CyberTheory white logo
menu

Cybersecurity (Marketing) Unplugged

wade baker

Generative AI’s Role in Cybersecurity Data Analysis

In this episode of Cybersecurity (Marketing) Unplugged, Wade discusses: The rapid adoption of generative AI and its expanded use cases through OpenAI’s GPT marketplace and plugins; Future speculation on the impact of generative AI on data analysis over the next decade; And more.

untitled design (50)

Lost in the Inbox: The Cybersecurity PR Epidemic Part 2

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the cybersecurity industry amidst various marketing strategies; Challenges in establishing meaningful connections with media outlets and the effectiveness of personalized approaches; and more.

kevin kosh

Lost in the Inbox: The Cybersecurity PR Epidemic Part 1

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the cybersecurity industry amidst various marketing strategies; Challenges in establishing meaningful connections with media outlets and the effectiveness of personalized approaches; and more.

dan verton (1)

Generative AI’s Impact on Cybersecurity Marketers

In this episode of Cybersecurity (Marketing) Unplugged, Dan also discusses: Generative AI’s role: How it’s reshaping cybersecurity marketing careers; Tips for entering the world of generative AI in marketing; DIY language models: How to train your own AI for specific tasks; and more.

shaina xm

B2B Cybersecurity Leads: What’s the Best Method for Acquisition?

In this episode of Cybersecurity (Marketing) Unplugged, Shaina also discusses: A comparison between generating leads through impression-based tactics and using third-party content syndication programs; Advantages of driving traffic to your own landing pages including control and customization; and more.

freya ward

Content Syndication as a Foundational Element of Lead Generation

In this episode of Cybersecurity (Marketing) Unplugged, Freya discusses: Leveraging content syndication to increase brand exposure; Attracting targeted B2B IT and cybersecurity leads; Effective strategies recommended to nurture leads through different stages of the buyer’s journey; and more.

dan-interview

CISO Community Management From the Vendor Perspective

In this episode of Cybersecurity (Marketing) Unplugged, Dan also discusses: The main benefits in creating and managing the CISO community he’s put together from a vendor perspective; How he maintains an active and engaged CISO community and the measures he takes to encourage participation and ongoing interaction; and more.

bobi-interview

Israeli Cybersecurity Investing…Or Should We Call It Company Building?

In this episode of Cybersecurity (Marketing) Unplugged, Bobi also discusses: An overview of different investment strategies; Specific areas of the cybersecurity industry that he’s currently most excited about; How he sees the role of artificial intelligence and machine learning in the future of cybersecurity; and more.

kamil-interview

OT Security Marketing: Insights From the Plant Floor

In this episode of Cybersecurity (Marketing) Unplugged, Kamil also discusses: OT vs. IT Security; How Rockwell Automation works with its partner ecosystem from a marketing standpoint; How Rockwell Automation collaborates with other departments (marketing, sales, product management) as a very large organization; and more.

kevin-interview

Part 2: Your Leads Suck, My Sales Rep Told Me So!

In this episode of Cybersecurity (Marketing) Unplugged, Kevin also discusses: The difference between third-party and first-party intent data; Strategies and examples of how to use various intent data platforms; The current state of B2B lead and demand generation and how account based marketing (ABM) fits into the equation; and more.

kevin-interview

Part 1: Your Leads Suck, My Sales Rep Told Me So!

In this episode of Cybersecurity (Marketing) Unplugged, Kevin also discusses: The current state of B2B lead generation and demand generation; Intent data landscape for digital and content marketers; Strategies for making use of both third-and first-party intent data; Best practices for lead follow-up (hint: no one size fits all); and more.

mary-interview

Webinars 3.0: The Cybersecurity Marketer’s Checklist

In this episode of Cybersecurity (Marketing) Unplugged, Mary also discusses: Where webinars fit in with her content marketing and demand generation strategy; What’s been her “secret sauce” to producing webinars that create a high level of engagement; The goal of these webinar programs and what she hopes to accomplish; and more.

box-interview

Kubernetes and Complexity

In this episode of Cybersecurity (Marketing) Unplugged, Box also discusses: Service mesh as a potential solution D and how that might work in an optimal world; The different ways that Kubernetes and 5G overlap; The safe boundary between generic Kubernetes; and more.

patricia-interview

Are We Doomed?

In this episode of Cybersecurity (Marketing) Unplugged, Muoio also discusses: Why companies should think about cyber resilience, not just cybersecurity; Software vulnerabilities and our future outlook – are we doomed? Ransomware and its surrounding drama; The evolution of the CISO; and more.

john-interview

Protecting Neural Networks

In this episode of Cybersecurity (Marketing) Unplugged, Sestito and Kindervag also discuss: Why machine learning is becoming more important in the market; HiddenLayer’s ideal customer profile and their market differentiator; The Zero Trust Framework and HiddenLayer’s product; and more.

Derigiotis-interview

Players in the Crypto Space

In this episode of Cybersecurity (Marketing) Unplugged, Derigiotis also discusses: The impact young Sam, FTX and Alameda and the insurance industry; Bridging between two different blockchains when hacking the crypto space; How to protect yourself in breaches; and more.

Lubetzky-interview

Securing The SaaS Layer

In this episode of Cybersecurity (Marketing) Unplugged, Lubetzky also discusses: Wing Security’s inventory of SaaS applications that are being used; Her direct experience with end-user customers; The relationship between SaaS applications and the CISO; and more.

stone-interview

The CISO and The Cyberattack

In this episode of Cybersecurity (Marketing) Unplugged, Stone also discusses: How the CISO job level is affected by cyberattacks; The difference between CISOs’ best intentions and their ability to execute those intentions; Progress around his report and respondents believing that public and private partnerships are important to solve cybersecurity challenges; and more.

