on cybersecurity and tech training, especially in the army. With many resources available for this education, it's clear how Israel has risen to the top of this industry.

“Israel is cultivating, not just in cyber, also in data analytics, also in a lot of biomed technology. There are all kinds of technologies that have come from military bases, and then are commercialized for use in industry.”

 

Can you give us some of your secrets to making a relationship between marketing and sales successful?

With experience in marketing and sales, David is our expert in where those roles need to intersect to be successful. Throughout our discussion, David explains that marketing is a creative role, but the credit to closing deals and making profits can be equally divided between sales and marketing for them to thrive together.

“I mean, we have a fun profession here in marketing, we get to try new things, we get to innovate, we get to be creative, we get to go out to conferences, and to meet people all over the world. It's a great profession.”

 

What are some other things that marketing can learn from sales?

David’s tips and tricks don’t stop with sales and marketing collaboration, they extend also to the relationships cultivated between you and your clients. David has realized that through being genuinely interested in learning about his clients and their problems, he forms an authentic connection and a real sales relationship beyond a quick pitch.

“I think, whether you're doing email sequences, or you're doing events, or you're doing podcasts, whatever it is, you should always have in mind that you have to build the relationship. You're not selling features, you're selling benefits, you're selling value.”

---------

Spend some time with our guest David Leichner on LinkedIn and on the Cybellum website

Follow Gianna on LinkedIn

Catch up with Maria on LinkedIn

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we interview David Leichner, the CMO of Cybellum, currently residing in Tel Aviv, Israel. We talk to David about his move from America to Israel, his admiration for Israel’s focus on cyber startups, his decades of experience in sales and marketing, and his dedication to relationship building -- no matter what he’s marketing!</p>
<p>Timecoded Guide:</p>
<p>[01:17] David’s personal and professional journey to Cybellum</p>
<p>[05:03] Israel’s transformation into a cybersecurity startup mecca</p>
<p>[08:44] Creation and mission of the Cyber Elite</p>
<p>[18:32] Tying together marketing and sales in the cyber world</p>
<p>[31:27] Passions David has outside of being a CMO</p>
<p> </p>
<p>How did you get to where you are today to be the CMO of Cybellum?</p>
<p>From his start on Wall Street to his current position in Tel Aviv, David has worn many hats. After taking advice from a VP of Engineering in Israel who advised him that marketing may be a better place for him, he realized his unique perspective and experience working hands-on in cybersecurity and software gave him a leg up and made him a very well-rounded marketer.</p>
<p><em>“One of the things I realized was that most marketeers at the time didn't really understand technology. I had an advantage that I understood technology on one side, and then I also understood marketing and then, later on, sales.”</em></p>
<p> </p>
<p>How has Israel evolved into a place known for very successful cybersecurity vendors?</p>
<p>As a kid, David dreamed of living in a country like Israel, and his dream became a reality when he moved to Tel Aviv to work for the Bezeq. He quickly learned about how much energy Israel focuses on hands-on cybersecurity and tech training, especially in the army. With many resources available for this education, it's clear how Israel has risen to the top of this industry.</p>
<p><em>“Israel is cultivating, not just in cyber, also in data analytics, also in a lot of biomed technology. There are all kinds of technologies that have come from military bases, and then are commercialized for use in industry.”</em></p>
<p> </p>
<p>Can you give us some of your secrets to making a relationship between marketing and sales successful?</p>
<p>With experience in marketing and sales, David is our expert in where those roles need to intersect to be successful. Throughout our discussion, David explains that marketing is a creative role, but the credit to closing deals and making profits can be equally divided between sales and marketing for them to thrive together.</p>
<p><em>“I mean, we have a fun profession here in marketing, we get to try new things, we get to innovate, we get to be creative, we get to go out to conferences, and to meet people all over the world. It's a great profession.”</em></p>
<p> </p>
<p>What are some other things that marketing can learn from sales?</p>
<p>David’s tips and tricks don’t stop with sales and marketing collaboration, they extend also to the relationships cultivated between you and your clients. David has realized that through being genuinely interested in learning about his clients and their problems, he forms an authentic connection and a real sales relationship beyond a quick pitch.</p>
<p><em>“I think, whether you're doing email sequences, or you're doing events, or you're doing podcasts, whatever it is, you should always have in mind that you have to build the relationship. You're not selling features, you're selling benefits, you're selling value.”</em></p>
<p>---------</p>
<p>Spend some time with our guest David Leichner on <a href="https://www.linkedin.com/in/davidleichner/">LinkedIn</a> and on <a href="https://cybellum.com">the Cybellum website</a></p>
<p>Follow Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a></p>
<p>Catch up with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a></p>
<p>Join the Cybersecurity Marketing Society on <a href="https://cybersecuritymarketingsociety.com">our website</a>, and keep up with us on <a href="https://twitter.com/CyberMSociety">Twitter</a></p>
<p>Keep up with Hacker Valley on <a href="https://hackervalley.com">our website</a>, <a href="https://www.linkedin.com/company/hackervalleystudio/">LinkedIn</a>, <a href="https://www.instagram.com/hackervalleymedia/">Instagram</a>, and <a href="https://twitter.com/TheHackerValley">Twitter</a></p>
]]>
      </content:encoded>
      <itunes:duration>2278</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/8e80aef3-6f37-372b-a530-f16e48abe65f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9987867303.mp3?updated=1723027026" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Humanizing Your Cybersecurity Marketing with Allan Alford</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/17/notes</link>
      <description>“Marketing is too often sidelined from the bad news about the product and from the good news about the competitors. What we do is cool, but we don't do everything and that is okay!”- Allan Alford 

No one knows how to get product marketing in front of a CISO better than, well, a CISO! In this episode, Gianna and Maria are joined by Allan Alford, CISO and CTO at TrustMAPP, to talk about his biggest takeaways from his time spent as a CMO. Allan shares his tips on bringing more personality into cybersecurity marketing, why building your personal brand is just as important as building the company’s, and the best ways to position your marketing to the CISO community. Lastly, Allan shares his philosophy on meeting customers where their challenges are and acknowledging your competition. 

If you enjoyed our guest as much as we did, be sure to check out his show, The Cyber Ranch Podcast

 

Guest Bio:

With 20+ years in information security, Allan Alford has served as CISO four times in three industries. Alford parlayed an IT career into a product security career and then ultimately fused the two disciplines. Alford gives back to the security community via The Cyber Ranch Podcast and by authoring articles and speaking at conferences.

 

Links

Follow Allan Alford on LinkedIn and Twitter

Connect with Gianna on LinkedIn

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast</description>
      <pubDate>Wed, 18 May 2022 09:00:00 -0000</pubDate>
      <itunes:title>Humanizing Your Cybersecurity Marketing with Allan Alford</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>“Marketing is too often sidelined from the bad news about the product and from the good news about the competitors. What we do is cool, but we don't do everything and that is okay!”- Allan Alford 
No one knows how to get product marketing in front of...</itunes:subtitle>
      <itunes:summary>“Marketing is too often sidelined from the bad news about the product and from the good news about the competitors. What we do is cool, but we don't do everything and that is okay!”- Allan Alford 

No one knows how to get product marketing in front of a CISO better than, well, a CISO! In this episode, Gianna and Maria are joined by Allan Alford, CISO and CTO at TrustMAPP, to talk about his biggest takeaways from his time spent as a CMO. Allan shares his tips on bringing more personality into cybersecurity marketing, why building your personal brand is just as important as building the company’s, and the best ways to position your marketing to the CISO community. Lastly, Allan shares his philosophy on meeting customers where their challenges are and acknowledging your competition. 

If you enjoyed our guest as much as we did, be sure to check out his show, The Cyber Ranch Podcast

 

Guest Bio:

With 20+ years in information security, Allan Alford has served as CISO four times in three industries. Alford parlayed an IT career into a product security career and then ultimately fused the two disciplines. Alford gives back to the security community via The Cyber Ranch Podcast and by authoring articles and speaking at conferences.

