As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
1
The Art of Trade Show Excellence: Planning, Presence, and Follow-Up
29:58
29:58
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
29:58
Featuring Jennifer Baker-Johnson, Director of Commercial Marketing - Network & Cybersecurity Services at Rockwell Automation.
…
continue reading
1
Survey Says! Utilizing Survey Data to Support Cybersecurity Marketing Programs
25:01
25:01
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:01
Kristine DePippo, Head of B2B Product Marketing: Security, Verizon, is at the helm of orchestrating Verizon Security's B2B strategy and pioneering its data report advancements.
…
continue reading
1
Generative AI's Role in Cybersecurity Data Analysis
29:38
29:38
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
29:38
To help us unpack it all we’ve invited Wade Baker, Co-Founder of Cyentia Institute – a leading firm focused on cybersecurity data-driven research.
…
continue reading
1
Lost in the Inbox: The Cybersecurity PR Epidemic Part 2
24:43
24:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:43
This two-part series dives into the issue within cybersecurity PR and Communications, focusing on the widespread use of ineffective mass email strategies by PR professionals. Featuring special guest Kevin Kosh, Senior Director of Communications at Bishop Fox
…
continue reading
1
Lost in the Inbox: The Cybersecurity PR Epidemic Part 1
25:52
25:52
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:52
This two-part series dives into the issue within cybersecurity PR and Communications, focusing on the widespread use of ineffective mass email strategies by PR professionals. Featuring special guest Kevin Kosh, Senior Director of Communications at Bishop Fox.
…
continue reading
1
Generative AI’s Impact on Cybersecurity Marketers
43:28
43:28
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:28
Dan Verton currently serves as the Director of Content Marketing at Uptycs, taking us through a deep dive into generative AI's role in reshaping cybersecurity marketing.
…
continue reading
1
B2B Cybersecurity Leads: What’s the Best Method for Acquisition?
36:56
36:56
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
36:56
Shaina Lanchin Zarrin is the Head of the Digital Department at the pioneering B2B marketing powerhouse - Xtra-mile, an Israeli-based marketing agency that specializes in lead generation for B2B technology and cybersecurity vendors.
…
continue reading
1
Content Syndication as a Foundational Element of Lead Generation
27:25
27:25
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:25
Freya Ward, Global Sales Director for Headley Media, joins us for a deep dive into content syndication as a foundational element of lead generation.
…
continue reading
1
CISO Community Management From the Vendor Perspective
24:11
24:11
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:11
This episode of Cybersecurity (Marketing) Unplugged features Dan DeSantis, Director or CISO Advisory in Cisco's Security Organization.
…
continue reading
1
Israeli Cybersecurity Investing...Or Should We Call It Company Building?
19:00
19:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
19:00
Bobi Gilburd is the Chief Innovation Officer at Team8. Having served in the IDF's elite unit 8200 as a colonel for over 26 years, Bobi brings extensive cybersecurity knowledge and strategic acumen to his role at Team8. Leading the unit's research and cloud divisions, Bobi developed an innate understanding to the myriad of attack vectors across the …
…
continue reading
1
OT Security Marketing: Insights From the Plant Floor
23:20
23:20
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:20
Kamil Karmali has over 15 years of experience in cross-functional team leadership, global sales leadership, talent development & executive consulting in OT cybersecurity services. He is currently the Sr. Global Manager of OT Cybersecurity Consulting Services with Rockwell Automation, a leading global industrial automation company founded way back i…
…
continue reading
1
Part 2: Your Leads Suck, My Sales Rep Told Me So!
26:18
26:18
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:18
Kevin Flint's mission is to help B2B agencies, clients and solutions providers identify, form and grow prosperous relationships. As a B2B Agency Executive and Digital Media expert, he's spent the past two decades working with many of the most innovative B2B brands and marketers to evolve their marketing strategy and deliver superior ROI.…
…
continue reading
1
Part 1: Your Leads Suck, My Sales Rep Told Me So!
