2018
EDITORIAL CALENDARS
Key topics that will shape our discussions
1
Editor’s Note
2018 Editorial Calendars Our Guide to Global Coverage of Critical Issues I’m pleased to present Information Security Media Group’s 2018 Editorial Calendars. This document includes the hot topics and key sponsorship opportunities across all of our global media properties—BankInfoSecurity, CUInfoSecurity, GovInfoSecurity, HealthcareInfoSecurity, DataBreachToday, CareersInfoSecurity and InfoRiskToday. Our coverage is truly global, featuring region-specific content for both Europe and Asia as well as the United States.
Tom Field SVP Editorial
ISMG publishes websites, and not print magazines, so we take a different approach to covering timely topics than a print publication. While each of these editorial calendar items will be given significant attention in a given month, they are not the only topics we’ll focus on during that period. Nor will key topics be addressed only once during the year. We encourage you to use these editorial calendars as a guide to the dozens of security and technology topics we address each day across our media properties. If you have any questions about sponsorship opportunities, please contact our sales team. If you have any questions about our editorial calendar topics, or if you have an idea or a source you’d like to share, please feel free to contact me or any of our editorial team members pictured on the following page. Thank you,
Tom Field SVP Editorial
[email protected]
2018 Editorial Calendars
2
Editorial Team No other IT security and risk management publisher has put more emphasis on the quality of content. Information Security Media Group offers 100 percent original content prepared by the largest team of journalists serving the industry. Our readers rely on our experienced editors to provide them with the news and analysis they need to make the right decisions about IT security and risk management. You can be confident that your product messaging will be positioned adjacent to high-quality editorial content that’s unsurpassed for quality, timeliness, accuracy and thoroughness. Tom Field SVP Editorial
Howard Anderson
Tracy Kitten
Marianne Kolbasuk McGee
News Editor
Director, Global Events Content Executive Editor, BankInfoSecurity & CUInfoSecurity
Executive Editor, HealthcareInfoSecurity
Geetha Nandikotkur
Varun Haran
Jeremy Kirk
Suparna Goswami
Managing Editor, Asia & the Middle East
Global Director of Programming, Senior Editor
Managing Editor, Security and Technology
Principal Correspondent
Mathew J. Schwartz Executive Editor, DataBreachToday & Europe
Contact
[email protected] or call (800) 944-0401 to to learn how to sync your messaging with our editorial content on a specific topic. 3
US/UK/EU Edition
2018 Editorial Calendar
Month
Features
Tech Categories
January
GDPR: Compliance Insights
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
Applying Machine Learning
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services
March
Identity-Centric Security: Identity as the New Perimeter
April
Securing Cashless Transaction Infrastructure
May
Effective Incident Response and Remediation
June
Defending Against Ransomware and Digital Extortion
July
Mobile Fraud Risk Management
August
The Evolution of Targeted Attacks
September
SWIFT Security Issues
October
Enterprise Internet of Things Security
November
Getting the Most from an MSSP
December
Using Fraud Analytics Platforms
Executive Editor: Tracy Kitten |
[email protected] | @FraudBlogger
Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.bankinfosecurity.com
4
U.S. Edition
2018 Editorial Calendar
Month
Features
Tech Categories
January
GDPR: Compliance Insights
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
Applying Machine Learning
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services
March
Identity-Centric Security: Identity as the New Perimeter
April
Securing Cashless Transaction Infrastructure
May
Effective Incident Response and Remediation
June
Defending Against Ransomware and Digital Extortion
July
Mobile Fraud Risk Management
August
The Evolution of Targeted Attacks
September
SWIFT Security Issues
October
Enterprise Internet of Things Security
November
Getting the Most from an MSSP
December
Using Fraud Analytics Platforms
Executive Editor: Tracy Kitten |
[email protected] | @FraudBlogger
Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.cuinfosecurity.com
5
U.S. Edition
2018 Editorial Calendar
Month
Features
Tech Categories
January
GDPR: Influence on U.S. Policy
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
Trump Administration’s Impact on Cybersecurity
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services
March
Identity-Centric Security: Identity as the New Perimeter
April
The FTC’s Role in Enforcing Security
May
Effective Incident Response and Remediation
June
HIPAA Enforcement Trends
July
DHS: Emerging Security Priorities
August
The Evolution of Targeted Attacks
September
DMARC: Effective in Fighting Phishing?
October
Leveraging Threat Intelligence
November
Addressing Security in Shift to the Cloud
December
2019 Legislative Outlook
Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.govinfosecurity.com
6
U.S. Edition
2018 Editorial Calendar
Month
Features
Tech Categories
January
GDPR: Compliance Insights
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
Applying Machine Learning
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services
March
Identity-Centric Security: Identity as the New Perimeter
April
Defending Against Ransomware and Digital Extortion
May
Effective Incident Response and Remediation
June
HIPAA Enforcement Trends
July
Threat Hunting: More Than a Catch Phrase?
