Meet the Guardians of Critical Infrastructure

In this episode of Cybersecurity (Marketing) Unplugged, Curry also discusses: Threat detection for operational technology and how the vFortified product was developed; Merging of digital security and physical security to ensure the supply chain remains uninterrupted; How culture and time constrains the possibilities of technical innovation; and more.

Making Cybersecurity Marketing People Centric

In this episode of Cybersecurity (Marketing) Unplugged, Lowe also discusses: Standing out in a market full of lookalikes; Not allowing a focus on metrics to run and ruin marketing efforts; Eliminating the competitive nature between sales and marketing; and more.

No Pain, No Gain, Zero Trust

In this episode of Cybersecurity (Marketing) Unplugged, Dr. Cunningham also discusses: How the Zero Trust strategy was developed and has existed for nearly 20 years now; How to deal with the discomfort of change while implementing Zero Trust; How best to utilize artificial intelligence and machine learning solutions in cybersecurity; and more.

Zero Trust: Practice Makes Better

In this episode of Cybersecurity (Marketing) Unplugged, Scott also discusses: How sacrificing security for interoperability got us to where we are today; Pervasive problems with poor cyber hygiene; The top legal issues facing software and cybersecurity companies; and more.

Securing Healthcare Systems

In this episode of Cybersecurity (Marketing) Unplugged, Bowden also discusses: Blockchain solutions in healthcare; The shift to telemedicine; Real risks around medical device security; and more.

Everything is Hackable

In this episode of Cybersecurity (Marketing) Unplugged, Harrington also discusses: The dangers of connected medical devices and how he and his team have identified vulnerabilities in passive medical devices; How most organizations are doing it wrong and don’t understand how to secure software systems; The problem that inspired him to write Hackable; and more.

Building Brand Trust Through Contact and Exposure

In this episode of Cybersecurity (Marketing) Unplugged, Curry also discusses: Financing and building up an agile cybersecurity company; Improving company recognizability and trust by using commercial media, streaming and Cybereason’s signature owl; How SMBs can increase visibility into indicators of compromise; and more.

Solving Digital Identity

In this episode of Cybersecurity (Marketing) Unplugged, Grant also discusses: How zero trust will affect the traditional security landscape; Enabling open healthcare with security in mind; The increasing difficulty of doing identity proofing properly; and more.

Consequences of Identity Done Wrong

In this episode of Cybersecurity (Marketing) Unplugged, Maler also discusses: Creating an architecture for meaningful consent; Social sign-on, single sign-on and the battle between convenience and security; A real path to passwordless authentication; Decentralized identity and identity proofing; and more.

Challenges of Cybersecurity Events Marketing

In this episode of Cybersecurity (Marketing) Unplugged, Elichman also discusses: Using relevant content and compelling speakers to drive engagement; The evolution of technology to keep pace with the rapid increase in virtual and hybrid events; Calculating costs when managing the production of complex hybrid events; and more.

Embracing Public-Private Partnership in Cybersecurity

In this episode of Cybersecurity (Marketing) Unplugged, Cox also discusses: The possibilities for improving the government’s cybersecurity posture through the Cybersecurity and Infrastructure Security Agency (CISA); Shifting our cybersecurity approach from a defensive posture to more offensive maneuvers; The effects of the current geopolitical landscape on cybersecurity; and more.

Distilling Complexity Through Design Thinking

In this episode of Cybersecurity (Marketing) Unplugged, Barnier also discusses: How to apply critical and design thinking to cybersecurity; How cyber risk differs from other business continuity risks; The cybersecurity initiatives coming from Washington and predictions on their effectiveness; and more.

Perplexing Problems: Security, Privacy, Complexity

In this episode of Cybersecurity (Marketing) Unplugged, Herold also discusses: The gap in cybersecurity education and how to incorporate information and cybersecurity, as well as privacy, into public school curriculum; How to fully and successfully address privacy whether from the lens of compliance, governance or the intersection between the need for privacy and the need for security; and more.

Art of the Possible: Autonomous Real-time Patching

In this episode of Cybersecurity (Marketing) Unplugged, Brumley also discusses: Software flaw detection and how Brumley developed Mayhem; Brumley’s contract with the Pentagon to find coding flaws in operating systems and custom programs used by the US military; Legal barriers to autonomously fixing software bugs; and more.

Joe-Head-2

AI and Big Data Wage the War on Cybercrime

In this episode of Cybersecurity (Marketing) Unplugged, Head also discusses: The difference between trying to modify human behavior and implementing robust security; How INTRUSION’s product, Shield, satisfies the principles of zero trust; How big data, historical reputation references and AI will win the war on cybercrime; and more.

Cybersecurity Impacts on the Global Economy

In this episode of Cybersecurity (Marketing) Unplugged, Russ also discusses: The correlation between cybersecurity and global economics; How AI is transforming international trade and the broadening range of supplies and services offered overseas; China’s Belt and Road Initiative and the ramifications of China’s increased economic footprint; and more.

Satisfying the Shortage in Cyber Warriors

In this episode of Cybersecurity (Marketing) Unplugged, Clyde also discusses: The history of ISACA and the importance of professional organizations for cybersecurity practitioners; Factors that contribute to the success of online training platforms like CyberEd.io; Board-level cybersecurity awareness; and more.