 

Links

Follow Allan Alford on LinkedIn and Twitter

Connect with Gianna on LinkedIn

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>“Marketing is too often sidelined from the bad news about the product and from the good news about the competitors. What we do is cool, but we don't do everything and that is okay!”- Allan Alford </em></p>
<p>No one knows how to get product marketing in front of a CISO better than, well, a CISO! In this episode, Gianna and Maria are joined by Allan Alford, CISO and CTO at TrustMAPP, to talk about his biggest takeaways from his time spent as a CMO. Allan shares his tips on bringing more personality into cybersecurity marketing, why building your personal brand is just as important as building the company’s, and the best ways to position your marketing to the CISO community. Lastly, Allan shares his philosophy on meeting customers where their challenges are and acknowledging your competition. </p>
<p>If you enjoyed our guest as much as we did, be sure to check out his show, <a href="https://hackervalley.com/show/cyberranch/">The Cyber Ranch Podcast</a></p>
<p> </p>
<p>Guest Bio:</p>
<p>With 20+ years in information security, Allan Alford has served as CISO four times in three industries. Alford parlayed an IT career into a product security career and then ultimately fused the two disciplines. Alford gives back to the security community via <em>The Cyber Ranch Podcast </em>and by authoring articles and speaking at conferences.</p>
<p> </p>
<p>Links</p>
<p>Follow<a href="https://allanalford.com/"> Allan Alford</a> on<a href="https://linkedin.com/in/allanalford"> LinkedIn</a> and<a href="https://twitter.com/AllanAlfordinTX"> Twitter</a></p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a></p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and the <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
]]>
      </content:encoded>
      <itunes:duration>2193</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/f4c2e450-2b0d-3f67-b2a1-7333c24d6da3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW7982953848.mp3?updated=1723027155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Behind the Axonius-Simone Biles-Amy Bream Campaign with Nathan Burke</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/15/notes</link>
      <description>“If you want to do something that no one has ever done before, you have to be different.” Nathan Burke

In this episode, Gianna and Maria are joined by Nathan Burke, Chief Marketing Officer at Axonius, to talk about how Axonius approaches innovation and creativity – from company culture to marketing practices. Nathan explores his desire to shake things up in cybersecurity marketing and ways to position both your brand and message in a way that is both unique and effective. He announces his biggest project yet!! – working with CrossFit champion and kickboxer, Amy Bream and US Olympic gold medalist, Simone Biles. He shares how the campaign emerged, from ideation to conception, and his intentions for the future. 

Stop by the Axonius booth, #943, during RSA Conference in San Francisco from June 6-9, 2022, where both Biles and Bream will be making an appearance!

 

Guest Bio:

Nathan Burke is the Chief Marketing Officer at Axonius. Passionate about bringing new technologies to market to solve real problems, he has held marketing leadership roles at Hexadite (acquired by Microsoft), Intralinks, MineralTree, CloudLock (acquired by Cisco), and is a frequent speaker and contributing author on topics related to the intersection of collaboration and security. 

 

Links:

Check out Amy Bream’s promo video, Axonius’s video submission to Simone Biles, Simone Biles’s promo video, and Dinner With The Biles

Follow Amy Bream and Simone Biles on Instagram

Stay in touch with Nathan Burke on LinkedIn and Twitter, and read more about this campaign on the Axonius blog.

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Hear more episodes from Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast

 </description>
      <pubDate>Wed, 11 May 2022 09:00:00 -0000</pubDate>
      <itunes:title>Behind the Axonius-Simone Biles-Amy Bream Campaign with Nathan Burke</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>“If you want to do something that no one has ever done before, you have to be different.” Nathan Burke
In this episode, Gianna and Maria are joined by Nathan Burke, Chief Marketing Officer at Axonius, to talk about how Axonius approaches innovation a...</itunes:subtitle>
      <itunes:summary>“If you want to do something that no one has ever done before, you have to be different.” Nathan Burke

In this episode, Gianna and Maria are joined by Nathan Burke, Chief Marketing Officer at Axonius, to talk about how Axonius approaches innovation and creativity – from company culture to marketing practices. Nathan explores his desire to shake things up in cybersecurity marketing and ways to position both your brand and message in a way that is both unique and effective. He announces his biggest project yet!! – working with CrossFit champion and kickboxer, Amy Bream and US Olympic gold medalist, Simone Biles. He shares how the campaign emerged, from ideation to conception, and his intentions for the future. 

Stop by the Axonius booth, #943, during RSA Conference in San Francisco from June 6-9, 2022, where both Biles and Bream will be making an appearance!

 

Guest Bio:

Nathan Burke is the Chief Marketing Officer at Axonius. Passionate about bringing new technologies to market to solve real problems, he has held marketing leadership roles at Hexadite (acquired by Microsoft), Intralinks, MineralTree, CloudLock (acquired by Cisco), and is a frequent speaker and contributing author on topics related to the intersection of collaboration and security. 

 

Links:

Check out Amy Bream’s promo video, Axonius’s video submission to Simone Biles, Simone Biles’s promo video, and Dinner With The Biles

Follow Amy Bream and Simone Biles on Instagram

Stay in touch with Nathan Burke on LinkedIn and Twitter, and read more about this campaign on the Axonius blog.

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Hear more episodes from Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>“If you want to do something that no one has ever done before, you have to be different.” Nathan Burke</em></p>
<p>In this episode, Gianna and Maria are joined by Nathan Burke, Chief Marketing Officer at Axonius, to talk about how Axonius approaches innovation and creativity – from company culture to marketing practices. Nathan explores his desire to shake things up in cybersecurity marketing and ways to position both your brand and message in a way that is both unique and effective. He announces his biggest project yet!! – working with CrossFit champion and kickboxer, Amy Bream and US Olympic gold medalist, Simone Biles. He shares how the campaign emerged, from ideation to conception, and his intentions for the future. </p>
<p><em>Stop by the Axonius booth, #943, during RSA Conference in San Francisco from June 6-9, 2022, where both Biles and Bream will be making an appearance!</em></p>
<p> </p>
<p>Guest Bio:</p>
<p>Nathan Burke is the Chief Marketing Officer at Axonius. Passionate about bringing new technologies to market to solve real problems, he has held marketing leadership roles at Hexadite (acquired by Microsoft), Intralinks, MineralTree, CloudLock (acquired by Cisco), and is a frequent speaker and contributing author on topics related to the intersection of collaboration and security. </p>
<p> </p>
<p>Links:</p>
<p>Check out <a href="https://www.axonius.com/plus/controlling-complexity/simone-biles/controlling-complexity-with-amy-bream">Amy Bream’s promo video</a>, <a href="https://axonius.wistia.com/medias/hjcryu9f5t">Axonius’s video submission</a> to Simone Biles, <a href="https://www.axonius.com/plus/controlling-complexity/simone-biles/controlling-complexity-with-simone-biles/ixgpurqpvv">Simone Biles’s promo video</a>, and <a href="https://www.axonius.com/plus/controlling-complexity/simone-biles/dinner-with-the-biles">Dinner With The Biles</a></p>
<p>Follow <a href="https://www.instagram.com/onelegtostandon/?hl=en">Amy Bream</a> and <a href="https://www.instagram.com/simonebiles/">Simone Biles</a> on Instagram</p>
<p>Stay in touch with Nathan Burke on <a href="http://linkedin.com/in/nathanwburke">LinkedIn</a> and <a href="https://twitter.com/nathanwburke">Twitter</a>, and read more about this campaign on the Axonius <a href="https://www.axonius.com/blog/humanizing-cybersecurity-axonius-partners-with-simone-biles-amy-bream">blog</a>.</p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Hear more episodes from <a href="https://hackervalley.com/">Hacker Valley Media</a> and the <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2637</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/16813996-1232-3b93-82c2-7fe351ac9e19]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8052549055.mp3?updated=1723027209" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Actual Demand Gen with Liam Barnes</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/14/notes</link>
      <description>In this episode, Gianna and Maria are joined by Liam Barnes, Head of Demand Generation &amp; Programs at Bionic, to talk about his transition from SEO to Demand Gen and why he thinks SEO is a ‘confused industry.’ Liam explores the need for more intentional and strategic SEO practices, shares his tips for capturing buyers that are lower in the funnel, and why he chooses not to invest in paid search/PPC. Lastly, he shares his key marketing tools as well as his favorite BBQ restaurants in Texas…plus much more!

 

Guest Bio:

Liam Barnes is the Head of Demand Generation and Programs at Bionic, an Application Security startup. He has previously worked at Harness and consulted for companies like Sumo Logic.

