Tiffeny Price | Remote Product Marketing Manager  Email tiffenyprice@gmail.com   Phone: 1.408.351.1751 

2025 Professional Product Marketing Portfolio Linkedin: https://www.linkedin.com/in/tiffenyprice/ 

Expertise:

Welcome!

Thanks for visiting my portfolio!

Today, it takes more effort than ever to earn a double-click and get head turning results.

Review my writing examples for companies focused on selling cybersecurity, enterprise social networks, global collaboration, GDPR/Privacy, and many other B2B SaaS solutions.

I am a problem solver, technical marketing writer, customer insight expert, sales enabler, GTM expert and most of all, I am a collaborator.

Take a look around and see if my work sparks some inspiration, a quick laugh, or best of all the motivation to get in touch.


Tiffeny Price - Quick Tech Bio

My recent experience includes a deep dive into GTM and sales enablement for cyber threat intelligence and threat-hunting tools, including attack surface management, ASM,  identity/secrets management, CASB, privileged access, zero trust, vulnerability management, application fraud and abuse, and quantifying cyber risk in financial terms.

I also have a solid background in email security / DMARC, managed detection and response (MDR), GRC, GDPR/CCPA compliance, network and application performance management (NPM/APM), and enterprise SaaS solutions. 

I am recognized for creating content for product/feature launches, website updates and landing pages, thought leadership communications, competitive positioning, sales enablement, and customer/account-based marketing initiatives. I write data sheets, industry solution briefs, whitepapers, blog posts, video storyboards, case studies, use cases, ideal customer profiles and sales enablement materials for BDR/SDR teams.


Case Studies and Use Cases

Unless you have been living under a rock, you know customer stories that detail industry challenges and how your solution solves the problem is your number one demand generation asset.

But even then, you still need to stand out from the rest, and that takes thought leadership,  empathy, understanding your customer, and their industry. Its how PMMs find the inspiration to tell a compelling story and use cases..

Enterprise Email and Cloud Security

Proofpoint is the powerhouse for enterprise email security threat intelligence. Proofpoint helps solve some of the most pressing human security problems organizations face today.

Phishing, BEC, targeted attacks, cloud security, and social media continue to bring more threats into enterprises than any other vector.

So, it’s no surprise that email continues to lead as the most exploited vector for APT groups and other bad actors.

Check out a selection of case studies I wrote to demonstrate how and why companies continually invest in email security with Proofpoint.

University of Tampa—Virtually eliminates email threats -Proofpoint delivers visibility, peace of mind, and support for ISO compliance.

Real estate company puts a stop to email fraud - Proofpoint keeps fraudulent emails out of clients’ inboxes

College of Medicine implements preventive medicine against advanced email threats - team gains proactive incident response with Proofpoint.

Prominent Multinational Bank Protects Brand and Customers from Social Media Fraudsters

Health system vaccinates against email-based threats - Prevents advanced attacks while simplifying security operations.

Focusing on the next level: proactive, correlated defense – Pinnacle Bank takes the offense against threats with a strategic approach.

Sisters of Charity health system puts faith in Proofpoint and deploys preventive medicine against malicious emails and attachments.

Westinghouse supercharges email security gains better, more accurate protection with Proofpoint

Operationalizing Threat Intelligence

It is not easy to operationalize threat intelligence, t add value to active cases, and speed up response within security and development teams.  How do you connect what adversaries are doing right now to how you defend your applications? In the case of DevSecOps and application security best practices you must  build defenses into your apps that addresses new TTPs and novel ways of commiting fraud.

The sad truth is that it is difficult, if not impossible, to make the connection between what ATP groups and doing right now and how it affects in-production apps and and live apps. After all, the SDLC is long so how do you incorporate defense now for attacks that come later?

Elite threat intelligence professionals operationalize their work so that the entire team and supply chain knows they when are being targeted. Having the right tools, skills, and visibility beyond your attack surface can  stop an attack before it can do damage. 

This UK retail banking organization was able to anticipate attacks and outsmart their cyber adversaries using Team Cymru Pure Signal ReconRead more.

Global Collaboration Solutions

Tibbr, a former start-up within TIBCO, provided enterprise social network solutions that broke down the barriers between geographic locations, workflows, partners, and silos that inherently exist in large organizations.

Customers were enabled to replay and share institutional knowledge with a wide group people that needed to work together in some really tough environments.

I wrote this collection of case studies to discuss customer use cases for secure collaboration and workflows in diverse industries and environments.

