Breaking Through in Cybersecurity Marketing

The Hidden Power of Cybersecurity Podcasts (and How to Make Yours Stand Out) with David Moulton


Listen Later

Episode Summary:

This week’s episode is about love—the love of great content, storytelling, and marketing.

Gianna and Maria sit down with David Moulton, host of the Threat Vector Podcast at Palo Alto Networks, to discuss the secrets to making a cybersecurity podcast that works. Forget boring, “salesy” content—David shares the Three E’s of Podcasting (Education, Engagement, and Entertainment) and explains why a killer podcast is one of the most powerful (yet underrated) tools in cybersecurity marketing.

But that’s not all—David also reveals his ROI formula for proving a podcast’s value (yes, there’s math, but the fun kind!), his dream career if he wasn’t in cybersecurity, and why marketing is just like chocolate—you have to savor the good stuff. 🍫

If you’re thinking about launching a podcast or proving its value to leadership, this is the episode you cannot afford to miss.


Timestamps: 

 [01:22] - David’s Journey Into Cybersecurity Podcasting - How David got into his role at Palo Alto Networks and his experience with internal and external podcasts.

 [02:56] - The Secret to a Great Podcast: The 3 E’s - Education, Engagement, and Entertainment – A framework for successful content.

[05:35] - Creating Value for Listeners, Not Just Leads - The importance of thought leadership over hard selling.

[06:50] - Doing the Hard Things in Marketing - Why cybersecurity marketing must go beyond Google-able content.

[08:54] - The ROI of Podcasting: How to Prove It Works - Ear-minutes x $1.03 per minute – The formula for podcast attention value.

[12:14] - The Hardest Part of Running a Podcast - Balancing content strategy, editing, and distribution.

[16:01] - The Problem of Podcast “Pod Fade” - Why most podcasts fail by episode six and how to stay consistent and build momentum.

 [19:47] - Getting Executive Buy-In for Podcasts - Overcoming objections to attribution challenges and how BP, universities, and Fortune 50 companies validate podcast success.

[24:12] - What You Can Learn About Your Podcast Audience - Using data from Megaphone (geo, devices, listener trends).

[26:42] - The Self-Attribution Hack for Proving Impact - Why add "How did you hear about us?" fields matter, and how does traditional attribution miss the human element?


Resources & Mentions
  • Threat Vector Podcast – Listen Here
  • The Challenger Sale: Taking Control of the Customer Conversation by Matthew Dixon and Brent Adamson is a seminal book that introduces a new approach to sales, emphasizing the importance of challenging customers' thinking to add value.​ You can find more details and purchase the book on Amazon or read reviews on Goodreads.


    Be sure also to follow our hosts on LinkedIn:


    👉Gianna Whitver

    👉Maria Velasquez

    Thank you for tuning in to another episode of Breaking Through in Cybersecurity Marketing. You can join the Cybersecurity Marketing Society on our website, main LinkedIn page, or podcast LinkedIn page, and keep up with us on Twitter.

    See you in the next episode!

    ...more
    View all episodesView all episodes
    Download on the App Store

    Breaking Through in Cybersecurity MarketingBy Cybersecurity Marketing Society | N2K Networks

    • 5
    • 5
    • 5
    • 5
    • 5

    5

    21 ratings


    More shows like Breaking Through in Cybersecurity Marketing

    View all
    SpyCast by SpyCast

    SpyCast

    1,495 Listeners

    The School of Greatness by Lewis Howes

    The School of Greatness

    21,139 Listeners

    Hidden Brain by Hidden Brain, Shankar Vedantam

    Hidden Brain

    43,213 Listeners

    CyberWire Daily by N2K Networks

    CyberWire Daily

    1,008 Listeners

    The Daily by The New York Times

    The Daily

    111,479 Listeners

    Shameless Sex by Amy Baldwin and April Lampert| Pleasure Podcasts

    Shameless Sex

    2,995 Listeners

    Darknet Diaries by Jack Rhysider

    Darknet Diaries

    7,810 Listeners

    CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

    CISO Series Podcast

    187 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    308 Listeners

    All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

    All-In with Chamath, Jason, Sacks & Friedberg

    8,724 Listeners

    Giggly Squad by Hannah Berner & Paige DeSorbo

    Giggly Squad

    14,413 Listeners

    The Artificial Intelligence Show by Paul Roetzer and Mike Kaput

    The Artificial Intelligence Show

    152 Listeners

    Search Engine by PJ Vogt

    Search Engine

    4,024 Listeners

    Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

    Threat Vector by Palo Alto Networks

    26 Listeners

    AI Explored by Michael Stelzner, Social Media Examiner—AI marketing

    AI Explored

    76 Listeners