December 4-6, 2017
Florida, USA

Media Center

2017 Cyber Security Exchange

Download the Cyber Security Exchange 2017 AgendaThe 2017 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the Cyber... Read More

Whitepapers

Creating a Security Awareness Program that Sticks

Let’s face it – someone out there wants your sensitive data. Smishing. Spear Phishing. Clickjacking. We are bombarded everyday with headlines shouting the new and inventive ways attackers are coming after our sensitive information and the catastrophic consequences when they actually get their hands on it. By now, security education should be a... Read More

Submission Form

The State of Information Security Awareness: Trends & Developments

Take an in depth look at global gindings from the Ponemon Research Institute and Security... Read More

The Essential Guide To Online Security

Often with security and privacy concerns there exist trade-offs with usability and complexity.The most secure user is often the one who doesn’t use the Internet, but if you would like to climb out from under your rock to join the rest of us on the Internet, this guide is here to help you. Getting to a point where you can be reasonably confident... Read More

Cyber Security in the Information Age

In the age of all things digital, almost every single person has left a footprint on the World Wide Web. We post and share information at the touch of a button, without much thought about where that information may go. With so much data being transmitted on a daily basis, there are those who use the relative anonymity of the internet to... Read More

Cyber Security Priorities: What Will Matter To CISOs?

We surveyed Chief Information Security Officers at last years Cyber Security Exchange on what important investments they are looking to make in 2017. These are the results of a survey given to senior-level cyber security executives from some of the world’s largest organizations. Our FREE graphic can be downloaded here!... Read More

CASE STUDY: An Event Above the Rest

In this case study, Skipstone gives qualitative details abouttheir experience sponsoring with IQPC Exchange. Skipstonegives examples of how an Exchange, an exclusive in-personevent with decision maker attendees, is different from otherevents and how the Exchange has helped further their business... Read More

2017 Sponsorship Brochure

Download the Cyber Security Sponsorship BrochureThe 2017 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the Cyber... Read More

Reports

Event Materials

2016 Cyber Security Post Report

The 2016 Cyber Security Exchange post-event report features interviews with speakers, attendee lists, event photos and videos and more! Learn more about the event by downloading the report below.... Read More

Is BYOD (Bring Your Own Device) Worth the Risk?

As technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more productive mobile workplace at the expense of security, or do we sacrifice productivity for peace of mind? Inside: • The case for and against BYOD •... Read More