Contacts

Advertising

UK/North America/Europe/ROW Sales

Malcolm Wells
Head of Sales
Tel: +44 (0)20 8910 7718
Email: malcolm.wells@reedexpo.co.uk

Raymond C Filbert
US & Canada Sales
Tel: +01 203 840 5821
Email: rfilbert@reedexpo.com

Ben Race
Sales Manager
Tel: +44 (0)20 8910 7991
Email: ben.race@reedexpo.co.uk

Greg Fleming
Sales Executive
Tel: +44 (0)20 8910 7081
Email: greg.fleming@reedexpo.co.uk

Editorial

Please send all press releases to infosecurity.press@reedexpo.co.uk

Eleanor Dallaway
Editor & Associate Publisher
Tel: +44 (0)208 910 7893
Email: eleanor.dallaway@reedexpo.co.uk 

Drew Amorosi
Deputy Editor
Email: drew.amorosi@reedexpo.co.uk
Tel: +1 203 722 4005
Follow on Twitter: @drewamorosi
 
Tara Seals
US/North America Online News Writer
 
Stephen Pritchard
Contributing Editor 
 
Victoria Windsor
Content Manager
+44 (0)208 910 7943
Email: victoria.windsor@reedexpo.co.uk
 

Marketing & Circulation 

For all general enquiries please email: infosecurity.magazine@reedexpo.co.uk
 
Rebecca Harper 
Online Marketing Manager
Tel: +44 (0)208 910 7861
 
Joy-Fleur Brettschneider
Group Marketing Manager
 
Rianna Ramkissoon
Online Marketing Coordinator 
 

Contact Addresses

Primary:
Reed Exhibitions Ltd
Gateway House
28 The Quadrant
Richmond
Surrey TW9 1DN
United Kingdom
 
North America: 
Contact Drew Amorosi 
Tel: +1 203 722 4005
 
We welcome your press releases and announcements.
Please send your news to infosecurity.press@reedexpo.co.uk. Please do not call or email to check that we have received your press release – we will contact you if we need any further information or comment. Thank you.

 

2014 Forward Features: July/August/September Print Edition (PR Submission Deadline: May 01, 2014)

Crime and Punishment: Bring Hackers to Justice 
Traditionally considered an easy crime with minimal consequence, law enforcement agencies – including the FBI and newly formed NCA – are determined to make cybercriminals pay for their crimes. This article will consider how much ‘teeth’ these agencies have, look at some of the punishments and penalties served to date, and take a look at the future of cybercrime and the law.

British Information Security Companies
This article will look at the information security companies founded in the United Kingdom. It will also explore the R&D and innovation happening in British universities and labs. 

Pirated Software Security Concerns 
Pirated software continues to be prevalent worldwide, but particularly in lesser developed countries. Putting legal issues aside, pirated software does not benefit from the patches and security fixes that genuine software does, leaving machines exposed and highly vulnerable to exploit. This article will investigate the extent of the issue, and look at what can be done within the industry to protect these machines and users and prevent the damage that can be spread through computers running pirated software. 

The Tale of Heart Bleed 
The recently discovered heart bleed bug has taken the industry by storm, with information security researchers and practitioners declaring it a “catastrophic 11 on a scale of 1-10”. This article will take a look at the heart bleed timeline, from discovery to present, and explain everything you need to know about this flaw phenomenon. 

Expired XP and the Finance Industry’s Reluctance to Trade it in 
April marked the end of support for Windows XP by Microsoft, and undoubtedly the beginning of a hacker spree to target vulnerable machines. Whilst XP usage has dropped across the board, new analysis shows that here’s still plenty of work to be done – especially in the financial sector. 

The Soaring Cost of Cyber Security Tools
Each year the costs of purchasing security tools continues to rise. As larger security firms buy out smaller companies, they tack on nominal costs. Are public sector CISOs better off putting all their eggs in one basket, staying with one company's suite of tools and getting a multi discount? What are the considerations and security implications? How should CISOs approach this challenge given the current budgetary environment?

 

Point–Counterpoint Opinion Series: TBD

  • Those interested in submitting opinion pieces for print or online publication should contact Drew Amorosi, deputy editor (drew.amorosi@reedexpo.co.uk), for guidelines and submission dates
Please send your request for contributions, interviews, data, etc., relevent to our forward features toinfosecurity.press@reedexpo.co.uk. Please do not call or email to check that we have received your offer – we will contact you if we need any further information or comment. Thank you.

