Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Forward Features

Submitting Content to Infosecurity Magazine

Please send your request for contributions, interviews, data, etc., relevant to our forward features to eleanor.dallaway@reedexpo.co.uk Please do not call or email to check that we have received your offer – we will contact you if we need any further information or comment. Thank you.

Deadline for PR contributions: Friday December 15 2017. 

2017 Forward Features: January/February/March Print Edition

  1. Millennials in the Cybersecurity Workforce: Millennials are, like it or not, the future cybersecurity workforce. With more and more millennials joining the industry, there is some discontent around their way of working and, as the (ISC)2 workforce study showed, the gap between what hiring managers prioritize and what millennials deem important is very wide.  
  2. GDPR: Ambulance-Chasing Lawyers? It’s the dawn of the General Data Protection Regulation’s enforcement and this article explores the potential emergence of ambulance-chasing lawyers. What should information security professionals be doing to keep on the right side of the law? 
  3. Diversity in Information Security: We often talk about women in security but the lack of diversity in other areas – age, ethnicity, class, sexuality – often gets ignored. This feature will weigh up the severity of the diversity concern and ask questions about why these issues exist. 
  4. Critical Legacy Apps: When Patching Isn’t Possible: Many of our critical sectors – like healthcare and critical national infrastructure – rely on technology and hardware that runs on legacy apps. Patches are not available for the majority of these systems, leaving them vulnerable to attack. This article asks questions about how to secure legacy apps when patching isn’t an option.  
  5. Cloud Computing: The Highs, the Lows and the Cloudy Areas: Now a mature offering, very few organizations have managed to completely avoid the cloud. This feature will explore the elements that challenge information security and the elements that support the security function. 

What’s Hot on Infosecurity Magazine?