2019
EDITORIAL CALENDARS
Key topics that will shape our discussions
1
Editor’s Note
2019 Editorial Calendars Our Guide to Global Coverage of Critical Issues I’m pleased to present Information Security Media Group’s 2019 Editorial Calendars. This document includes the hot topics and key sponsorship opportunities across all of our global media properties—BankInfoSecurity, CUInfoSecurity, GovInfoSecurity, HealthcareInfoSecurity, DataBreachToday, CareersInfoSecurity and InfoRiskToday. Our coverage is truly global, featuring region-specific content for both Europe and Asia as well as the United States.
Tom Field SVP Editorial
ISMG publishes websites, and not print magazines, so we take a different approach to covering timely topics than a print publication. While each of these editorial calendar items will be given significant attention in a given month, they are not the only topics we’ll focus on during that period. Nor will key topics be addressed only once during the year. We encourage you to use these editorial calendars as a guide to the dozens of security and technology topics we address each day across our media properties. If you have any questions about sponsorship opportunities, please contact our sales team. If you have any questions about our editorial calendar topics, or if you have an idea or a source you’d like to share, please feel free to contact me or any of our editorial team members pictured on the following page. Thank you,
Tom Field SVP Editorial
[email protected]
2019 Editorial Calendars
2
Editorial Team No other IT security and risk management publisher has put more emphasis on the quality of content. Information Security Media Group offers 100 percent original content prepared by the largest team of journalists serving the industry. Our readers rely on our experienced editors to provide them with the news and analysis they need to make the right decisions about IT security and risk management. You can be confident that your product messaging will be positioned adjacent to high-quality editorial content that’s unsurpassed for quality, timeliness, accuracy and thoroughness. Tom Field SVP Editorial
Howard Anderson
Nick Holland
Marianne Kolbasuk McGee
Mathew J. Schwartz
News Editor
Director, Banking and Payments
Executive Editor, HealthcareInfoSecurity
Executive Editor, DataBreachToday & Europe
Geetha Nandikotkur
Jeremy Kirk
Suparna Goswami
Managing Editor, Asia & the Middle East
Managing Editor, Security and Technology
Principal Correspondent
Contact
[email protected] or call (800) 944-0401 to to learn how to sync your messaging with our editorial content on a specific topic. 3
US/UK/EU Edition
2019 Editorial Calendar
Month
Features
January
Vendor Risk Management
February
Authentication for Account Onboarding
March
Managing IOT Risks
April
The Evolution of Skimming, Jackpotting Attacks
May
Defenses Against Ransomware, Digital Extortion
June
Financial Services Cybersecurity Frameworks
July
Protecting Against Insider Threats
August
The Art of Threat Hunting
September
Business Email Compromises: How to Block
October
AI & ML Security Trends
November
The Role of PCI in Broader Compliance Strategies
December
DevSecOps
Executive Editor: Nick Holland |
[email protected] | @nickster2407
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.bankinfosecurity.com
4
US/UK/EU Edition
2019 Editorial Calendar
Month
Features
January
Vendor Risk Management
February
Authentication for Account Onboarding
March
Managing IOT Risks
April
The Evolution of Skimming, Jackpotting Attacks
May
Defenses Against Ransomware, Digital Extortion
June
Financial Services Cybersecurity Frameworks
July
Protecting Against Insider Threats
August
The Art of Threat Hunting
September
Business Email Compromises: How to Block
October
AI & ML Security Trends
November
The Role of PCI in Broader Compliance Strategies
December
DevSecOps
Executive Editor: Nick Holland |
[email protected] | @nickster2407
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.cuinfosecurity.com
5
U.S. Edition
2019 Editorial Calendar
Month
Features
January
Voting Infrastructure Security
February
Incident Response and Remediation
March
Congressional Cybersecurity Legislative Activity
April
Latest HIPAA Enforcement Trends
May
Defenses Against Ransomware, Digital Extortion
June
GDPR and Privacy Trends
July
Protecting Against Insider Threats
August
The Art of Threat Hunting
September
FTC’s Emerging Security Priorities
October
AI & ML Security Trends
November
DHS: Cybersecurity Priorities
December
2020 Legislative Outlook
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.govinfosecurity.com
6
U.S. Edition
2019 Editorial Calendar
Month
Features
January
Vendor Risk Management
February
Fighting Targeted Healthcare Cyberattacks
March
Managing IOT Risks
April
Latest HIPAA Enforcement Trends
May
Defenses Against Ransomware, Digital Extortion
