Archive for the ‘Event’ Category


@CyberSec_EXPO call for speakers deadline 7th April

March 28, 2014

By Rosalind Carr, @Rosalind_at_O




In its first year, Cyber Security EXPO, part of IP EXPO Europe 2014, is in search of senior information security and technology experts to present at this targeted information security event. According to the event’s Content Director Mike England, “Cyber Security EXPO will delve into the issues set to disrupt the status quo in cyber security thinking with a view to providing visitors with a real understanding of the challenges that are impacting on their organisations.”

Taking place from 8th – 9th October 2014 at ExCeL London, Cyber Security EXPO will incorporate a dedicated CISO conference plus education theatres and a significant exhibition. It will examine major themes, including:

  • Internet & Network Security
  • Fighting Cyber-Crime
  • Log Data & Advanced Analytics
  • Identity & Privacy Protection
  • Cloud Security & Governance
  • Mobile Device Management

Read the rest of this entry ?


5 golden PR rules for events…

March 4, 2014

By Rosalind Carr @Rosalind_at_O and Rose Ross @Rose_at_O

 ipexpo-exhibitionnewsIn the midst of a busy events period, the O-team have had some tips from Désiré Athow(@desireathow), Editor of TechRadar Pro, and are armed with a trusty event PR checklist at the ready!



Here are 5 handy hints for PRs looking to make the most of event opportunities with the press…

 1.      Timing is key in the run up to events – Do not wait for the last week to invite journalists to briefings- pitch as early as possible to bag a slot in their diary! With an initial conversation in advance, you’ll also have the time to get a sense of what they’d like to discuss, and can prepare accordingly if a briefing is arranged.

2.      Communicating with the press – Each journalist is different in the way they like to be pitched. For instance, we can definitely understand Désiré’s aversion to out of the blue PR calls pitching interviews with unknown companies. However, there are now so many ways of communicating, that over time, you can gage different journalists’ preferences for contact. Read the rest of this entry ?


#RSAC DAY ONE – Pictures at an Exhibition – A parrot (a la Monty Python), a pirate, and Angela Merkel (Well a German oompah band anyway) and a chaos box

February 28, 2012

By Rose Ross, @Rose_at_O

A picture paints a thousand words so here is RSA Conference in San Francisco day one.

Have a chat with Poli the Parrot on the Techguard stand. (And as a brit I can’t resist a link to the infamous Monty Python Parrot Sketch)

On the pirate related theme, we spotted this guy escaped in the forest from the IOActive stand.

If you want to win something neat. Pop over to the Titus stand to take flight with a neat remote control helicopter. Someone will have to run the gauntlet in the Chaos cabinet to get data under control. Check out Kristian’s efforts.

And last but by no means least, the German IT security booth with lots of the finest security from the European powerhouse. This oompah band.

And of course the ladies serving beer yesterday would NOT have spilt bier on Angela Merkel (Here courtesy of the Huffington Post)



And the Innovation Sandbox winner is Appthority #RSAC

February 28, 2012

By Rose Ross, @Rose_at_O

Just a few minutes ago, the Security equivalent of the Oscars was announced. Despite the lack of glamourous dresses, there were still some very bright smiles. None so perhaps brighter than President and Founder and this year’s winner: Appthority – Domingo J Guerra. He said: ” Winning this confirms there is a need for mobile application risk management and that we are recognised as a winning approach for this.”

Unlike the champagne guzzling parties in LA last night, Domingo has more modest plans for celebration: “The team will enjoy dinner out and about tonight, but first we’ll enjoy chatting with RSA attendees upstairs” and on that note I am myself heading to the exhibition hall as the doors are about to open for the Welcome Reception.

See you all upstairs and don’t forget to say a big Hi and congratulations to Domingo and his team and also for the runners up (In no particular order):

  1. CloudPassage
  2. Content Raven
  3. Dome9 Security
  4. Impermium
  5. ionGrid
  6. MokaFive
  7. Pindrop Security
  8. Sonatype
  9. Sumo Logic

Putting a lid on this year’s sandbox, but hopefully everyone recognized will get a chance to raise a glass. Cheers!


Up close and personal Q and A with infosecurity Security Watch blogger @BrianHonan, a diamond from the Emerald Isle

January 18, 2012

By Rose Ross (@Rose_at_0)

As 2012 dawns, we have had the pleasure of getting an audience with renowned infosecurity blogger, Brian Honan. Keep an eye out for his blog SecurityWatch if you aren’t already a fan.

