SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
 This is a version of the actual presentation I prepared for a job application
at Duo Security. Unfortunately, they can’t hire Cuban based professionals.
But, perhaps you are not in my particular situation
 IMPORTANT (again): this is just my personal opinion: I don’t work for Duo
Security, and these ideas doesn’t represent any statement of the
company
 Said that: Feel free to use them whatever you like to prepare your own job
application, so
 This series of videos should be focused in how Duo’s clients use Duo
Products to improve its security with 2FA. I would make a video for one
client by industry:
 FinTech, Healthcare, Media & Entertainment, Energy and Oil, Food &
Beverage, Tech, Education, Federal and Retail
 These videos could create a strong foundation for Duo Security, making a
horizontal impact in several industries at the same time
 The videos could have an interview format, something similar to AWS’s
Customer Success videos with Jeff Barr (Chief Evangelist at AWS)
Examples
 Yelp Cuts Test-Run Times by 90% Using AWS
 Fiksu Scales to Billions of Requests for Mobile Advertising Customers
 PaymentSpring Launches New Payment Service on AWS
 Precision Exams Saves 30% by Moving Database to Amazon DynamoDB
 Reading a great post from Tomasz Tunguz, Partner at RedPoint Ventures
and united to DataStax’s Startup Program, we could create a new pricing
tag for this kind of companies, with revenue less than 2M annually.
 Not all startups are ready for this, so the decision should be based in strong
facts and insights, seeing the potential of the product, and make it secure
from the same beginning. Here, we could act like VCs, valuating a
company. Here, we could use the expertise of Ken Norton, Product Partner
from Google Ventures.
 The discount rate should be discussed.
 The core of this idea came from the recent data breaches from Sony,
Target, Home Depot and OPM.
 Like each of these companies are in different industries, Marketing
campaigns should be focused on them, because although all them could
make a lot of benefits using Two-Factor Authentication, its problems are
not the same, so, we should target this.
 We could work with Brian, PMM to think about compelling webinars
focused in this idea: one focused on Retail, other focused on Mobile
ecommerce, etc.
 Insights extracted from:
Insights extracted from
 The APAC region is eager for good security solutions
 Many executives in APAC are not well prepared for this increase of
cyberattacks (State of Cybersecurity 2015: Implications for 2015, RSA and
ISACA Survey)
 APAC is one of the most sophisticated cyberattacks areas of the world.
Two examples? APT30, the Cyber Threat Group discovered by FireEye in
April of this year (“APT30 and the Mechanics of a Long-Running Cyber
Espionage Operation”, FireEye), and APT17, the Chinese advanced
persistent threat group behind the Obfuscation tactic attack on Microsoft
TechNet (FireEye).
 Based on these facts and stats, Dou Security should participate in the
upcoming RSA Conference APJ in Singapore to expose how we could help
to organization in the region to be prepared for the future.
 The core of this idea is to have a professional from every major region of
the world with a good expertise in the Security field (Ms or PhD) but natural
storytellers
 It must be a combined team of male and female, because this diversity
could bring a lot of new and fresh ideas to create a compelling Go-To-
Market strategy focused by region, particularly from BRICs countries
 Where to find the candidates? The PhD dissertation by Jon is a very good
place to begin the search, taking advantage of the contacts network
from Jon
Good candidates from Jon’s network
 Jose Nazario
 Manish Karir
 Yunjing Xu
 Timur Alperovich
 Kaushik Veeraraghavan
Good candidates
 Add someone of SecureList’s blog from
Karspersky (particularly Russian)
 Add someone from Brazil (from Red Hat
perhaps? )
 Add someone from South Korea
(Samsung KNOX’s team is a very good
place to start)
