29th - 30th November 2017 | London, UK

Media Center

Featured Download

Threat Intelligence: How vendors are standing out from the crowd

At a recent infosec trade show, Cyber IQ explored the exhibition floor to find out how companies specialising in threat intelligence were keeping their voices heard above the noise in an increasingly busy market...

Is your business prepared to respond to a data breach?

While many C-level executives have a strategy in place for cyber security, many have not included sufficient planning to handle the aftermath of a successful cyber attack. This infographic offers quick insight into what to be aware of, including:

Guide for Cybersecurity Event Recovery: U.S. Gov (NIST)

The National Institute of Standards and technology (U.S. Department of Commerce) has released SP800-184, a new draft guide that provides tactical and strategic guidance regarding the planning, playbook developing, testing, and improvement of recovery planning in the event of a cyber security inci ...

The challenge of finding threat intelligence solutions

According to recent figures (MarketsandMarkets), the global threat intelligence security market is expected to grow from $3.7 billion in 2015 to $5.5 billion by 2020 (at a CAGR of 14.3% during the forecast period), with North America expected to be the largest market on the basis of spending and ...

8 Shocking Facts about Cyber Incident Response

“Unfortunately for many organizations, Incident Response is still primarily a reactive premise centered on a plan or policy document that describes how they should handle such an event. Alarmingly, many others have no plan or policy at all,” says Clint San ...

The state of the cyber threat intelligence market: insights from experts

Cyber incidences are increasing all over the world and the threat is real. Ahead of the 3rd annual Threat Intelligence and Incident Response Conference (28th-30th November 2017), we asked threat intelligence professionals from a range of industries for insight into their strategies at their respe ...

2017 Sample Attendee List

Take a look at the 2017 sample attendee list to see who you will meet at the event. 

Additional Content Download

Sharing Cyber Threat Intelligence: Why business and law enforcement must renew its collaborative effort

As information security threats to private businesses continue to increase, the risk to public data broadens, undoubtedly demanding a stronger and more coordinated effort between the private industry and the authorities. From the Wikileaks (and alleged Russian hacker) involvement in the Democratic National Committee email dump this summer to the...

Registration Form

To fast track your registration, please fill in this form and send back to enquire@iqpc.co.uk . 

Why hiring the right personel is as important as a good solution

Threat intelligence has become an integral part of a companies cyber security protection, providing an analysis of the threat actors and risks that may impact and organisation. What does it take to be a good cyber intelligence professional? Are the skills required any different from the traditional intelligence sector? What...