Putting Your Cyber Marketing Audience First with Dani Woolf

Putting Your Cyber Marketing Audience First with Dani Woolf

Dani Woolf, Director of Demand Generation at Cybersixgill and Host of the Audience First podcast, brings her marketing expertise to Hacker Valley to talk about what’s broken in the marketer-buyer relationship. Dani’s tried and true methods of cybersecurity marketing involve clear messaging, authentic communication, and building trust in an industry where not trusting anyone is the norm. How can cyber marketers break through the negative stereotypes and show cybersecurity buyers that they’re authentic?

Timecoded Guide:

[00:00] Fixing the broken relationship between cyber marketers, sellers, & buyers

[04:58] Unrealistic marketing goals vs incorrect marketer perspectives

[10:23] Better conversations between marketers & practitioners with Audience First

[15:12] Connecting with curious cyber practitioners instead of dismissing them

[23:37] Advice for cyber marketers looking to start fresh with content

Sponsor Links:

Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!

The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley

Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at uptycs.com

What messages are practitioners receiving (or not receiving) from cybersecurity marketers?

One of the domains Dani actively uses is hilariously titled, “WTF Did I Just Read?” This project, inspired by the contextless and confusing messaging cyber practitioners receive everyday, aims to show marketers how to adopt better tactics and more authentic communication with potential buyers. Truth be told, Dani has seen the worst of cyber marketing, and she understands why many marketing teams get a bad rap in the industry.

“Frankly, [marketers] are just sending messages that have absolutely no context or need to the buyer, which is just lazy. You have to identify the problem, do a little bit of legwork to see what the buyer is interested in. Who are they really? What are they trying to solve?”

Where do you think we all went wrong, from a cyber marketing perspective?

Two factors have contributed to incorrect and inauthentic marketing tactics in cybersecurity, according to Dani. The first is pressure to achieve stressful goals and unrealistic KPIs on marketing teams that should be focusing on quality of communication over quantity of calls or outreach methods. The second is marketers coming into the cyber industry with the false mindset that cyber marketing is just like any other marketing, when in reality, the methods of communication and the relationship with buyers is completely different.

“A lot of professionals coming into cybersecurity think that what they've done in other verticals works in cybersecurity, when in fact it doesn't. I know for a fact it doesn't, because that's how I made mistakes in the security space and that's how [my podcast] Audience First was born.”

Is there a lot of conversation and communication happening between marketers and cybersecurity practitioners?

Marketers and practitioners are not communicating in a trustworthy and authentic way, in Dani’s opinion. Many marketers fall into the mindset trap of letting the “smart people” in the room talk during meetings and calls, instead of engaging in the conversation. Dani explains that when cyber marketers shut themselves out, they don’t learn anything about cybersecurity or about their clients. Not knowing creates a lack of trust and confidence for both sides.

“If we continue to just click on buttons and look at numbers, we're not going to do our jobs any better. I urge anybody listening to foster that bidirectional relationship, to be open to marketers speaking to you, and to be open to speaking to practitioners and asking for feedback.”

How would you compare the average cybersecurity buyer to, for example, other buyers in the technology space?

Despite the stereotypes of cybersecurity buyers being tough or unapproachable, Dani admits that many of her cybersecurity clients are kinder and more empathetic than in other tech industries. However, this kindness and empathy has to be earned, and security professionals aren’t always the easiest people to gain the trust of. Dani explains that credibility and authenticity reign supreme in messaging to cyber buyers, because that is the only way to break through the caution many practitioners are trained to have.

“Why would I scratch your back? Or, why would you scratch mine if I don't even know who you are? Like, the whole point of security is not to trust everything that you see. So, trust and credibility is a huge part of that, and establishing authentic relationships is a huge part, too.”

---------------

Links:

Keep up with our guest Dani Woolf on LinkedIn and Twitter

Listen to Dani’s podcast, Audience First, and learn more about “WTF Did I Just Read?”

Check out the Cybersixgill website

Learn more about Dani’s work on her other Hacker Valley podcast appearances: Breaking Through in Cybersecurity Marketing, Breaking Into Cyber

Connect with Ron Eddings on LinkedIn and Twitter

Connect with Chris Cochran on LinkedIn and Twitter

Purchase a HVS t-shirt at our shop

Continue the conversation by joining our Discord

Check out Hacker Valley Media and Hacker Valley Studio

Jaksot(405)

Navigating AI as a CISO with Whitney Palacios

Navigating AI as a CISO with Whitney Palacios

In this episode, Host Ron Eddings catches up with one of his colleagues, Whitney Palacios, Vice President and CISO at BigBear.ai. They explore the challenges and responsibilities of being a CISO and Whitney addresses key cybersecurity issues such as the importance of balancing security with innovation, especially in the context of AI. Whitney offers sage insight into Security Operations Centers (SOCs), the need for diversity in tech leadership roles and closes out with helpful advice for rising CISOs.   Impactful Moments: 00:00 - Welcome 01:26 - Introducing guest, Whitney Palacios 04:03 - What Is A CISO? What Do You Do? 06:19 - SOC or No SOC? 08:40 - CISO Role & Risk/Accountability 11:12 - “One of A Few CISOs” 12:00 - Join Our Mastermind! 15:21 - AI: Allowing Innovation 18:27 - AI Use Cases 20:30 - One Step Better…   Links: Connect with our guest, Whitney Palacios : https://www.linkedin.com/in/whitneypalacios/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