Where to find good female candidates focused in CyberSecurity?
 Women in CyberSecurity Meetup
 LinkedIn is a very good resource
 Don’t underestimate the power of your Network
 Add European females too: in general any good Security Research
candidate from Israeli Security companies could be a start
 I’m a Data-Driven guy, so I love to create posts with great data
visualizations, stats and more cool things, so why not we create posts
focused in industries and verticals like Mobile ecommerce, Internet of
Things, Bitcoin and the Blockchain?
 The main topics here could be how cyberattacks are increasing in these
particular raising industries, and how Two-Factor Authentication services
from Duo, could help to protect the assets of the orgs on them
 I would begin with Mobile ecommerce in Asia, talking about Zomato, Ola
and more Indian ecommerce companies which have been victims of
sophisticated attacks, and the state of cybersecurity in the region.
 Based in some data and facts published by CBInsights: Asian ecommerce
is the Hottest Industry of the world, so always it is and will be a marked
objective for hackers. So, based in this list, we could create targeted Visual
Marketing campaigns (LinkedIn’s Sponsored Updates and Slideshare’s Ads
could be very good platforms for this) focusing in two major markets: India
& China.
 Potential clients in India: Flipkart (Mobile-First), Snapdeal, Olacabs, Zomato
 Potential clients in China: Coupang, Jumei, Meituan, Mogujie
 Then, I would focus in Bitcoin, because if the vision of the company is
precisely people-centric security; Bitcoin could be in a few years an
established digital currency, but people is skeptical to use it for the recent
attack affecting Bitstamp, and the bad case of Silk Road, so they need
security.
 So, if we could make intelligent bets in this market, protecting Blockchain
with 2FA, we could be working thinking in the long-term Bitcoin’s strategy
 We could make the technology to protect this, or we could make acqui-
hires from teams focused on this. Two companies to watch in this space:
21.co and Gem.com (Read my post about this)
For reading:
- Bitcoin platform Circle gets $50M — and global credibility — from Goldman
Sachs and China’s IDG Capital, PandoDaily
- Why the Blockchain matters, Reid Hoffman, Wired UK
- Coinbase makes a play for global Bitcoin market with new app release, free bit
distribution, PandoDaily
- On the 5 stages of Bitcoin, from dismissal to acceptance, Andreessen Horowitz
- Coinbase makes a play for global Bitcoin market with new app release, free bit
distribution, PandoDaily
- Marc Andreessen’s Tweetstorm about state of Bitcoin in 2015
 Big Data is another hot market with estimates from $7.6 to $84.69 Billion
(2011-2026), and there are many companies using and Enterprise-graded
products based in platforms like Apache Hadoop, Apache Cassandra,
Apache Spark and more.
 So, the whitepaper would be focused in how to protect these “Data
Factories” using Two-Factor Authentication for its production servers (with
Duo’s Unix) or for its Cloud-based Analytics platforms (with Duo’s Platform
and APIs)
 This could be the start of a calculated Go-To-Market strategy to enter in
this massive market, selecting key partnerships with leader companies
 Flash-based Array: Pure Storage (they released a new product called
Pure1, which is a Cloud-based Flash-Array Storage solution, so it could be a
very good candidate for Duo’s Platform)
 Enterprise Hadoop: MapR (Google Ventures invested on them too),
Hortonworks (now a public company) and Cloudera (the first one that
offered this kind of services with CDH) – Duo’s Unix
 Apache Cassandra: DataStax, (Duo’s Unix)
 Apache Spark: Databricks, the best commercial offering for Spark-As-A-
Service through Databricks Cloud (Duo’s APIs)
Contacts from my network in these companies
 Pure Storage: VP of Enterprise Sales
 MapR: Director of Product Management
 Hortonworks: Chief Architect
 DataStax: Chief Evangelist/VP of Customer Success
7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security