Golubchik-interview

Protection in The Platform

In this episode of Cybersecurity (Marketing) Unplugged, Golubchik also discusses: Tools and products you’ll want to integrate with; His strategy for international growth; Accumulating data that will better serve CISOs; and more.

hason-interview

Machine Learning and AI: Where do we go?

In this episode of Cybersecurity (Marketing) Unplugged, Hason also discusses: The most promising applications for AI and Machine Learning; The human factor that’s involved in cybersecurity these days; Predictions of seeing AI and Machine Learning show up in the majority of applications that are developed; and more.

weiss-interview

Isolating Control Systems

In this episode of Cybersecurity (Marketing) Unplugged, Weiss also discusses: What control systems consist of; The two-fold problem between IT and the CISO; Differences in IT in a control system world; and more.

dougherty-interview

The Middle of the War

In this episode of Cybersecurity (Marketing) Unplugged, Dougherty also discusses: If we can imagine a future of preparedness to launch a conventional warfare attack like Russia has on Ukraine; His view on what we can expect moving forward, as China has taken a lead in the disinformation space; The importance of cybersecurity education and its impact on the next 10 years of international conflict; and more.

cohen-interview

A World to Explore

In this episode of Cybersecurity (Marketing) Unplugged, Cohen also discusses: The new road of dependency on information systems; His estimation of our greatest risk today and one of the most significant threats we haven’t yet gotten our hands around; Zero Trust and misuse of terminology; and more.

miller-interview

Digging Ourselves Out of a Hole

In this episode of Cybersecurity (Marketing) Unplugged, Miller also discusses: Increased pressure on Putin causing him to act in certain ways; If Putin is going to execute a cybersecurity strike on Ukraine; China’s incentive: can Russia accomplish whatever it is they’re trying to accomplish without China?; and more.

nikki-interview

The World of Kubernetes and Cloud Containers

In this episode of Cybersecurity (Marketing) Unplugged, Dr. Robinson also discusses: Application development of Kubernetes and Cloud Containers; How we get our hands around the software supply chain as it relates to Cloud Containers; Vulnerability scanning in terms of being a major component to secure a network; and more.

amit-interview

Exposing Vulnerabilities

In this episode of Cybersecurity (Marketing) Unplugged, Shah also discusses: The questions that arise from the Log4j vulnerability; Challenges around the proper configuration and software supply chain; The exposure of energy companies having power supply disruptions for millions of customers; and more.

Shikiar-interview

Exploring The World of Passwords

In this episode of Cybersecurity (Marketing) Unplugged, Shikiar also discusses: How FIDO Alliance addresses problems surrounding passwords; Recent joint announcement along with Apple, Google and Microsoft on the next wave of FIDO technology; Training for the FIDO Certified Professional Program; and more.

rb-tk

The Geopolitical Playing Field

In this episode of Cybersecurity (Marketing) Unplugged, Bird and Kellermann also discuss: How to begin with counterinsurgency within our infrastructures and supply chain in order to fight this war; Reversing the funding mechanism; Closing the educational gap; and more.

ct-podcast

Behind Agency Doors

In this episode of Cybersecurity (Marketing) Unplugged, Chaillan also discusses: Anticipated changes coming out of the White House or the Pentagon; What’s going on behind the agency doors in terms of sharing information among the private and public sectors; What he’s done for DevSecOps and the service and what he’s doing from an educational platform point of view; and more.

mark-cristiano

Protecting Industrial Security

In this episode of Cybersecurity (Marketing) Unplugged, Cristiano also discusses: The attack on Ukraine, Colonial Pipeline and JBS Foods; New government mandates around cybersecurity and if that’s going to have an impact on industrial clients; The minimums in terms of industrial protections that organizations need to have in place today; and more.

wade baker

Generative AI's Role in Cybersecurity Data Analysis

In this episode of Cybersecurity (Marketing) Unplugged, Wade discusses: The rapid adoption of generative AI and its expanded use cases...
untitled design (50)

Lost in the Inbox: The Cybersecurity PR Epidemic Part 2

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the...
kevin kosh

Lost in the Inbox: The Cybersecurity PR Epidemic Part 1

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the...
dan verton (1)

Generative AI's Impact on Cybersecurity Marketers

In this episode of Cybersecurity (Marketing) Unplugged, Dan also discusses: Generative AI’s role: How it’s reshaping cybersecurity marketing careers; Tips...
shaina xm

B2B Cybersecurity Leads: What's the Best Method for Acquisition?

In this episode of Cybersecurity (Marketing) Unplugged, Shaina also discusses: A comparison between generating leads through impression-based tactics and using...
freya ward

Content Syndication as a Foundational Element of Lead Generation

In this episode of Cybersecurity (Marketing) Unplugged, Freya discusses: Leveraging content syndication to increase brand exposure; Attracting targeted B2B IT...

Take Your
Business to the
Next Level

CONNECT WITH US TODAY!

Speak with an Expert

CyberTheory helps you find cybersecurity buyers faster. We combine 1st party intent data, deep strategy, and execution expertise to drive your growth and success.

Request a
PPC Audit

See how your PPC efforts stack up against the competition. Gain insights on how keywords, spend, creative, and content intersect with buyers looking for your solution category.