 

Links:

Check out Liam’s key tools Metadata and Clearbit, as well as Canva, LinkedIn, Zapier, and Slack

Get your ‘Liam approved’ Texas BBQ fix at Terry Black’s, Roady’s truck stops, and Snow’s 

Stay in touch with Liam Barnes on LinkedIn and Twitter, and listen to his podcast

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Hear more episodes from Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast</description>
      <pubDate>Wed, 04 May 2022 09:00:00 -0000</pubDate>
      <itunes:title>Actual Demand Gen with Liam Barnes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Gianna and Maria are joined by Liam Barnes, Head of Demand Generation &amp; Programs at Bionic, to talk about his transition from SEO to Demand Gen and why he thinks SEO is a ‘confused industry.’ Liam explores the need for more intention...</itunes:subtitle>
      <itunes:summary>In this episode, Gianna and Maria are joined by Liam Barnes, Head of Demand Generation &amp; Programs at Bionic, to talk about his transition from SEO to Demand Gen and why he thinks SEO is a ‘confused industry.’ Liam explores the need for more intentional and strategic SEO practices, shares his tips for capturing buyers that are lower in the funnel, and why he chooses not to invest in paid search/PPC. Lastly, he shares his key marketing tools as well as his favorite BBQ restaurants in Texas…plus much more!

 

Guest Bio:

Liam Barnes is the Head of Demand Generation and Programs at Bionic, an Application Security startup. He has previously worked at Harness and consulted for companies like Sumo Logic.

 

Links:

Check out Liam’s key tools Metadata and Clearbit, as well as Canva, LinkedIn, Zapier, and Slack

Get your ‘Liam approved’ Texas BBQ fix at Terry Black’s, Roady’s truck stops, and Snow’s 

Stay in touch with Liam Barnes on LinkedIn and Twitter, and listen to his podcast

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Hear more episodes from Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Gianna and Maria are joined by Liam Barnes, Head of Demand Generation &amp; Programs at Bionic, to talk about his transition from SEO to Demand Gen and why he thinks SEO is a ‘confused industry.’ Liam explores the need for more intentional and strategic SEO practices, shares his tips for capturing buyers that are lower in the funnel, and why he chooses not to invest in paid search/PPC. Lastly, he shares his key marketing tools as well as his favorite BBQ restaurants in Texas…plus much more!</p>
<p> </p>
<p>Guest Bio:</p>
<p>Liam Barnes is the Head of Demand Generation and Programs at Bionic, an Application Security startup. He has previously worked at Harness and consulted for companies like Sumo Logic.</p>
<p> </p>
<p>Links:</p>
<p>Check out Liam’s key tools <a href="https://metadata.io/">Metadata</a> and <a href="https://clearbit.com/">Clearbit</a>, as well as <a href="https://www.canva.com/">Canva</a>, <a href="http://www.linkedin.com">LinkedIn</a>, <a href="https://zapier.com/">Zapier</a>, and <a href="https://slack.com/">Slack</a></p>
<p>Get your ‘Liam approved’ Texas BBQ fix at <a href="https://www.terryblacksbbq.com/">Terry Black’s</a>, <a href="https://roadys.com/">Roady’s</a> truck stops, and <a href="https://snowsbbq.com/">Snow’s</a> </p>
<p>Stay in touch with Liam Barnes on <a href="https://www.linkedin.com/in/liambarnes44/">LinkedIn</a> and <a href="https://twitter.com/liam_blaise">Twitter</a>, and listen to his <a href="https://everyday-demand-gen.captivate.fm/listen">podcast</a></p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Hear more episodes from <a href="https://hackervalley.com/">Hacker Valley Media</a> and the <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
]]>
      </content:encoded>
      <itunes:duration>2563</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/3af27769-151c-388a-8296-91a7a50bccbf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8035665014.mp3?updated=1723027239" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Creating Influencer Marketing Programs with Doron Youngerwood</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/13/notes</link>
      <description>As cybersecurity marketers, we are always in search of ways to get our content in front of the community and stand out from the noise. This, at times, seems like an impossible endeavor – but what if we told you your CISO network could be your missing link?

In this episode, Gianna and Maria are joined by the Vice President of Marketing at Continuity, Doron Youngerwood, to share his experience in establishing successful influencer marketing strategies. Doron dives into the key elements when building an influencer program, how he leverages his network of CISOs to build trust within the cybersecurity community, and the positive impacts the program has delivered both in business and the cyber community at large.

 

Guest Bio:

With a successful track record in B2B tech marketing, Doron has driven significant growth for both early-stage startups and well-established enterprises for 17 years.

 

Links

Stay in touch with Doron Youngerwood on LinkedIn 

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast.</description>
      <pubDate>Wed, 27 Apr 2022 09:00:00 -0000</pubDate>
      <itunes:title>Creating Influencer Marketing Programs with Doron Youngerwood</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>As cybersecurity marketers, we are always in search of ways to get our content in front of the community and stand out from the noise. This, at times, seems like an impossible endeavor – but what if we told you your CISO network could be your missing...</itunes:subtitle>
      <itunes:summary>As cybersecurity marketers, we are always in search of ways to get our content in front of the community and stand out from the noise. This, at times, seems like an impossible endeavor – but what if we told you your CISO network could be your missing link?

In this episode, Gianna and Maria are joined by the Vice President of Marketing at Continuity, Doron Youngerwood, to share his experience in establishing successful influencer marketing strategies. Doron dives into the key elements when building an influencer program, how he leverages his network of CISOs to build trust within the cybersecurity community, and the positive impacts the program has delivered both in business and the cyber community at large.

 

Guest Bio:

With a successful track record in B2B tech marketing, Doron has driven significant growth for both early-stage startups and well-established enterprises for 17 years.

 

Links

Stay in touch with Doron Youngerwood on LinkedIn 

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As cybersecurity marketers, we are always in search of ways to get our content in front of the community and stand out from the noise. This, at times, seems like an impossible endeavor – but what if we told you your CISO network could be your missing link?</p>
<p>In this episode, Gianna and Maria are joined by the Vice President of Marketing at Continuity, Doron Youngerwood, to share his experience in establishing successful influencer marketing strategies. Doron dives into the key elements when building an influencer program, how he leverages his network of CISOs to build trust within the cybersecurity community, and the positive impacts the program has delivered both in business and the cyber community at large.</p>
<p> </p>
<p>Guest Bio:</p>
<p>With a successful track record in B2B tech marketing, Doron has driven significant growth for both early-stage startups and well-established enterprises for 17 years.</p>
<p> </p>
<p>Links</p>
<p>Stay in touch with Doron Youngerwood on <a href="https://www.linkedin.com/in/youngerwood/">LinkedIn</a> </p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and the <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2246</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/7c9851fc-770e-3b7d-b91e-a3fbd2ea715d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9445833317.mp3?updated=1723027064" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Understanding Your People with Ronen Shetelboim</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/12/notes</link>
      <description>In this episode, Gianna and Maria are joined by the Vice President of Demand Generation at Tessian, Ronen Shetelboim, to explore his philosophies on company culture and relationship building in the workplace. Ronen shares his tips on remote hiring, how personality tests have helped him become a better, more empathetic leader, and the key to building strategic relationships. Lastly, Ronen reveals why helping others achieve success can greatly impact yours as well. 

 

Guest Bio:

Ronen Shetelboim is a marketing leader and avid learner that is passionate about helping companies scale through developing data-driven, revenue focused marketing. He currently serves as the Vice President of Demand Generation at Tessian

 

Links

Learn more about the Johari window, as mentioned in this episode, here

Stay in touch with Ronen on LinkedIn and subscribe to his newsletter here.

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast.</description>
      <pubDate>Wed, 20 Apr 2022 09:00:00 -0000</pubDate>
      <itunes:title>Understanding Your People with Ronen Shetelboim</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Gianna and Maria are joined by the Vice President of Demand Generation at Tessian, Ronen Shetelboim, to explore his philosophies on company culture and relationship building in the workplace. Ronen shares his tips on remote hiring, h...</itunes:subtitle>
      <itunes:summary>In this episode, Gianna and Maria are joined by the Vice President of Demand Generation at Tessian, Ronen Shetelboim, to explore his philosophies on company culture and relationship building in the workplace. Ronen shares his tips on remote hiring, how personality tests have helped him become a better, more empathetic leader, and the key to building strategic relationships. Lastly, Ronen reveals why helping others achieve success can greatly impact yours as well. 

 

Guest Bio:

Ronen Shetelboim is a marketing leader and avid learner that is passionate about helping companies scale through developing data-driven, revenue focused marketing. He currently serves as the Vice President of Demand Generation at Tessian

 

Links

Learn more about the Johari window, as mentioned in this episode, here

Stay in touch with Ronen on LinkedIn and subscribe to his newsletter here.