Weitere ähnliche Inhalte

Was ist angesagt?

Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
Cheapest SSLs
 
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
CODE BLUE
 
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for MobileMapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
MITRE - ATT&CKcon
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
Sean Dickson
 
OWASP Thailand-Beyond the Penetration Testing
OWASP Thailand-Beyond the Penetration TestingOWASP Thailand-Beyond the Penetration Testing
OWASP Thailand-Beyond the Penetration Testing
Prathan Phongthiproek
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
Nicholas Chia
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedman
Aaron Friedman
 

Was ist angesagt? (20)

Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure!
 
Customer experience pioneer directly protects customer data and reputation wi...
Customer experience pioneer directly protects customer data and reputation wi...Customer experience pioneer directly protects customer data and reputation wi...
Customer experience pioneer directly protects customer data and reputation wi...
 
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
[CB20] Explainable malicious domain diagnosis by Tsuyoshi Taniguchi
 
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for MobileMapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...
[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...
[CB20] LogonTracer v1.5 + Elasticsearch = Real-time AD Log Analysis System by...
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
OWASP Thailand-Beyond the Penetration Testing
OWASP Thailand-Beyond the Penetration TestingOWASP Thailand-Beyond the Penetration Testing
OWASP Thailand-Beyond the Penetration Testing
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity
 
Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedman
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 

Ähnlich wie 7 Ideas to Revamp Product Marketing at Duo Security

Ähnlich wie 7 Ideas to Revamp Product Marketing at Duo Security (20)

DEW w.e.f 17 11 2021.pdf
DEW w.e.f 17 11 2021.pdfDEW w.e.f 17 11 2021.pdf
DEW w.e.f 17 11 2021.pdf
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?
 
Analysis mvp factory
Analysis mvp factoryAnalysis mvp factory
Analysis mvp factory
 
After Cutting its Big Data Teeth on Wall Street, Vichara Technologies Grows t...
After Cutting its Big Data Teeth on Wall Street, Vichara Technologies Grows t...After Cutting its Big Data Teeth on Wall Street, Vichara Technologies Grows t...
After Cutting its Big Data Teeth on Wall Street, Vichara Technologies Grows t...
 
The RISE of 2015 - Changes in the Digital Landscape
The RISE of 2015 - Changes in the Digital LandscapeThe RISE of 2015 - Changes in the Digital Landscape
The RISE of 2015 - Changes in the Digital Landscape
 
The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019
 
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...
 
The Geospatial Future of Insurance
The Geospatial Future of InsuranceThe Geospatial Future of Insurance
The Geospatial Future of Insurance
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
 
Digital Trends 2017 Final
Digital Trends 2017 FinalDigital Trends 2017 Final
Digital Trends 2017 Final
 
The 10 most innovative google solution providers dec jan 2017
The 10 most innovative google solution providers dec jan 2017The 10 most innovative google solution providers dec jan 2017
The 10 most innovative google solution providers dec jan 2017
 
Article_6
Article_6Article_6
Article_6
 
The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing Companies
 
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
Riding the Seven Waves of Change That Will Power, or Crush, Your Digital Busi...
 
Team Sepulchre_Bizcase_round1.pdf
Team Sepulchre_Bizcase_round1.pdfTeam Sepulchre_Bizcase_round1.pdf
Team Sepulchre_Bizcase_round1.pdf
 
How To Start A Reflective Essay 8 Tips For Writing A
How To Start A Reflective Essay 8 Tips For Writing AHow To Start A Reflective Essay 8 Tips For Writing A
How To Start A Reflective Essay 8 Tips For Writing A
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
CMO's guide to AI (Artificial Intelligence)
CMO's guide to AI (Artificial Intelligence)CMO's guide to AI (Artificial Intelligence)
CMO's guide to AI (Artificial Intelligence)
 
7 Tech Trends That Will Dominate Marketing Strategies in 2021
7 Tech Trends That Will Dominate Marketing Strategies in 20217 Tech Trends That Will Dominate Marketing Strategies in 2021
7 Tech Trends That Will Dominate Marketing Strategies in 2021
 
Thinking about VC themes
Thinking about VC themesThinking about VC themes
Thinking about VC themes
 

Mehr von Marcos Ortiz Valmaseda

Estado del Desarrollo de PostgreSQL-9.0
Estado del Desarrollo de PostgreSQL-9.0Estado del Desarrollo de PostgreSQL-9.0
Estado del Desarrollo de PostgreSQL-9.0
Marcos Ortiz Valmaseda
 

Mehr von Marcos Ortiz Valmaseda (9)

SEC: Actualización de la definición de "Inversor Acreditado" en el 2019
SEC: Actualización de la definición de "Inversor Acreditado" en el 2019SEC: Actualización de la definición de "Inversor Acreditado" en el 2019
SEC: Actualización de la definición de "Inversor Acreditado" en el 2019
 
A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...
A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...
A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...
 
