Tuesday, November 19, 2024

David, Are You Attending Any Conferences?

Hi David,

I am looking forward to representing JTN Research at upcoming global conferences. Are you or anyone from your company attending any? If so, which ones?

It would be amazing to meet in person, but if you are not going, let's set up a Teams call using my Calendly Link.

JTN has been a well-kept secret in the EU for almost two decades, with offices in Denmark, Bulgaria, and now the USA. Despite operating behind the scenes, JTN is one of the largest global suppliers of progressively profiled consumer and B2B proprietary audience panels in AMS, EMEA, and APAC for the market research industry.

Do you need help recruiting participants or survey design and programming for any of your studies? 

JTN guarantees local experience and knowledge to make data collection reliable and relevant for every recruitment or full-service project. I've attached our Audience Panel Book PDF containing our recruitment methods and exclusive panel country breakdowns.

These participants are only accessible through direct collaboration with JTN and are not available through APIs, DIYs, programmatic methods, or sample exchanges. 

I look forward to meeting you in person or even just over Teams!

Have a fantastic day!

Best Regards,
Jonathan



Jonathan Cheriff

Head of Partner Development

M: +1 707 758 1154

jcheriff@jtnresearch.com  |  http://www.jtnresearch.com

 

Real data. Real research. Real insights.



















Click here if you would not like to hear from us

2025 cyber threats: risks you need to know about

Hi David,

This year, we've seen familiar cyber threats take on new forms. Supply chain attacks became patient long-term strategies, prompt injections tricked AI defenses, and security complexity is now a costly vulnerability.

Join Cato Networks' Chief Security Strategist for a Cybersecurity Masterclass that will discuss impactful attacks from 2024 and risks you should be aware of for the year ahead.

What's covered:

  • 'Low and slow' supply chain attack: how the XZ vulnerability revealed a threat actor embedding themselves in an open-source project for years before committing a backdoor.
  • Deceiving AI: New evasion tactics where prompt injections fool AI-based security analysis tools into thinking malware code is safe.
  • Security is broken: Why security complexity has become the main contributor to the cost of a breach.

Get ready for the tricks and tactics your teams need to watch for in 2025.


Kim White
Senior Business Development Manager

CATO LOGO 2019.png

twitter.png in.png
.

This email was sent to dasmith1973.blog@blogger.com. If you no longer wish to receive these emails you may unsubscribe at any time.

Monday, November 18, 2024

Heading to AWS re:Invent?

Friday, November 15, 2024

Keys to unlocking innovative customer experiences

© 2024 Comcast. All rights reserved.
THIS EMAIL IS AN ADVERTISEMENT.
If you do not wish to receive emails like this in the future, please click here to manage your email subscriptions.
Comcast respects your privacy. For a complete description of our privacy policy, click here.
Comcast
One Comcast Center
1701 JFK Blvd. Philadelphia, PA 19103-2838
Attn: Business Services
MM_EP_NovNL_Gen_NAT_CBR-9079_202411