Q.  Tell us a bit about yourself:

I am an independent information security consultant based out of Dublin Ireland.  When not providing services to my clients I enjoy writing articles for various magazines, blogging to my own site and now to Infosecurity Magazine Blogs, editing the SANS NewsBites and writing the occasional books are one way that I can articulate some of my ideas and reach a wider audience.  I believe that a key element in our battle against criminals is sharing knowledge and information.  I don’t pretend to know all the answers but if some of what I write makes people think differently, discuss an issue in more detail or look at an issue in a different way, then it is worth the time and effort put into the piece.  I have also published and contributed to numerous whitepapers on information security and also speak regularly at various conferences and seminars.  I also founded and run Ireland’s Computer Emergency Response Team, IRISSCERT

Q. Tell us a little bit about the blogs you write for and their interest in data security.

My own blog, SecurityWatch, is where I do a lot of my posting.  Although, of late my rate of posting has dropped off.  Likewise I used to regularly blog to the Infosecurity Magazine blog but have not done so in a while.  One of my resolutions this year is to address this deficit and update both blogs more regularly.   SecurityWatch is my own company’s blog so I use it to make people aware of some of the work we do, new industry initiatives, upcoming security events and also post some of my musings on information security.  Infosecurity Magazine is one of the industry’s leading publications on information security and I tend to post more strategic or information security management issues.

Q. What’s hot in IT security this year?

I always worry when people focus on what is hot in IT security.  My concern is that if we look at what is hot we tend to overlook the basics which in turn can lead to system compromises.  However, providing organisations continue to take a risk based approach and address the basic disciplines in information security then the areas I see being hot this year are the consumerisation of IT, cloud computing, hacktivism and security awareness.  Consumerisation of IT covers not just allowing employees to use their smartphones, tablets or personal PCs to work on but also personal services such as personal email accounts, file sharing solutions, online collaboration tools and social networks.  Given the ease of use with these devices and services and also how tech savvy many people are today, those responsible for security can no longer simply ignore this issue and need to see how best to integrate into their work place and manage the associated risks.  Cloud computing will continue apace this year and as more and more business people see the benefits that the cloud can bring, IT security needs to grasp this nettle and ensure cloud is embraced into their organisations in a secure manner or they will be simply bypassed by the business.  Remember you do not need to be technical anymore to deploy and use many cloud services.  You simply need a credit card and a mouse.  Anonymous and other groups such as Lulzsec have focused the spotlight in 2011 onto hactivism with many major organisations hitting the headlines as a result, for all the wrong reasons.  However, while hacktivism is nothing new the increasing media exposure to the likes of Anonymous is encouraging many others to come forward and use the Internet as a means to demonstrate their displeasure at the way companies, individuals or governments are behaving.  So I see an increase in these type of attacks this year and already we are seeing an example of this with the tit for tat exchanges that are currently happening between activists in Israel and Saudi Arabia.  In order to help minimise the risk of the above topics and to address the traditional and on-going threats we face I see many organisations looking at how to better educate their users to be more aware of information security risks and how to deal with them.

Q. How many security events do you attend each year?

I try and attend as many as I can, work permitting.  Being based in Ireland means that for many major events I have to travel so I have to be rather choosy on which ones I go to.  I always make sure that each year I get to attend both Infosec Europe and RSA Europe.  I find these are great events to get to meet others in the industry and to keep up to date with what is going on.  Last year I attended and spoke at BsidesLondon and found it to be an excellent event and hope to attend again this year.  I also run the Irish CERT’s Annual Cybercrime conference in November and it is fast becoming one of the top security events in Ireland.  I also look to attend local chapter events for organisations such as ISSA, ISACA and OWASP.  These events are excellent in allowing people to network with their peers in the local area and to discuss issues of common interest.  If you cannot get to attend any of the major events I would strongly recommend people look towards their local ISSA, ISACA and OWASP chapters for their events.

Q. Which one are you most looking forward to?

I look forward to Infosec Europe and RSA Europe a lot as I get to meet friends and peers that I may not see as regularly as I wish.  It is often a chance to meet with new people or to come across a new product idea or interesting speaker.  While it requires a lot of work, the Irish CERT Cybercrime conference is also a favourite as it is an opportunity for us to invite great speakers to address an Irish audience and for those attending to network with each other.

