calendars


[PDF]calendars - Rackcdn.comhttps://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackc...

0 downloads 141 Views 2MB Size

2018

EDITORIAL CALENDARS

Key topics that will shape our discussions

1

Editor’s Note

2018 Editorial Calendars Our Guide to Global Coverage of Critical Issues I’m pleased to present Information Security Media Group’s 2018 Editorial Calendars. This document includes the hot topics and key sponsorship opportunities across all of our global media properties—BankInfoSecurity, CUInfoSecurity, GovInfoSecurity, HealthcareInfoSecurity, DataBreachToday, CareersInfoSecurity and InfoRiskToday. Our coverage is truly global, featuring region-specific content for both Europe and Asia as well as the United States.

Tom Field SVP Editorial

ISMG publishes websites, and not print magazines, so we take a different approach to covering timely topics than a print publication. While each of these editorial calendar items will be given significant attention in a given month, they are not the only topics we’ll focus on during that period. Nor will key topics be addressed only once during the year. We encourage you to use these editorial calendars as a guide to the dozens of security and technology topics we address each day across our media properties. If you have any questions about sponsorship opportunities, please contact our sales team. If you have any questions about our editorial calendar topics, or if you have an idea or a source you’d like to share, please feel free to contact me or any of our editorial team members pictured on the following page. Thank you,

Tom Field SVP Editorial [email protected]

2018 Editorial Calendars

2

Editorial Team No other IT security and risk management publisher has put more emphasis on the quality of content. Information Security Media Group offers 100 percent original content prepared by the largest team of journalists serving the industry. Our readers rely on our experienced editors to provide them with the news and analysis they need to make the right decisions about IT security and risk management. You can be confident that your product messaging will be positioned adjacent to high-quality editorial content that’s unsurpassed for quality, timeliness, accuracy and thoroughness. Tom Field SVP Editorial

Howard Anderson

Tracy Kitten

Marianne Kolbasuk McGee

News Editor

Director, Global Events Content Executive Editor, BankInfoSecurity & CUInfoSecurity

Executive Editor, HealthcareInfoSecurity

Geetha Nandikotkur

Varun Haran

Jeremy Kirk

Suparna Goswami

Managing Editor, Asia & the Middle East

Global Director of Programming, Senior Editor

Managing Editor, Security and Technology

Principal Correspondent

Mathew J. Schwartz Executive Editor, DataBreachToday & Europe

Contact [email protected] or call (800) 944-0401 to to learn how to sync your messaging with our editorial content on a specific topic. 3

US/UK/EU Edition

2018 Editorial Calendar

Month

Features

Tech Categories

January

GDPR: Compliance Insights

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

Applying Machine Learning

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services

March

Identity-Centric Security: Identity as the New Perimeter

April

Securing Cashless Transaction Infrastructure

May

Effective Incident Response and Remediation

June

Defending Against Ransomware and Digital Extortion

July

Mobile Fraud Risk Management

August

The Evolution of Targeted Attacks

September

SWIFT Security Issues

October

Enterprise Internet of Things Security

November

Getting the Most from an MSSP

December

Using Fraud Analytics Platforms

Executive Editor: Tracy Kitten | [email protected] |  @FraudBlogger

Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.bankinfosecurity.com

4

U.S. Edition

2018 Editorial Calendar

Month

Features

Tech Categories

January

GDPR: Compliance Insights

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

Applying Machine Learning

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services

March

Identity-Centric Security: Identity as the New Perimeter

April

Securing Cashless Transaction Infrastructure

May

Effective Incident Response and Remediation

June

Defending Against Ransomware and Digital Extortion

July

Mobile Fraud Risk Management

August

The Evolution of Targeted Attacks

September

SWIFT Security Issues

October

Enterprise Internet of Things Security

November

Getting the Most from an MSSP

December

Using Fraud Analytics Platforms

Executive Editor: Tracy Kitten | [email protected] |  @FraudBlogger

Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.cuinfosecurity.com

5

U.S. Edition

2018 Editorial Calendar

Month

Features

Tech Categories

January

GDPR: Influence on U.S. Policy

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

Trump Administration’s Impact on Cybersecurity

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services

March

Identity-Centric Security: Identity as the New Perimeter

April

The FTC’s Role in Enforcing Security

May

Effective Incident Response and Remediation

June

HIPAA Enforcement Trends

July

DHS: Emerging Security Priorities

August

The Evolution of Targeted Attacks

September

DMARC: Effective in Fighting Phishing?

October

Leveraging Threat Intelligence

November

Addressing Security in Shift to the Cloud

December

2019 Legislative Outlook

Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.govinfosecurity.com

6

U.S. Edition

2018 Editorial Calendar

Month

Features

Tech Categories

January

GDPR: Compliance Insights

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

Applying Machine Learning

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services

March

Identity-Centric Security: Identity as the New Perimeter

April

Defending Against Ransomware and Digital Extortion

May

Effective Incident Response and Remediation

June

HIPAA Enforcement Trends

July

Threat Hunting: More Than a Catch Phrase?

