Breaking Through in Cybersecurity Marketing

Mastering Marketing Mayhem with Pam Cobb


Listen Later

This week, get ready to laugh until it hurts because we might just have our funniest episode ever. Earthquakes and spreadsheets are the names of the game as we welcome Pam Cobb, the hilariously jet-lagged (for this episode, not permanently, folks!) Director of Content Security at Akamai. Join hosts Gianna and Maria as they dive into how Pam not only survives natural disasters but also thrives amid the chaos of cybersecurity marketing. From smart marketing tactics to hilarious earthquake jokes, Pam keeps the tips and laughter rolling. Don’t miss out on this episode’s mix of awesome advice and entertaining stories from the wild world of marketing!

Timestamps:
  • [01:08] Pam's role at Akamai explained
  • [02:05] How Pam attributes revenue to security content
  • [03:36] The humor in marketing data struggles
  • [07:20] Pam's journey from engineering to marketing
  • [09:29] Transition to IBM and experiencing corporate acquisitions
  • [13:36] Creative content strategies and memorable marketing moments

  • Takeaways:
    • Content plays a crucial role in driving revenue and should be strategically managed.
    • Multi-touch attribution is a valuable tool for measuring the impact of content on revenue.
    • Creating engaging experiences at trade shows and events requires thoughtful planning and alignment with brand messaging.
    • Collaboration between different teams, such as content strategists and writers, is essential for successful content creation. Event planning is an important aspect of cybersecurity marketing, and creative ideas such as custom-named cocktails can make an event more memorable.
    • Resources:

      Join Us at RSA 2024:

      Remember to join the Cybersecurity Marketing Society's party at RSA 2024 on May 5th, at Novella San Francisco. Secure your tickets on our website and enjoy the best party for cybersecurity marketers!

      About  guest:

      👉Link to Pam's blog post featuring the infamous orange kitten story.

      👉Follow Pam on LinkedIn

      👉Find Akamai on LinkedIn or their website.  

      Be sure to also follow our hosts on LinkedIn:

      👉Gianna Whitver

      👉Maria Velasquez 

      Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing, join the Cybersecurity Marketing Society on our website, on our main LinkedIn page, or our podcast LinkedIn page, and keep up with us on Twitter.

      See you in the next episode!

      ...more
      View all episodesView all episodes
      Download on the App Store

      Breaking Through in Cybersecurity MarketingBy Cybersecurity Marketing Society | N2K Networks

      • 5
      • 5
      • 5
      • 5
      • 5

      5

      21 ratings


      More shows like Breaking Through in Cybersecurity Marketing

      View all
      SpyCast by SpyCast

      SpyCast

      1,493 Listeners

      The School of Greatness by Lewis Howes

      The School of Greatness

      21,165 Listeners

      Hidden Brain by Hidden Brain, Shankar Vedantam

      Hidden Brain

      43,334 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,007 Listeners

      The Daily by The New York Times

      The Daily

      111,422 Listeners

      Shameless Sex by Amy Baldwin and April Lampert| Pleasure Podcasts

      Shameless Sex

      3,003 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      7,803 Listeners

      CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

      CISO Series Podcast

      189 Listeners

      Hacking Humans by N2K Networks

      Hacking Humans

      312 Listeners

      All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

      All-In with Chamath, Jason, Sacks & Friedberg

      8,733 Listeners

      Giggly Squad by Hannah Berner & Paige DeSorbo

      Giggly Squad

      14,434 Listeners

      The Artificial Intelligence Show by Paul Roetzer and Mike Kaput

      The Artificial Intelligence Show

      153 Listeners

      Search Engine by PJ Vogt

      Search Engine

      4,021 Listeners

      Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

      Threat Vector by Palo Alto Networks

      26 Listeners

      AI Explored by Michael Stelzner, Social Media Examiner—AI marketing

      AI Explored

      77 Listeners