The Art of Trade Show Excellence: Planning, Presence, and Follow-Up

In this episode of Cybersecurity (Marketing) Unplugged, Jennifer also discusses: How to set clear objectives and plan your trade show presence to align with your overall marketing goals; Innovative ideas for booth design and activities that attract and engage visitors; Crafting compelling messaging and content that resonates with your target audience and highlights your brand’s unique value.
Survey Says! Utilizing Survey Data to Support Cybersecurity Marketing Programs

In this episode of Cybersecurity (Marketing) Unplugged, Kristine also discusses: How research and survey reports guide B2B cybersecurity marketing by identifying market needs and shaping narratives; Designing surveys to balance valuable data with marketing narratives; and more.
Generative AI’s Role in Cybersecurity Data Analysis

In this episode of Cybersecurity (Marketing) Unplugged, Wade discusses: The rapid adoption of generative AI and its expanded use cases through OpenAI’s GPT marketplace and plugins; Future speculation on the impact of generative AI on data analysis over the next decade; And more.
Lost in the Inbox: The Cybersecurity PR Epidemic Part 2

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the cybersecurity industry amidst various marketing strategies; Challenges in establishing meaningful connections with media outlets and the effectiveness of personalized approaches; and more.
Lost in the Inbox: The Cybersecurity PR Epidemic Part 1

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the cybersecurity industry amidst various marketing strategies; Challenges in establishing meaningful connections with media outlets and the effectiveness of personalized approaches; and more.
Generative AI’s Impact on Cybersecurity Marketers

In this episode of Cybersecurity (Marketing) Unplugged, Dan also discusses: Generative AI’s role: How it’s reshaping cybersecurity marketing careers; Tips for entering the world of generative AI in marketing; DIY language models: How to train your own AI for specific tasks; and more.
B2B Cybersecurity Leads: What’s the Best Method for Acquisition?

In this episode of Cybersecurity (Marketing) Unplugged, Shaina also discusses: A comparison between generating leads through impression-based tactics and using third-party content syndication programs; Advantages of driving traffic to your own landing pages including control and customization; and more.
Content Syndication as a Foundational Element of Lead Generation

In this episode of Cybersecurity (Marketing) Unplugged, Freya discusses: Leveraging content syndication to increase brand exposure; Attracting targeted B2B IT and cybersecurity leads; Effective strategies recommended to nurture leads through different stages of the buyer’s journey; and more.
CISO Community Management From the Vendor Perspective

In this episode of Cybersecurity (Marketing) Unplugged, Dan also discusses: The main benefits in creating and managing the CISO community he’s put together from a vendor perspective; How he maintains an active and engaged CISO community and the measures he takes to encourage participation and ongoing interaction; and more.
Israeli Cybersecurity Investing…Or Should We Call It Company Building?

In this episode of Cybersecurity (Marketing) Unplugged, Bobi also discusses: An overview of different investment strategies; Specific areas of the cybersecurity industry that he’s currently most excited about; How he sees the role of artificial intelligence and machine learning in the future of cybersecurity; and more.
OT Security Marketing: Insights From the Plant Floor

In this episode of Cybersecurity (Marketing) Unplugged, Kamil also discusses: OT vs. IT Security; How Rockwell Automation works with its partner ecosystem from a marketing standpoint; How Rockwell Automation collaborates with other departments (marketing, sales, product management) as a very large organization; and more.
Part 2: Your Leads Suck, My Sales Rep Told Me So!

In this episode of Cybersecurity (Marketing) Unplugged, Kevin also discusses: The difference between third-party and first-party intent data; Strategies and examples of how to use various intent data platforms; The current state of B2B lead and demand generation and how account based marketing (ABM) fits into the equation; and more.
Part 1: Your Leads Suck, My Sales Rep Told Me So!

In this episode of Cybersecurity (Marketing) Unplugged, Kevin also discusses: The current state of B2B lead generation and demand generation; Intent data landscape for digital and content marketers; Strategies for making use of both third-and first-party intent data; Best practices for lead follow-up (hint: no one size fits all); and more.
Webinars 3.0: The Cybersecurity Marketer’s Checklist

In this episode of Cybersecurity (Marketing) Unplugged, Mary also discusses: Where webinars fit in with her content marketing and demand generation strategy; What’s been her “secret sauce” to producing webinars that create a high level of engagement; The goal of these webinar programs and what she hopes to accomplish; and more.
Kubernetes and Complexity

In this episode of Cybersecurity (Marketing) Unplugged, Box also discusses: Service mesh as a potential solution D and how that might work in an optimal world; The different ways that Kubernetes and 5G overlap; The safe boundary between generic Kubernetes; and more.
Are We Doomed?

