mark-cristiano

Protecting Industrial Security

In this episode of Cybersecurity (Marketing) Unplugged, Cristiano also discusses: The attack on Ukraine, Colonial Pipeline and JBS Foods; New government mandates around cybersecurity and if that’s going to have an impact on industrial clients; The minimums in terms of industrial protections that organizations need to have in place today; and more.

sirkis-interview

Cybersecurity Workflow

In this episode of Cybersecurity (Marketing) Unplugged, Sirkis also discusses: His inspiration behind Seemplicity; The secret to Seemplicity’s ability to impact manual operations; How focused they are on customers with a footprint in the cloud who implement several security scanners or security tools; and more.

Netzer-interview

COVID-19’s Impact on Cybersecurity Marketing

In this episode of Cybersecurity (Marketing) Unplugged, Netzer also discusses: The mid of the market and how Perimeter 81 reaches their typical customers during this time; How much of a role Zero Trust plays into successors and the future of Perimeter 81’s marketing strategy; The evolution of the product roadmap from her point of view to become a winning company; and more.

beckman-victoria

Are We Prepared?

In this episode of Cybersecurity (Marketing) Unplugged, Beckman also discusses: The downstream implications of countries dispersing and distributing operations and data assets; How Microsoft and the DCU are dealing with cyberattacks; How preparation is key, on and off the battlefield; and more.

zioni-interview

Day Zero

In this episode of Cybersecurity (Marketing) Unplugged, Zioni also discusses: The downstream dependencies on other open source programs that are called by API; How organizations can best mitigate future ransomware attacks, specifically around supply chain and open source; and more.

yonatan

Hunting The Bad Guys

In this episode of Cybersecurity (Marketing) Unplugged, Khanashvili also discusses: How Hunters is dealing with the big golden SAML attack and how the attack works; Detection and hunting techniques used to find and identify the bad guys, a potential solution; Who is at risk of a SAML attack, even a cybersecurity expert?; and more.

rb-interview

Cryptocurrency Bloodbath

In this episode of Cybersecurity (Marketing) Unplugged, Bird also discusses: Crypto as a means of commerce in exchange due of the collapse that it’s currently experiencing; How crypto players and their statements are becoming more regulated than banks; The blockchain as an opportunistic way to create value or fuel opportunities for economic gain in the corporate world; and more.

peter-bordow

Separating the Hype From the Reality

In this episode of Cybersecurity (Marketing) Unplugged, Bordow also discusses: The quantum computing hype versus reality: His assessment of our quantum program’s current state; Two camps in quantum: Hardware approach and software approach; The importance of new technical approaches to preserve privacy; and more.

ribeiro-interview

The Nature of Application Code

In this episode of Cybersecurity (Marketing) Unplugged, Ribeiro also discusses: Marketing material in website and application code and how his product works to identify corrupt code; The nature of polymorphic and how Jscrambler deals with it; How the ever expanding threat landscape impacts Jscrambler; and more.

chaim-edit

A New CISO Playbook

In this episode of Cybersecurity (Marketing) Unplugged, Mazal also discusses: What Kandji does to help organizations have seamless ease of development across the global landscape; The risk framework where CISOs can identify and prioritize threats; The kind of leverage that’s required for meaningful change; and more.

spafford-interview

Chasing the Unattainable Aim of Security

In this episode of Cybersecurity (Marketing) Unplugged, Spafford also discusses: Who and what could be behind the pileup of attacks on security vendors; How our democracy and freedom of speech allow for exploitation by the adversary; Why our current solutions seem to create more problems than they solve; and more.

gupta-interview

Safety In The Cloud

In this episode of Cybersecurity (Marketing) Unplugged, Gupta also discusses: How Rubrik’s outbound marketing messaging suggests that you’ve embedded the five principles of Zero Trust Security into your approach; The product that Rubrik built towards protecting and managing data; And how Rubrik provides value in Zero Trust, data security and what it takes to provide data resilience to enterprises; and more.

ari-interview

Security Strategy for the Blockchain

In this episode of Cybersecurity (Marketing) Unplugged, Redbord also discusses: How tracing the flow of funds from ransom payments can take down criminals; Major threats in crypto and the blockchain; What needs to be done in order to modernize laws regarding cybercrime; and more.

csu-interview-2

Trusting Our Global Supply Chain

In this episode of Cybersecurity (Marketing) Unplugged, Danks also discusses: The height of Huawei’s business growth in the U.S.; Additional steps we need to take in terms of understanding our entire supply chain and identifying: What needs to be done to protect our critical infrastructure? Which aspects of our supply chain are at risk?; and more.

bruce-interview

A Marketer’s Competition

In this episode of Cybersecurity (Marketing) Unplugged, Bruce also discusses: Noise level in cybersecurity marketing; How particular product ties fit to a problem; Investing a design thinking approach into a problem; and more.

