October 19, 2022

The Scariest Cybersecurity Event Red Flags with Jason Cenamor

by Breaking Through in Cybersecurity Marketing

Listen Now

The Scariest Cybersecurity Event Red Flags with Jason Cenamor

October 19, 2022 Breaking Through in Cybersecurity Marketing

00:00:00

Show Notes

We’re joined this week by Jason Cenamor, Founder of the CISO Society, to talk about the community he’s focused on building for fellow CISOs, as well as his extensive background in cybersecurity events. Events aren’t always an easy topic for cybersecurity marketers looking to make the most of their marketing budgets, but Jason has the dirt on all things events; the good, the bad, and the downright scary. Looking to spot an event red flag before it wastes your time and money? Jason is your guy!

 

Timecoded Guide:

[00:00] Introducing Jason Cenamor & the CISO Society

[05:50] Transitioning from cyber event management into community building

[15:59] Noticing best event strategies & prioritizing transparent event vendors

[24:16] Understanding the value of custom curated events and targeted invite lists

[32:27] Building events better to provide value and community in cybersecurity

[41:59] Getting the best price from event vendors, no matter who you choose

 

Did you envision your career would shift towards community building, content creation, and networking?

Until recently, Jason didn’t consider his career path would’ve evolved and shifted into a focus on the CISO Society. Originally started as a side project, the CISO Society was born from Jason’s passion for building community and putting on hybrid in-person and virtual events. When the Society took off and continued to grow larger under Jason’s care, he realized more and more of his passion and energy belonged with the CISOs he was working with everyday. 

“I started the CISO Society as a side project, because obviously, what's better than to start developing a network of CISOs that I could get access to for real market intelligence when I'm working with these advisory boards.” 

 

What are some noticeable green lights of a good event vendor for cyber marketers to look out for? 

While Jason dives deep into the red flags of bad cybersecurity event vendors, he also reassures us that there are incredible events out there. Jason recommends his favorite companies, including the always consistent Evanta, but more than that, he gives us advice on what makes a good cybersecurity event. Unsurprisingly for cybersecurity practitioners, transparency in invitees and agendas signify an event vendor is much more trustworthy. 

“I think the key is how transparent the event company is going to be with the information they give you. A typical tactic of some event companies is to password protect their attendee list. In my personal opinion, all that does is show that you have something to hide.”

 

What are the event vendor red flags we should worry about?

We want the dirt on what makes an event vendor a waste of time or resources, and Jason delivers with a list of red flags. From password protected invite lists to calendars full of unpromising events to not giving money back, Jason has seen the worst of the worst in events. Despite the scary practices in place, Jason is happy to report that many of these elements are on the outs in the cyber world as we continue to call companies out and hold them accountable in groups like the Cyber Marketing Society.

“That is such an important question for any vendor to ask: How are you forming the agenda? Because that shows how much they care about the CISO experience or not. If they don't care about the CISO experience, they're not going to have a good audience.”

 

What sort of content makes a good event for CISOs? 

Many of the event vendors Jason discusses with us have been approved not only by his own experience running events, but by his fellow CISOs in the CISO Society. But what really makes an event worth it for a CISO? Why are they showing up, and how can we help them show up more? Jason explains that CISOs thrive in a collaborative environment and don’t just want pitch after pitch of standalone presentations. 

“CISOs actually provide more value in collaborative roundtable discussions, right? That will always be my recommendation. It's great to stand up and to do your thing, but it's better to be part of a conversation and then say, ‘Can I come to your office and do my thing?’”

----------

Links:

Get tickets for our upcoming Cyber Marketing Con 2022

Spend some time with our guest Jason Cenamor on the CISO Society website, or send him an email at Jason@LoremAdvisory.com.

Check out some of the events Jason mentioned on the show: Evanta, HMG Strategy, C-Vision International, CXOSync, Security Current, CISOs Connect, PSI Alliance

Learn more about the CISO Society on their website.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Read more

Recent Episodes

November 29, 2023
by Breaking Through in Cybersecurity Marketing

In this episode, Charles Gold, Chief Marketing Officer at ThreatConnect, joins Maria and Gianna to discuss why CMOs fail or succeed.  To begin, Charles shares his background in running global marketing organizations. He even started a technology comp...

November 22, 2023
by Breaking Through in Cybersecurity Marketing

When you think humor, comedy, LOL, or even LMFAO if you are fancy, cybersecurity isn't typically the first thing that comes to mind. But who says talking about ROI, demand gen, and marketing has to be boring? Humor exists in everything, and with so m...

November 15, 2023
by Breaking Through in Cybersecurity Marketing

Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Amy Stokes Waters, Founder and Chief Executive Off...

November 8, 2023
by Breaking Through in Cybersecurity Marketing

Competitive intelligence programs can be reactionary and one-dimensional due to squeaky-wheel syndrome and we-just-lost-a-deal-to-so-and-so-itis.    Learn from Alex Babar, Vice President of Solutions at Brinqa about 3 categories of competitive intel ...

October 31, 2023
by Breaking Through in Cybersecurity Marketing

On this week’s very special Halloween episode, listen as the hosts embark on a journey beyond the seven seas, a thrilling match filled with spooky stories and of course, lighthearted banter (one can’t help but laugh even in fear)... Sink your fangs i...

October 25, 2023
by Breaking Through in Cybersecurity Marketing

Since #CyberMarketingCon2023 is coming on December 10th through 13th. We can’t help but replay some of our sessions from previous conferences. This week’s episode is from CyberMarketingCon2022. If you enjoy this session, you will enjoy this year’s li...

October 18, 2023
by Breaking Through in Cybersecurity Marketing

In this episode, Joseph Barringhaus, Director of Demand Generation at Sonrai Security, joins Maria and Gianna to discuss all things demand gen. Sonrai Security is a cloud security startup that focuses on identity, access, and permission in the cloud....

October 11, 2023
by Breaking Through in Cybersecurity Marketing

The time for #CyberMarketingCon2023 is fast approaching and we hope to see you in Austin in December. So mark those calendars and get your tickets, the conference will be from December 10th through 13th. It's filled with education, the best speakers,...

October 4, 2023
by Breaking Through in Cybersecurity Marketing

In this episode, Geordie Carswell, CMO at ActualTech Media joins Maria and Gianna to talk about the stuff no marketer wants to talk about right now: lead generation and content syndication! Can lead generation be a successful part of a demand generat...

September 27, 2023
by Breaking Through in Cybersecurity Marketing

In this episode, Jake Milstein, CRO, and CMO at Critical Insight, joins Maria and Gianna to discuss his unique perspective on serving underrepresented cybersecurity markets, the importance of establishing trust and personal connection with clients, a...