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Gianna and Maria are joined by the Vice President of Demand Generation at Tessian, Ronen Shetelboim, to explore his philosophies on company culture and relationship building in the workplace. Ronen shares his tips on remote hiring, how personality tests have helped him become a better, more empathetic leader, and the key to building strategic relationships. Lastly, Ronen reveals why helping others achieve success can greatly impact yours as well. </p>
<p> </p>
<p>Guest Bio:</p>
<p>Ronen Shetelboim is a marketing leader and avid learner that is passionate about helping companies scale through developing data-driven, revenue focused marketing. He currently serves as the Vice President of Demand Generation at Tessian</p>
<p> </p>
<p>Links</p>
<p>Learn more about the Johari window, as mentioned in this episode, <a href="https://en.wikipedia.org/wiki/Johari_window">here</a></p>
<p>Stay in touch with Ronen on <a href="https://www.linkedin.com/in/ronenshetelboim/">LinkedIn</a> and subscribe to his <a href="https://ronenshetelboim.substack.com/">newsletter here</a>.</p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and the <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a>.</p>
]]>
      </content:encoded>
      <itunes:duration>2376</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/075ad83c-e702-34e1-bdfb-f0521ddc3b16]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6410068545.mp3?updated=1723027185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mastering Public Relations In Cybersecurity with Sonia Awan</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/11/notes</link>
      <description>In this episode, Gianna and Maria are joined by the Senior Public Relations Specialist at Sotero, Sonia Awan, to talk about all things PR in cybersecurity. Sonia explores the challenges of standing out in cybersecurity public relations, her tips for crafting a newsworthy story, and ways to improve your relationship with reporters and news outlets. Lastly, Sonia shares her thoughts on HARO’s usefulness and her philosophy on getting the most out of your content. 

 

Guest Bio:

Sonia Awan is a seasoned Public Relations professional with over 19 years of experience in technology PR specializing in cyber security. With a degree in Journalism, Sonia has been working with companies in the US and abroad, bringing focus into branding and visibility. She is the principal at Outbloom PR.

 

Links

Check out Sonia’s fireside chat here and visit the Haro website

Stay in touch with Sonia Awan on LinkedIn

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast.

 </description>
      <pubDate>Wed, 13 Apr 2022 09:00:00 -0000</pubDate>
      <itunes:title>Mastering Public Relations In Cybersecurity with Sonia Awan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Gianna and Maria are joined by the Senior Public Relations Specialist at Sotero, Sonia Awan, to talk about all things PR in cybersecurity. Sonia explores the challenges of standing out in cybersecurity public relations, her tips for ...</itunes:subtitle>
      <itunes:summary>In this episode, Gianna and Maria are joined by the Senior Public Relations Specialist at Sotero, Sonia Awan, to talk about all things PR in cybersecurity. Sonia explores the challenges of standing out in cybersecurity public relations, her tips for crafting a newsworthy story, and ways to improve your relationship with reporters and news outlets. Lastly, Sonia shares her thoughts on HARO’s usefulness and her philosophy on getting the most out of your content. 

 

Guest Bio:

Sonia Awan is a seasoned Public Relations professional with over 19 years of experience in technology PR specializing in cyber security. With a degree in Journalism, Sonia has been working with companies in the US and abroad, bringing focus into branding and visibility. She is the principal at Outbloom PR.

 

Links

Check out Sonia’s fireside chat here and visit the Haro website

Stay in touch with Sonia Awan on LinkedIn

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and the Breaking Through in Cybersecurity Marketing Podcast.

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Gianna and Maria are joined by the Senior Public Relations Specialist at <a href="https://www.soterosoft.com/">Sotero</a>, Sonia Awan, to talk about all things PR in cybersecurity. Sonia explores the challenges of standing out in cybersecurity public relations, her tips for crafting a newsworthy story, and ways to improve your relationship with reporters and news outlets. Lastly, Sonia shares her thoughts on HARO’s usefulness and her philosophy on getting the most out of your content. </p>
<p> </p>
<p>Guest Bio:</p>
<p>Sonia Awan is a seasoned Public Relations professional with over 19 years of experience in technology PR specializing in cyber security. With a degree in Journalism, Sonia has been working with companies in the US and abroad, bringing focus into branding and visibility. She is the principal at <a href="https://outbloompr.net/">Outbloom PR</a>.</p>
<p> </p>
<p>Links</p>
<p>Check out Sonia’s fireside chat <a href="https://cybersecuritymarketingsociety.com/pr-best-practices-for-small-medium-cybersecurity-companies/">here</a> and visit the Haro <a href="https://www.helpareporter.com/">website</a></p>
<p>Stay in touch with Sonia Awan on <a href="https://www.linkedin.com/in/outbloompr/">LinkedIn</a></p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and the <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a>.</p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>1625</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/affe4616-5ab8-3f4b-b66f-e210494f1a33]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW6684300176.mp3?updated=1723026968" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity Marketing Sucks, But It Doesn’t Have To Richard Melick</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/10/notes</link>
      <description>In this episode Gianna is joined by Richard Melick, Director of Product Strategy at Zimperium, to have an honest conversation on why cybersecurity marketing sucks and how we can do it better. Richard takes a deep dive into his thoughts on product misrepresentation in cyber, ways in which marketing leadership can better support their teams, and how 'The Great Resignation' in cyber and burnout culture are creating unforeseen problems in the community. The two share their stance on white papers and how to make swag that is both useful and memorable. Lastly, Richard explores his philosophy that all good marketing starts with sharing stories people can relate to.

 

Guest Bio:

Richard Melick has spent over a decade advancing through the security industry with his considerable experience and focus on the stories surrounding enterprise attack surfaces, hacking, and cyber attacks. He has presented various thought leadership to global audiences, including RSA, GISEC, Infosec London, and more.

 

Links

Stay in touch with Richard Melick on LinkedIn and Twitter

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</description>
      <pubDate>Wed, 06 Apr 2022 09:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity Marketing Sucks, But It Doesn’t Have To Richard Melick</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode Gianna is joined by Richard Melick, Director of Product Strategy at Zimperium, to have an honest conversation on why cybersecurity marketing sucks and how we can do it better. Richard takes a deep dive into his thoughts on product mis...</itunes:subtitle>
      <itunes:summary>In this episode Gianna is joined by Richard Melick, Director of Product Strategy at Zimperium, to have an honest conversation on why cybersecurity marketing sucks and how we can do it better. Richard takes a deep dive into his thoughts on product misrepresentation in cyber, ways in which marketing leadership can better support their teams, and how 'The Great Resignation' in cyber and burnout culture are creating unforeseen problems in the community. The two share their stance on white papers and how to make swag that is both useful and memorable. Lastly, Richard explores his philosophy that all good marketing starts with sharing stories people can relate to.

 

Guest Bio:

Richard Melick has spent over a decade advancing through the security industry with his considerable experience and focus on the stories surrounding enterprise attack surfaces, hacking, and cyber attacks. He has presented various thought leadership to global audiences, including RSA, GISEC, Infosec London, and more.

 

Links

Stay in touch with Richard Melick on LinkedIn and Twitter

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode Gianna is joined by Richard Melick, Director of Product Strategy at Zimperium, to have an honest conversation on why cybersecurity marketing sucks and how we can do it better. Richard takes a deep dive into his thoughts on product misrepresentation in cyber, ways in which marketing leadership can better support their teams, and how 'The Great Resignation' in cyber and burnout culture are creating unforeseen problems in the community. The two share their stance on white papers and how to make swag that is both useful and memorable. Lastly, Richard explores his philosophy that all good marketing starts with sharing stories people can relate to.</p>
<p> </p>
<p>Guest Bio:</p>
<p>Richard Melick has spent over a decade advancing through the security industry with his considerable experience and focus on the stories surrounding enterprise attack surfaces, hacking, and cyber attacks. He has presented various thought leadership to global audiences, including RSA, GISEC, Infosec London, and more.</p>
<p> </p>
<p>Links</p>
<p>Stay in touch with Richard Melick on <a href="https://www.linkedin.com/in/richardmelick/">LinkedIn</a> and <a href="https://twitter.com/RCMelick">Twitter</a></p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
]]>
      </content:encoded>
      <itunes:duration>4086</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/c11aece9-e148-3e7f-9bd7-a7871023fb84]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW5596405543.mp3?updated=1723027483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building the SOAR Category: The Siemplify Story with Nimmy Reichenberg</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/9/notes</link>
      <description>In this episode, Nimmy Reichenbery joins Maria and Gianna to discuss the highs and lows of building a marketing program from the ground up at Siemplify. Nimmy explores the building blocks of successful marketing teams, his first few essential hires, and why branding is a crucial element in the early stages. Lastly, Nimmy shares his biggest wins and takeaways from his journey at Siemplify.



See the famous SOCStock conference here. Fingers crossed for future SOCStocks! 



