Infosecurity Europe, the UK’s largest cyber-security exhibition and conference programme, took place last week at Kensington Olympia in London. The annual event includes high level keynote speakers, panels and tech talks as well as over 400 exhibitors, which makes it a ‘must-attend’ event for IT professionals. Eskenzi PR has attended Infosec for 22 years consecutively and this year we’re proud to say we’ve added another successful event to our tally.

This year we had to think outside the box and work hard to get our clients PR from the show. But, we did it again! In total, Eskenzi clients had 122 press, radio, TV and analyst interviews for 15 clients with 13 surveys amongst 4,200 people during Infosec. Alongside the BBC came The Daily Telegraph, New Statesman, IDG Connect, and of course all our friends from IDC, Infosecurity, SC Media, Ovum, KuppingerCole and ISMG to name but a few.

Handling expectations is very important, so we always estimate around 5 interviews per client but, we got on average around 8 – in fact one of our clients had 12 press briefings! This comes down to the fact that we start reaching out to press six weeks before the show and we create a more personal approach when contacting journalists. We will never waste a journalist’s time, especially when they’re at a show like Infosec, so it’s crucial that we know the areas journalists cover and only approach them only if we genuinely feel our clients have something to say. So, it’s our job to work closely with our clients to make their stories compelling.


Every year we organise a party at the end of Day 1 of the show just around the corner from Olympia. This year we also hosted the European Cyber-Security Bloggers Awards with Brian Honan which recognise the best blogs and podcasts in the industry. The event was an absolute blast and we were delighted be able to host the awards as we know how much time and dedication goes into writing a truly insightful and balanced blog! You can find the full list of winners here.

We would like to thank our sponsors – Corero Network Security, AlienVault, Cylance, Cyberproof, Domaintools, HackerOne, Imperva, Lastline, Synopsys, Tenable – for helping make this such a fabulous event!

If you’d like to see our advice on how best to PR yourself at Infosec, based on 22 years’ experience of doing the PR for the show for hundreds of clients, check our previous blog post.


cupOk, so you’ll be lucky if, this year, 30 good tier one press even come to Infosec. Gone are the days when 300+ would show up and cruise the show openly interviewing exhibitors to see what was new (and I’m sure that’s got nothing to do with the fact that we no longer do the PR!!).

Boy oh boy – if you want to get  interviews, you’re going to have to think long and hard about what it is you’ve got that’s going to make a hard working journalist want to see you, especially as it’s only humanly possible for them to see a maximum of 7 vendors per day. This year you’re going to have to think outside of the box and work harder and smarter than ever before to get PR from the show, and it may not even be from the press you rely on to get it. You’re going to have to be your very own content machine. Think like Graham Cluley, Carole Theriault, Ken Munro or Javvad Malik – these are all self styled security content kings & queens who inform us smartly with humour, intelligence and considered rhetoric.

It’s a new exciting world out there, where you no longer have to scratch your heads wondering how on earth are you going to entice the media at a show like infosec. You can make your own news by producing riveting, exciting, original commentary through a blog on what you see as new interesting products and solutions. Spend your three days at Infosec tweeting, blogging and videoing the unusual, quirky human interest stuff that’s going to resonate with people! Become your own PR machine and offer considered thoughtful opinion – the human side or your expert take on what’s emerging that’s new and worthwhile.

Here is our advice on how best to PR yourself at Infosec, based on 22 years’ experience of doing the PR for the show for hundreds of clients, plus the knowledge of the extended Eskenzi PR team who have spent the last 4 weeks on the phone to those very press attending Infosec this year!

If you have the following, Infosecurity will be a runaway success from a PR point of view!

Have you got some original research to release at this year’s show that will grab the attention of the press?

Have you got a topical take on a news related story? E.g. are you working on the first GDPR blunder?

Has your team discovered a new malware or breach?

Have you got a Guru or leading expert in town?

Do you have a new product that’s got something truly original that’s going to make a difference?

Have you got an unique spin on a new topic?

Is your speaking slot going to give some smart, original insight?

Do you have a product that’s not just threat intelligence?

If you answered yes to any of the above, then great; your PR is going to be awesome. If you answered no to all of the above, then you can still take advantage of being at the show by doing some of the following.

