calendars


[PDF]calendars - Rackcdn.comhttps://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackc...

4 downloads 104 Views 2MB Size

2019

EDITORIAL CALENDARS

Key topics that will shape our discussions

1

Editor’s Note

2019 Editorial Calendars Our Guide to Global Coverage of Critical Issues I’m pleased to present Information Security Media Group’s 2019 Editorial Calendars. This document includes the hot topics and key sponsorship opportunities across all of our global media properties—BankInfoSecurity, CUInfoSecurity, GovInfoSecurity, HealthcareInfoSecurity, DataBreachToday, CareersInfoSecurity and InfoRiskToday. Our coverage is truly global, featuring region-specific content for both Europe and Asia as well as the United States.

Tom Field SVP Editorial

ISMG publishes websites, and not print magazines, so we take a different approach to covering timely topics than a print publication. While each of these editorial calendar items will be given significant attention in a given month, they are not the only topics we’ll focus on during that period. Nor will key topics be addressed only once during the year. We encourage you to use these editorial calendars as a guide to the dozens of security and technology topics we address each day across our media properties. If you have any questions about sponsorship opportunities, please contact our sales team. If you have any questions about our editorial calendar topics, or if you have an idea or a source you’d like to share, please feel free to contact me or any of our editorial team members pictured on the following page. Thank you,

Tom Field SVP Editorial [email protected]

2019 Editorial Calendars

2

Editorial Team No other IT security and risk management publisher has put more emphasis on the quality of content. Information Security Media Group offers 100 percent original content prepared by the largest team of journalists serving the industry. Our readers rely on our experienced editors to provide them with the news and analysis they need to make the right decisions about IT security and risk management. You can be confident that your product messaging will be positioned adjacent to high-quality editorial content that’s unsurpassed for quality, timeliness, accuracy and thoroughness. Tom Field SVP Editorial

Howard Anderson

Nick Holland

Marianne Kolbasuk McGee

Mathew J. Schwartz

News Editor

Director, Banking and Payments

Executive Editor, HealthcareInfoSecurity

Executive Editor, DataBreachToday & Europe

Geetha Nandikotkur

Jeremy Kirk

Suparna Goswami

Managing Editor, Asia & the Middle East

Managing Editor, Security and Technology

Principal Correspondent

Contact [email protected] or call (800) 944-0401 to to learn how to sync your messaging with our editorial content on a specific topic. 3