Q. What types of stories or companies are likely to attract your attention this year?

Those that look at addressing the basic issues in IT security and look to engage with the community on dealing with those issues.  This approach though is not attractive to many in marketing as it requires investing time and resources in building up relationships and  can be a long slow burn to achieve any direct results.  But from the organisations I have seen take this approach the dividends gained can be quite large.

Q. What’s the best way to pitch a story to you? Email? Phone? Twitter? By mail?

Email is the best contact, brian.honan(at)bhconsulting(dot)ie or via Twitter @brianhonan.

Q. Who is worth listening to (about IT security) and what’s your favourite blog?

Those that are engaged in the trenches in dealing with IT security issues and tend not to put a marketing or sales spin onto the topic.  A good list of people on Twitter to follow is Tripwire’s Top 25 Influential People to Follow on Twitter

Q. What is your favourite piece of technology?

The Internet, I know it is composed of many different technologies but when you think about how it has changed our lives, both personal and business, it is amazing.

Q. What do you think is the most important development in IT security to date?

I think one of the most important developments in IT security to date is the information sharing forums or groups that have been set up to help organisations, both private and public, to share information and intelligence on criminal activities and devise strategies on how to address them.  While technology will help us tackle some of these threats, it is humans at the end of the day who are actually posing the threats and it will be humans working for the common good that ultimately can best address those threats.   So the setting up and running of the first CERT, CERT/CC, was a major forwarding initiative and one that is still paying dividends today.

Q. What is the best piece of advice for companies pitching stories?

Avoid the FUD (Fear Uncertainty and Doubt) approach, the sky is not going to fall if someone does not use your product/service.  Yes do highlight the issue but address it in a pragmatic way.  Also don’t brand your solution to solve the latest security buzzword or that your product could have prevented the latest headline security breach.

Q. Are you a social media lover? Which ones are you on? FB? LinkedIn? Twitter?

I love social media as it provides me with the opportunity to keep in touch with friends and peers and access the thoughts of some of the best minds in the industry. While I have a profile on Facebook I am not as active there as I very wary about the way Facebook deals with the privacy of its users.  I am very active on Twitter (@brianhonan) and LinkedIn (

Copyright ©Launchpad Europe 2012. All rights reserved. You may copy and distribute this material as long as  you credit the author where possible; the copies are distributed only for non-commercial purposes and at no charge; and you include this copyright notice and link to, the original source of the work.

If you have any questions, please contact Launchpad Europe,


Cloudcamp London – Goes Big Data with some Infosec twists for one night only!

January 16, 2012

By Rose Ross, AKA @Rose_at_0


I’ve just blogged about the upcoming CloudCamp London on Big Data for but wanted to shout out one of the lightning talks which will make this event of interest to the Infosecurity world too! Full post here:


Chris Swan from UBS will be giving a lightning talk on “Security Information and Event Management – a big data problem. A look at how big data tools are being used for security monitoring”.


I have chatted with and listened to Chris before at Cloudcamps in the past and he’ll no doubt have some Infosec pearls of wisdom on Big Data to share. If Big Data is starting to appear on your Infosec radar it is definitely worth getting yourself down to the Crypt on the evening of 25th Jan. And as always to round off the evening beer and pizza. A perfect Cloudcamp evening for sure! See you there!

More at


Infosecurity Europe Call for Papers closes on Friday 16th December #Infosec12

December 1, 2011

By Rose Ross, @Rose_at_O

As the christmas lights start twinkling in shop windows and people’s living rooms, it isn’t all mince pies and tinsel in IT security land. Oh no, there are still plenty of deadlines speeding towards us with great velocity. One to be mindful of, as we cruise into the 2011 holiday season, is the call for papers deadline of Infosecurity Europe. The show itself will take place in late April, but the call for papers closes on December 16th this year.

<!– –>The Business Strategy Theatre and Technical Theatre Presentation Submissions are now open.
All submissions will be considered.EXHIBITORS
Exhibitors should submit their presentations through the Exhibitor Zone – Click on the ‘Business Strategy Theatre and Technical Theatre Presentation Submission’ option.

ArrowLogin to the Exhibitor Zone now >>

If you are not currently confirmed as an exhibitor at Infosecurity Europe 2012 follow the link below and complete the online form and a member of the sales team will contact you shortly.

ArrowComplete the enquiry form for non-exhibitors  >>