Cyber Talks: The Four Ps of Marketing for Cybersecurity: A Cyber Talks Conversation with Tapan Deka

Hey, welcome back to Cyber Talks,

developed by MeribetalCyber.com.

I'm Dr. Jason Edwards,

and today we're stepping out of the strict

security lane and into a topic every cyber

and tech professional actually lives with

every day, marketing.

Our guest is Dipan Dekka,

assistant professor at Madhavi Skills

University,

and he's joining us to walk through the

classic four Ps of marketing and why they

still matter in a digital always-on world.

Tapan brings more than eight years of

teaching and professional experience in

marketing and international business,

plus hands-on work in digital marketing

and personal branding.

In this session,

we'll connect those marketing fundamentals

to things you care about every day,

positioning your work,

communicating value,

and the core business principles to drive

real outcomes.

So Tapan, welcome to the show.

Good to have you.

Yeah.

Good morning, good evening.

Good morning.

Yeah.

Good morning.

Good evening.

Good night.

Yeah.

So so tell us about what you do

and where you work and the university.

Thank you, Dr. Jason,

for this opportunity to for calling me to

this bare metal.

So my name is Tapan Deka.

Actually, I have worked in the teaching.

I have more than eight years of

experience.

And besides this,

before coming to teaching,

I have worked in the

corporate world also around seven years.

So as a total,

I can say about fifteen years.

I worked in Madhavi skills university.

This university is in Sikkim,

one of the northeastern states of India.

And this university's beauty is that we

actually try to develop the skills which

actually mostly the industries need.

And it is a skill university where,

along with the theoretical knowledge,

we are giving more importance to

application-based knowledge based on the

skills of the students.

And Madhavi Skills University,

if I say in India,

is one of the

most forefront or you can say in the

first place in introducing skill education

to whole of the Indian populations.

Besides catering to the students of

northeastern states of India,

we are also trying to cover whole of

the Indian population or the youngsters or

you can say so that they can not

only learn these things only in

theoretical purpose but practical way

also.

And I also want to, through this,

I want to give gratitude to my Chancellor

of the University, Dr. Parviz Dudhani,

and Dr. Kulip Sharma also.

They are actually the pioneer in

establishing this university.

So this is all about me in short

to say.

Thank you so much, Jason.

Yeah, great.

So let's go ahead and get started.

I'll go ahead and put the slides on

the screen and you take it away.

okay can you see him yes uh today

i want to share something knowledge about

the four piece of marketing and how we

can use it inside your security because uh

this four piece of marketing you can see

uh from here only from the slide also

here we'll be discussing about how this

four piece is related about product price

place and promotion

These four Vs are also considered as one

of the important marketing tool because

without this tool,

it will be very difficult to apply the

practical knowledge or you can say

theoretical knowledge in the most skillful

way in order to give

what you can say a real time picture

of how a product is being moved in

the market or how the product actually

help to put it in the mind of

the customers.

So let us move to the first spring.

What is that is can be also known

as product.

But before we go for the product,

So marketing,

many people think that marketing is about

being lucky,

but marketing not about success is not

about luck because like to make a very

good food,

we also know a very good recipe should

be there.

So this for free can be considered or

we can be considered as a balanced recipe.

And through my today's talk with Dr.

Jason,

I'll be trying to break down how from

cybersecurity point of view,

these four P's can be applicable in this

modern way and in making a very actionable

framework for immediate use.

So let us jump to the first P

that can be also known as product.

But before going for this,

always the common mistake that we as a

what you can say the normal people or

the customers or you can say a layman

always we focus on only the product but

one thing before we go more in the

four piece

We should also know the value that is

being created by this product and also how

this value is being captured because lots

of strategy is involved and not just only

innovation.

So this actually helps to move from being

a product person to being a market

strategist.

So now we can go directly for the

force speed that is known as the product.

Now here you can see from my heading

its product which can be also known as

the value generator or we can say that

this product can be also act as a

solution which we have to trust.