 

2014 Forward Features: April/May/June Print Edition (PR Submission Deadline: Jan. 15, 2014)

Using Analytics to Prevent DDoS Attacks
DDoS attacks can completely cripple a network and an organization. This article will look at how businesses can and should prepare for a DDoS attack and use case studies to display the key lessons learnt from DDoS attacks. Test methodologies to prevent DDoS will be explored and the article will consider what is involved with DNS flooding and DNS response spoofing.

A Year of Snowden
Almost a year on from when the Edward Snowden story broke, we take a look back at the impact of the whistleblowing on the NSA and other intelligence agencies, and impact on the information security industry. How has Snowden changed industry and government practices, and how has public opinion evolved in the aftermath?

The Underground Market for Bitcoin Stealers and Miners
As Bitcoin hits new highs, heists and individual robberies are becoming disturbingly common. This article explores the behavior of the cyber-criminals wheeling and dealing Bitcoin, and the consequences of their actions. Just how big can Bitcoin get?

Security as an Enabler: Supporting Innovation through Business-led Information Security
While information and cyber security are being pushed up the corporate agenda, information security is often seen as a risk-averse, business inhibitor. This article will explore how the information security function can evolve to become a business lead and how you can bring business knowledge into the security team to educate security practitioners about the implications of threats for the business and enable the security team to start thinking like the business. This article will offer advice on information security and the business can work together to create a common language to ensure the effective communication of risk intelligence.
 

Point–Counterpoint Opinion Series: TBD

  • Those interested in submitting opinion pieces for print or online publication should contact Drew Amorosi, deputy editor (drew.amorosi@reedexpo.co.uk), for guidelines and submission dates
Please send your request for contributions, interviews, data, etc., relevent to our forward features to infosecurity.press@reedexpo.co.uk. Please do not call or email to check that we have received your offer – we will contact you if we need any further information or comment. Thank you.

 

2014 Forward Features: January/February/March Print Edition (PR Submission Deadline: Dec. 14, 2013)

Cloud Computing: A Crowded Standards Landscape
There's growing demand for standards to bring clarity to the cloud computing market. Both buyers and sellers have their reasons to want common ways to do things such as transfer data from one cloud-based app or infrastructure to another. But the competition to be in control is fierce. This article will look at the increasingly crowded cloud computing standards landscape.

The Generation X, Y, Z of Information Security
The different ways in which information security is regarded and practiced by generations X, Y and Z is extreme. As we prepare for generation Z to start entering the workforce, we must consider how this will affect information security. Privacy and accessibility expectations in younger generations are vastly different than before. This article will look at the perceived technical needs of younger staff and how their expectations and attitudes affect information security.

Data Privacy, Protection and Law: Preparing for the EU General Data Protection Regulation
The vote to ratify the new EU data protection legislation is expected to take place in October with a view to being implemented by May 2014. With organizations facing potentially huge financial penalties and legal sanctions in the event of non-compliance and with some business sectors facing mandatory breach disclosures, the regulation will have far reaching consequences for data security, setting new parameters for compliance.

BYOD Update
The BYOD phenomenon continues to cause information security managers headaches and loss of data. This article will offer an update on the BYOD threat landscape and investigate whether privacy and data security are sacrificed in exchange for convenience and cost saving.

Securing the ‘Internet of Things’
As more physical devices are connected to the internet, security implications are vast. From SMART grids to medical devices and cars, the proliferation of connected devices introduces increased cyber security risks. This article will take a look at the risk of breach, and the data security and compliance considerations as businesses look to harness the huge quantities of personal data from multiple devices.

Manipulating Financial Markets: The Next Wave in Cybercrime?
Scott Borg, the man who foresaw a Stuxnet-style cyber-attack years before it was discovered, has issued his latest prediction: manipulation of financial markets will be the long-term cybercrime wave of the future. This article will explore this prediction and ask the opinion of industry experts.

Point–Counterpoint Opinion Series: Anti-virus: Art thou dead?

  • Anti-virus, once the bread and butter of the information security industry, is now often dismissed as “a commodity”, something that should be built in to a greater product, or as “necessary yet all-too-often ineffective”. Yet, without it, consumers leave themselves exposed. The evolution of the anti-virus market is undeniable, but what is its future? Is AV dead?
  • Those interested in submitting opinion pieces for print or online publication should contact Drew Amorosi, deputy editor (drew.amorosi@reedexpo.co.uk), for guidelines and submission dates
Please send your request for contributions, interviews, data, etc., relevent to our forward features to infosecurity.press@reedexpo.co.uk. Please do not call or email to check that we have received your offer – we will contact you if we need any further information or comment. Thank you.
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×