
Insights from a marketing “Legend” at the top of her game
Marketing and sales is a world that’s often dominated by big, extroverted personalities. But one of the secrets to running a successful team is creating an environment where all personality types, including introverts, can participate, be productive, and be recognized in ways that matter to them.
That’s just one of the insights explored in depth by Barracuda Chief Marketing Officer Erin Hintz in this episode of the people.ai podcast Legends of Sales and Marketing.
Hintz’s marketing leadership career is a series of impressive achievements, including growing Symantec’s Norton business nearly six-fold, and doubling Citrix SaaS revenue in 3.5 years. So, she has a lot of hard-won insights to share on marketing success, both B2B and B2C.
Building confidence and connections
In this relaxed, interview-style podcast, Hintz covers a lot of ground, including getting personal about her own introverted—yet highly competitive—nature, and how she built up her confidence through public speaking. You’ll also hear why she thinks her introverted nature has helped her succeed.
The conversation also gets into detail about Hintz’s thoughts on the importance of building connections among teams, and how to do that. And at a practical level, she shares her strategies for measuring marketing contributions to the business with metrics that matter, and for nurturing close collaboration with sales teams.
Anyone in a leadership role, especially in marketing, can gain a lot of valuable, actionable guidance and insight from listening to this episode of Legends of Sales and Marketing featuring Barracuda CMO Erin Hintz.

The Ransomware Insights Report 2025
Risultati chiave sull'esperienza e l'impatto del ransomware sulle organizzazioni a livello mondiale
Iscriviti al blog di Barracuda.
Iscriviti per ricevere i Threat Spotlight, commenti del settore e altro ancora.

Sicurezza della vulnerabilità gestita: correzione più rapida, meno rischi, conformità più semplice
Scopri quanto può essere facile individuare le vulnerabilità che i criminali informatici vogliono sfruttare