June
When Attacks Affect Patient Care
July
Protecting Against Insider Threats
August
The Art of Threat Hunting
September
Business Email Compromises: How to Block
October
AI & ML Security Trends
November
Tackling Medical Device Cybersecurity Issues
December
DevSecOps
Executive Editor: Marianne Kolbasuk McGee |
[email protected] | @HealthInfoSec
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.healthcareinfosecurity.com
7
US/UK/EU Edition
2019 Editorial Calendar
Month
Features
January
Vendor Risk Management
February
Incident Response and Remediation
March
Managing IOT Risks
April
Authentication Innovations
May
Defenses Against Ransomware, Digital Extortion
June
GDPR’s Global Impact
July
Protecting Against Insider Threats
August
The Art of Threat Hunting
September
Business Email Compromises: How to Block
October
AI & ML Security Trends
November
Enhancing Application Security
December
DevSecOps
Executive Editor: Mathew J. Schwartz |
[email protected] | @euroinfosec
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.databreachtoday.com
8
US/UK/EU Edition
2019 Editorial Calendar
Month
Features
January
Vendor Risk Management
February
Balancing Privacy, Security Issues
March
Managing IOT Risks
April
When Using an MSSP Makes Sense
May
Defenses Against Ransomware, Digital Extortion
June
GDPR’s Global Impact
July
Protecting Against Insider Threats
August
The Art of Threat Hunting
September
Business Email Compromises: How to Block
October
AI & ML Security Trends
November
The C-Suite’s Role in Cybersecurity
December
Setting Security Priorities for 2020
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.inforisktoday.com
9
Global
2019 Editorial Calendar
Month
Features
January
The CISO’s Role in Vendor Risk Management
February
Balancing Privacy, Security Issues
March
Managing IOT Risks
April
Making the Right Authentication Choices
May
Building an Advanced SOC
June
When Using an MSSP Makes Sense
July
New Duties for CISOs
August
The Art of Threat Hunting
September
Winning Funding for Cybersecurity
October
Selecting the Right Emerging Technologies
November
The C-Suite’s Role in Cybersecurity
December
Hiring Digital Forensics Specialists
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.careersinfosecurity.com
10
India/Asia Edition
2019 Editorial Calendar
Month
Features
January
Vendor Risk Management
February
Data Localization
March
Managing IOT Risks
April
Aadhaar Authentication
May
Defenses Against Ransomware, Digital Extortion
June
Data Protection Requirements Evolve
July
Protecting Against Insider Threats
August
The Art of Threat Hunting
September
Business Email Compromises: How to Block
October
AI & ML Security Trends
November
Securing Cashless Transaction Infrastruture
December
DevSecOps
Executive Editor: Geetha Nandikotkur |
[email protected] | @AsiaSecEditor
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.bankinfosecurity.asia
11
India/Asia Edition
2019 Editorial Calendar
Month
Features
January
Vendor Risk Management
February
Data Localization
March
Managing IOT Risks
April
Aadhaar Authentication
May
Defenses Against Ransomware, Digital Extortion
June
Evolving Breach Notification Requirements
July
Protecting Against Insider Threats
August
The Art of Threat Hunting
September
Business Email Compromises: How to Block
October
Social Media Regulation
November
Securing Cashless Transaction Infrastruture
December
DevSecOps
Executive Editor: Geetha Nandikotkur |
[email protected] | @AsiaSecEditor
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.databreachtoday.asia
12
India/Asia Edition
2019 Editorial Calendar
Month
Features
January
Vendor Risk Management
February
Data Localization
March
Managing IOT Risks
April
Aadhaar Authentication
May
Defenses Against Ransomware, Digital Extortion
June
When Using an MSSP Makes Sense
July
Protecting Against Insider Threats
August
The Art of Threat Hunting
September
Business Email Compromises: How to Block
October
Social Media Regulation
November
Building a Security Team
December
DevSecOps
Executive Editor: Geetha Nandikotkur |
[email protected] | @AsiaSecEditor
Tech Categories Cloud Access Security Brokers Enterprise Mobility Management
Application Security Testing Anti-Phishing, DMARC
Advanced SOC Operations Data Loss Prevention
Identity & Access Management Security Information & Event Management
EDR and EPP User & Entity Behavioral Analytics
Active Defense/Deception Technologies Threat Intelligence
Threat Hunting Security Analytics
Device Identification Infrastructure as Code
Secure Development Lifecycle Management Threat Modelling
Threat Intelligence Blockchain/Distributed Ledger Applications
Containerization & Sandboxing Hardware-level Security
Operational Technology/SCADA Privileged Access Management
www.inforisktoday.asia
13
2019 Editorial Calendar
CyberEd
902 Carnegie Center • Princeton, NJ • 08540 • www.ismg.io 14