August

Fighting Against Targeted Hacker Attacks

September

Effective Fraud-Fighting Strategies

October

Enterprise Internet of Things Security

November

Getting the Most from an MSSP

December

New Medical Device Security Issues

Executive Editor: Marianne Kolbasuk McGee | [email protected] |  @HealthInfoSec

Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.healthcareinfosecurity.com

7

US/UK/EU Edition

2018 Editorial Calendar

Month

Features

Tech Categories

January

GDPR: Compliance Insights

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

Applying Machine Learning

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services

March

Identity-Centric Security: Identity as the New Perimeter

April

Threat Modeling

May

Effective Incident Response and Remediation

June

Defending Against Ransomware and Digital Extortion

July

Threat Hunting: More Than a Catch Phrase?

August

The Evolution of Targeted Attacks

September

Operational Technology: Addressing the Risks

October

Enterprise Internet of Things Security

November

Getting the Most from an MSSP

December

IT Vendor Risk Management

Executive Editor: Mathew J. Schwartz | [email protected] |  @euroinfosec

Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.databreachtoday.com

8

US/UK/EU Edition

2018 Editorial Calendar

Month

Features

Tech Categories

January

GDPR: Compliance Insights

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

Applying Machine Learning

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services

March

Identity-Centric Security: Identity as the New Perimeter

April

IT Vendor Risk Management

May

Effective Incident Response and Remediation

June

Is Your InfoSec Team Big Enough?

July

Threat Hunting: More Than a Catch Phrase?

August

Mitigating the Insider Threat

September

Operational Technology: Addressing the Risks

October

Enterprise Internet of Things Security

November

Getting the Most from an MSSP

December

Cyber Insurance: Worth the Investment?

Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.inforisktoday.com

9

2018 Editorial Calendar

Month

Features

Tech Categories

January

The Internet of Things: A Career Changer?

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

What Skills Are Lacking on Your Incident Response Team?

March

How to Win the CISO Job

April

Behavioral Analytics: Building a Staff

May

Educating the Board of Directors on Security

June

Advanced SOC Operations: Building the Team

July

Building Endpoint Detection and Response Expertise

August

Learning More About Blockchain

September

Making the Case for a Bigger InfoSec Budget

October

Digital Forensics: Making the Right Hires

November

Managing Your MSSP

December

Developing Skills for Implementing New Security Tech

News Editor: Howard Anderson | [email protected] |  @ismg_editor

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.careersinfosecurity.com

10

India/Asia Edition

2018 Editorial Calendar

Month

Features

Tech Categories

January

GDPR: Compliance Insights for Asian Entities

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

Overcoming Aadhaar’s Privacy and Security Challenges

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services

March

India’s Imminent Data Privacy Legislation

April

Securing Cashless Transaction Infrastructure

May

Blockchain Technology Benefits for Banking

June

Defending Against Ransomware and Digital Extortion

July

Mobile Fraud Risk Management

August

Targeted Attacks in Asia

September

EMV Migration: Can Asia Share Its Formula for Success?

October

Identity-Centric Security: Identity as the New Perimeter

November

Asia’s Growing MSSP Market

December

Using Fraud Analytics Platforms

Executive Editor: Geetha Nandikotkur | [email protected] |  @AsiaSecEditor

Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.bankinfosecurity.asia

11

India/Asia Edition

2018 Editorial Calendar

Month

Features

Tech Categories

January

GDPR: Compliance Insights for Asian Entities

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

Applying Machine Learning

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services

March

Identity-Centric Security: Identity as the New Perimeter

April

Cloud Security Challenges in Developing Markets

May

Why Breach Notification Norms Are Important in Asia

June

Defending Against Ransomware and Digital Extortion

July

Threat Hunting: More Than a Catch Phrase?

August

Effective Incident Response and Remediation

September

Operational Technology: Addressing the Risks

October

Enterprise Internet of Things Security

November

Asia’s Growing MSSP Market

December

IT Vendor Risk Management

Executive Editor: Geetha Nandikotkur | [email protected] |  @AsiaSecEditor

Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.databreachtoday.asia

12

India/Asia Edition

2018 Editorial Calendar

Month

Features

Tech Categories

January

GDPR: Compliance Insights for Asian Entities

Endpoint Detection and Response/Endpoint Data Protection Platforms Web Application Firewalls

February

Blockchain Technology Benefits for Banking

Cloud Access Security Brokers/Cloud Workload Protection Platforms Managed Security Services

March

Identity-Centric Security: Identity as the New Perimeter

April

IT Vendor Risk Management

May

Effective Incident Response and Remediation

June

Is Your InfoSec Team Big Enough?

July

Threat Hunting: More Than a Catch Phrase?

August

Mitigating the Insider Threat: Asian Case Studies

September

Operational Technology: Addressing the Risks

October

Enterprise Internet of Things Security

November

Security and Board Room Agenda for Asian Leaders

December

Cyber Insurance: Worth the Investment?

Executive Editor: Geetha Nandikotkur | [email protected] |  @AsiaSecEditor

Enterprise Data Loss Prevention Deception Capability Intrusion Prevention and Detection Systems Infrastructure as Code/Programmable Infrastructure Big Data Security Analytics Disaster Recovery as a Service Enterprise Network Firewalls DevSecOps Enterprise Mobile Management Suites Threat Intelligence Data Center Backup and Recovery Software Next-Generation Security Operations Centers Identity and Access Management as a Service Unified Threat Management Application Security Testing IT Risk Management Solutions Business Continuity Management Planning Software Blockchain/Distributed Ledger Technology Identity Governance and Administration Network Performance Monitoring and Diagnostics

www.inforisktoday.asia

13

2018 Editorial Calendar

902 Carnegie Center • Princeton, NJ • 08540 • www.ismg.io 14