Invisible at Infosecurity Europe 2014? Definitely Not
The major tube strike that was conducted in London during the first two days of Infosecurity Europe 2014 didn’t seem to have had an impact on the visitors count. Held from April 30 to May 1 at Earl’s Court, Infosecurity Europe is the biggest IT Security related exhibition in Europe, and supposedly brought close to 15,000 visitors there this year. And of course, we participated with a stand and speaking sessions, not to miss out on the opportunity to meet up with customers and prospects.
So what was hot there? It seemed to me, and to everyone else who were visiting, that all vendors were trying to say the same thing. “Enterprise Security”, “Vulnerability Management”, “Privileged Identity Management”, “Cloud Security”, “Compliance”, “Mobile Security”…. You could literally see visitors standing in the corridors gazing at all the keywords on exhibitor’s stand walls, wondering which one to visit, wondering what they were supposed to learn more about during the show.
Cybercrime is increasing at an unbelievable rate, and let’s face it, all company knows by now that you need IT security. Security is a major business enabler for every company in any sector. So what was our goal there? Well, to educate CISOs and IT Security Managers about what they _didn’t know yet_ about some parts of their IT security, and we definitely stood out on the following two topics:
- “Is SSH the next cyber-weapon?”- We did a presentation at the Technology Showcase Theatre on this topic, and it was a full-house, with people standing in the back to get a glimpse of our presenter. IT administrators who know all about the SSH protocol were curious to find out how on earth the encryption protocol itself could become a cyber-weapon. Wow, were they surprised after our 25-min presentation! If you missed this, it’s not too late for you! Watch our on-demand webinar from here: http://pages.ssh.com/cyber-weapon.html
- “Encrypted Channel Monitoring” - It was amazing to see how many visitors stopped _to think_ when they saw these words on our stand wall. We could see their eyes twinkle with curiosity, a big question mark, and the urge to learn more what it’s all about. YES; you need to monitor and audit your encrypted traffic. If we managed to get you curious, you can learn more about this particular subject from here: http://www.ssh.com/products/crypto-auditor
To sum up, all I can say is, we were definitely not invisible at Infosecurity Europe this year. On the contrary.