If we go for the definition of product

from cybersecurity point of view,

the security of pricing is not just only

about software or service.

The main benefit is always making your

software being safe for the users because

we have to follow the different rules.

We have to keep the business running.

So trust is one of the main thing

when we are launching a product in the

form of software or any product which is

related with, you can say,

the software-based industries.

Now, what will be the key focus?

So the key focus from the client point

of view, we should go to the ZTBD.

That is known as job to be done.

That means not using only the fire rail.

Instead, we should also prevent,

for example,

a five million dollar breach so that we

can ensure the GDPR,

which is very important from European

country point of view.

Because this GDPR compliance is very

important or we can say if we apply

it,

we can sleep soundly so that our product

also not only help in getting the customer

whom we are actually segmenting or

targeting or positioning,

that will also help a very good sleep.

Now, from actionable point of view,

we can translate these features.

How?

For example,

we can use AI power threat detection in

our product so that the business outcome,

for example,

ninety nine nine point nine percent

reduction in false positive saving analyst

time.

And also one can go for a faster

incident response,

which can cut the bridge time from days

to hours.

So next,

let us move to the next piece.

Price.

Now, price,

when we'll be putting a price to any

product or product as a service,

it should be always able to capture the

value the price is giving.

So that means the price should also act

as a protector or you can say the

value of the protection.

Now,

what happens when we deal with these

products which are made for cyber point of

view or cyber security point of view?

So the degree of how one has to

face these risks should be reflected in

the cost.

So this is for the premium for any

business to become resilient also and for

bringing a peace in the mind of the

customers and also bringing a peace in the

mind of the seller also.

Now,

here the key focus is that we should

use a RIC space pricing so that it

can determine the client's total cost of

potential bridge,

which is also known as TCB.

and which may include penalties and we can

say downtime or reputational harm that may

come.

So this also be considered when we are

putting a price on the product.

And it is also important that insurance

premium should be also included in the

cost because someone will be buying some

software.

That insurance, if it is there,

so obviously it will be creating as an

insurance payment rather than only a cost.

Then a strategic insight if I have to

give.

A low price for cybersecurity,

one can frequently indicate the lack of

market trust and quality because it's

natural for any human being.

If someone is using a premium product,

price matters because the same thing the

Lamborghini car will give you will be not

given by a car which is made by,

for example, one Indian brand,

I can say the Maruti.

Yes,

if I consider the brand which is making

the Lamborghini and if Maruti,

then if you want to bring Lamborghini in

your home,

we should be ready to bear that price

because already this Lamborghini have lots

of varieties of what you can say benefit

for the customers.

So here,

that's why I saying here that low price

for cybersecurity frequently will induct a

lack of market trust and quality.

Now in a high-stake industry,

like for example, cyber defense,

premium pricings can be strengthened our

expertise also.

So let us move to the next P.

Place.

Place means,

The product where we can go for,

we can get easy access to the customers

and the distribution is very frictionless.

That means which can show the security

journey.

So the security journey of the client,

where and how they'll be using our

knowledge is that place.

So this include our SOC,

SO means Security Operations Center.

which the teams should immediately make

available for the customers and also the

smooth implementation.

And it should be also user friendly from

client's point of view,

because whatever the portal they'll be

using,

it should be very friendly with the

customer.

Then only this place they can go for

the software service.

Now for modern view point of view,

what we can say,

We can adopt a frictionless security.

That means where security will not be

compromised because it is very crucial

because nowadays we have heard that many

softwares we have to put in your,

what you can say,

in your desktop or in your laptop,

we have found that breaching is there.

And not only that takes our data,

but we also become the,

pray to any hackers will be using it

so that's why we should see that does

uh our uh mdr service have a complicated

uh onboarding process is there or not and

there mean managing this detection and the

response from this security as a service

so it is difficult to understand the

reporting desperate we should ask these

questions when we are going to place our

product

that does our MDR service as a complicated

onboarding process,

because this will be used by someone who

will be our customer,

or whether it will be difficult to

understand the reporting dashboard or not.

