Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

What's Next: The Future of Big Cybersecurity Conferences

By Dawn Morrissey
SEC0420-cyber-Feat-slide1_900px
May 5, 2020

The old curse has come true: we are “living in interesting times.” None of us could have possibly foreseen the way that 2020 has evolved, least of all, conference professionals. A listing on Security Magazine provides the entire list of security conferences and events that have either been postponed or cancelled. Gartner says it’s taking a $158 million hit in its Q2 revenues; O’Reilly went one huge step further, permanently shuttering its in-person events business.

Aside from those gatherings, an entire slew of security meetings has moved into the virtual realm. In-person conferences during the pandemic are seen as being too hazardous and unsafe; better to meet online than to risk spreading the virus.

Companies like Data Connectors and the SANS Institute have gone the virtual conference route out of necessity, as have industry behemoths like IBM and Microsoft…the belief being that vital information can be shared with participants online as well as in-person. It’s never been more important: the chief clinical officer at HIMSS is quoted as saying, “Cybersecurity always has been one of the most important pillars in digital transformation, but its importance is heightened considerably in a pandemic.” 

Writing on Crowdstrike, Michael Sentonas says, “Our customers…are facing sudden and profound challenges as they seek ways to quickly support corporate directives for employees to vacate offices and corporate campuses and start working from home. Maintaining security in the face of this global office exodus presents significant risks for most organizations.”  And at vendor CriticalStart, Jim Rhode says, “It's never been cheaper or easier for the bad guys to deliver cyberattacks.”

Obviously, the pandemic will not last forever; in fact, as these words are being written, countries around the world and states across North America are taking the tentative first steps toward restoring a sense of pre-COVID normalcy. But we’ll submit that this crisis has altered the “normalcy paradigm;” we’ll suggest that the lessons we’ve learned in the last several months may change the way security and other professionals act and interact when it comes to conferences for months, or even years to come.

In this environment, companies are literally watching every penny; no expense is too small to be scrutinized. For those companies that were going to exhibit at a conference, they’re seeing significant savings by staying home: estimates of $60,000 or more per conference are not unusual, once booth space, show services, personnel costs and more are factored in to the bottom line. At larger conferences, that cost may rise exponentially. These are numbers that cause bean counters’ eyebrows to go up sharply. 

By contrast, conferences held on a regional or virtual basis cost far less, which the bean counters will love. The math is obvious: it costs less to travel regionally than to fly across the country and booth space will cost proportionately less. Attendees can get the same information they will receive at the mega-conference, and sales personnel working the booth will know that visitors are prospects; there may be nothing an account executive hates more than engaging a prospect, only to find out that the person has to be passed to another AE because the prospect isn’t in his or her territory. (In fact, a friend of ours who’s an AE is highly skeptical of big shows in general, saying, “Unless you’re using them to wow prospects and clients, [the big conferences] are a waste. Buyers are skeptical. They stay off the floor.”)

Taking it one step further, virtual conferences and summits offer many of the same benefits at sharply lower costs. For instance, I’m watching a Data Connectors virtual summit, aimed at Chicago, Ill.-area cybersecurity professionals, as I’m writing this; more than 1,000 people have signed up for the day-long event…triple the number of those who registered to show in person…and more than 30 vendors have signed on as sponsors, including a number of industry leaders. The keynote speaker is a Secret Service agent, based in Chicago, who understands the regional nuances.

Obviously, attendees won’t attend, and sponsors won’t sponsor if they don’t perceive solid benefits. The company originally had planned the Chicago event as an in-person summit but had to quickly pivot in the face of government-ordered shutdowns. Seven other events, for cities ranging from Seattle to Toronto, will also be virtual summits, and more may occur depending on how quickly our society reopens.

The large conferences have their defenders, of course, not all of them vendors. One well-known technology reporter says, “For Joe User and Jane Developer, I see the real value in meeting mentors, colleagues, and friends. And, in being exposed to the movers and shakers of the industry and new ideas.” We agree to an extent, and don’t mean to suggest that all of the mega-conferences, security-based and otherwise, will wither and die on the vine. But we also see solid evidence that many of the benefits of the large conferences can and are being transferred to the local, even virtual, level.

Yes, we’re living in interesting times, but they are times that may see a permanent shift in how we regard when and where we obtain the ongoing professional information needed to do our jobs more effectively and efficiently.  Like you, we can’t wait to see how this all shakes out.

KEYWORDS: conference coronavirus cyber security pandemic

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dawn morrissey

Dawn Morrissey has 20 years of experience in Cybersecurity and Compliance event planning. As CEO and Founder of Data Connectors, she puts together and hosts Cybersecurity conferences in 50 major cities each year across the US and Canada. After earning her bachelor’s degree in Political Science from the University of Missouri in 1992, she started selling similar technologies as her clients sell today.  Dawn is a member of Women in Cybersecurity and actively works with Infragard, ISSA and other cybersecurity organizations. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • people on cell phones

    Disinformation is the next big cybersecurity threat

    See More
  • financial- enews

    Five cybersecurity trends from 2020 – And what the future holds

    See More
  • Adjusting remote work polices in the future will prepare companies for next wave of threats

    Adjusting remote work polices in the future will prepare companies for next wave of threats

    See More

Events

View AllSubmit An Event
  • September 29, 2025

    Global Security Exchange (GSX)

     
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!