August
Fighting Against Targeted Hacker Attacks
September
Effective Fraud-Fighting Strategies
October
Enterprise Internet of Things Security
November
Getting the Most from an MSSP
December
New Medical Device Security Issues
Executive Editor: Marianne Kolbasuk McGee |
[email protected] | @HealthInfoSec
Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.healthcareinfosecurity.com
7
US/UK/EU Edition
2018 Editorial Calendar
Month
Features
Tech Categories
January
GDPR: Compliance Insights
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
Applying Machine Learning
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services
March
Identity-Centric Security: Identity as the New Perimeter
April
Threat Modeling
May
Effective Incident Response and Remediation
June
Defending Against Ransomware and Digital Extortion
July
Threat Hunting: More Than a Catch Phrase?
August
The Evolution of Targeted Attacks
September
Operational Technology: Addressing the Risks
October
Enterprise Internet of Things Security
November
Getting the Most from an MSSP
December
IT Vendor Risk Management
Executive Editor: Mathew J. Schwartz |
[email protected] | @euroinfosec
Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.databreachtoday.com
8
US/UK/EU Edition
2018 Editorial Calendar
Month
Features
Tech Categories
January
GDPR: Compliance Insights
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
Applying Machine Learning
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services
March
Identity-Centric Security: Identity as the New Perimeter
April
IT Vendor Risk Management
May
Effective Incident Response and Remediation
June
Is Your InfoSec Team Big Enough?
July
Threat Hunting: More Than a Catch Phrase?
August
Mitigating the Insider Threat
September
Operational Technology: Addressing the Risks
October
Enterprise Internet of Things Security
November
Getting the Most from an MSSP
December
Cyber Insurance: Worth the Investment?
Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.inforisktoday.com
9
2018 Editorial Calendar
Month
Features
Tech Categories
January
The Internet of Things: A Career Changer?
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
What Skills Are Lacking on Your Incident Response Team?
March
How to Win the CISO Job
April
Behavioral Analytics: Building a Staff
May
Educating the Board of Directors on Security
June
Advanced SOC Operations: Building the Team
July
Building Endpoint Detection and Response Expertise
August
Learning More About Blockchain
September
Making the Case for a Bigger InfoSec Budget
October
Digital Forensics: Making the Right Hires
November
Managing Your MSSP
December
Developing Skills for Implementing New Security Tech
News Editor: Howard Anderson |
[email protected] | @ismg_editor
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.careersinfosecurity.com
10
India/Asia Edition
2018 Editorial Calendar
Month
Features
Tech Categories
January
GDPR: Compliance Insights for Asian Entities
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
Overcoming Aadhaar’s Privacy and Security Challenges
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services
March
India’s Imminent Data Privacy Legislation
April
Securing Cashless Transaction Infrastructure
May
Blockchain Technology Benefits for Banking
June
Defending Against Ransomware and Digital Extortion
July
Mobile Fraud Risk Management
August
Targeted Attacks in Asia
September
EMV Migration: Can Asia Share Its Formula for Success?
October
Identity-Centric Security: Identity as the New Perimeter
November
Asia’s Growing MSSP Market
December
Using Fraud Analytics Platforms
Executive Editor: Geetha Nandikotkur |
[email protected] | @AsiaSecEditor
Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.bankinfosecurity.asia
11
India/Asia Edition
2018 Editorial Calendar
Month
Features
Tech Categories
January
GDPR: Compliance Insights for Asian Entities
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
Applying Machine Learning
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services
March
Identity-Centric Security: Identity as the New Perimeter
April
Cloud Security Challenges in Developing Markets
May
Why Breach Notification Norms Are Important in Asia
June
Defending Against Ransomware and Digital Extortion
July
Threat Hunting: More Than a Catch Phrase?
August
Effective Incident Response and Remediation
September
Operational Technology: Addressing the Risks
October
Enterprise Internet of Things Security
November
Asia’s Growing MSSP Market
December
IT Vendor Risk Management
Executive Editor: Geetha Nandikotkur |
[email protected] | @AsiaSecEditor
Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.databreachtoday.asia
12
India/Asia Edition
2018 Editorial Calendar
Month
Features
Tech Categories
January
GDPR: Compliance Insights for Asian Entities
Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls
February
Blockchain Technology Benefits for Banking
Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services
March
Identity-Centric Security: Identity as the New Perimeter
April
IT Vendor Risk Management
May
Effective Incident Response and Remediation
June
Is Your InfoSec Team Big Enough?
July
Threat Hunting: More Than a Catch Phrase?
August
Mitigating the Insider Threat: Asian Case Studies
September
Operational Technology: Addressing the Risks
October
Enterprise Internet of Things Security
November
Security and Board Room Agenda for Asian Leaders
December
Cyber Insurance: Worth the Investment?
Executive Editor: Geetha Nandikotkur |
[email protected] | @AsiaSecEditor
Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics
www.inforisktoday.asia
13
2018 Editorial Calendar
902 Carnegie Center • Princeton, NJ • 08540 • www.ismg.io 14