Infosecurity Group Websites
Magazine
Events
Infosecurity Europe
Infosecurity Leadership Summit
Infosecurity Magazine Events
Infosecurity North America
Infosecurity Netherlands
Infosecurity Belgium
Infosecurity Russia
Infosecurity Mexico
Infosecurity Middle East
Insight
Infosecurity Webinars
Infosecurity Whitepapers
Infosecurity Online Summits
Latest
#HowTo: Improve Your Company’s Cybersecurity Training
UK Ransomware Incident Volumes Surge 17% in 2022
"Hinata" Botnet Could Launch Massive DDoS Attacks
Scam Robocalls Forecast to Cost $58bn This Year
Telegram, WhatsApp Trojanized to Target Cryptocurrency Wallets
News
Topics
Features
Webinars
White Papers
Podcasts
Events & Conferences
Directory
Search
Infosecurity Magazine Home
»
Webinars
»
Life of: A Chief Marketing Officer
12 Dec 2017
Webinar
Life of: A Chief Marketing Officer
Speakers
Maria Battaglia
CMO
,
Resilient an IBM Company
Michael Hill
Former Editor
,
Infosecurity Magazine
Email Michael
Follow @MichaelInfosec
Jennifer Leggio
Chief Marketing Officer, Flashpoint
Follow @mediaphyter
Carole Theriault
Director of Tick Tock Social and co-host of Smashing Security podcast
Email Carole
Follow @caroletheriault
Connect on LinkedIn
Brought to You by
Infosecurity Magazine
Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s
privacy policy
for additional information.
Why Not Watch?
16 Dec 2021
The Big Fat (Infosec) Quiz of the Year
31 Mar 2022
Modernizing AppSec and Developer Security Programs
3 Nov 2016
Preparing for Incident Response: Best Practise and Common Failings
29 Apr 2021
Endpoint Strategies: Balancing Productivity and Security
Related to This Story
I'm @InfosecEditor...Get Me Out of Here!
Top Ten Tips for Enhancing Your Career
Infosecurity Magazine’s Infosec Christmas Advent Calendar
Cisco: How Real is a Passwordless Future?
Editorial: Brighter Days (Q3 2020 Issue)
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
1
17 Mar 2023
News
Google Exposes 18 Zero-Day Flaws in Samsung Exynos Chips
2
16 Mar 2023
News
US Government IIS Server Breached via Telerik Software Flaw
3
17 Mar 2023
News
Russian Military Preparing New Destructive Attacks: Microsoft
4
11 Apr 2022
News
Raspberry Pi Ditches Default Logins to Boost Security
5
17 Mar 2023
News
Telegram, WhatsApp Trojanized to Target Cryptocurrency Wallets
6
16 Mar 2023
News
Chinese SilkLoader Malware Sold to Russian Cyber-Criminals
1
2 Nov 2021
News
Most Computer Code Compilers Vulnerable to Novel Attacks
2
14 Mar 2023
News
MI5 Launches New Agency to Tackle State-Backed Attacks
3
14 Mar 2023
News
UK Crypto Firm Loses $200m in Cyber-Attack
4
15 Mar 2023
News
Phishing Campaigns Use SVB Collapse to Harvest Crypto
5
16 Mar 2023
News
Chinese SilkLoader Malware Sold to Russian Cyber-Criminals
6
14 Mar 2023
News
CISA Creates New Ransomware Vulnerability Warning Program
1
9 Mar 2023
Webinar
Authentication Security: Crafting a Bulletproof Password Reset Process
2
23 Feb 2023
Webinar
How to Ensure your NDR Tool isn't a Firehose That Gets Away From You
3
13 Dec 2022
Webinar
Discover Unknown Vulnerabilities with Crowdsourced Security
4
10 Nov 2022
Webinar
Leveraging Endpoint Security to Navigate the Modern Threat Landscape
5
27 Oct 2022
Webinar
Updating Your Active Directory Security to the Modern Threat Environment
6
12 Jul 2022
Webinar
Reducing the Risk to Critical Infrastructure Before It’s Too Late
1
15 Mar 2023
News
Phishing Campaigns Use SVB Collapse to Harvest Crypto
2
9 Mar 2023
News
TikTok Initiates Project Clover Amid European Data Security Concerns
3
6 Mar 2023
News Feature
Threat Intelligence: Do We Need A 'Rosetta Stone' of Cyber Attribution?
4
6 Mar 2023
Interview
#IWD2023: Jenny Radcliffe Warns Against “Performative Diversity” in the Battle for Gender Equality
5
13 Mar 2023
News Feature
Cyber-Attacks in the Media Industry Making Headlines
6
30 Mar 2023, 13:00 BST
Webinar
Combating InfoSec Compliance Fatigue: Pain Points and Best Practices
Please wait…