  1. Press releases – there’s still a press office so put your news releases in there and visit it frequently to see which journalists are there that could be interested in your company.
  2. You need to attract journalists’ attention in the press office, so put something bright and eye catching in there. How about giveaways? Do you have any bags, pens etc.? – journalists love freebies!
  3. You still have a week to get people to your stand, so get blogging, send out email shots, mention Infosec at the bottom of your email signature.
  4. Produce a good handout that people can read there and then.
  5. Network and use the show to make new partnerships, use it for recruitment and to educate and impress new clients.
  6. Make sure your stand has words that sum up eloquently what you do.
  7. Get bright, smart, alert people to work your booth. Not tired old sales guys no longer hungry for leads.
  8. Do not let anyone on your stand who is hungover, has smelly breath from the night before and doesn’t want to be there.
  9. Think how you will stand out from the crowd. Giveaways, uniqueness, messaging, enthusiasm, desire to help?
  10. What’s your objective? To scan every lead or focus on a few qualified leads? How will you filter them out?
  11. Remember to follow them up immediately – don’t hang around!
  12. Don’t waste time talking to the wrong people. Qualify them quickly and move on.
  13. Can you use this opportunity to do some market research?
  14. Can you do a survey to get original content for press releases or an opinion piece?
  15. Do not allow your staff to talk to each other – they should be outwardly looking to catch every passing visitor.
  16. Smile at everyone and ask people as they walk past your stand “ are you looking for a so and so solution then come on in – you’ve come to the right place!”
  17. Make it easy for every visitor to feel comfortable to approach you.
  18. Don’t overcrowd/clutter your stand.
  19. Do not eat on your stand.
  20. Have enough literature and plan to have back up if you run out
  21. Wear comfy shoes
  22. Take pictures and videos and make sure you use these after the show in whatever way you possible can as Content, Content, Content is the PR mantra that works!


I’m sure the title of the blog has given you a clue about the content of this blog, but we are delighted to finally be able to share with you our news, that we’ve been keeping under our hats (or perhaps crowns may be more fitting in this case) for a few weeks …

Eskenzi PR & Marketing has won a 2018 Queens Award for Enterprise!

The Queens Award is an incredible accolade, celebrating the outstanding achievement by UK businesses across a number of categories, from innovation to sustainable development. Eskenzi has been recognised for its contribution to the UK’s economy, and we are one of just 152 companies that have received the honour this year for overseas trade and International growth.

Having worked within the cybersecurity space since the very beginning, we are proud to be part of a sector that has grown from something very niche, where only those ‘in the know’ really understood its importance, to an industry which continues to dominate mainstream news headlines, and is discussed at everything from dinner parties, student union gatherings, board meetings and government debates across the globe.

We work tirelessly to do our bit in highlighting the challenges of cybersecurity, and bringing them to the attention of the masses; from DDoS attacks, phishing and Ransomware, all the way through to Nation State Hacking, GDPR and the Skills Gap, you can be sure that Eskenzi are there, finger on the pulse and ensuring our clients are in the right place at the right time to be positioned as the thought leaders they are. We couldn’t have done it without our fabulous clients, both past and present- so we extend a big thank you to all of you.

Our services span across the globe from the US, to France, Germany and Benelux- and of course, our headquarters in High Barnet, London. We are a tight knit, PR family, and we really do pride ourselves on delivering only the best. Each achievement we reach for our clients spur us on to aim for bigger and better the next time, and so as you can imagine, The Queens Award really does have us all pretty electrified here at Eskenzi HQ (and beyond!).  We have lots of exciting things in the pipeline, from a trip to the Palace and the presentation of the award at our offices – which we will of course, keep you all posted on.

For now, however, thank you all for joining us in whatever capacity you have on the incredible journey that Eskenzi PR has been on (so far). We’re almost certain our next chapter is going to bigger, better and even more wonderful than we can even begin to imagine.


–  Queens Awards Winners 2018, over and out!



The European Cyber Security Bloggers Awards has returned in 2018 to recognise the best blogs and podcasts in the industry, as voted by peers. Nominations have now opened until midnight on the 30th of April.  Individuals, companies and cyber enthusiasts can nominate their favourite blogs here:

This year will see the third European Cyber Security Blogger Awards hosted by Brian Honan from BH Consulting and Eskenzi PR. Bloggers and podcasters can vote for their favourite blogs that must be focused on information security issues from around the world as well as Europe. The awards will take place alongside the Infosecurity Europe event to be held in London from June 5th to June 7th.