2 Heinä 202422min

The Power of AppSec, Cyber Education, and Friendship with Tanya Janca

The Power of AppSec, Cyber Education, and Friendship with Tanya Janca

In this episode, Host Ron Eddings catches up with longtime friend, Tanya Janca, Head of Education and Community at SemGrep and author of 'Alice and Bob Learn Application Security.' Tanya shares her experiences from working in the Canadian government to joining Microsoft and eventually founding WeHackPurple. Tanya talks about her new role at SemGrep, where she focuses on making application security education accessible, and the importance of building supportive communities in the tech industry. Impactful Moments: 00:00 - Welcome 01:20 - Introducing guest, Tanya Janca 03:09 - “IDK How to Make SemGrep Rules…” 0707 - Finding Shadow IT & Embezzlers 11:27 - Join Our Mastermind 12:09 - Becoming an AppSec Professional 15:22 - Elections CISO 18:00 - Speaking at Conferences 21:15 - Microsoft Calls Me One Day… 23:21 - Parting Ways; But Still Friends 24:30 - “Can You Train Our Devs?” 27:50 - Fairness Is Important 32:27 - Put Yourself Out There!   Links: Connect with our guest, Tanya Janca: https://www.linkedin.com/in/tanya-janca/ Check out SemGrep Academy: https://academy.semgrep.dev/ We Hack Purple Podcast: https://wehackpurple.buzzsprout.com/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

26 Kesä 202435min

Networking 2.0: The Future of Decentralized Networking & Access Management

Networking 2.0: The Future of Decentralized Networking & Access Management

In this episode, Hosts Ron Eddings, and Jen Langdon share takeaways from Ron's RSA conversation with Colin Constable, Co-Founder and CTO at Atsign On this show, they’ll break down Networking 2.0 and how it can serve as the next evolution for data ownership and access control. Colin and his team at Atsign have built the atProtocol®, a new open-source internet protocol that makes private and secure data sharing simple and intuitive, enabling any person, entity or thing to implement NIST Zero Trust principles into their solution. Impactful Moments: 00:00 - Welcome 02:17 - Introducing, Colin Constable 03:42 - The Problem with the Current Internet 08:02 - The Catalyst Behind atProtocol® 11:12 - Nexus of Networking, Identity & Privacy 14:19 - From our Sponsor, Atsign 15:23 - What’s Networking 2.0? 18:54 - Internet Anonymity & Accountability 24:31 - Unique Solutions using atProtocol®   Links: Connect with Colin Constable: https://www.linkedin.com/in/colinconstable/ Check out Atsign: https://atsign.com/ Read the atProtocol Whitepaper here: https://atsign.com/resources/white-papers/the-atprotocol/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

18 Kesä 202432min

How AI is the Key Turning Point in TPRM with Paul Valente

How AI is the Key Turning Point in TPRM with Paul Valente

In this episode, Host Ron Eddings enjoys a reprieve from the hectic RSA conference with guest Paul Valente, CEO of VISO Trust. Paul discusses how he used his extensive experience as a CISO to solve a huge pain point he was experiencing with third party risk management (TPRM) and how it prompted him and a colleague to start their own company to create the solution they had been wishing for. However, nothing could be more exciting than the ways AI has expanded the potential for TPRM to change security outcomes and allow the security sector to drop the ‘department of no’ branding for good. Tune in to hear the whole story!   Impactful Moments: 00:00 - Welcome 01:03 - Introducing guest, Paul Valente 04:49 - Core Pillars of Being a CISO 06:14 - Why Cyber Startup? 7:46 - AI: The Key Turning Point for TPRM 10:40 - Why Do Companies Need TPRM? 15:09 - From our Sponsor, VISO Trust 16:17 - Data & Controlling Risk 22:35 - No Security Questionnaires! 24:14 - One Step Better…   Links: Connect with our guest, Paul Valente: https://www.linkedin.com/in/pauldvalente/ Check out VISO Trust: https://visotrust.com/hackervalley Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

