Contacts

Advertising

UK/North America/Europe/ROW Sales

Malcolm Wells
Head of Sales
Tel: +44 (0)20 8910 7718
Email: malcolm.wells@reedexpo.co.uk

Raymond C Filbert
US & Canada Sales
Tel: +01 203 840 5821
Email: rfilbert@reedexpo.com

Ben Race
Sales Manager
Tel: +44 (0)20 8910 7991
Email: ben.race@reedexpo.co.uk

Greg Fleming
Sales Executive
Tel: +44 (0)20 8910 7081
Email: greg.fleming@reedexpo.co.uk

Editorial

Please send all press releases to infosecurity.press@reedexpo.co.uk

Eleanor Dallaway
Editor & Associate Publisher
Tel: +44 (0)208 910 7893
Email: eleanor.dallaway@reedexpo.co.uk 

Drew Amorosi
Deputy Editor
Email: drew.amorosi@reedexpo.co.uk
Tel: +1 203 722 4005
Follow on Twitter: @drewamorosi
 
Phil Muncaster 
UK/EMEA News Reporter
Follow on Twitter: @philmuncaster
 
Tara Seals
US/North America Online News Writer
 
Stephen Pritchard
Contributing Editor 
 
Victoria Windsor
Content Manager
+44 (0)208 910 7943
Email: victoria.windsor@reedexpo.co.uk
 

Marketing & Circulation 

For all general enquiries please email: infosecurity.magazine@reedexpo.co.uk
 
Rebecca Harper 
Online Marketing Manager
Tel: +44 (0)208 910 7861
 
Joy-Fleur Brettschneider
Group Marketing Manager
 
Rianna Ramkissoon
Online Marketing Coordinator 
 

Contact Addresses

Primary:
Reed Exhibitions Ltd
Gateway House
28 The Quadrant
Richmond
Surrey TW9 1DN
United Kingdom
 
North America: 
Contact Drew Amorosi 
Tel: +1 203 722 4005
 
We welcome your press releases and announcements.
Please send your news to infosecurity.press@reedexpo.co.uk. Please do not call or email to check that we have received your press release – we will contact you if we need any further information or comment. Thank you.
 
2014 Forward Features: October/November/December Print Edition (PR Submission Deadline: August 8, 2014)

British Information Security Companies
This article will look at the information security companies founded in the United Kingdom. It will also explore the R&D and innovation happening in British universities and labs.

Gaming and Information Security 
Kaspersky declared that gamers were targeted by 11.7 million attacks in 2012, and that there are at least 4.6 million pieces of gaming-focused malware out there in the world. The market for gaming goods on the dark markets is indeed huge, from malware that steals credentials to cracked games and much, much more. This article takes a look at the information security concerns that gaming presents.

Why Should Security Professionals Care about Privacy?
The juncture of security and privacy is complex – a minefield of regulation, threats and challenges. Within many organizations the security and privacy functions sit in different parts of the business, reporting to different leaders and holding different risk appetites. Yet privacy is one of the biggest issues surrounding the security of data and it’s an issue that security professionals can’t afford to ignore. This article will consider the biggest privacy issues that information security professionals need to have at the top of their agenda and explore how security and privacy functions can work together in alignment.

Outsourcing: When to DIY and when to Call a Consultancy
With plenty of very capable consultancy firms in the information security, it can be tempting to outsource most of the organization’s information security needs. At the other end of the spectrum, there are organizations that believe their investment in a CISO should cover all the bases and negate need for external help. This feature will explore the merits and downfalls of both investing in a consultancy and keeping all infosec in house, and draw conclusions about when to DIY, and when to call the experts.

Cyber Warfare in an Increasingly Hostile Political World
In an increasingly hostile world, with political wars and disputes reaching new tense heights, concern for cyber warfare is a natural extension of concern. In today’s electronic age, an act of cyberwar may be to electronically disrupt the workings of government and industry, or infiltrate National Grids. This article will take a look at how current physical-world wars are being played out in the cyber domain.

Phishing Your Own Users
It’s becoming increasingly common practice for businesses to phish or purposely spam their own users as part of awareness campaigns seeking to socially engineer staff. These programs are initiated in order to highlight information security risks to employees. This article considers the benefits of phishing your own users, and also the risks, and offers advice on best practice around the discipline.
 

Point–Counterpoint Opinion Series: TBD
  • Those interested in submitting opinion pieces for print or online publication should contact Drew Amorosi, deputy editor (drew.amorosi@reedexpo.co.uk), for guidelines and submission dates
Please send your request for contributions, interviews, data, etc., relevent to our forward features to infosecurity.press@reedexpo.co.uk. Please do not call or email to check that we have received your offer – we will contact you if we need any further information or comment. Thank you.
 

2014 Forward Features: July/August/September Print Edition (PR Submission Deadline: May 01, 2014)

Crime and Punishment: Bring Hackers to Justice 
Traditionally considered an easy crime with minimal consequence, law enforcement agencies – including the FBI and newly formed NCA – are determined to make cybercriminals pay for their crimes. This article will consider how much ‘teeth’ these agencies have, look at some of the punishments and penalties served to date, and take a look at the future of cybercrime and the law.

British Information Security Companies
This article will look at the information security companies founded in the United Kingdom. It will also explore the R&D and innovation happening in British universities and labs. 

Pirated Software Security Concerns 
Pirated software continues to be prevalent worldwide, but particularly in lesser developed countries. Putting legal issues aside, pirated software does not benefit from the patches and security fixes that genuine software does, leaving machines exposed and highly vulnerable to exploit. This article will investigate the extent of the issue, and look at what can be done within the industry to protect these machines and users and prevent the damage that can be spread through computers running pirated software. 

The Tale of Heart Bleed 
The recently discovered heart bleed bug has taken the industry by storm, with information security researchers and practitioners declaring it a “catastrophic 11 on a scale of 1-10”. This article will take a look at the heart bleed timeline, from discovery to present, and explain everything you need to know about this flaw phenomenon. 

Expired XP and the Finance Industry’s Reluctance to Trade it in 
April marked the end of support for Windows XP by Microsoft, and undoubtedly the beginning of a hacker spree to target vulnerable machines. Whilst XP usage has dropped across the board, new analysis shows that here’s still plenty of work to be done – especially in the financial sector. 

The Soaring Cost of Cyber Security Tools
Each year the costs of purchasing security tools continues to rise. As larger security firms buy out smaller companies, they tack on nominal costs. Are public sector CISOs better off putting all their eggs in one basket, staying with one company's suite of tools and getting a multi discount? What are the considerations and security implications? How should CISOs approach this challenge given the current budgetary environment?

 

Point–Counterpoint Opinion Series: Should governments immediately (or in a timely fashion) disclose zero-day vulnerabilities they discover to affected vendor(s)?

  • Those interested in submitting opinion pieces for print or online publication should contact Drew Amorosi, deputy editor (drew.amorosi@reedexpo.co.uk), for guidelines and submission dates
Please send your request for contributions, interviews, data, etc., relevent to our forward features to infosecurity.press@reedexpo.co.uk. Please do not call or email to check that we have received your offer – we will contact you if we need any further information or comment. Thank you.

 

 

 

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×