Breaking Through in Cybersecurity Marketing

From the Horse’s Mouth: CISO Q&A - CyberMarketingCon2022 Replay Session


Listen Later

Since #CyberMarketingCon2023 is coming on December 10th through 13th. We can’t help but replay some of our sessions from previous conferences. This week’s episode is from CyberMarketingCon2022. If you enjoy this session, you will enjoy this year’s lineup filled with education, the best speakers, hands-on workshops, networking, networking, AND MORE networking!

We cannot wait to see you. Enjoy this episode and be sure to get your ticket by clicking ➡️➡️➡️here!

The From the Horse's Mouth: CISO Q&A session is an in-depth conversation about reaching the unreachable buyer. Join us to hear security executives share their insights on why they buy, how they buy, and where they buy. 

 

The speakers are:

Michele Perry, Operating Partner at Elsewhere Partners 

Rick Howard, Chief Security Officer, Chief Analyst, and Senior Fellow at N2K Networks  

Jaclyn Miller,  Co-Founder and Chief Operations Officer(COO) at Stealth Startup

Ted Wagner, VP and CISO at SAP National Security Services

 

In this session you will find: 

1️⃣ What works and doesn’t work in getting a security executive’s attention? 

2️⃣ Message trust, message fatigue, and what you can do about it. 

3️⃣ Trusted information sources and how security executives use them. 

4️⃣ Positioning and messaging that is meaningful to decision-makers. 

5️⃣ The security executive’s purchasing behavior and why skepticism is the driving force. 

 

The speakers will talk more in-depth about the day in the life of a CISO, and how you can balance innovation and platform suites when considering products/services. From how do you develop trust with your vendors or potential vendors, the boundaries around when to how to contact a vendor and what is the acceptable amount of time for a call back from a potential vendor. The panelists also dive into who are the evangelists that people listen to and how a company can create their own evangelists. 

 

By the end, the host opened the floor for audience questions:  

 

How big is it a disadvantage to require an email/gate to download content? 

Any advice you have for vendor websites?

How involved would you be in a customer advisory board or executive retreat?

Why do you not give survey data much merit (to Rick)? 

Do you have a preference for virtual or live events?

 

More on #CyberMarketingCon2023 here, see you in Texas! 🤠

Be sure to watch a video version of this session here.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

 

...more
View all episodesView all episodes
Download on the App Store

Breaking Through in Cybersecurity MarketingBy Cybersecurity Marketing Society | N2K Networks

  • 5
  • 5
  • 5
  • 5
  • 5

5

21 ratings


More shows like Breaking Through in Cybersecurity Marketing

View all
SpyCast by SpyCast

SpyCast

1,493 Listeners

The School of Greatness by Lewis Howes

The School of Greatness

21,169 Listeners

Hidden Brain by Hidden Brain, Shankar Vedantam

Hidden Brain

43,334 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,007 Listeners

The Daily by The New York Times

The Daily

111,422 Listeners

Shameless Sex by Amy Baldwin and April Lampert| Pleasure Podcasts

Shameless Sex

3,003 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,803 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Hacking Humans by N2K Networks

Hacking Humans

312 Listeners

All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

All-In with Chamath, Jason, Sacks & Friedberg

8,733 Listeners

Giggly Squad by Hannah Berner & Paige DeSorbo

Giggly Squad

14,434 Listeners

The Artificial Intelligence Show by Paul Roetzer and Mike Kaput

The Artificial Intelligence Show

153 Listeners

Search Engine by PJ Vogt

Search Engine

4,021 Listeners

Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

Threat Vector by Palo Alto Networks

26 Listeners

AI Explored by Michael Stelzner, Social Media Examiner—AI marketing

AI Explored

77 Listeners