Guest Bio:

Nimmy Reichenberg is a four-time CMO and cybersecurity industry veteran with 20+ years of experience growing B2B technology companies. He is passionate about building, leading and mentoring world-class marketing teams and working with companies to solve their security challenges. He currently heads security operations marketing at Google following the acquisition of Siemplify, where he served as CMO.



Links

Stay in touch with Nimmy Reichenberg on LinkedIn
Connect with Gianna on LinkedIn 
Connect with Maria on LinkedIn 
Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website
Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast

 </description>
      <pubDate>Wed, 30 Mar 2022 09:00:00 -0000</pubDate>
      <itunes:title>Building the SOAR Category: The Siemplify Story with Nimmy Reichenberg</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Nimmy Reichenbery joins Maria and Gianna to discuss the highs and lows of building a marketing program from the ground up at Siemplify. Nimmy explores the building blocks of successful marketing teams, his first few essential hires, ...</itunes:subtitle>
      <itunes:summary>In this episode, Nimmy Reichenbery joins Maria and Gianna to discuss the highs and lows of building a marketing program from the ground up at Siemplify. Nimmy explores the building blocks of successful marketing teams, his first few essential hires, and why branding is a crucial element in the early stages. Lastly, Nimmy shares his biggest wins and takeaways from his journey at Siemplify.



See the famous SOCStock conference here. Fingers crossed for future SOCStocks! 



Guest Bio:

Nimmy Reichenberg is a four-time CMO and cybersecurity industry veteran with 20+ years of experience growing B2B technology companies. He is passionate about building, leading and mentoring world-class marketing teams and working with companies to solve their security challenges. He currently heads security operations marketing at Google following the acquisition of Siemplify, where he served as CMO.



Links

Stay in touch with Nimmy Reichenberg on LinkedIn
Connect with Gianna on LinkedIn 
Connect with Maria on LinkedIn 
Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website
Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Nimmy Reichenbery joins Maria and Gianna to discuss the highs and lows of building a marketing program from the ground up at Siemplify. Nimmy explores the building blocks of successful marketing teams, his first few essential hires, and why branding is a crucial element in the early stages. Lastly, Nimmy shares his biggest wins and takeaways from his journey at Siemplify.<br>
<br>
</p>
<p>See the famous SOCStock conference <a href="https://www.socstock2021.com/">here</a>. Fingers crossed for future SOCStocks! <br>
<br>
</p>
<p>Guest Bio:</p>
<p>Nimmy Reichenberg is a four-time CMO and cybersecurity industry veteran with 20+ years of experience growing B2B technology companies. He is passionate about building, leading and mentoring world-class marketing teams and working with companies to solve their security challenges. He currently heads security operations marketing at Google following the acquisition of Siemplify, where he served as CMO.<br>
<br>
</p>
<p>Links</p>
<p>Stay in touch with Nimmy Reichenberg on <a href="https://www.linkedin.com/in/nreichenberg/">LinkedIn</a><br>
Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> <br>
Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> <br>
Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website<br>
Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2414</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/155deb46-334f-319a-8adf-4dcf74a72c2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW1942515266.mp3?updated=1723027107" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is Your Marketing Annoying to Security Folks? How to Fix it with Dani Woolf</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/8/notes</link>
      <description>Gianna is joined by the Director of Demand Generation at Cybersixgill, Dani Woolf, to discuss her core marketing values: empathy, trust and loyalty. Dani shares her philosophy on creating meaningful, customer-centric experiences, how to identify customer challenges and buying motivations, and how asking the right questions can help transform your marketing efforts. Lastly, Dani shares the story behind the uncomfortable encounter that sparked a great friendship with a cybersecurity practitioner. 

 

Follow Dani’s newsletter and her podcast launch at the Audience 1st Substack!

Get the book Buyer Personas: How to Gain Insight into your Customer's Expectations, Align your Marketing Strategies, and Win More Business by Adele Revella at Amazon or the bookstore of your choice! 

 

Guest Bio:

Dani Woolf is a swimmer turned marketer. She has been applying lessons learned as a distance freestyler to B2B organizational success for the past 10 years. Dani's core specialty is in digital marketing with a focus on net new customer acquisition via digital channels - website optimization, SEO, SEM, social media, conversion rate optimization and marketing automation. Dani currently serves as the Director of Demand Generation at Cybersixgill.

 

LInks:

Stay in touch with Dani Woolf on LinkedIn and Twitter

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</description>
      <pubDate>Wed, 23 Mar 2022 09:00:00 -0000</pubDate>
      <itunes:title>Is Your Marketing Annoying to Security Folks? How to Fix it with Dani Woolf</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Gianna is joined by the Director of Demand Generation at Cybersixgill, Dani Woolf, to discuss her core marketing values: empathy, trust and loyalty. Dani shares her philosophy on creating meaningful, customer-centric experiences, how to identify cust...</itunes:subtitle>
      <itunes:summary>Gianna is joined by the Director of Demand Generation at Cybersixgill, Dani Woolf, to discuss her core marketing values: empathy, trust and loyalty. Dani shares her philosophy on creating meaningful, customer-centric experiences, how to identify customer challenges and buying motivations, and how asking the right questions can help transform your marketing efforts. Lastly, Dani shares the story behind the uncomfortable encounter that sparked a great friendship with a cybersecurity practitioner. 

 

Follow Dani’s newsletter and her podcast launch at the Audience 1st Substack!

Get the book Buyer Personas: How to Gain Insight into your Customer's Expectations, Align your Marketing Strategies, and Win More Business by Adele Revella at Amazon or the bookstore of your choice! 

 

Guest Bio:

Dani Woolf is a swimmer turned marketer. She has been applying lessons learned as a distance freestyler to B2B organizational success for the past 10 years. Dani's core specialty is in digital marketing with a focus on net new customer acquisition via digital channels - website optimization, SEO, SEM, social media, conversion rate optimization and marketing automation. Dani currently serves as the Director of Demand Generation at Cybersixgill.

 

LInks:

Stay in touch with Dani Woolf on LinkedIn and Twitter

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gianna is joined by the Director of Demand Generation at Cybersixgill, Dani Woolf, to discuss her core marketing values: empathy, trust and loyalty. Dani shares her philosophy on creating meaningful, customer-centric experiences, how to identify customer challenges and buying motivations, and how asking the right questions can help transform your marketing efforts. Lastly, Dani shares the story behind the uncomfortable encounter that sparked a great friendship with a cybersecurity practitioner. </p>
<p class="x-scope qowt-word-para-1"> </p>
<p class="x-scope qowt-word-para-1">Follow Dani’s newsletter and her podcast launch at the <a href="https://audience1st.substack.com/p/what-is-audience-1st-podcast-and?showWelcome=true&amp;s=r">Audience 1st Substack</a>!</p>
<p class="x-scope qowt-word-para-1">Get the book Buyer Personas: How to Gain Insight into your Customer's Expectations, Align your Marketing Strategies, and Win More Business by Adele Revella at <a href="https://www.amazon.com/Buyer-Personas-Customers-Expectations-Strategies/dp/1118961501">Amazon</a> or the bookstore of your choice! </p>
<p> </p>
<p>Guest Bio:</p>
<p>Dani Woolf is a swimmer turned marketer. She has been applying lessons learned as a distance freestyler to B2B organizational success for the past 10 years. Dani's core specialty is in digital marketing with a focus on net new customer acquisition via digital channels - website optimization, SEO, SEM, social media, conversion rate optimization and marketing automation. Dani currently serves as the Director of Demand Generation at Cybersixgill.</p>
<p> </p>
<p>LInks:</p>
<p>Stay in touch with Dani Woolf on <a href="https://www.linkedin.com/in/daniarad/">LinkedIn</a> and <a href="https://twitter.com/DanielleArad">Twitter</a></p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
]]>
      </content:encoded>
      <itunes:duration>2256</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/d5e8759f-7627-3e9f-8ad7-74cf1cd5cc33]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW8626389792.mp3?updated=1723027173" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Specifics of Federal Government Marketing with Mary Yang</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/7/notes</link>
      <description>Getting your marketing in front of government customers can be a very difficult endeavor, especially when traditional marketing tactics don’t apply. In this episode, Mary Yang joins Gianna to discuss the strategies she uses to connect her message and product with her FedGov clientele. Mary breaks down the importance of leveraging thought leadership and content marketing and why understanding your audience and their needs is a critical ingredient in your government marketing strategy.





Guest Bio:

Mary Yang is the Chief Marketing Officer of LookingGlass Cyber Solutions and is an expert in cybersecurity marketing in the federal government industry. She has more than a dozen years of experience doing everything from creating sales collateral to nurturing campaigns and corporate messaging.