Personal Identity Wallet Back in Your Pocket

In this episode of Cybersecurity (Marketing) Unplugged, Weiss also discusses: What control systems consist of; The two-fold problem between IT and the CISO; Differences in IT in a control system world; and more.

The Venture Capitalist’s View of Cybersecurity

In this episode of Cybersecurity (Marketing) Unplugged, Lang also discusses: The venture capitalist’s view on the state of cybersecurity; How economic issues are causing global ecological issues such as Chronic Wasting Disease; The comingling of security and economic issues and expectations for this White House; and more.

Digital Vaccine to Prevent Ransomware Virus

In this episode of Cybersecurity (Marketing) Unplugged, Tal Kollender also discusses: The lessons learned from the Colonial Pipeline attack; How GYTPOL “thinks like a hacker” in order to prevent hacks; How misconfiguration is the largest attack vector and how to fix it; and more.

The National Security Threat of Narcissism

In this episode of Cybersecurity (Marketing) Unplugged, Braw also discusses: The Colonial Pipeline attack and our lack of preparedness; How to create more public awareness about responding to cyberattacks; The history of solar and our resource dependencies on China; and more.

lynn-peachey-wide

Cyber Insurance Questions? We’ve Got You Covered

In this episode of Cybersecurity (Marketing) Unplugged, Peachey also discusses: What cybersecurity insurance is and what it covers; What would have happened if Colonial Pipeline had been insured; Risks, rates and trends in the insurance industry; and more.

Teaching to Create, Not Consume Technology

In this episode of Cybersecurity (Marketing) Unplugged, Monthie also discusses: Building the cybersecurity program at Grand Canyon University and receiving the Center of Academic Excellence in Cyber Defense Education (CAE-CD) designation; Designing cybersecurity education for K-12; and more.

Eliminating the Threat of Ransomware

In this episode of Cybersecurity (Marketing) Unplugged, Darling also discusses: How to deal with ransomware and STASH Global’s solution; The challenge of privacy and data security on social media networking sites; Janine’s career development story; and more.

Colonial Pipeline and Ransomware: The Kalashnikov of 2021

In this episode of Cybersecurity (Marketing) Unplugged, Kellermann also discusses: The vulnerability of U.S. energy infrastructure; The geopolitical motivations behind the attack; What Colonial Pipeline should do now to mitigate the damage; and more.

Creating Pathways for Women in Tech

In this episode of Cybersecurity (Marketing) Unplugged, Root and Carter also discuss: How they each pivoted into their current careers; How to create pathways for women in tech; Collaboration and collective knowledge building in cybersecurity; and more.

Building Top-Notch Talent in Cybersecurity

In this episode of Cybersecurity (Marketing) Unplugged, Dr. Baggili also discusses: The cybersecurity talent gap and how to address it; What it takes to build top-notch talent and identify programs that promote excellence; How he became interested in digital forensics; and more.

How Zero Trust Is Inverting the Way We Do Cybersecurity

In this episode of Cybersecurity (Marketing) Unplugged, Kindervag also discusses: How to practically implement zero trust; Shifting focus from worrying about the attack surface to securing the “protect surface”; The future threat of quantum and the fear of falling behind; and more.

A Holistic Approach to Cybersecurity and Compliance

In this episode of Cybersecurity (Marketing) Unplugged, Ferris and Brooks also discuss: The convergence of cybersecurity and compliance in the new category MCCP; How MSSPs can avoid getting attacked themselves; The future of cybersecurity and compliance; and more.

jbj (1)

The Art of Trade Show Excellence: Planning, Presence, and Follow-Up

In this episode of Cybersecurity (Marketing) Unplugged, Jennifer also discusses: How to set clear objectives and plan your trade show...
kristine-depippo

Survey Says! Utilizing Survey Data to Support Cybersecurity Marketing Programs

In this episode of Cybersecurity (Marketing) Unplugged, Kristine also discusses: How research and survey reports guide B2B cybersecurity marketing by...
wade baker

Generative AI's Role in Cybersecurity Data Analysis

In this episode of Cybersecurity (Marketing) Unplugged, Wade discusses: The rapid adoption of generative AI and its expanded use cases...
untitled design (50)

Lost in the Inbox: The Cybersecurity PR Epidemic Part 2

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the...
kevin kosh

Lost in the Inbox: The Cybersecurity PR Epidemic Part 1

In this two-part series of Cybersecurity (Marketing) Unplugged, Kevin and Mat discuss: The role of PR and Communications in the...
dan verton (1)

Generative AI's Impact on Cybersecurity Marketers

In this episode of Cybersecurity (Marketing) Unplugged, Dan also discusses: Generative AI’s role: How it’s reshaping cybersecurity marketing careers; Tips...

Take Your
Business to the
Next Level

CONNECT WITH US TODAY!

Speak with an Expert

CyberTheory helps you find cybersecurity buyers faster. We combine 1st party intent data, deep strategy, and execution expertise to drive your growth and success.

Request a
PPC Audit

See how your PPC efforts stack up against the competition. Gain insights on how keywords, spend, creative, and content intersect with buyers looking for your solution category.