200 Global Facts about the State of Small Businesses in 2015
200 Global Facts about the State of Small Businesses in 2015200 Global Facts about the State of Small Businesses in 2015
200 Global Facts about the State of Small Businesses in 2015
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
 
The future of marketing
The future of marketingThe future of marketing
The future of marketing
 
Introducción a Apache HBase
Introducción a Apache HBaseIntroducción a Apache HBase
Introducción a Apache HBase
 
Research group in databases technologies
Research group in databases technologiesResearch group in databases technologies
Research group in databases technologies
 
Postgre Sql Para Las Empresas Cubanas
Postgre Sql Para Las Empresas CubanasPostgre Sql Para Las Empresas Cubanas
Postgre Sql Para Las Empresas Cubanas
 
Estado del Desarrollo de PostgreSQL-9.0
Estado del Desarrollo de PostgreSQL-9.0Estado del Desarrollo de PostgreSQL-9.0
Estado del Desarrollo de PostgreSQL-9.0
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

7 Ideas to Revamp Product Marketing at Duo Security

  • 1.
  • 2.  This is a version of the actual presentation I prepared for a job application at Duo Security. Unfortunately, they can’t hire Cuban based professionals. But, perhaps you are not in my particular situation  IMPORTANT (again): this is just my personal opinion: I don’t work for Duo Security, and these ideas doesn’t represent any statement of the company  Said that: Feel free to use them whatever you like to prepare your own job application, so
  • 3.  This series of videos should be focused in how Duo’s clients use Duo Products to improve its security with 2FA. I would make a video for one client by industry:  FinTech, Healthcare, Media & Entertainment, Energy and Oil, Food & Beverage, Tech, Education, Federal and Retail  These videos could create a strong foundation for Duo Security, making a horizontal impact in several industries at the same time  The videos could have an interview format, something similar to AWS’s Customer Success videos with Jeff Barr (Chief Evangelist at AWS)
  • 4. Examples  Yelp Cuts Test-Run Times by 90% Using AWS  Fiksu Scales to Billions of Requests for Mobile Advertising Customers  PaymentSpring Launches New Payment Service on AWS  Precision Exams Saves 30% by Moving Database to Amazon DynamoDB
  • 5.  Reading a great post from Tomasz Tunguz, Partner at RedPoint Ventures and united to DataStax’s Startup Program, we could create a new pricing tag for this kind of companies, with revenue less than 2M annually.  Not all startups are ready for this, so the decision should be based in strong facts and insights, seeing the potential of the product, and make it secure from the same beginning. Here, we could act like VCs, valuating a company. Here, we could use the expertise of Ken Norton, Product Partner from Google Ventures.  The discount rate should be discussed.
  • 6.  The core of this idea came from the recent data breaches from Sony, Target, Home Depot and OPM.  Like each of these companies are in different industries, Marketing campaigns should be focused on them, because although all them could make a lot of benefits using Two-Factor Authentication, its problems are not the same, so, we should target this.  We could work with Brian, PMM to think about compelling webinars focused in this idea: one focused on Retail, other focused on Mobile ecommerce, etc.  Insights extracted from:
  • 8.  The APAC region is eager for good security solutions  Many executives in APAC are not well prepared for this increase of cyberattacks (State of Cybersecurity 2015: Implications for 2015, RSA and ISACA Survey)  APAC is one of the most sophisticated cyberattacks areas of the world. Two examples? APT30, the Cyber Threat Group discovered by FireEye in April of this year (“APT30 and the Mechanics of a Long-Running Cyber Espionage Operation”, FireEye), and APT17, the Chinese advanced persistent threat group behind the Obfuscation tactic attack on Microsoft TechNet (FireEye).
  • 9.  Based on these facts and stats, Dou Security should participate in the upcoming RSA Conference APJ in Singapore to expose how we could help to organization in the region to be prepared for the future.
  • 10.  The core of this idea is to have a professional from every major region of the world with a good expertise in the Security field (Ms or PhD) but natural storytellers  It must be a combined team of male and female, because this diversity could bring a lot of new and fresh ideas to create a compelling Go-To- Market strategy focused by region, particularly from BRICs countries  Where to find the candidates? The PhD dissertation by Jon is a very good place to begin the search, taking advantage of the contacts network from Jon