Links:

Download and read the NIST framework that Mary mentioned here: https://www.nist.gov/cyberframework 

Stay in touch with Mary on LinkedIn and Twitter

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast

 </description>
      <pubDate>Wed, 16 Mar 2022 09:00:00 -0000</pubDate>
      <itunes:title>Specifics of Federal Government Marketing with Mary Yang</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>Getting your marketing in front of government customers can be a very difficult endeavor, especially when traditional marketing tactics don’t apply. In this episode, Mary Yang joins Gianna to discuss the strategies she uses to connect her message and...</itunes:subtitle>
      <itunes:summary>Getting your marketing in front of government customers can be a very difficult endeavor, especially when traditional marketing tactics don’t apply. In this episode, Mary Yang joins Gianna to discuss the strategies she uses to connect her message and product with her FedGov clientele. Mary breaks down the importance of leveraging thought leadership and content marketing and why understanding your audience and their needs is a critical ingredient in your government marketing strategy.





Guest Bio:

Mary Yang is the Chief Marketing Officer of LookingGlass Cyber Solutions and is an expert in cybersecurity marketing in the federal government industry. She has more than a dozen years of experience doing everything from creating sales collateral to nurturing campaigns and corporate messaging.





Links:

Download and read the NIST framework that Mary mentioned here: https://www.nist.gov/cyberframework 

Stay in touch with Mary on LinkedIn and Twitter

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Getting your marketing in front of government customers can be a very difficult endeavor, especially when traditional marketing tactics don’t apply. In this episode, Mary Yang joins Gianna to discuss the strategies she uses to connect her message and product with her FedGov clientele. Mary breaks down the importance of leveraging thought leadership and content marketing and why understanding your audience and their needs is a critical ingredient in your government marketing strategy.</p>
<p><br>
<br>
</p>
<p>Guest Bio:</p>
<p>Mary Yang is the Chief Marketing Officer of LookingGlass Cyber Solutions and is an expert in cybersecurity marketing in the federal government industry. She has more than a dozen years of experience doing everything from creating sales collateral to nurturing campaigns and corporate messaging.</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Download and read the NIST framework that Mary mentioned here: <a href="https://www.nist.gov/cyberframework">https://www.nist.gov/cyberframework</a> </p>
<p>Stay in touch with Mary on <a href="https://www.linkedin.com/in/marycyang/">LinkedIn</a> and <a href="https://twitter.com/techgirlmary">Twitter</a></p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>2024</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/c18b1716-0fd9-3d94-a161-947808c1f70d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4562386261.mp3?updated=1723027024" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Getting Your Brand Noticed with Samuel Tyler</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/6/notes</link>
      <description>How do you make your brand stand out in a sea of cybersecurity marketing? Sometimes, all it takes is a fresh idea, a killer pitch, and a wee-bit of luck. In this episode, Samuel Tyler shares the story behind Bugcrowd’s famous out-of-home RSA campaign and his advice on how to make your brand stand out in the crowd.

 

Guest Bio:

Samuel Tyler is the Senior Manager of Corporate Marketing at Bugcrowd. Samuel is a B2B marketer working at the intersection of cybersecurity and data. He has an interdisciplinary background in growth-stage product marketing and brand management, plus a wealth of hands-on skills in creative direction. As a professional by day, and scholar by night, he passionately integrates discipline, intuition, and experience to deliver work that's both effective and evocative.

 

Links:

Read the blog wrap-up and get more resources from this episode here

Stay in touch with Samuel Tyler on LinkedIn 


Connect with Gianna on LinkedIn 


Connect with Maria on LinkedIn 


Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website


Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast

 </description>
      <pubDate>Wed, 09 Mar 2022 10:00:00 -0000</pubDate>
      <itunes:title>Getting Your Brand Noticed with Samuel Tyler</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>How do you make your brand stand out in a sea of cybersecurity marketing? Sometimes, all it takes is a fresh idea, a killer pitch, and a wee-bit of luck. In this episode, Samuel Tyler shares the story behind Bugcrowd’s famous out-of-home RSA campaign...</itunes:subtitle>
      <itunes:summary>How do you make your brand stand out in a sea of cybersecurity marketing? Sometimes, all it takes is a fresh idea, a killer pitch, and a wee-bit of luck. In this episode, Samuel Tyler shares the story behind Bugcrowd’s famous out-of-home RSA campaign and his advice on how to make your brand stand out in the crowd.

 

Guest Bio:

Samuel Tyler is the Senior Manager of Corporate Marketing at Bugcrowd. Samuel is a B2B marketer working at the intersection of cybersecurity and data. He has an interdisciplinary background in growth-stage product marketing and brand management, plus a wealth of hands-on skills in creative direction. As a professional by day, and scholar by night, he passionately integrates discipline, intuition, and experience to deliver work that's both effective and evocative.

 

Links:

Read the blog wrap-up and get more resources from this episode here

Stay in touch with Samuel Tyler on LinkedIn 


Connect with Gianna on LinkedIn 


Connect with Maria on LinkedIn 


Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website


Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast

 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>How do you make your brand stand out in a sea of cybersecurity marketing? Sometimes, all it takes is a fresh idea, a killer pitch, and a wee-bit of luck. In this episode, Samuel Tyler shares the story behind Bugcrowd’s famous out-of-home RSA campaign and his advice on how to make your brand stand out in the crowd.</p>
<p> </p>
<p>Guest Bio:</p>
<p>Samuel Tyler is the Senior Manager of Corporate Marketing at Bugcrowd. Samuel is a B2B marketer working at the intersection of cybersecurity and data. He has an interdisciplinary background in growth-stage product marketing and brand management, plus a wealth of hands-on skills in creative direction. As a professional by day, and scholar by night, he passionately integrates discipline, intuition, and experience to deliver work that's both effective and evocative.</p>
<p> </p>
<p>Links:</p>
<p>Read the blog wrap-up and get more resources from this episode <a href="https://cybersecuritymarketingsociety.com/getting-your-brand-noticed-with-samuel-tyler/">here</a></p>
<p>Stay in touch with Samuel Tyler on <a href="https://www.linkedin.com/in/samueljtyler/">LinkedIn</a> <br>
</p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> <br>
</p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> <br>
</p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website<br>
</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
<p> </p>
]]>
      </content:encoded>
      <itunes:duration>1420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/71cedbae-ec43-382e-8eb3-d831a16ec72c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2645115411.mp3?updated=1723027006" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Maria &amp; Gianna on Sales Alignment</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/5/notes</link>
      <description>In this episode, Maria takes a turn in the hot seat to talk about her favorite subject: improving sales and marketing alignment. Gianna and Maria explore what a healthy sales and marketing relationship looks like, how a combination of communication and incentives can help educate your sales team on the MQL process, and their tips for rolling out an account based marketing strategy. Lastly, Maria takes a moment to gab about her love of food. 

 

Key Takeaways

00:42  Maria’s bio

01:19  Why Maria loves sales alignment 

02:24  The “ideal” sales person

04:15  Goals and KPI alignment

06:31  Mindset and tactical tips 

09:25  Being patient and flexible

12:17  Communication, documentation and incentives 

18:14  Do BDRs belong in marketing or sales?

23:22  ABM steps and strategy

27:49  Asking the right questions

30:30  Dishing out marketing tips &amp; good food

 

Links:

Check out and download Maria's Pipeline Spreadsheet and SLA Template!

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</description>
      <pubDate>Wed, 02 Mar 2022 10:00:00 -0000</pubDate>
      <itunes:title>Maria &amp; Gianna on Sales Alignment</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode, Maria takes a turn in the hot seat to talk about her favorite subject: improving sales and marketing alignment. Gianna and Maria explore what a healthy sales and marketing relationship looks like, how a combination of communication a...</itunes:subtitle>
      <itunes:summary>In this episode, Maria takes a turn in the hot seat to talk about her favorite subject: improving sales and marketing alignment. Gianna and Maria explore what a healthy sales and marketing relationship looks like, how a combination of communication and incentives can help educate your sales team on the MQL process, and their tips for rolling out an account based marketing strategy. Lastly, Maria takes a moment to gab about her love of food. 

 

Key Takeaways

00:42  Maria’s bio

01:19  Why Maria loves sales alignment 

02:24  The “ideal” sales person

04:15  Goals and KPI alignment

06:31  Mindset and tactical tips 

09:25  Being patient and flexible

12:17  Communication, documentation and incentives 

18:14  Do BDRs belong in marketing or sales?