And another thing,

adoption itself is threatened by friction

in security adoption.

So that's why the place where we'll be

putting our software

So we should be very much aware about

that.

And we should make sure that our client

communication channels are simple.

Because if, for example, I myself,

if I have to buy software as a

service or any software,

if this communication channel is very much

complicated,

it will become very difficult for me.

Though I may have a limited knowledge of

using these different softwares because my

field will be different.

So for that purpose,

I should make that my client's

communication sensor simple.

And also they are available around the

clock.

So this is very important so that our

system is deployed,

can be deployed quickly.

Case example,

we can manage security service provider,

which is known as MSPS, SACSI.

on place by providing what instantaneous

round-the-clock access for the human

knowledge and also we can remarkably once

go for straightforward one click incident

acceleration procedure so let us move to

the next piece

So promotion means promotion means

promotion does not only mean about

advertising about our software or about

saying about the security that only our

product will give a cyber security point

of view.

Promotion should always try to tell a

story that why the customer should how how

this product will be credible for them.

Or it can be like a war stories.

For example, once there is a king,

there is a queen and they go away.

and forever and they own it for like

that we can make also on a software

we should tell a story through our

promotion so we should try to establish

some unquestional credibility to our

product so whatever we promotion that we

are doing our promotion always to

demonstrate knowledge through some

thoughtful leadership should be there

In the promotional,

we should also share some success stories

in order to transform what fear into

trust.

Because nowadays,

everything is being digitalized.

And once this AI has come to our

click of our mouse,

so these promotional techniques,

whatever stories we are saying,

we should be very much be trustful to

our customers.

so key focus we can go for some

case to case studies or we can do

stories about cyber world or we can

demonstrate how we can avoid a real

business crisis or we can also go for

use some high level non-technical

narratives also that will also help to

promote our software products and another

thing we should pay attention to the

solution part when we are promoting our

product because our products should give

solution to the product and also

we should keep in your mind the client's

problems, such as compliance headaches,

because compliance is one of the things

most of the customers who will be using

software as a service,

most of the customers actually face.

So we should,

while using this promotional technique,

we should also keep on our mind this

client's problem.

And from an actionable step, for example,

we should invite a client for a brief

private webinar about a very specific

trait, such as the top three REST groups.

REST could mean ransomware or service,

as services.

Or we can target some mid-marketed main

focus also.

So instead of selling,

we should start a pertinent conversation

with them.

We should try to establish ourselves as a

true thought leader by providing

actionable and exclusive insight.

Because this promotion is one of the,

you can say,

the trick through which not only if we'll

be sharing our story,

we can also promote our product in the

mind of the customer.

Because through this promotion,

we can position software as a service in

the mind of the customer.

And through that,

we will not only able to reach our

target customer,

but our target customer will be also very

happy that cybersecurity is not being

compromised.

Can you move to the next slide, doctor?

Now,

what will be the equitable marketing mix?

So why these four cyber piece need to

work together?

So particularly in the high-stake field of

cybersecurity,

these four piece must be in balance.

because failure will be a result from an

imbalance.

Example, excellent product is there,

but the promotion is very awful.

Then what will happen?

The product may have very good price also.

The product may have very good promotion

also.

But if we are not promoting it in

the right place,

then it may be a disaster for us.

Therefore,

these four cyber piece need to work

together.

Then through this,

if we're able to include this marketing

mix through our four piece,

we're able to also bring cyber-harmonic

example

The market will assume what?

Low quality.

If we have the best product also,

then you need zero day defense.

But if our price is too low,

then people will think that we are

undermining the trust.

That means we're undermining the security

of that particular customer because

necessarily human psychology is like this.

If we are using some cyber products,

the price should be a little bit higher.

Then only the trust is built in.

Then cyber imbalance example,

if you are not equating this marketing

means.

So adoption and renewal will be killed if

our promotion is great,

producing a lot of leads, but our place,

that means where we'll be onboarding or

when we'll be going for a client portal

is very difficult.