  • 11. Good candidates from Jon’s network  Jose Nazario  Manish Karir  Yunjing Xu  Timur Alperovich  Kaushik Veeraraghavan Good candidates  Add someone of SecureList’s blog from Karspersky (particularly Russian)  Add someone from Brazil (from Red Hat perhaps? )  Add someone from South Korea (Samsung KNOX’s team is a very good place to start)
  • 12. Where to find good female candidates focused in CyberSecurity?  Women in CyberSecurity Meetup  LinkedIn is a very good resource  Don’t underestimate the power of your Network  Add European females too: in general any good Security Research candidate from Israeli Security companies could be a start
  • 13.  I’m a Data-Driven guy, so I love to create posts with great data visualizations, stats and more cool things, so why not we create posts focused in industries and verticals like Mobile ecommerce, Internet of Things, Bitcoin and the Blockchain?  The main topics here could be how cyberattacks are increasing in these particular raising industries, and how Two-Factor Authentication services from Duo, could help to protect the assets of the orgs on them  I would begin with Mobile ecommerce in Asia, talking about Zomato, Ola and more Indian ecommerce companies which have been victims of sophisticated attacks, and the state of cybersecurity in the region.
  • 14.  Based in some data and facts published by CBInsights: Asian ecommerce is the Hottest Industry of the world, so always it is and will be a marked objective for hackers. So, based in this list, we could create targeted Visual Marketing campaigns (LinkedIn’s Sponsored Updates and Slideshare’s Ads could be very good platforms for this) focusing in two major markets: India & China.  Potential clients in India: Flipkart (Mobile-First), Snapdeal, Olacabs, Zomato  Potential clients in China: Coupang, Jumei, Meituan, Mogujie
  • 15.  Then, I would focus in Bitcoin, because if the vision of the company is precisely people-centric security; Bitcoin could be in a few years an established digital currency, but people is skeptical to use it for the recent attack affecting Bitstamp, and the bad case of Silk Road, so they need security.  So, if we could make intelligent bets in this market, protecting Blockchain with 2FA, we could be working thinking in the long-term Bitcoin’s strategy  We could make the technology to protect this, or we could make acqui- hires from teams focused on this. Two companies to watch in this space: 21.co and Gem.com (Read my post about this)
  • 16. For reading: - Bitcoin platform Circle gets $50M — and global credibility — from Goldman Sachs and China’s IDG Capital, PandoDaily - Why the Blockchain matters, Reid Hoffman, Wired UK - Coinbase makes a play for global Bitcoin market with new app release, free bit distribution, PandoDaily - On the 5 stages of Bitcoin, from dismissal to acceptance, Andreessen Horowitz - Coinbase makes a play for global Bitcoin market with new app release, free bit distribution, PandoDaily - Marc Andreessen’s Tweetstorm about state of Bitcoin in 2015
  • 17.  Big Data is another hot market with estimates from $7.6 to $84.69 Billion (2011-2026), and there are many companies using and Enterprise-graded products based in platforms like Apache Hadoop, Apache Cassandra, Apache Spark and more.  So, the whitepaper would be focused in how to protect these “Data Factories” using Two-Factor Authentication for its production servers (with Duo’s Unix) or for its Cloud-based Analytics platforms (with Duo’s Platform and APIs)  This could be the start of a calculated Go-To-Market strategy to enter in this massive market, selecting key partnerships with leader companies
  • 18.  Flash-based Array: Pure Storage (they released a new product called Pure1, which is a Cloud-based Flash-Array Storage solution, so it could be a very good candidate for Duo’s Platform)  Enterprise Hadoop: MapR (Google Ventures invested on them too), Hortonworks (now a public company) and Cloudera (the first one that offered this kind of services with CDH) – Duo’s Unix  Apache Cassandra: DataStax, (Duo’s Unix)  Apache Spark: Databricks, the best commercial offering for Spark-As-A- Service through Databricks Cloud (Duo’s APIs)
  • 19. Contacts from my network in these companies  Pure Storage: VP of Enterprise Sales  MapR: Director of Product Management  Hortonworks: Chief Architect  DataStax: Chief Evangelist/VP of Customer Success