Feeds

Infosec surfs in on self-propagating scaremongering

Enter the insufferable hype machine

The Power of One eBook: Top reasons to choose HP BladeSystem

Opinion Infosec, the annual IT security trade show, has always been a place to do deals rather than to unveil new research or make significant product announcements.

Over the years the conference has attracted a steady stream of high-profile speakers - last year former Home Secretary David Blunkett featured in the line-up. With the general election just days away it's understandable that no politicians made the show this year. Air travel disruption precipitated by the Icelandic volcano meant that some US-based chief execs failed to make the conference this year as well.

What was left was more than 300 firms competing for attention at an Earl's Court venue that by mid afternoon Tuesday began to resemble a sauna. Infosec bills itself as "Europe’s number one information security event" but the truth is there's more news and high profile speakers at RSA Europe or even the security fringe of shows such as CeBIT or 3GSM. RSA Europe, for example, had presentations by the Information Commissioner and rogue trader Nick Leeson last October.

Infosec had to make do with one of six deputy Information Commissioners as its headliner. Not so good.

New digs for Infosec

Will the last vendor with any news please turn off the lights.

If 3GSM is the mobile world's Glastonbury then Infosec is the high-tech equivalent of the Adam Ant comeback gig. Delegates want it to work but it's well past its prime and hovers on the edge of a breakdown. Where the conference works, and works well, is as an opportunity for US vendors to meet channel partners. It's also a place for buyers to size up the market and for sales folk to generate leads. It's a channel event, and a good one, but this is not how it's sold. And therein lies the problem.

There's plenty of exciting new research going on in the security field but that research is presented at conferences like Source Boston and Black Hat Europe - which both occurred this month alone. No substantive research was presented at Infosec and few security researchers attended. Instead Infosec is full of security marketing people and other suits.

The biggest stands at the show were maintained by anti-virus vendors. But dive down through the list and you'll see a number of former stalwarts of the show have drifted away. There was no BT or Microsoft, for example. I've attended Infosec every year since 1997 and each time I've got less and less news out of it. These days I use the conference as a chance to catch up with people I normally only speak to on the phone.

The show also lacks the focus of more specialist events, such as the e-Crime Congress. Ironically this was the problem the Network Telecom Birmingham used to have in comparison with Infosec prior to the demise of that little-missed show.

This year vendors were talking about compliance or cloud computing or simply what they did. Nobody had a significant announcement and this has been the pattern for several years.

Judging by its first day, Infosec show numbers seem to be holding up. Last year 12,445 people visited the show. Exhibitor numbers are also about the same as last year.

Infosec remains by all appearances and certainly by the testimony of its own hype machine a big commercial success. Nonetheless it needs to reinvent itself to stay relevant. Now in its fifteenth year, Infosec needs to move on from being a troubled teenager onto adulthood. Greater change than just moving digs from Olympia, its digs for over a decade, to Earl's Court can't come soon enough. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.