Prachee-Kale-2

Expanding Your Marketing Process

In this episode of Cybersecurity (Marketing) Unplugged, Kale also discusses: The growth of systems and design thinking through global challenges; Marketers using systems and design thinking for creative solutions: Systems is the problem, design is the solution; Telling your systems marketing story in terms of what it provides and what outcome it creates; and more.

roger-sels

Revisiting the Global Threat Landscape One Year After SolarWinds

In this episode of Cybersecurity (Marketing) Unplugged, Sels also discusses: BlackBerry and how they help organizations secure data; The real cyber threat at hand: What’s China’s next move? What’s Russia’s next move?; Threat actors and capabilities that have been growing since SolarWinds; and more.

lynn-peachey-wide

Changing Data Quantification in Security Insurance

In this episode of Cybersecurity (Marketing) Unplugged, Peachey also discusses: Important security tools to reduce your attack surface: Colonial and the coverage on critical infrastructure; How insurance companies are seeing higher demands for subrogation in the wake of a cyber incident; and more.

abdel-khalik-haney

The Double-Edged Sword: AI

In this episode of Cybersecurity (Marketing) Unplugged, Abdel-Khalik also discusses: Patterns he’s seen in AI and the ability to automate things that humans understand very well; How AI is skyrocketing all over the world in cybersecurity; And cybersecurity as a science: Understanding the impact of attacks and the knowledge behind systems that are taking in false information.

cunningham-chase

Filling The Gaps in Cyber Warfare

In this episode of Cybersecurity Unplugged, Dr. Cunningham also discusses: Getting a bigger and better view of the Zero Trust model in cyber warfare; His book, Cyber Warfare – Truth, Tactics and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare; Looking into the future of Zero Trust and turning up the heat in the market; and more.

Darren-Williams-final

A Medical Approach to Cybersecurity

In this episode of Cybersecurity (Marketing) Unplugged, Dr. Williams also discusses: How BlackFog applies medical professionalism to cybersecurity; Medicine and design drug therapy in cybersecurity ransomware: The lifecycle of disease, spreading and destroying it; Defining behavioral analytics to protect the people and their data from ransomware attacks; and more.

kruger-david

Putting The Brakes on Physical Data

In this episode of Cybersecurity (Marketing) Unplugged, Kruger also discusses: Military intelligence and Abiso: Creating a new tactical battlefield communication system; The concept of data ownership vs. the information of data; The future of the software engineering community and the movement of the manufacturing process; and more.

Cloud Security: With Challenges Comes Solutions

In this episode of Cybersecurity (Marketing) Unplugged, Shua also discusses: His idea of a Cloud Security solution: Asset and infrastructure visibility; Cloud Orchestration and how Orca Security mediates the problem of extra layers and confusion; How using the solution helps to identify risk sensitive data and speeds up the process; and more.

Improving The Market With Higher Security

In this episode of Cybersecurity (Marketing) Unplugged, Williams also discusses: How working from home impacts software development and security; The use of Executive Order: Zero Trust, security labels and creating visibility in the market; Company mandates and making the market more competitive by achieving a higher level of security; and more.

Challenges in the World of Cybersecurity Marketing

In this episode of Cybersecurity (Marketing) Unplugged, Patil also discusses: The importance of effective messaging in marketing: Defining and understanding your target audience, Creativity with content and breaking away from the norm when it comes to engaging with your customers, The human experience in MIT, examining the human challenges and turning thoughts into actions towards progress; and more.

Brand Narratives and Awareness in Cybersecurity

In this episode of Cybersecurity (Marketing) Unplugged, Flaherty also discusses: How Cybereason has been impacted by its brand; The importance of brand campaign awareness; Effective brand campaigns to focus on and how to create one; and more.

The Impact of Digital Transformation on Business

In this episode of Cybersecurity (Marketing) Unplugged, Hanlon also discusses: Digital transformation from a business impact point of view; The goal of digital transformation; Building a culture of change with digital transformation; and more.

How to Approach the Reality of Remote Work

In this episode of Cybersecurity (Marketing) Unplugged, Yost also discusses: The security vulnerabilities that remote work has created; Remote work and its impact on productivity and social conventions; How the reintegration of the hybrid workforce is placing pressure on employees and causing resignations; and more.

The Global Impact of Digital Transformation

In this episode of Cybersecurity (Marketing) Unplugged, Shoushany also discusses: How to tackle the global talent shortage; The differences in the UAE and the US’s approach to digital transformation; How adopting a digital transformation strategy can solve the problems our world is facing; and more.

Meet the Guardians of Critical Infrastructure

In this episode of Cybersecurity (Marketing) Unplugged, Curry also discusses: Threat detection for operational technology and how the vFortified product was developed; Merging of digital security and physical security to ensure the supply chain remains uninterrupted; How culture and time constrains the possibilities of technical innovation; and more.

kristine-depippo

Survey Says! Utilizing Survey Data to Support Cybersecurity Marketing Programs

In this episode of Cybersecurity (Marketing) Unplugged, Kristine also discusses: How research and survey reports guide B2B cybersecurity marketing by...
wade baker

Generative AI's Role in Cybersecurity Data Analysis

In this episode of Cybersecurity (Marketing) Unplugged, Wade discusses: The rapid adoption of generative AI and its expanded use cases...
untitled design (50)

Lost in the Inbox: The Cybersecurity PR Epidemic Part 2

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the...
kevin kosh

Lost in the Inbox: The Cybersecurity PR Epidemic Part 1

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the...
dan verton (1)

Generative AI's Impact on Cybersecurity Marketers

In this episode of Cybersecurity (Marketing) Unplugged, Dan also discusses: Generative AI’s role: How it’s reshaping cybersecurity marketing careers; Tips...
shaina xm

B2B Cybersecurity Leads: What's the Best Method for Acquisition?

In this episode of Cybersecurity (Marketing) Unplugged, Shaina also discusses: A comparison between generating leads through impression-based tactics and using...

Take Your
Business to the
Next Level

CONNECT WITH US TODAY!

Speak with an Expert

CyberTheory helps you find cybersecurity buyers faster. We combine 1st party intent data, deep strategy, and execution expertise to drive your growth and success.

Request a
PPC Audit

See how your PPC efforts stack up against the competition. Gain insights on how keywords, spend, creative, and content intersect with buyers looking for your solution category.