Then this thing,

there will be this balance and this

balance.

So from here we can find out now

our marketing mix should be very

equitable.

So can we move to the next slide?

Now,

there are some two pieces which actually

have been included in the latter part of

this four piece that can be also say

the people in the process foundation that

can be also considered an extended means.

So bridging theory is that these

facilitators can be one of the online

success because this will enable

functions.

For example,

the people means who will be on your

team,

who will be the members in your cyber

quality,

how they'll be maintaining it or the

process that means

how efficiency is there whether the

logistics is efficiency or not they will

be guaranteeing what the regular and

profitable delivery of the fundamental for

me because these people in the process

they will be play a very important role

when we will be dealing with this cyber

for this because uh

People are ultimately who will be involved

directly or indirectly with the product.

People, number one,

is the manufacturer or seller of the

product.

And second will be the customer or the

client with whom we will be doing.

So this is very particularly important

that in cybersecurity,

While we are delivering the trust,

so it will be definitely will be heavily

dependent on the human expertise and also

whatever the execution we are doing,

it should be flawless because one flaw can

destroy the whole data of an individual or

the whole security purpose of the

individual and which may be compromised.

So as an entrepreneur, what we can focus,

we can guarantee the quality of place,

that means the client journey or the

support,

and our products should always try to give

a solution

and that solution should be delivered to

our client and we should also record our

process in so that we can get the

customer feedback because this customer

feedback is very important because that

this customer feedback will going to

create our loyal customers because if we

have to go for upselling that means more

selling of the product then this customer

feedback is very important because that

will and also the return because in using

this people and process efficiently we can

also get a very good return

And we should make sure that our process

requires our client communication samples.

And it should be easy and it should

be easily accessible,

twenty-four into seven.

Can you move to the next slide?

Now, what is the final takeaway?

The final takeaway,

we can take it that we should evaluate

that whether our cyber four piece on a

scale of one to ten when we're making

a cyber product,

we should scale it that whether and we

should be very honest in scaling it

because there is one saying is that the

good seller is that who can not only

satisfy their customers,

but can consider the customer as their

wife.

Because for example,

if we are able to fulfill or if

we make our wife happy,

then our home will be very happy.

So same thing,

if we're able to make our customers happy,

like if we're making our wife happy,

then we can also make our product happily

going in the market.

Therefore,

we should be very honest when scaling this

product in the scale of one to ten

so that we can rate our four piece

by ourselves before launching the product

or after launching the product.

because our type top priority is one with

the lowest score so out of the four

piece every pay may not be uh going

for eight or nine in their uh scaling

so one of the p may be marking

from our own use we can find out

that it may be give a rating of

four or one can give a rating of

five so this may get go we can

go for the rating before launching of the

product and after launching of the product

then cyber focus so in particular we

should check our place for so that uh

This does not create a friction with our

client journey because this friction can

be very dangerous for cybersecurity.

And also our promotion should have more

credibility, should be there.

So because we should talk as a leader,

because if we're only thinking from only

entrepreneur point of view,

then we should also have the quality of

leadership insight.

Then a product,

this product should always give the

solution and that solution should be

trusted so that customer can trust our

solution.

And also score of less than seven will

indicate an urgent security emergency

because after all it will be an online

product,

not offline product because customer

cannot go directly for the sellers

directly.

So always there should be this trust

should be there.

So if the product has it's indicating

seven or less than seven,

then we should be sure that red button

have been switched on.

Then how we can modify this thing?

We should try risk the pricing also try

varying our prices to see how it affects

the demand right away.

And if we go for a cyber focus,

we should try to modify our pricing model

to be risk based rather than simply

cutting the price.

We should, we have,

because as an entrepreneur or as a

supplier of this product,

we should be always trying to take the

tricks and we should examine whether

sourcing a higher price

should be it should be supported by

convincing tool for example the total cost

of bridge we should always keep this in

our mind we should analyze it and also

we should validate our knowledge and raise

the porsche value of the product so thank

you so much session that actually i want

to add about the four piece and if

you have any questions uh you can ask

me

Yeah.