The winners of the awards will be announced at the security bloggers meetup on Tuesday the 5th of June at The Crown & Sceptre 34 Holland Road, London W14 starting at 18:00. Bloggers and podcasters can register here to attend:

We’re delighted to be able to host the European Cyber Security Bloggers Awards as we know how much time and dedication goes into writing a truly insightful and balanced blog. As these awards are judged by the general public alongside a team of independent judges, we’re intrigued to find out who everyone agrees is the vocal player out there, making a difference to the cyber-security industry!

Good luck everyone!

womens day

Today at Eskenzi HQ there was cake- we had our own ‘International Women’s Day’ celebration, and joined millions of others around the world recognising the need for gender parity. First implemented in 1975, International Women’s Day is a global celebration identifying the achievements of women; 2018 has already seen huge campaigns like the #MeToo and #TimesUp movements dominate headlines, challenging issues such as sexual harassment, equal pay, education and femicide (to name but a few), and the conversation is far from over (Hooray!).

Looking beyond just Eskenzi, PR is renowned for being inclusive of women- in fact, according the Holmes Report, women make up 70% of PR staff. However, when it comes to looking to the top, women only hold 30% of management positions in the sector- a figure which drops to 25% when looking solely at 20 of the largest PR companies. Of course it doesn’t stop there- the gender pay gap is all too apparent the industry, with PR Week reporting earlier this year that it can reach a huge £75,000 difference between men and women, at senior corporate levels. Unreal, right!?

Now, looking at the industry we work closely with, gender diversity in the tech has long been a talking point. Research shows that, despite industry growth, over the last 10 years’ female representation in the industry has stagnated- only 17% of those working in the industry are female and when looking higher up the ladder, things aren’t that much better – only 1 in 10 are IT leaders. With only 7% of students taking Computer Science at A-Level being female, there is a clear need for action to encourage young women to pursue a career in the field of technology.

It has been 100 years since women in the UK gained the right to vote, yet The World Economic Forum estimates it will take another 170 years to reach gender equality (shocked faces all round). Equality should know no bounds, yet we have reached 2018 and women of all ages, across every industry and in every country, are still having to fight twice as hard to be heard and to achieve.

As Hilary Clinton said- ‘“I believe the rights of women and girls is the unfinished business of the 21st Century.” The time for change is now- together we can break every glass ceiling.

By Michelle Marriott 


It’s gone bonkers at Eskenzi PR since the New Year winning some awesome clients, selling out our IT Security Analyst & CISO Forum, being shortlisted for a UK Government award (I’m not allowed to say any more until it’s announced in April). So, we need to recruit for a wonderful, talented and brilliant account manager who can fit into our happy, dynamic and friendly agency!

We are looking for someone with:

  • Proven PR experience
  • Ambition and drive to progress
  • Prior B2B or technology sector experience would be ideal
  • A team player
  • Self-starter with the ability to inspire juniors
  • An interest in writing articles, blogs and press releases
  • Experience in social media as well as traditional media
  • Experience of developing and running impactful campaigns
  • An interest in cyber security
  • The ability and ambition to build strong productive relationships with clients and help them raise their profiles and grow their businesses.


View original post 67 more words


It’s gone bonkers at Eskenzi PR since the New Year winning some awesome clients, selling out our IT Security Analyst & CISO Forum, being shortlisted for a UK Government award (I’m not allowed to say any more until it’s announced in April). So, we need to recruit for a wonderful, talented and brilliant account manager who can fit into our happy, dynamic and friendly agency!

We are looking for someone with:

  • Proven PR experience
  • Ambition and drive to progress
  • Prior B2B or technology sector experience would be ideal
  • A team player
  • Self-starter with the ability to inspire juniors
  • An interest in writing articles, blogs and press releases
  • Experience in social media as well as traditional media
  • Experience of developing and running impactful campaigns
  • An interest in cyber security
  • The ability and ambition to build strong productive relationships with clients and help them raise their profiles and grow their businesses.

