Sponsorship Opportunities


Sponsorship provides your company with an excellent way to:

  • Create, maintain and enhance brand awareness 
  • Elevate your profile in the eyes of End-Users
  • Generate new leads
  • Foster relationships with current clients
  • Intellectually influence your industry peers

    We offer a wide variety of standard sponsorship packages designed to meet each of these objectives. These range from keynote Platinum sponsorship to hospitality-based packages and exhibition stands. Our consultative approach also allows for more specific tailor made packages to be designed to meet your precise needs and budget. You are welcome to submit your request for receiving information about concrete package:

    • Hall Sponsorship (1 or 3 days)
    • Main Stage Sponsorship (1 or 3 days)
    • Registration Zone Sponsorship (3 days)
    • Badge Band Sponsorship (3 days)
    • Visitors Bag Sponsorship (3 days)
    • Fourchette Sponsorship (1 day)
    • Souvenirs Sponsorship (T-shirts / notebooks / pens - 3 days)
    • Networking Bar Sponsorship (3 days)
    • VisitorsLounge Sponsorship (3 days)
    • ITsec Award Sponsorship 
    • VIP-Lounge Sponsorship (3 days)

    For further details on Sponsorship and Exhibiting opportunities, please contact me directly. I will be glad to assist in choosing the most suitable participation format for your company.


    Sincerely yours,


    Alla Aldushina
    International Marketing Officer
    GROTECK Business Media
    Aldushina@groteck.ru


     

     


    | Share

    InfoSecurity Russia-2015: Keynote Theatre of Global leaders calls for experts 23th of September within The Keynote Theatre, which is traditionally held at the Main Arena of Infosecurity Russia Ian Evans, Airwatch EMEA Vice President and Managing Director (on photo) will perform with his keynote presentation:

    More

    InfoSecurity Russia 2015 calls for speakers! InfoSecurity Russia is the only IT Security exhibition in Russia and major business event which plays an integral role in networking between suppliers and decision makers and keeping security professionals connected.

    More

    Radwares Attack Mitigation System Selected by BlackMesh - Provides Customers Protection Against DDoS Without Impacting Legitimate TrafficLeading cloud hosting company to offer DDoS protection as a service 

    More

    Imperva Names Sunil Nagdev as Senior Vice President of Worldwide Services and SupportProfessional track record highlights success building

    More

    Thales launches BYOK Deployment Service for Microsoft Azure Cloud ApplicationsUnique bring your own key capability enables you to have total control over your keys and sensitive data in the Azure Cloud

    More

    CyberArk Software Ltd. Files Registration Statement for Proposed Secondary OfferingCyberArk Software Ltd. (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced that it has filed a registration statement on Form F-1 with the Securities and Exchange Commission for a proposed secondary public offering of its ordinary shares. The underwriters will have a 30-day option from the date of the offering to purchase additional ordinary shares. All of the shares will be offered by the company’s shareholders. The company will not receive any proceeds from the sale of these shares.

    More

    Check Point Acquires Hyperwise to Deliver Industrys First CPU Level Threat Prevention CapabilitiesAcquisition of Stealth-Mode Start-up Enhances Threat Prevention Portfolio to Stop Attacks Before They Happen

    More

    Akamai Acquires OctoshapeOctoshape to provide Akamai unique video optimization technology designed to enable superior IP broadcast experiences

    More

    IBM and Juniper Networks Partner to Build Smarter Networks with Predictive AnalyticsEmailPDFPrintRSS

    More

    UL LLC Collaborates with Codenomicon to Test Industrial Automation Equipment and Services and Medical Devices for Digital Security VulnerabilitiesUL and Codenomicon have collaborated to develop and perform security testing on network connected devices. Initial testing will be on industrial automation equipment and services and medical devices, with planned expansion into security testing in other industries. Codenomicon and UL will work together to provide Fuzz and Binary Analysis testing services. Fuzz Testing is a mechanism in which the communication protocols of the device under test are subjected to random exception messages to discover coding and security errors. The Binary Analysis identifies known vulnerabilities found in compiled software that could possibly be deployed in a production environment.

    More