So I guess one of the things I

was thinking about right as we're going

through this is that everything changes so

fast, especially in cybersecurity.

I mean,

the cybersecurity that I've dealt with

today that we deal with today is not

the cybersecurity that I started off with.

And it's definitely not cybersecurity from

five years ago.

So out of the four P's, right,

which do you believe we should focus on?

Like,

which is the strategic focus right now?

Yes.

So out of the four P's,

the most important P is the product.

Because see,

whenever we will be dealing with the

product, if the product is very good,

because ultimately before going for

launching the product,

we will be doing lots of market research

because this market research will give us

the ultimate outcome.

So this product is one of,

according to me,

most important four P because this product

will be the game changer.

Because this product will going to give

out what price we have to set.

This product will be say where we'll be

promoting our product and in which place

we have to put the product.

All right, perfect.

So I guess another question I had,

and again, I'm sorry,

I have a bunch of questions here,

but one of them is that

Can you provide examples of companies that

did this, right?

And I'm thinking like during major

disruptions,

like we've had a lot of major disruptions

in the industry, right?

Not only from like CrowdStrike to COVID,

right?

You know, that we've had over it,

especially the whole, you know,

shift to remote work for a while there

and now shifting back to RTO.

So can you give me an example of

a company that evolved, you know,

using these?

This four piece, one great example,

if I have to say, Dr. Zeeshan,

is that the company called ChatGPT, yes,

that ChatGPT have been developed from this

using this four piece because they have

done extensive resource.

because uh when chem altman actually

before launching that product he was

working uh as i think one of the

product developer if i'm not wrong in u.s

so before then he have gone through his

uh some degree resource also through this

resource actually through his promotion of

the products

he actually comes out not only now one

of the greatest example of chat gpt is

that they are giving the products free

presently the first person yes which is

the free version which is available that

means they are promoting their product so

he have exactly used the place also he

know where he have to promote the product

place is the different uh what you can

say the different domains where will be

this product for example just by clicking

chat gpt in the google we can find

the product from there the place and

promotion is you can say

people are getting the promotion because

many people will be able to use this

product freely so this promotion product

have been also freely promoted and

especially in third world country like

india we as a developing country so this

chat gpd is becoming very famous because

using the exact use of this four piece

Perfect.

And then one of the things I was

kind of Googling it while we were talking,

right,

is that the four Ps are pretty common

that you've seen out there, right?

Everybody talks about the four Ps.

I mean, I know them now, right?

Even, you know, before then,

I think they're pretty common.

But I saw a lot of things where

they talk about like moving them to like

five or six Ps, because why not?

I guess you got to add more Ps

to make it more popular.

But like I hear people talk about people

in process.

Like, what do you think about that?

uh means you want to know uh what

about my view about people and process

well that and how do people integrate that

right how would you add that to your

four p's i guess six p's or whatever

i guess you could go yes yes people

means uh people uh for example uh the

cyber security if you say software let me

take one product uh any software for

example uh what can your name as presently

Let us take Cisco as a software.

Yes.

Cisco is a software.

So if this Cisco is a software,

number one thing that people will be

involved with developer of the Cisco

service.

Yes.

So number one people,

they are the most wanted the engineers,

the software engineers were involved

there.

Secondly,

the developers will be involved there.

And thirdly,

someone have to make this product

available to the people.

That means the people who will be

promoting,

that means the different sales will be

there.

the different marketing people will be

there,

the different strategies will be there.

So nowadays these people are very much

important,

though we are saying that we can make

many product, we can automate the product,

but for the automation purpose also we

need people.

Yes, if I'm not wrong.

Because someone have to automate that

product.

So people is one of the most important

thing among the six piece also.

Because ultimately,

if we made the products,

we have to sell the product in order

to earn that ROI.

Because without earning that ROI,

it will be very difficult.

So the client will be using that software.

For example,

I have said you have the Cisco as

a service.

These clients are also very important.