US/UK/EU Edition

2019 Editorial Calendar

Month

Features

January

Vendor Risk Management

February

Authentication for Account Onboarding

March

Managing IOT Risks

April

The Evolution of Skimming, Jackpotting Attacks

May

Defenses Against Ransomware, Digital Extortion

June

Financial Services Cybersecurity Frameworks

July

Protecting Against Insider Threats

August

The Art of Threat Hunting

September

Business Email Compromises: How to Block

October

AI & ML Security Trends

November

The Role of PCI in Broader Compliance Strategies

December

DevSecOps

Executive Editor: Nick Holland | [email protected] |  @nickster2407

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.bankinfosecurity.com

4

US/UK/EU Edition

2019 Editorial Calendar

Month

Features

January

Vendor Risk Management

February

Authentication for Account Onboarding

March

Managing IOT Risks

April

The Evolution of Skimming, Jackpotting Attacks

May

Defenses Against Ransomware, Digital Extortion

June

Financial Services Cybersecurity Frameworks

July

Protecting Against Insider Threats

August

The Art of Threat Hunting

September

Business Email Compromises: How to Block

October

AI & ML Security Trends

November

The Role of PCI in Broader Compliance Strategies

December

DevSecOps

Executive Editor: Nick Holland | [email protected] |  @nickster2407

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.cuinfosecurity.com

5

U.S. Edition

2019 Editorial Calendar

Month

Features

January

Voting Infrastructure Security

February

Incident Response and Remediation

March

Congressional Cybersecurity Legislative Activity

April

Latest HIPAA Enforcement Trends

May

Defenses Against Ransomware, Digital Extortion

June

GDPR and Privacy Trends

July

Protecting Against Insider Threats

August

The Art of Threat Hunting

September

FTC’s Emerging Security Priorities

October

AI & ML Security Trends

November

DHS: Cybersecurity Priorities

December

2020 Legislative Outlook

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.govinfosecurity.com

6

U.S. Edition

2019 Editorial Calendar

Month

Features

January

Vendor Risk Management

February

Fighting Targeted Healthcare Cyberattacks

March

Managing IOT Risks

April

Latest HIPAA Enforcement Trends

May

Defenses Against Ransomware, Digital Extortion

June

When Attacks Affect Patient Care

July

Protecting Against Insider Threats

August

The Art of Threat Hunting

September

Business Email Compromises: How to Block

October

AI & ML Security Trends

November

Tackling Medical Device Cybersecurity Issues

December

DevSecOps

Executive Editor: Marianne Kolbasuk McGee | [email protected] |  @HealthInfoSec

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.healthcareinfosecurity.com

7

US/UK/EU Edition

2019 Editorial Calendar

Month

Features

January

Vendor Risk Management

February

Incident Response and Remediation

March

Managing IOT Risks

April

Authentication Innovations

May

Defenses Against Ransomware, Digital Extortion

June

GDPR’s Global Impact

July

Protecting Against Insider Threats

August

The Art of Threat Hunting

September

Business Email Compromises: How to Block

October

AI & ML Security Trends

November

Enhancing Application Security

December

DevSecOps

Executive Editor: Mathew J. Schwartz | [email protected] |  @euroinfosec

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.databreachtoday.com

8

US/UK/EU Edition

2019 Editorial Calendar

Month

Features

January

Vendor Risk Management

February

Balancing Privacy, Security Issues

March

Managing IOT Risks

April

When Using an MSSP Makes Sense

May

Defenses Against Ransomware, Digital Extortion

June

GDPR’s Global Impact

July

Protecting Against Insider Threats

August

The Art of Threat Hunting

September

Business Email Compromises: How to Block

October

AI & ML Security Trends

November

The C-Suite’s Role in Cybersecurity

December

Setting Security Priorities for 2020

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.inforisktoday.com

9

Global

2019 Editorial Calendar

Month

Features

January

The CISO’s Role in Vendor Risk Management

February

Balancing Privacy, Security Issues

March

Managing IOT Risks

April

Making the Right Authentication Choices

May

Building an Advanced SOC

June

When Using an MSSP Makes Sense

July

New Duties for CISOs

August

The Art of Threat Hunting

September

Winning Funding for Cybersecurity

October

Selecting the Right Emerging Technologies

November

The C-Suite’s Role in Cybersecurity

December

Hiring Digital Forensics Specialists

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.careersinfosecurity.com

10

India/Asia Edition

2019 Editorial Calendar

Month

Features

January

Vendor Risk Management

February

Data Localization

March

Managing IOT Risks

April

Aadhaar Authentication

May

Defenses Against Ransomware, Digital Extortion

June

Data Protection Requirements Evolve

July

Protecting Against Insider Threats

August

The Art of Threat Hunting

September

Business Email Compromises: How to Block

October

AI & ML Security Trends

November

Securing Cashless Transaction Infrastruture

December

DevSecOps

Executive Editor: Geetha Nandikotkur | [email protected] |  @AsiaSecEditor

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.bankinfosecurity.asia

11

India/Asia Edition

2019 Editorial Calendar

Month

Features

January

Vendor Risk Management

February

Data Localization

March

Managing IOT Risks

April

Aadhaar Authentication

May

Defenses Against Ransomware, Digital Extortion

June

Evolving Breach Notification Requirements

July

Protecting Against Insider Threats

August

The Art of Threat Hunting

September

Business Email Compromises: How to Block

October

Social Media Regulation

November

Securing Cashless Transaction Infrastruture

December

DevSecOps

Executive Editor: Geetha Nandikotkur | [email protected] |  @AsiaSecEditor

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.databreachtoday.asia

12

India/Asia Edition

2019 Editorial Calendar

Month

Features

January

Vendor Risk Management

February

Data Localization

March

Managing IOT Risks

April

Aadhaar Authentication

May

Defenses Against Ransomware, Digital Extortion

June

When Using an MSSP Makes Sense

July

Protecting Against Insider Threats

August

The Art of Threat Hunting

September

Business Email Compromises: How to Block

October

Social Media Regulation

November

Building a Security Team

December

DevSecOps

Executive Editor: Geetha Nandikotkur | [email protected] |  @AsiaSecEditor

Tech Categories Cloud Access Security Brokers Enterprise Mobility Management

Application Security Testing Anti-Phishing, DMARC

Advanced SOC Operations Data Loss Prevention

Identity & Access Management Security Information & Event Management

EDR and EPP User & Entity Behavioral Analytics

Active Defense/Deception Technologies Threat Intelligence

Threat Hunting Security Analytics

Device Identification Infrastructure as Code

Secure Development Lifecycle Management Threat Modelling

Threat Intelligence Blockchain/Distributed Ledger Applications

Containerization & Sandboxing Hardware-level Security

Operational Technology/SCADA Privileged Access Management

www.inforisktoday.asia

13

2019 Editorial Calendar

CyberEd

902 Carnegie Center • Princeton, NJ • 08540 • www.ismg.io 14