23:22  ABM steps and strategy

27:49  Asking the right questions

30:30  Dishing out marketing tips &amp; good food

 

Links:

Check out and download Maria's Pipeline Spreadsheet and SLA Template!

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Maria takes a turn in the hot seat to talk about her favorite subject: improving sales and marketing alignment. Gianna and Maria explore what a healthy sales and marketing relationship looks like, how a combination of communication and incentives can help educate your sales team on the MQL process, and their tips for rolling out an account based marketing strategy. Lastly, Maria takes a moment to gab about her love of food. </p>
<p> </p>
<p>Key Takeaways</p>
<p>00:42  Maria’s bio</p>
<p>01:19  Why Maria loves sales alignment </p>
<p>02:24  The “ideal” sales person</p>
<p>04:15  Goals and KPI alignment</p>
<p>06:31  Mindset and tactical tips </p>
<p>09:25  Being patient and flexible</p>
<p>12:17  Communication, documentation and incentives </p>
<p>18:14  Do BDRs belong in marketing or sales?</p>
<p>23:22  ABM steps and strategy</p>
<p>27:49  Asking the right questions</p>
<p>30:30  Dishing out marketing tips &amp; good food</p>
<p> </p>
<p>Links:</p>
<p>Check out and download Maria's <a href="https://f.hubspotusercontent40.net/hubfs/9445447/Marketing%20Performance%20&amp;%20Pipeline%20%5BTEMPLATE%5D%20(Please%20make%20a%20copy).xlsx">Pipeline Spreadsheet</a> and <a href="https://f.hubspotusercontent40.net/hubfs/9445447/Sales%20&amp;%20Marketing%20SLA%20Template%20(Please%20make%20a%20copy).docx">SLA Template</a>!</p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
]]>
      </content:encoded>
      <itunes:duration>2034</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/5926cd04-989c-3474-8d30-7d90ab243071]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW9436505204.mp3?updated=1723027161" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No Product Marketing Alignment, No Strategy! With Seth Goldhammer</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/4/notes</link>
      <description>In this episode of Breaking Through in Cybersecurity Marketing, Gianna is joined by the VP of Marketing at Spyderbat, Seth Goldhammer. Seth shares his perspective on how and how not to be successful in product marketing, why role clarity is essential when establishing your marketing chain of command, and his excitement in building out marketing programs and functions at a virtual startup. Lastly, Seth gives his advice on how to work alongside strong personalities and shares the story behind his favorite film of all time!

 

Key Takeaways:

01:27  Seth’s bio - from screen writing to marketing 

06:25  Why product marketing?

07:59  What’s your motivation? 

09:41  Alignment and role clarity

13:21  Decision making  - who’s responsible?

15:30  Communication is key

21:04  Working with strong personalities 

22:55 Seth’s favorite film!

 

Links:

Stay in touch with Seth on Twitter and LinkedIn, and check out his favorite film, Apocalypse Now, as well as the RACI matrix

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</description>
      <pubDate>Wed, 23 Feb 2022 10:00:00 -0000</pubDate>
      <itunes:title>No Product Marketing Alignment, No Strategy! With Seth Goldhammer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode of Breaking Through in Cybersecurity Marketing, Gianna is joined by the VP of Marketing at Spyderbat, Seth Goldhammer. Seth shares his perspective on how and how not to be successful in product marketing, why role clarity is essential...</itunes:subtitle>
      <itunes:summary>In this episode of Breaking Through in Cybersecurity Marketing, Gianna is joined by the VP of Marketing at Spyderbat, Seth Goldhammer. Seth shares his perspective on how and how not to be successful in product marketing, why role clarity is essential when establishing your marketing chain of command, and his excitement in building out marketing programs and functions at a virtual startup. Lastly, Seth gives his advice on how to work alongside strong personalities and shares the story behind his favorite film of all time!

 

Key Takeaways:

01:27  Seth’s bio - from screen writing to marketing 

06:25  Why product marketing?

07:59  What’s your motivation? 

09:41  Alignment and role clarity

13:21  Decision making  - who’s responsible?

15:30  Communication is key

21:04  Working with strong personalities 

22:55 Seth’s favorite film!

 

Links:

Stay in touch with Seth on Twitter and LinkedIn, and check out his favorite film, Apocalypse Now, as well as the RACI matrix

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out  Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Breaking Through in Cybersecurity Marketing</em>, Gianna is joined by the VP of Marketing at Spyderbat, Seth Goldhammer. Seth shares his perspective on how and how not to be successful in product marketing, why role clarity is essential when establishing your marketing chain of command, and his excitement in building out marketing programs and functions at a virtual startup. Lastly, Seth gives his advice on how to work alongside strong personalities and shares the story behind his favorite film of all time!</p>
<p> </p>
<p>Key Takeaways:</p>
<p>01:27  Seth’s bio - from screen writing to marketing </p>
<p>06:25  Why product marketing?</p>
<p>07:59  What’s your motivation? </p>
<p>09:41  Alignment and role clarity</p>
<p>13:21  Decision making  - who’s responsible?</p>
<p>15:30  Communication is key</p>
<p>21:04  Working with strong personalities </p>
<p>22:55 Seth’s favorite film!</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with Seth on <a href="https://twitter.com/SoCalledSeth">Twitter</a> and <a href="https://www.linkedin.com/in/sethgoldhammer/">LinkedIn</a>, and check out his favorite film, <a href="https://www.youtube.com/watch?v=9l-ViOOFH-s">Apocalypse Now</a>, as well as the <a href="https://en.wikipedia.org/wiki/Responsibility_assignment_matrix">RACI matrix</a></p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out  <a href="https://hackervalley.com/">Hacker Valley Media</a> and <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
]]>
      </content:encoded>
      <itunes:duration>1680</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/07f8eb62-2ca0-3824-a914-6d99f2682920]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW4344003458.mp3?updated=1723026979" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How To Kickoff Research Programs with Joanna Jones</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/3/notes</link>
      <description>In this episode of Breaking Through in Cybersecurity Marketing, Gianna and Maria are joined by CEO and founder of InterQ Research, Joanna Jones. Joanna does a deep dive into the qualitative market research process, why focused market research can take product and services marketing to the next level, and how to leverage your product team to help drive company support buy-in. Lastly, Joanna gives a crash course on focus groups and what you need to get started. 

 

Key takeaways:

00.34  Bio

03:13  The qualitative research process

05:19  Participant sourcing and engagement

08:00  Will there be food?! - Gianna has to know!

08:48  Remote focus groups 

10:03  Qualitative Vs. Quantitative research

12:20  Company support buy-in

15:54  Is there an ideal time?

18:23  Focused driven research

21:15  Focus groups 101

25:21  Stay in touch with Joanna!


Read the blog wrap-up and get more resources from this episode here

Stay in touch with Joanna Jones on Twitter and LinkedIn, and at InterQ

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</description>
      <pubDate>Mon, 14 Feb 2022 01:01:15 -0000</pubDate>
      <itunes:title>How To Kickoff Research Programs with Joanna Jones</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In this episode of Breaking Through in Cybersecurity Marketing, Gianna and Maria are joined by CEO and founder of InterQ Research, Joanna Jones. Joanna does a deep dive into the qualitative market research process, why focused market research can tak...</itunes:subtitle>
      <itunes:summary>In this episode of Breaking Through in Cybersecurity Marketing, Gianna and Maria are joined by CEO and founder of InterQ Research, Joanna Jones. Joanna does a deep dive into the qualitative market research process, why focused market research can take product and services marketing to the next level, and how to leverage your product team to help drive company support buy-in. Lastly, Joanna gives a crash course on focus groups and what you need to get started. 

 

Key takeaways:

00.34  Bio

03:13  The qualitative research process

05:19  Participant sourcing and engagement

08:00  Will there be food?! - Gianna has to know!

08:48  Remote focus groups 

10:03  Qualitative Vs. Quantitative research

12:20  Company support buy-in

15:54  Is there an ideal time?

18:23  Focused driven research

21:15  Focus groups 101

25:21  Stay in touch with Joanna!