In this episode of Cybersecurity (Marketing) Unplugged, Muoio also discusses: Why companies should think about cyber resilience, not just cybersecurity; Software vulnerabilities and our future outlook – are we doomed? Ransomware and its surrounding drama; The evolution of the CISO; and more.
Protecting Neural Networks

In this episode of Cybersecurity (Marketing) Unplugged, Sestito and Kindervag also discuss: Why machine learning is becoming more important in the market; HiddenLayer’s ideal customer profile and their market differentiator; The Zero Trust Framework and HiddenLayer’s product; and more.
Players in the Crypto Space

In this episode of Cybersecurity (Marketing) Unplugged, Derigiotis also discusses: The impact young Sam, FTX and Alameda and the insurance industry; Bridging between two different blockchains when hacking the crypto space; How to protect yourself in breaches; and more.
Securing The SaaS Layer

In this episode of Cybersecurity (Marketing) Unplugged, Lubetzky also discusses: Wing Security’s inventory of SaaS applications that are being used; Her direct experience with end-user customers; The relationship between SaaS applications and the CISO; and more.
The CISO and The Cyberattack

In this episode of Cybersecurity (Marketing) Unplugged, Stone also discusses: How the CISO job level is affected by cyberattacks; The difference between CISOs’ best intentions and their ability to execute those intentions; Progress around his report and respondents believing that public and private partnerships are important to solve cybersecurity challenges; and more.
Protection in The Platform

In this episode of Cybersecurity (Marketing) Unplugged, Golubchik also discusses: Tools and products you’ll want to integrate with; His strategy for international growth; Accumulating data that will better serve CISOs; and more.
Machine Learning and AI: Where do we go?

In this episode of Cybersecurity (Marketing) Unplugged, Hason also discusses: The most promising applications for AI and Machine Learning; The human factor that’s involved in cybersecurity these days; Predictions of seeing AI and Machine Learning show up in the majority of applications that are developed; and more.
Isolating Control Systems

In this episode of Cybersecurity (Marketing) Unplugged, Weiss also discusses: What control systems consist of; The two-fold problem between IT and the CISO; Differences in IT in a control system world; and more.
The Middle of the War

In this episode of Cybersecurity (Marketing) Unplugged, Dougherty also discusses: If we can imagine a future of preparedness to launch a conventional warfare attack like Russia has on Ukraine; His view on what we can expect moving forward, as China has taken a lead in the disinformation space; The importance of cybersecurity education and its impact on the next 10 years of international conflict; and more.
A World to Explore

In this episode of Cybersecurity (Marketing) Unplugged, Cohen also discusses: The new road of dependency on information systems; His estimation of our greatest risk today and one of the most significant threats we haven’t yet gotten our hands around; Zero Trust and misuse of terminology; and more.
Digging Ourselves Out of a Hole

In this episode of Cybersecurity (Marketing) Unplugged, Miller also discusses: Increased pressure on Putin causing him to act in certain ways; If Putin is going to execute a cybersecurity strike on Ukraine; China’s incentive: can Russia accomplish whatever it is they’re trying to accomplish without China?; and more.
The World of Kubernetes and Cloud Containers

In this episode of Cybersecurity (Marketing) Unplugged, Dr. Robinson also discusses: Application development of Kubernetes and Cloud Containers; How we get our hands around the software supply chain as it relates to Cloud Containers; Vulnerability scanning in terms of being a major component to secure a network; and more.
Exposing Vulnerabilities

In this episode of Cybersecurity (Marketing) Unplugged, Shah also discusses: The questions that arise from the Log4j vulnerability; Challenges around the proper configuration and software supply chain; The exposure of energy companies having power supply disruptions for millions of customers; and more.
Exploring The World of Passwords

In this episode of Cybersecurity (Marketing) Unplugged, Shikiar also discusses: How FIDO Alliance addresses problems surrounding passwords; Recent joint announcement along with Apple, Google and Microsoft on the next wave of FIDO technology; Training for the FIDO Certified Professional Program; and more.
The Geopolitical Playing Field

In this episode of Cybersecurity (Marketing) Unplugged, Bird and Kellermann also discuss: How to begin with counterinsurgency within our infrastructures and supply chain in order to fight this war; Reversing the funding mechanism; Closing the educational gap; and more.