27:45
27:45
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:45
Kevin Flint’s mission is to help B2B agencies, clients and solutions providers identify, form and grow prosperous relationships. As a B2B Agency Executive and Digital Media expert, he’s spent the past two decades working with many of the most innovative B2B brands and marketers to evolve their marketing strategy and deliver superior ROI.…
…
continue reading
1
Webinars 3.0: The Cybersecurity Marketer's Checklist
38:19
38:19
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
38:19
Mary Owen is the VP of marketing and demand generation at KnowBe4, who joins us today to discuss where webinars fit in with her content marketing and demand generation strategy.
…
continue reading
1
Kubernetes and Complexity
35:13
35:13
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
35:13
Craig Box is the vice president of open source and community at ARMO. He is responsible for ARMO's open source Kubernetes security platform called Kubescape and for managing all relationships with the developer and open source community.
…
continue reading
Patricia Muoio is a partner at SineWave Ventures in NYC, an early stage venture capital firm dedicated to helping new technology companies grow across the commercial and public sectors.
…
continue reading
1
Protecting Neutral Networks
33:22
33:22
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
33:22
Tito Sestito is the co-founder and CEO of HiddenLayer, a cybersecurity startup in the business of preventing adversarial machine learning attacks. In this episode, Sestito is joined by John Kindervag, who we all know as the 'father of Zero Trust' and a friend to HiddenLayer.
…
continue reading
1
Players in the Crypto Space
29:22
29:22
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
29:22
David serves as the Chief Insurance Officer for leading insurtech, Embroker. In this role, David is responsible for providing the strategic direction and leadership for the performance of Embroker’s insurance operations which include underwriting, claims, and other functions. David is an active member of the International Association of Privacy Pro…
…
continue reading
1
Securing The SaaS Layer
33:19
33:19
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
33:19
Galit Lubetzky Sharon is the co-founder and chief technical officer of Wing Security and a retired colonel in the IDF, elite to A200 unit, the equivalent of our NSA. In this episode of Cybersecurity Unplugged, Lubetzky discusses Wing Security's inventory of SaaS applications that are being used, its relationship to the CISO and more.…
…
continue reading
1
The CISO and The Cyberattack
36:38
36:38
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
36:38
Steve Stone is the vice president of Rubrik Zero Labs, which is a new cybersecurity research team that Stone leads. In this episode of Cybersecurity Unplugged, Stone breaks down The State of Data Security Report, how the CISO job level is affected by cyberattacks and more.
…
continue reading
1
Protection in The Platform
30:00
30:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
30:00
Stan Golubchik is the founder and CEO of ContraForce, a company whose mission is to simplify security tools. In this episode of Cybersecurity Unplugged, Golubchik weighs in on how their platform works in the cyberattack world and protecting smaller companies and more.
…
continue reading
1
Machine Learning and AI: Where do we go?
25:36
25:36
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:36
Liran Paul Hason is the co-founder and CEO of Aporia, a full stack machine learning observability platform used by Fortune 500 companies and data science teams around the world. In this episode of Cybersecurity Unplugged, Hason weighs in on the current state of AI and ML in cybersecurity and the most interesting and promising applications for these…
…
continue reading
1
Isolating Control Systems
31:31
31:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:31
Joe Weiss is the managing partner at Applied Control Systems, providing strategic consulting to optimize and secure control systems used in industry, manufacturing, transportation, building controls and defense. In this episode of Cybersecurity Unplugged, Weiss also discusses what control systems consist of, the two-fold problem between IT and the …
…
continue reading
Chris Dougherty is a senior fellow for the defense program at the Center for New American Security. His primary area of research includes defense strategy, operational concepts, and force planning. In this episode of Cybersecurity Unplugged, Dougherty discusses imagining a future of preparedness to launch a conventional warfare attack as Russia has…
…
continue reading
Fred Cohen is the CEO of Management Analytics, an assessment and planning advisory services litigation support, angel investment company with a long pedigree in cybersecurity. In this episode of Cybersecurity Unplugged, we're exploring the world of cybersecurity.
