Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Forward Features

Submitting Content to Infosecurity Magazine

Please send your request for contributions, interviews, data, etc., relevant to our forward features to eleanor.dallaway@reedexpo.co.uk Please do not call or email to check that we have received your offer – we will contact you if we need any further information or comment. Thank you.

Deadline for PR contributions: Monday March 19, 2018. 

2018 Forward Features: April/May/June Print Edition

  1. Cybersecurity on a Budget: 

    The most extensive information security program in the world won’t combat every single cyber threat. Modest budgets only increase the importance of making the right investments in the right products, services and training. CISOs are tasked with identifying the most critical risks to their organization and making the right investments to combat those risks and achieve return on those financial investments. This article will look at how CISOs on a budget can get the most out of their security spend. 

  2. Nations at (Cyber) War:
    Implications of a successful nation-backed cyber-attack could be absolutely catastrophic. Most recently, attacks on the Winter Olympics have made headlines, proceeded by multiple election hacking stories, the blame game surrounding WannaCry and increasing targeting of the energy sector. This article will take a look at the tactics of the main offending nations and the evolving end game. It will also look at the future of nation-state hacking. 

  3. Exposing the CISO/Security Vendor Relationship: 

    The relationship between cybersecurity vendors and CISOs can sometimes be contentious. Despite a co-dependency (CISOs need vendors’ products to improve their organization’s security and vendors need CISOs to buy their products) there is often conflict, with CISOs complaining about ‘snake oil’ and nuisance sales calls. This article explores the relationship between vendors and information security end-users, questioning how vendors can better serve the needs of CISOs and therefore sell more effectively. 

  4. The Lowdown on British Cybersecurity Accelerators and Incubators:

    The UK is only behind United States and Israel in cybersecurity investment spending. There are an increasing amount of accelerators and incubators in the UK that focus on cybersecurity alone. This feature considers the objectives of GCHQ Cyber Accelerator, Cylon, HutZero and Cyber39 amongst others. This feature looks at the purpose of cybersecurity accelerators, their achievements and how they are evolving. It will also feature case studies on some of the companies who have used these initiatives to launch and grow. 

  5. Battle of the Sectors: Which Sector is Most Vulnerable to Cyber Attack?
    This article will explore which vertical sectors experience the most – and the worst – cyber-attacks and why. This data-led feature will investigate what kinds of attacks are most common and successful in which verticals, and how hackers target particular sectors. 
     
  6. Cryptocurrency-mining Malware 

    Cryptocurrency-mining malware became a bigger issue in 2017. As cryptojacking has spread, the technique which aims to generate real money, is often also used to exploit people’s resources, their hardware and their personal information. This article looks at the art of cryptocurrency-mining, how it works and the criminal objectives versus outcomes. It will consider detection and prevention methods against cryptocurrency-mining and whether the malware could lead to further threats. 

What’s Hot on Infosecurity Magazine?