Read the blog wrap-up and get more resources from this episode here

Stay in touch with Joanna Jones on Twitter and LinkedIn, and at InterQ

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Breaking Through in Cybersecurity Marketing</em>, Gianna and Maria are joined by CEO and founder of InterQ Research, Joanna Jones. Joanna does a deep dive into the qualitative market research process, why focused market research can take product and services marketing to the next level, and how to leverage your product team to help drive company support buy-in. Lastly, Joanna gives a crash course on focus groups and what you need to get started. </p>
<p> </p>
<p>Key takeaways:</p>
<p>00.34  Bio</p>
<p>03:13  The qualitative research process</p>
<p>05:19  Participant sourcing and engagement</p>
<p>08:00  Will there be food?! - Gianna has to know!</p>
<p>08:48  Remote focus groups </p>
<p>10:03  Qualitative Vs. Quantitative research</p>
<p>12:20  Company support buy-in</p>
<p>15:54  Is there an ideal time?</p>
<p>18:23  Focused driven research</p>
<p>21:15  Focus groups 101</p>
<p>25:21  Stay in touch with Joanna!</p>
<p><br>
Read the blog wrap-up and get more resources from this episode <a href="https://cybersecuritymarketingsociety.com/how-to-kickoff-research-programs-with-joanna-jones/">here</a></p>
<p>Stay in touch with Joanna Jones on <a href="https://twitter.com/InterQResearch">Twitter</a> and <a href="https://www.linkedin.com/in/joanna-jones-54686425/">LinkedIn</a>, and at <a href="https://interq-research.com/">InterQ</a></p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out <a href="https://hackervalley.com/">Hacker Valley Media</a> and <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/80d0742f-2e0d-3fa6-9c8b-746db534c4ae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2722666093.mp3?updated=1723027043" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building Trust, Culture, and Communities with Tyler Shields</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/2/notes</link>
      <description>In the first episode of Breaking Through In Cybersecurity Marketing, Gianna and Maria are joined by JupiterOne’s self proclaimed “accidental CMO,” Tyler Shields. Tyler shares his three step approach for building out marketing programs at startups, how to establish company culture remotely, setting realistic expectations with internal stakeholders when building community at companies, and why your company is in need of a “talking head.” Lastly, Tyler spills the beans on the true mastermind behind his Yeti swag and the current marketing models and platforms he’s engaging in.  

 

Key takeaways:

00:40  Bio

02:10  Tyler’s 3 step approach for startup marketing

06:39  Remote working - communication is key!

09:54  Trust building and authentic leadership 

11:06  Establishing company culture remotely

13:43  Accountability and teamwork 

15:35  What’s in store for JupiterOne in 2022?!

18:18  Building community - foundation first  

22:54  Setting realistic expectations 

24:28  Spokespeople and “talking heads”

27:03  Favorite swag and the true Yeti mastermind

31:35  Product-led growth and establishing value

34:10  Social media, podcasting, and modern marketing models

35:41  Platforms - Youtube, Shopify, Slack, and the whole gambit!

39:01  Stay in touch with Tyler

 

See photos of Tyler’s favorite swag, a list of the tools mentioned on this episode, and get the episode transcript here 

 

Stay in touch with Tyler on Twitter and LinkedIn, and JupiterOne

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out more from Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</description>
      <pubDate>Mon, 14 Feb 2022 01:00:09 -0000</pubDate>
      <itunes:title>Building Trust, Culture, and Communities with Tyler Shields</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>In the first episode of Breaking Through In Cybersecurity Marketing, Gianna and Maria are joined by JupiterOne’s self proclaimed “accidental CMO,” Tyler Shields. Tyler shares his three step approach for building out marketing programs at startups, ho...</itunes:subtitle>
      <itunes:summary>In the first episode of Breaking Through In Cybersecurity Marketing, Gianna and Maria are joined by JupiterOne’s self proclaimed “accidental CMO,” Tyler Shields. Tyler shares his three step approach for building out marketing programs at startups, how to establish company culture remotely, setting realistic expectations with internal stakeholders when building community at companies, and why your company is in need of a “talking head.” Lastly, Tyler spills the beans on the true mastermind behind his Yeti swag and the current marketing models and platforms he’s engaging in.  

 

Key takeaways:

00:40  Bio

02:10  Tyler’s 3 step approach for startup marketing

06:39  Remote working - communication is key!

09:54  Trust building and authentic leadership 

11:06  Establishing company culture remotely

13:43  Accountability and teamwork 

15:35  What’s in store for JupiterOne in 2022?!

18:18  Building community - foundation first  

22:54  Setting realistic expectations 

24:28  Spokespeople and “talking heads”

27:03  Favorite swag and the true Yeti mastermind

31:35  Product-led growth and establishing value

34:10  Social media, podcasting, and modern marketing models

35:41  Platforms - Youtube, Shopify, Slack, and the whole gambit!

39:01  Stay in touch with Tyler

 

See photos of Tyler’s favorite swag, a list of the tools mentioned on this episode, and get the episode transcript here 

 

Stay in touch with Tyler on Twitter and LinkedIn, and JupiterOne

Connect with Gianna on LinkedIn 

Connect with Maria on LinkedIn 

Follow the Cybersecurity Marketing Society on Twitter or learn more at the Cybersecurity Marketing Society website

Check out more from Hacker Valley Media and Breaking Through in Cybersecurity Marketing Podcast</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the first episode of <em>Breaking Through In Cybersecurity Marketing</em>, Gianna and Maria are joined by JupiterOne’s self proclaimed “accidental CMO,” Tyler Shields. Tyler shares his three step approach for building out marketing programs at startups, how to establish company culture remotely, setting realistic expectations with internal stakeholders when building community at companies, and why your company is in need of a “talking head.” Lastly, Tyler spills the beans on the true mastermind behind his Yeti swag and the current marketing models and platforms he’s engaging in.  </p>
<p> </p>
<p>Key takeaways:</p>
<p>00:40  Bio</p>
<p>02:10  Tyler’s 3 step approach for startup marketing</p>
<p>06:39  Remote working - communication is key!</p>
<p>09:54  Trust building and authentic leadership </p>
<p>11:06  Establishing company culture remotely</p>
<p>13:43  Accountability and teamwork </p>
<p>15:35  What’s in store for JupiterOne in 2022?!</p>
<p>18:18  Building community - foundation first  </p>
<p>22:54  Setting realistic expectations </p>
<p>24:28  Spokespeople and “talking heads”</p>
<p>27:03  Favorite swag and the true Yeti mastermind</p>
<p>31:35  Product-led growth and establishing value</p>
<p>34:10  Social media, podcasting, and modern marketing models</p>
<p>35:41  Platforms - Youtube, Shopify, Slack, and the whole gambit!</p>
<p>39:01  Stay in touch with Tyler</p>
<p> </p>
<p>See photos of Tyler’s favorite swag, a list of the tools mentioned on this episode, and get the episode transcript <a href="https://cybersecuritymarketingsociety.com/podcast-episode-1-building-trust-culture-and-communities-with-tyler-shields">here </a></p>
<p> </p>
<p>Stay in touch with Tyler on <a href="https://twitter.com/txs">Twitter</a> and <a href="https://www.linkedin.com/in/tylershields/">LinkedIn</a>, and <a href="https://jupiterone.com/">JupiterOne</a></p>
<p>Connect with Gianna on <a href="https://www.linkedin.com/in/giannawhitver/">LinkedIn</a> </p>
<p>Connect with Maria on <a href="https://www.linkedin.com/in/maria-vepa/">LinkedIn</a> </p>
<p>Follow the Cybersecurity Marketing Society on <a href="https://twitter.com/CyberMSociety">Twitter</a> or learn more at the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> website</p>
<p>Check out more from <a href="https://hackervalley.com/">Hacker Valley Media</a> and <a href="https://hackervalley.com/show/breaking-through-in-cybersecurity-marketing/">Breaking Through in Cybersecurity Marketing Podcast</a></p>
]]>
      </content:encoded>
      <itunes:duration>2551</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/24564964-0bbe-3451-8f62-b4a47c2b80d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW3013346332.mp3?updated=1723027186" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trailer: Breaking Through in Cybersecurity Marketing</title>
      <link>https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/1/notes</link>
      <description>A sneak peek on what to expect from Gianna and Maria on cybersecurity marketing!</description>
      <pubDate>Sat, 12 Feb 2022 20:29:00 -0000</pubDate>
      <itunes:title>Trailer: Breaking Through in Cybersecurity Marketing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Cybersecurity Marketing Society | N2K Networks</itunes:author>
      <itunes:subtitle>A sneak peek on what to expect from Gianna and Maria on cybersecurity marketing!</itunes:subtitle>
      <itunes:summary>A sneak peek on what to expect from Gianna and Maria on cybersecurity marketing!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A sneak peek on what to expect from Gianna and Maria on cybersecurity marketing!</p>
]]>
      </content:encoded>
      <itunes:duration>160</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[breaking-through-cyber-marketing.podbean.com/e2dc9469-7a97-3b7f-a538-8206a3b709f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6bd77a/traffic.megaphone.fm/CYBW2080610895.mp3?updated=1723026781" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