…
continue reading
1
Digging Ourselves Out of a Hole
26:44
26:44
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:44
Chris Miller, Ph.D. is an associate professor of International History at The Fletcher School at Tufts University. Miller is a doctor whose research has focused on Russian history, politics and economics. He is also the author of "Putinomincs: Power and Money in Resurgent Russian," and "We Shall Be Masters: Russian Pivots to East Asia from Peter Th…
…
continue reading
1
The World of Kubernetes and Cloud Containers
30:20
30:20
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
30:20
Dr. Nikki Robinson, a full-time security architect for IBM, is an expert in statistical data analysis, quantitative methods and risk management. In this episode of Cybersecurity Unplugged, Dr. Robinson also discusses application development of Kubernetes and cloud containers, how we get our hands around the software supply chain as it relates to cl…
…
continue reading
1
Exposing Vulnerabilities
22:34
22:34
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:34
Amit Shah is the director of product marketing at Dynatrace and one of the guys who discovered the Log4j vulnerability early on. This episode dives into vulnerabilities.
…
continue reading
1
Exploring The World of Passwords
26:42
26:42
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:42
Andrew Shikiar, executive director of FIDO Alliance, knows more about the password economy than anybody else in the industry. Shikiar has been around both the open system standards space and the promotion and marketing of Linux and Java with a focus on identity management for companies like Sun Microsystems, with an emphasis on developer mindsets a…
…
continue reading
1
The Geopolitical Playing Field
24:20
24:20
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:20
We're fortunate enough to host a couple of the industry's best and brightest: Richard Bird and Tom Kellermann. Bird and Kellermann join us today to discuss each battlefield and what they think we need to do to prevail and turn the race back. To this, Kellermann weighs in on education.
…
continue reading
Nicolas M. Chaillan is the first chief software officer for the United States Air Force and Space Force and a former special adviser for cloud security and DevSecOps at the Department of Defense within the Office of the Secretary of Defense. Chaillan was also the former special advisor for cybersecurity and chief architect for cyber.gov at the Depa…
…
continue reading
1
Protecting Industrial Security
36:06
36:06
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
36:06
Mark Cristiano, the commercial director of global business services for Rockwell Automation, has spent the last 30 years in IT and enterprise and manufacturing systems leadership, about 19 of which were spent with Rockwell Automation.
…
continue reading
When Seemplicity was established, Sirkis and his team went through a comprehensive ideation process: speaking with more than 70 CISOs in the U.S., Europe and in Isreal. It was clear that the security team felt that they had enough tools to identify weaknesses and vulnerabilities across the organization. To this, Sirkis weighs in on how Seemplicity …
…
continue reading
1
The World of Threat Landscape Visibility
25:02
25:02
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:02
David Monnier, chief evangelist at Team Cymru provides extensive threat landscape visibility beyond the perimeter to help threat hunters and analysts improve their abilities to identify cyberattacks in advance in today's world of threat intelligence.
…
continue reading
1
COVID-19's Impact on Cybersecurity Marketing
28:09
28:09
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
28:09
From a marketing point of view, events are about brand awareness and demand generation, pipeline acceleration, media relations and more, but COVID-19 had different plans for marketers. Netzer weighs in on how difficult it's gotten to rise above the noise after transitioning to digital.
