ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

How (and Why) CISOs Evaluate Vendors Before Taking Any First Meeting

Автор: Audience 1st

Загружено: 2026-02-13

Просмотров: 5

Описание: When a CISO starts evaluating a new product, they start evaluating the people they’re going to work with and only then evaluate the vendor from a technological perspective.





Because at the end of the day they do business with people, not just with products.



Building brand awareness and trust is very important. Why would you give access to your financial accounts if there’s no trust?



Brutally honest insights from May Brooks, CISO, Founder and Chairwoman of the Board of Helena Cybersecurity Awareness.



In this episode, Dani Woolf had a conversation with May about her challenges, goals, what vendors do that piss her off, and the alternatives.



We also covered:


• What May does from a day-to-day basis as a cybersecurity expert and what’s her ultimate goal.




• What is May’s one bleeding neck challenge right now as the deputy CISO?




• What is the ultimate goal May’s trying to achieve as a security practitioner?




• What are ways that May evaluates people within a potential vendor?




• What are differences or anomalies salespeople and marketers can learn from in order to stand out in CISOs’ eyes.




• How would a salesperson or marketer understand a CISO’s priorities best? What would be the way to extract that data not under an NDA?




• Why is building brand awareness and trust so important in cybersecurity?




• Cardinal rules security vendors, marketers, and sales teams are breaking these days. 




Join Audience 1st Newsletter Today



Join 1300+ cybersecurity marketers and sellers mastering security buyer research to better understand their audience and turn them into loyal customers:https://www.audience1st.fm/newsletter

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
How (and Why) CISOs Evaluate Vendors Before Taking Any First Meeting

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Practical Public Speaking Tips That Improve Audience Engagement at Security Events

Practical Public Speaking Tips That Improve Audience Engagement at Security Events

SIKORSKI O FRAJERACH, A TUSK ODPYCHA USA? Atak na Iran z perspektywy Polski | Salonik Ziemkiewicza

SIKORSKI O FRAJERACH, A TUSK ODPYCHA USA? Atak na Iran z perspektywy Polski | Salonik Ziemkiewicza

Nvidia’s Blowout Can’t Calm AI Anxiety | Prof G Markets

Nvidia’s Blowout Can’t Calm AI Anxiety | Prof G Markets

349: What Your Brand Is Saying About You (Before You Say a Word)

349: What Your Brand Is Saying About You (Before You Say a Word)

Meissner & Kobierski -

Meissner & Kobierski - "Chińczycy zabiorą im ostatnie gacie". Wyciskają Rosjan jak cytrynę.

The Rise of AI Teachers & Why ChatGPT in Classrooms Isn’t Working | #233

The Rise of AI Teachers & Why ChatGPT in Classrooms Isn’t Working | #233

Ziemkiewicz: „Druga młodość PRL-u”. Tusk idzie drogą Łukaszenki?

Ziemkiewicz: „Druga młodość PRL-u”. Tusk idzie drogą Łukaszenki?

Why Human-Centric Security is the Next Frontier in Data Privacy (and Why It Matters Now More Than...

Why Human-Centric Security is the Next Frontier in Data Privacy (and Why It Matters Now More Than...

Anthropic trying to put limitations on its AI models 'really has no standing', says Brent Sadler

Anthropic trying to put limitations on its AI models 'really has no standing', says Brent Sadler

How to Stop Falling for Fake Cyber Threat Exposure Management (CTEM) Claims

How to Stop Falling for Fake Cyber Threat Exposure Management (CTEM) Claims

Economist explains what happens after AI takes all jobs

Economist explains what happens after AI takes all jobs

Why the Legacy Analyst Model is Misaligned with Cybersecurity Buyer and Vendor Needs

Why the Legacy Analyst Model is Misaligned with Cybersecurity Buyer and Vendor Needs

Jak Polska buduje najsilniejszą armię w swojej historii

Jak Polska buduje najsilniejszą armię w swojej historii

SKILLS Legal AI Use Case Demos - Timelines and Chronologies

SKILLS Legal AI Use Case Demos - Timelines and Chronologies

From Cost Center to Growth Driver: The CFO’s Playbook for Cloud Security ROI

From Cost Center to Growth Driver: The CFO’s Playbook for Cloud Security ROI

How (And Why) This Founder of a Buyer <> Vendor Matching Software Built a Product from Deep Cyber...

How (And Why) This Founder of a Buyer <> Vendor Matching Software Built a Product from Deep Cyber...

Nvidia CEO Jensen Huang on AI's pressure on software stocks

Nvidia CEO Jensen Huang on AI's pressure on software stocks

Всередині Нової пошти: менеджмент, цифри, роботи, майбутнє. Частина 2 #FEDORIVVLOG

Всередині Нової пошти: менеджмент, цифри, роботи, майбутнє. Частина 2 #FEDORIVVLOG

Risk Leadership Redefined: Why Chief Risk Officers Must Think Beyond Compliance

Risk Leadership Redefined: Why Chief Risk Officers Must Think Beyond Compliance

Why You're Not Getting The Job Offer | Aspire with Emma Grede

Why You're Not Getting The Job Offer | Aspire with Emma Grede

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]