So from our point of view,

the people that you have said,

the fifth P or the sixth P,

these people are very important.

Perfect.

Okay, so I guess let's put up your,

we skipped the QA slide,

so we already jumped into it.

So anything else you want to give us

before we're done today?

And first of all,

it was a great talk and thanks for

coming on.

But I'll hand it over to you if

you want to give any last thoughts before

we head off.

Yes.

Before I end the talk,

if anyone has any questions,

they can also reach out to me.

This is my number for calling.

They can use that number.

Or if someone wants to WhatsApp also,

because if they want to collaborate also,

with our university or also if they want

to collaborate with me i'm often for that

so that is my email id also that

is my calling number that is my whatsapp

number so in the end what i want

to say dr jason is that if we

will be perfectly using this four piece uh

a small product a very small product in

the market we can make them a hero

for example uh i want to give uh

the example of uh i think you have

heard about zoho zoho as a software

It's one of the Indian software product.

So it started very small in the Indian

market.

It started from a village area.

Now Zoho have been used extensively by not

only the small, small industries,

but the government is also using it

because the founder of the Zoho,

what he did,

he actually promote this product at a very

tier two and tier three cities because

most of the population,

I can say from Indian point of view,

most of the population you can find in

tier two and tier three cities also.

Because many people from rural area,

they migrate to this tier two and tier

three in the source of livelihood.

So they at least capture this tier two

and tier three for using this two piece

very perfectly,

the product and the people.

Because already your question is there,

you have asked me,

product p actually i'll give more

importance so if i say product so p

so zoe is a product and people because

here he is not able to connect the

clients he is also directly handling with

uh with the different engineers who are

working there because indian rural market

is very big market so

From here,

I want to say that if we use

this four piece perfectly,

not only tangible, but intangible product,

for example,

this different software or cyber security,

we can use it very perfectly.

Awesome.

Well, no, I mean,

it's neat to see how it works behind

the scene.

We've all been marketed to.

Right.

But it's kind of interesting,

especially if you're pushing out a product

like, for example, this podcast, you know,

it'll help me market it right as I

go through it.

So.

All right.

Well, thanks, Tupan.

I appreciate it.

Thanks for coming today.

Thank you, Dr. Jason,

so much for giving this opportunity to

come to your podcast.

And I always, so through your session,

I want to ask that people please come

and see Jason's podcast because his

podcasts are not only qualitative,

but his podcasts are also from where we

can learn lots of things.

And he has a very good channel in

YouTube also.

Please people subscribe his channel also

because you can learn lots of things from

him.

And personally,

I used to go through his different

newsletters also from him and learning new

things.

Awesome.

Thank you.

And I appreciate it.

All right.

Thanks, Tapan.

Thank you.

Thank you.

Thank you so much.

Hey,

so that wraps up this CyberTalk session on

the four Ps of marketing with Tipan Deka.

And it was kind of cool, right?

Because we get marketed to all the time,

but we also kind of get blinders as

cybersecurity people, right?

Where we understand our processes and

everything else becomes kind of vague or

opaque, right?

So it's kind of neat to see how

that works, especially in your career,

right?

Marketing your career,

marketing your products as you grow in

cybersecurity.

So thanks again a lot to Tipan Deka

for coming on today from the Madhavi

Skills University.

if you want to share your expertise,

right?

If you want to be on this podcast

with me, which God help you.

I don't know why you would.

I'm just kidding.

Hopefully you do.

But if you want to be on this

podcast,

reach out to me through LinkedIn and we

can set up a time.

Or you can go to baremetalcyber.com.

where you can find a ton of stuff

on there.

Not only ways to contact me,

but audio courses,

the daily cyber newsletter that we have

going out.

And of course,

the bare metal cyber magazine that comes

out five issues a week now.

So thanks to all of you for listening

and watching today as you can see this.

And I hope you all have a great

week.

And thank you.

Cyber Talks: The Four Ps of Marketing for Cybersecurity: A Cyber Talks Conversation with Tapan Deka
Broadcast by