…
continue reading
Victoria Beckman is the director of the Digital Crimes Unit (DCU) for the Americas at Microsoft. DCU is responsible for implementing strategies to disrupt cybercrime. In this episode of Cybersecurity Unplugged, Beckman discusses the downstream implications of countries dispersing and distributing operations and data assets, how Microsoft and the DC…
…
continue reading
Moshe Zioni, VP of security research at Apiiro has been researching security for over 20 years in multiple industries. In this episode of Cybersecurity Unplugged, Zioni discusses the downstream dependencies on other open source programs that are called by API, how organizations can best mitigate future ransomware attacks, specifically around supply…
…
continue reading
Jonatan Khanashvili is a senior research lead at Hunters who spends every waking moment hunting bad actors in cyberspace. In this episode of Cybersecurity Unplugged, Khanashvili also discusses how Hunters is dealing with the big golden SAML attack and how the attack works, detection and hunting techniques used to find and identify the bad guys, a p…
…
continue reading
1
Cryptocurrency Bloodbath
32:21
32:21
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:21
Richard Bird is the chief product officer for SecZetta. Bird is a multi time C level executive in both the corporate and startup worlds and is internationally recognized for his expert insights, work and views on cybersecurity data privacy, digital consumer rights and identity centric security. He's also a senior fellow with the CyberTheory Zero Tr…
…
continue reading
1
Separating the Hype From the Reality
28:41
28:41
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
28:41
Peter Bordow is the senior vice president, principal architect and head of quantum systems and emerging technology for information and cybersecurity at Wells Fargo Bank. Before Wells Fargo. Anything that Bordow tells us today is his personal opinion and not the opinion or official position of Wells Fargo Bank. In this episode of Cybersecurity Unplu…
…
continue reading
1
The Nature of Application Code
23:54
23:54
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:54
Rui Ribeiro is the CEO and founder of Jscrambler, a bootstrap global business that serves over 43,000 customers worldwide. In this episode of Cybersecurity Unplugged, Ribeiro discusses marketing material in website and application code and how his product works to identify corrupt code, the nature of polymorphic and how Jscrambler deals with it, an…
…
continue reading
Chaim Mazal, CISO at Kandji, is the market leader in Apple device management and security. In this episode of Cybersecurity Unplugged, Mazal discusses what Kandji does to help organizations have seamless ease of development across the global landscape, the risk framework where CISOs can identify and prioritize threats, and the kind of leverage that…
…
continue reading
In this episode of Cybersecurity Unplugged, Gupta discusses how her outbound marketing messaging suggests that you've embedded the five principles of Zero Trust Security into your approach, the product that Rubrik built towards protecting and managing data, and how Rubrik provides value in Zero Trust, data security and what it takes to provide data…
…
continue reading
1
Trusting Our Global Supply Chain
26:05
26:05
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:05
Tim Danks is the founder and an advisor/consultant for Global Risk Perspectives with 35 years of global experience in the Technology industry. In this episode, Danks discusses additional steps we need to take in terms of understanding our entire supply chain and identifying: What needs to be done to protect our critical infrastructure? Which aspect…
…
continue reading
1
A Marketer's Competition
33:47
33:47
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
33:47
David Bruce is the global security lead for product marketing and the mainframe software division for Broadcom. Bruce has been in and around the market for years and knows how today's world is unprecedented in terms of noise levels and competition. There isn't a market without some competition, but there's insight as to why many of today's marketin…
…
continue reading
1
Expanding Your Marketing Process
27:25
27:25
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:25
As creator of Think.Design.Cyber. and the idea behind systems thinking feeding design thinking, Kale explores the need for and use cases around systems and design thinking in cybersecurity marketing. Kale discusses telling your systems marketing story in terms of what it provides and what outcome it creates and more.…
…
continue reading
1
Revisiting the Global Threat Landscape One Year After SolarWinds
31:52
31:52
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:52
Roger Sels is VP Solutions, EMEA at BlackBerry, helping maximize cyber program value and impact. Today, Sels is back to revisit the digital world of SolarWinds and the global threat landscape, as well as BlackBerry's point of view.
…
continue reading
1
Changing Data Quantification in Security Insurance
24:41
24:41
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:41
Lynn Peachey serves as the director of business development, connecting clients and partners with cyber security solutions at Arete Incident Response, an insurance company and security insurance space. In this episode of Cybersecurity Unplugged, Peachey uses her experience in cyber insurance to weigh in on the changes in data quantification in the …
…
continue reading
1
The Double-Edged Sword: AI
29:41
29:41
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
29:41
Hany Abdel-Khalik is an associate professor at Purdue University in the School of Nuclear Engineering and uses his background and expertise to discuss patterns he’s seen in AI and the ability to automate things that humans understand very well, how AI is skyrocketing all over the world in cybersecurity, and cybersecurity as a science: Understanding…
…
continue reading
1
Filling The Gaps in Cyber Warfare
20:35
20:35
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
20:35
Dr. Chase Cunningham, also known as the 'doctor of Zero Trust, is the current chief strategy officer at Ericom Software. In this episode of Cybersecurity Unplugged, Dr. Cunningham discusses getting a bigger and better view of the Zero Trust model in cyber warfare, his book, Cyber Warfare - Truth, Tactics and Strategies: How different things are use…
…
continue reading