11 Kesä 202425min

A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini

A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini

In this episode, Ron Eddings and Jen Langdon explore the origins of MSSPs and the solutions they offer to the cybersecurity industry with insights from Ricardo Nicolini, CTO at Bulletproof. Ricardo will uncover the potential of MSSPs to alleviate headaches and reduce burnout in cybersecurity by detailing his personal experience with overcoming a ransomware attack in the City of Saint John. Impactful Moments: 00:00 - Welcome 05:15 - Introducing guest, Ricardo Nicolini 07:21 - Find & Prevent: FAST! 11:39 - Who MSSPs Support 13:48 - From our Sponsor, ContraForce 14:48 - City of Saint John & Ransomware 20:02 - Implications of Ransomware 25:16 - SOC Burnout is Real 29:21 - Improving the SOC with the Right Person 35:46 - Is Reducing Cognitive Load Possible?   Links: Connect with our guest Ricardo Nicolini : https://www.linkedin.com/in/rnicolini/ Check out ContraForce: https://www.contraforce.com/ Learn more about how Bulletproof helped the City of Saint John: https://content.bulletproofsi.com/read-cosj-case-study Check out our upcoming events: hackervalley.com/livestreams Continue the conversation by joining our Discord: https://hackervalley.com/discord Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

4 Kesä 202440min

Zero Trust Tactics: Preventing Breaches with Ivan Fonseca & Nick Cottrell

Zero Trust Tactics: Preventing Breaches with Ivan Fonseca & Nick Cottrell

In this episode, Host Ron Eddings teams up with Ivan Fonseca and Nick Cottrell, Cybersecurity Engineers at ThreatLocker, as they break down the anatomy of previous breaches and the attacker’s playbook using MITRE ATT&CK. Ivan and Nick will take you through the defender’s perspective and will also share tools that are commonly used to defend breaches and discuss how Zero Trust can be implemented to better defend organizations.   Impactful Moments: 00:00 - Welcome 01:35 - Introducing guests, Ivan Fonseca and Nick Cottrell 04:39 - 3CX Breach & Supply Chain Attacks 08:10 - Ring Fencing Defense 11:16 - Living Off the Hacker Valley Land 13:06 - From our Sponsor, ThreatLocker 13:56 - Hacker Mindset in the Op 18:45 - Zero Trust, Default Deny 24:23 - Common Attack Vectors 30:09 - 7 Zip is a Russian Application? 32:49 - Learning How to Defend Better   Links: Connect with our guests, Ivan Fonseca and Nick Cottrell : https://www.linkedin.com/in/ivan-fonseca-64139222b/ https://www.linkedin.com/in/nicholas-cottrell-083564165/ Learn more about ThreatLocker: https://www.threatlocker.com/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

28 Touko 202439min

Enterprise Browsers: Work’s Natural Next Step

Enterprise Browsers: Work’s Natural Next Step

In this episode, Ron Eddings and Jen Langdon talk about the evolution of browsers and how enterprise browsers have entered to change the game for corporations. Special guest Bradon Rogers, Chief Customer Officer at Island, joins to explain how enterprise browsers expand capabilities in asset management, security, and user experience. They also discuss how enterprise browsers can streamline IT infrastructure, offering a glimpse into the future and AI's role in it. Impactful Moments: 00:00 - Welcome 04:25 - Introducing guest, Bradon Rogers 07:23 - Extension vs Browser 14:53 - Security Use Cases 18:12 - From our Sponsor 19:34 - Better User Decisions 24:01 - Tool Reduction 26:24 - IT & Security Should Play Nice 29:41 - Data Protection   Links: Connect with our guest, Bradon Rogers: https://www.linkedin.com/in/bradon/ Check out Island’s website here: https://www.island.io/ Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

21 Touko 202434min

Building Tech and Adding Value in the Era of AI with Josh Danielson

Building Tech and Adding Value in the Era of AI with Josh Danielson

In this episode, Ron Eddings talks with guest Josh Danielson, CEO at Kustos, about how his journey at a previous organization has led him to build and create new products in the industry. They’ll discuss everything from how AI is currently being used to how there are still many ways to optimize in the cybersecurity product and service space. Listen to learn more about how you could create the next great thing in cyber! Impactful Moments: 00:00 - Welcome 00:43 - Introducing guest, Josh Danielson 03:20 - Cutting Edge Tech 07:34 - To CISO or not to CISO 10:33 - Join Our Creative Mastermind 11:20 - Balancing Product & Services 14:37 - Not Taking Advantage of AI 18:10 - Getting Better Value out of Tooling 21:35 - One Step Better…   Links: Connect with our guest, Josh Danielson: https://www.linkedin.com/in/joshua-danielson-a82b7342/ Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

14 Touko 202424min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
rss-niinku-asia-on
aamukahvilla
jari-sarasvuo-podcast
psykologia
ihminen-tavattavissa-tommy-hellsten-instituutti
rss-valo-minussa-2
rss-vapaudu-voimaasi
rss-arkea-ja-aurinkoa-podcast-espanjasta
mielipaivakirja
rss-liian-kuuma-peruna
rss-psykalab
rss-rouva-keto
rss-anteeks-etukateen
rss-duodecim-lehti
rss-honest-talk-with-laurrenna
rss-turun-yliopisto
rss-synapselingo-opi-englantia