Generative AI’s Role in Cybersecurity Data Analysis

wade baker

In this episode of Cybersecurity (Marketing) Unplugged, Wade discusses: The rapid adoption of generative AI and its expanded use cases through OpenAI’s GPT marketplace and plugins; Future speculation on the impact of generative AI on data analysis over the next decade; And more.

Lost in the Inbox: The Cybersecurity PR Epidemic Part 2

untitled design (50)

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the cybersecurity industry amidst various marketing strategies; Challenges in establishing meaningful connections with media outlets and the effectiveness of personalized approaches; and more.

Lost in the Inbox: The Cybersecurity PR Epidemic Part 1

kevin kosh

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the cybersecurity industry amidst various marketing strategies; Challenges in establishing meaningful connections with media outlets and the effectiveness of personalized approaches; and more.

Generative AI’s Impact on Cybersecurity Marketers

dan verton (1)

In this episode of Cybersecurity (Marketing) Unplugged, Dan also discusses: Generative AI’s role: How it’s reshaping cybersecurity marketing careers; Tips for entering the world of generative AI in marketing; DIY language models: How to train your own AI for specific tasks; and more.

B2B Cybersecurity Leads: What’s the Best Method for Acquisition?

shaina xm

In this episode of Cybersecurity (Marketing) Unplugged, Shaina also discusses: A comparison between generating leads through impression-based tactics and using third-party content syndication programs; Advantages of driving traffic to your own landing pages including control and customization; and more.

Content Syndication as a Foundational Element of Lead Generation

freya ward

In this episode of Cybersecurity (Marketing) Unplugged, Freya discusses: Leveraging content syndication to increase brand exposure; Attracting targeted B2B IT and cybersecurity leads; Effective strategies recommended to nurture leads through different stages of the buyer’s journey; and more.

CISO Community Management From the Vendor Perspective

dan-interview

In this episode of Cybersecurity (Marketing) Unplugged, Dan also discusses: The main benefits in creating and managing the CISO community he’s put together from a vendor perspective; How he maintains an active and engaged CISO community and the measures he takes to encourage participation and ongoing interaction; and more.

Israeli Cybersecurity Investing…Or Should We Call It Company Building?

bobi-interview

In this episode of Cybersecurity (Marketing) Unplugged, Bobi also discusses: An overview of different investment strategies; Specific areas of the cybersecurity industry that he’s currently most excited about; How he sees the role of artificial intelligence and machine learning in the future of cybersecurity; and more.

OT Security Marketing: Insights From the Plant Floor

kamil-interview

In this episode of Cybersecurity (Marketing) Unplugged, Kamil also discusses: OT vs. IT Security; How Rockwell Automation works with its partner ecosystem from a marketing standpoint; How Rockwell Automation collaborates with other departments (marketing, sales, product management) as a very large organization; and more.

Part 2: Your Leads Suck, My Sales Rep Told Me So!

kevin-interview

In this episode of Cybersecurity (Marketing) Unplugged, Kevin also discusses: The difference between third-party and first-party intent data; Strategies and examples of how to use various intent data platforms; The current state of B2B lead and demand generation and how account based marketing (ABM) fits into the equation; and more.

Part 1: Your Leads Suck, My Sales Rep Told Me So!

kevin-interview

In this episode of Cybersecurity (Marketing) Unplugged, Kevin also discusses: The current state of B2B lead generation and demand generation; Intent data landscape for digital and content marketers; Strategies for making use of both third-and first-party intent data; Best practices for lead follow-up (hint: no one size fits all); and more.

Webinars 3.0: The Cybersecurity Marketer’s Checklist

mary-interview

In this episode of Cybersecurity (Marketing) Unplugged, Mary also discusses: Where webinars fit in with her content marketing and demand generation strategy; What’s been her “secret sauce” to producing webinars that create a high level of engagement; The goal of these webinar programs and what she hopes to accomplish; and more.

Kubernetes and Complexity

box-interview

In this episode of Cybersecurity (Marketing) Unplugged, Box also discusses: Service mesh as a potential solution D and how that might work in an optimal world; The different ways that Kubernetes and 5G overlap; The safe boundary between generic Kubernetes; and more.

Are We Doomed?

patricia-interview

In this episode of Cybersecurity (Marketing) Unplugged, Muoio also discusses: Why companies should think about cyber resilience, not just cybersecurity; Software vulnerabilities and our future outlook – are we doomed? Ransomware and its surrounding drama; The evolution of the CISO; and more.

