29th - 30th November 2017 | London, UK

Media Center

Exclusive Content

Threat Intelligence: How vendors are standing out from the crowd

At a recent infosec trade show, Cyber IQ explored the exhibition floor to find out how companies specialising in threat intelligence were keeping their voices heard above the noise in an increasingly busy market...

Read the full feature to get an inside perspective on:

  • The benefits of sizeable data and technology/service integration;
  • The common need for differentiation through trials and demonstrations;
  • The ‘selling point’ of specialist human skills and experience in threat intelligence;
  • The shift towards prevention over detection;
  • The level of buy-in from board level decision-makers;
  • The emerging threats and risks to SMEs;
  • The common questions customers are asking about threat intelligence solutions.

The challenge of finding threat intelligence solutions

According to recent figures (MarketsandMarkets), the global threat intelligence security market is expected to grow from $3.7 billion in 2015 to $5.5 billion by 2020 (at a CAGR of 14.3% during the forecast period), with North America expected to be the largest market on the basis of spending and adoption of the threat intelligence security market. 

However, as Cyber IQ recently explored, the concept of threat intelligence remains confusing for many businesses. This is in part due to the fact that many vendors in the information and cyber security space appear to be offering these solutions without necessarily catering to complex and individual needs...

Read what the experts think about the market - including insight from Vicki Gavin (Compliance Director, Head of Business Continuity and Information Security, The Economist Group) and Alan Millar (Senior Cyber Intelligence Manager, Capital One), who will be speaking at the Cyber Threat Intelligence & Incident Response event alongside many other industry end-users.

The state of the cyber threat intelligence market: insights from experts

Cyber incidences are increasing all over the world and the threat is real. Ahead of the 3rd annual Threat Intelligence and Incident Response Conference (28th-30th November 2017), we asked threat intelligence professionals from a range of industries for insight into their strategies at their respective companies. Find out what their main drivers are,challenges they are experiencing and if they are investing in solutions to help their cyber defence.

2017 Sample Attendee List

Take a look at the 2017 sample attendee list to see who you will meet at the event. 


Is your business prepared to respond to a data breach?

While many C-level executives have a strategy in place for cyber security, many have not included sufficient planning to handle the aftermath of a successful cyber attack. This infographic offers quick insight into what to be aware of, including:

  • Protecting valuable information
  • Ensuring business operations continue without interruption
  • Maintaining a trustworthy reputation
  • Risk factors that often go overlooked


Guide for Cybersecurity Event Recovery: U.S. Gov (NIST)

The National Institute of Standards and technology (U.S. Department of Commerce) has released SP800-184, a new draft guide that provides tactical and strategic guidance regarding the planning, playbook developing, testing, and improvement of recovery planning in the event of a cyber security incident.

The guide reinforces that much of the planning and documentation for recovery needs to be in place before the event occurs. To effectively plan, the draft guide recommends a number of key steps: threat modelling; understanding the identities that exist in the agency’s environment; using access controls, and ensuring data integrity. Read the document to get a sense of how U.S. experts are trying to enhance information security for the commercial sector.


8 Shocking Facts about Cyber Incident Response

“Unfortunately for many organizations, Incident Response is still primarily a reactive premise centered on a plan or policy document that describes how they should handle such an event. Alarmingly, many others have no plan or policy at all,” says Clint Sand, Sr. Director of Global Cyber Readiness and Response Services, Symantec. [Forbes] Companies need to be better trained to deal with cyber incidents and rather than merely trying to stop them from happening, must now make the assumption they will happen. Read all 8 eye-opening facts...

Exclusive Content

Sharing Cyber Threat Intelligence: Why business and law enforcement must renew its collaborative effort

As information security threats to private businesses continue to increase, the risk to public data broadens, undoubtedly demanding a stronger and more coordinated effort between the private industry and the authorities. From the Wikileaks (and alleged Russian hacker) involvement in the Democratic National Committee email dump this summer to the Sony email fallout of last year, attacks on organisations have had a frighteningly real impact on political influence, national security, foreign relations, health and safety, civil liberties, and the local economy. Law enforcement agencies, responsible as they are for maintaining peace and security, cannot simply sit back and expect vulnerable companies to come to them for assistance or guidance.

Read up on how law enforcement agencies and businesses are performing when it comes to integration on threat intelligence and incident response, including the latest initiatives to combat ransomware. The UK National Crime Agency, FBI and the City of London Police will all be addressing the delegation at this year's conference.

Why hiring the right personel is as important as a good solution

Threat intelligence has become an integral part of a companies cyber security protection, providing an analysis of the threat actors and risks that may impact and organisation. What does it take to be a good cyber intelligence professional? Are the skills required any different from the traditional intelligence sector? What do companies need to look for when hiring teams in a cyber intelligence programme? Ahead of the third Threat Intelligence and Incident Response conference (29th - 30th November), we asked four experts to give us their advice on that matter and an insight into their approach to hiring process.

Submission Form

Registration Form

To fast track your registration, please fill in this form and send back to enquire@iqpc.co.uk