Offshore and in the oilfield - tibbr fuels new levels of global collaboration

Cordelta cures enterprise email overload with tibbr - Cordelta employees email less and collaborate more

iHealth Exchange sets the pace for greater collaboration and clinical integration for Houston area physicians

InterPortPolice cracks the case for promoting inter-agency collaboration with security and public safety organizations worldwide

OOCL keeps the cargo moving with improved communication and collaboration powered by tibbr - New collaboration capabilities packed with productivity

tibbr social collaboration platform kicks customer service into high gear at Scania Group -Collaboration powered by tibbr accelerates employee onboarding and improves customer assistance

Enterprise Content Management

Filenet provides a solution that has saved billions of trees and cut government red tape by 70% or more. It wasn’t that long ago that the march towards paperless processes, transactions, and communications was a challenge. Remember all those paper files in government offices, schools, doctor offices, and hospitals?  There now all in a digital form now that is easy to access, saves trees, and improves productivity.  

These organizations invested in producing on-demand information, content management, citizen self-service and faster response times using FileNet. The company was purchased by IBM in 2006.

VA Tax Overhaul Realizes Quick, Accurate, and Comprehensive Customer Services Without Pains in the Budget

Park University Reduced Admissions Processing from One Month to Two Days - Content Management at the Head of its Class

Kentucky State Police CRASH System Paves the Way to Safer Highways and Byways- Real-Time Collision Data Saves Lives

Brochures & Solution Briefs

When dinosaurs and 286s roamed the earth, we humans cared about speeds and feeds. You needed to outrun rather that outwit. Now it’s less about outrunning the competition and more about getting there first with the better solution.

When and where you show up with the right message and competitive positioning is a direct result of PMM collaboration and communications.  

A good brochure converses about benefits your audience cares about. Worthy brochures communicate industry challenges, business value, efficacy, productivity, and motivations for change beyond cost savings. 

Whitepapers!

Everyone loves to sit down and read a great whitepaper, especially on your day off, right? What could be more fun and exciting than reading a whitepaper?

There are many great answers to that question.

But the fact is, that without a whitepaper, your solution lacks credibility with your customers. It's difficult for salespeople to describe your approach without having the confidence a well written use cases and industry specific information that they can reference. Industry statistic also helps paint the picture.  

Salespeople must prove their use cases and show the caliber of their understanding  of customer challenges, get buy-in, and earn their share of your customers wallet. It is not easy.

So, like it or not, every company needs up to date and convincing whitepapers to demonstrate expertise the same  problems your customer is having without putting everyone to sleep.

VSS Monitoring (Purchased by NetScout)

Network Security Visibility Is the New Bacon for Infosec Professionals -Like Bacon, You Can Never Have Too Much Network Visibility

A Privacy/GDPR/CCPA Company (not currently in business)

Top 5 Real-World Impacts of GDPR To Prepare You for CCPA - Rising Consumer Expectations and Empowered Mindsets Are Creating a New Landscape of Risk for Privacy Professionals.

Competitive Intelligence

The best competitive intelligence supports salespeople with a combination of hard facts and antidotal information that can be easily incorporated into customer conversations. Here are a couple of examples.

Privacy and GDPR

Centrl vs. OneTrust

Web Application Security (Vulnerability Mgmt)

Whitehat vs. Cenzic

Sales and Partner Enablement

Partners need validated use cases so they know when and why to include your solution in their deals. Enable your partners with short, easy-to-reference use cases, program guides and communicate your sales wins to instill best practices and celebrate those hard-earned partner                      and sales wins.  

Quick Reference Guide

This quick reference guide is for partners and includes SteelEye’s (Purchased by SIOS) top 10 use cases, key competitive differentiators, and some solid guidance on how to order as it isn’t easy when it comes to Linux.

Partner Program Guide

All the great benefits of becoming a SteelEye partner.

Wins of the Week

Here is an example of a weekly article I used to write to celebrate key wins and best practices at CheckPoint.


Blog Posts and Thought Leadership

The best outcome for creating a blog post is to change minds, flip the script, and cultivate an audience of customers that share the problems you are qualified to solve. It’s an opportunity to get ahead of current or biased thinking.

In an ideal world, it would give your thought leaders the opportunity to expand their influence into new customer organizations and industries. I have a silly number of blogs I have written over the years. Here are just a couple that I recently wrote.

Ideal Customer Profiles and Personas

This is a key deliverable for every product marketing professional. I have written a plethora of dossiers on SOC and GRC leadership, practitioners, economic buyers, CISOs, and influencer personas involved in the network/cybersecurity decision-making process. Some are very targeted. In other cases, they get incorporates into on-boarding and LMS training modules.

But these are active and sensitive documents so I am not going to share them online. After talking I can email you an example.