Protecting Neural Networks

john-interview

In this episode of Cybersecurity (Marketing) Unplugged, Sestito and Kindervag also discuss: Why machine learning is becoming more important in the market; HiddenLayer’s ideal customer profile and their market differentiator; The Zero Trust Framework and HiddenLayer’s product; and more.

Players in the Crypto Space

Derigiotis-interview

In this episode of Cybersecurity (Marketing) Unplugged, Derigiotis also discusses: The impact young Sam, FTX and Alameda and the insurance industry; Bridging between two different blockchains when hacking the crypto space; How to protect yourself in breaches; and more.

Securing The SaaS Layer

Lubetzky-interview

In this episode of Cybersecurity (Marketing) Unplugged, Lubetzky also discusses: Wing Security’s inventory of SaaS applications that are being used; Her direct experience with end-user customers; The relationship between SaaS applications and the CISO; and more.

The CISO and The Cyberattack

stone-interview

In this episode of Cybersecurity (Marketing) Unplugged, Stone also discusses: How the CISO job level is affected by cyberattacks; The difference between CISOs’ best intentions and their ability to execute those intentions; Progress around his report and respondents believing that public and private partnerships are important to solve cybersecurity challenges; and more.

Protection in The Platform

Golubchik-interview

In this episode of Cybersecurity (Marketing) Unplugged, Golubchik also discusses: Tools and products you’ll want to integrate with; His strategy for international growth; Accumulating data that will better serve CISOs; and more.

Machine Learning and AI: Where do we go?

hason-interview

In this episode of Cybersecurity (Marketing) Unplugged, Hason also discusses: The most promising applications for AI and Machine Learning; The human factor that’s involved in cybersecurity these days; Predictions of seeing AI and Machine Learning show up in the majority of applications that are developed; and more.

Isolating Control Systems

weiss-interview

In this episode of Cybersecurity (Marketing) Unplugged, Weiss also discusses: What control systems consist of; The two-fold problem between IT and the CISO; Differences in IT in a control system world; and more.

The Middle of the War

dougherty-interview

In this episode of Cybersecurity (Marketing) Unplugged, Dougherty also discusses: If we can imagine a future of preparedness to launch a conventional warfare attack like Russia has on Ukraine; His view on what we can expect moving forward, as China has taken a lead in the disinformation space; The importance of cybersecurity education and its impact on the next 10 years of international conflict; and more.

A World to Explore

cohen-interview

In this episode of Cybersecurity (Marketing) Unplugged, Cohen also discusses: The new road of dependency on information systems; His estimation of our greatest risk today and one of the most significant threats we haven’t yet gotten our hands around; Zero Trust and misuse of terminology; and more.

Digging Ourselves Out of a Hole

miller-interview

In this episode of Cybersecurity (Marketing) Unplugged, Miller also discusses: Increased pressure on Putin causing him to act in certain ways; If Putin is going to execute a cybersecurity strike on Ukraine; China’s incentive: can Russia accomplish whatever it is they’re trying to accomplish without China?; and more.

The World of Kubernetes and Cloud Containers

nikki-interview

In this episode of Cybersecurity (Marketing) Unplugged, Dr. Robinson also discusses: Application development of Kubernetes and Cloud Containers; How we get our hands around the software supply chain as it relates to Cloud Containers; Vulnerability scanning in terms of being a major component to secure a network; and more.

Exposing Vulnerabilities

amit-interview

In this episode of Cybersecurity (Marketing) Unplugged, Shah also discusses: The questions that arise from the Log4j vulnerability; Challenges around the proper configuration and software supply chain; The exposure of energy companies having power supply disruptions for millions of customers; and more.

Exploring The World of Passwords

Shikiar-interview

In this episode of Cybersecurity (Marketing) Unplugged, Shikiar also discusses: How FIDO Alliance addresses problems surrounding passwords; Recent joint announcement along with Apple, Google and Microsoft on the next wave of FIDO technology; Training for the FIDO Certified Professional Program; and more.

The Geopolitical Playing Field

rb-tk

In this episode of Cybersecurity (Marketing) Unplugged, Bird and Kellermann also discuss: How to begin with counterinsurgency within our infrastructures and supply chain in order to fight this war; Reversing the funding mechanism; Closing the educational gap; and more.

Behind Agency Doors

ct-podcast

In this episode of Cybersecurity (Marketing) Unplugged, Chaillan also discusses: Anticipated changes coming out of the White House or the Pentagon; What’s going on behind the agency doors in terms of sharing information among the private and public sectors; What he’s done for DevSecOps and the service and what he’s doing from an educational platform point of view; and more.