December 03 - 05, 2018
The Ritz-Carlton, Amelia Island, FL

Media Center

2017 Cyber Security Exchange Agenda Brochure

The 2017 Cyber Security Exchange will provide the Chief Information Security Officers/ Chief Information Officers and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increa ...

Featured Download

Creating a Security Awareness Program that Sticks

Let’s face it – someone out there wants your sensitive data. Smishing. Spear Phishing. Clickjacking. We are bombarded everyday with headlines shouting the new and inventive ways attackers are coming after our sensitive information and the catastrophic consequences when they actually get their hands ...

The State of Information Security Awareness: Trends & Developments

Take an in depth look at global gindings from the Ponemon Research Institute and Security Innovation.

The Essential Guide To Online Security

Often with security and privacy concerns there exist trade-offs with usability and complexity.The most secure user is often the one who doesn’t use the Internet, but if you would like to climb out from under your rock to join the rest of us on the Internet, this guide is here to help you. Getting to ...

Cyber Security in the Information Age

In the age of all things digital, almost every single person has left a footprint on the World Wide Web. We post and share information at the touch of a button, without much thought about where that information may go. With so much data being transmitted on a daily basis, there are those who use the ...

Cyber Security Priorities: What Will Matter To CISOs?

We surveyed Chief Information Security Officers at last years Cyber Security Exchange on what important investments they are looking to make in 2017. These are the results of a survey given to senior-level cyber security executives from some of the world’s largest organizations. Our FREE graphic can ...

CASE STUDY: An Event Above the Rest

In this case study, Skipstone gives qualitative details abouttheir experience sponsoring with IQPC Exchange. Skipstonegives examples of how an Exchange, an exclusive in-personevent with decision maker attendees, is different from otherevents and how the Exchange has helped further their business goa ...

2017 Sponsorship Brochure

Download the Cyber Security Sponsorship BrochureThe 2017 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyb ...

Six Traits of a Great CISO

In the c-suite, often the greatest emphasis is placed on leadership, communications skills, and business savvy. A great CISO, however, needs to bring much more to the table. They’re multidimensional: possessing all these ...

Reports

2016 Cyber Security Post Report

The 2016 Cyber Security Exchange post-event report features interviews with speakers, attendee lists, event photos and videos and more! Learn more about the event by downloading the report below.

The Human Side of Cybersecurity: An Exclusive Q&A with Southeastern Grocers CISO Chris Gay

Chris Gay, VP and Chief Information Security Officer of Southeastern Grocers and advocate for cyber security education, will be leading a roundtable discussion on the topic at the upcoming Cyber Security Exchange in Amelia Island, Florida, this December 4-6. Ahead of the Exchange, we sat down with him to talk...

Is BYOD (Bring Your Own Device) Worth the Risk?

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind? Inside: •...

Is BYOD (Bring Your Own Device) Worth the Risk?

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind? Inside: •...

Is BYOD (Bring Your Own Device) Worth the Risk?

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind?It’s a tough...