Most importantly, you’ll be brimming with ideas, have a creative mindset and keen to develop your PR career with us.

In return you can expect:

  • Competitive salary, based on experience
  • Bonus opportunities
  • Pension scheme
  • Flexible working arrangements
  • A dynamic agency
  • Opportunities to progress and develop
  • Plus many more!

If this is you or anyone you know, please email a CV and covering letter to Yvonne Eskenzi




Data Privacy Day – or Data Protection Day if you’re in Europe – is upon us once again on Sunday January 28th. If peanut brittle can get its own day (yes, it’s true and if you’re reading this in real time then you can just make it), then why not data privacy and protection?  Data is serious business, and with more attention than ever before on data breaches and the resulting consequences, it seems right to take this opportunity to think about the data we make available online.

One of our clients, Tripwire, a leading global provider of security and compliance solutions for enterprises and industrial organisations, conducted a poll that asked “who are you most concerned about collecting your private information? The government, corporations, identify theft criminals, or online stalkers/harassers?”. Of the 315 who participated, the majority (40%) said they would be most worried about corporations stealing their information. Nearly a third (27%) said they were most concerned about the government gathering their critical data, whereas only a fifth (21%) voted for identity theft criminals as being their main concern. Only 12% were concerned about online stalkers and harassers storing their private information.

It says a lot that the overwhelming majority 315 people are more concerned about governments and corporations collecting their private data than criminals and online stalkers. It also strengthens the use case for the upcoming GDPR, as it shows that people are indeed concerned about how organisations are treating our personal information.

Tripwire experts have shared the following tips to keep your data private:

Tim Erlin, VP of Product Management and Strategy at Tripwire:

“Nearly the entire economy is geared to convince you that your data really doesn’t need to be private, and that you should freely share it. From social media, to loyalty programs, to smart home devices; all of these trends are built on the back of your data. Remember that it’s yours, and it’s valuable and you have a right to protect it and keep it private. That leads you to making explicit choices to share, rather than sharing by default. And maybe, that awareness changes a few of those choices.”

Paul Norris, senior systems engineer for EMEA at Tripwire:

“As everyday interaction with the world around us is becoming more reliant on computer systems, it’s even more vital that you should care and take action around your data privacy. These days, personal identifiable identification (PII) data can be stored at a lot of places ranging from local drives on laptops, through to portable media and cloud providers storing data online. It’s imperative that you maintain individual strong passwords for all your online accounts, so if one account is compromised, other accounts do not suffer. And as you will have so many passwords to manage, consider using a password management piece of software and enable two-factor authentication to add a layer of security to your solution.”

Tyler Reguly, manager of security research and development at Tripwire:

“Accept that your data is not private. Once you do that, you will find yourself less stressed when your data is inevitably breached. I have three rules that I try to live by:

-If they don’t utilize Amazon/PayPal for payments, place your order elsewhere.

-If you wouldn’t get it developed at the store, don’t take the picture.

-Don’t take risks with your primary PC. Restrict social media browsing to cell phones, tablets, and secondary PCs.

In the distant 1978, the world witnessed an extraordinary event – the birth of the first spam email. If you already knew that, I’m impressed. If you didn’t and you’re quite shocked, I’m with you. Although it wasn’t referred to as spam at first, the email was sent by Gary Thuerk, a marketer for the Digital Equipment Corporation, to several hundred users presenting information about open houses where people could check out or purchase the computers. And now, forty years later, our inboxes are heavily bombarded with spam emails promising great holiday offers, informing you that you’ve won the lottery or simply asking you to “click here”.  However, far from being a rather innocent, email marketing tool, spam emails have transitioned into a dangerous attack vector for cyber criminals, aiming to hijack your device and extort money, information or sensitive data.

The Evolution of Spam Emails

Spam hardly needs an introduction. It encompasses everything from ads for products or services, money scams, malware, phishing and so on. Nowadays, everyone who owns a smartphone or computer has experienced the frustration of receiving one of these random, sleazy and quite often weird emails. However, even though spam emails have been around for so long, they still seem to work. Spammer techniques have evolved to avoid new spam filters and thus, those messages still reach hundreds of thousands of people worldwide, many of whom fall for the them.

With the growth of the Internet and online platforms, spam has evolved from email messages to mobile texts and social media spam. Indeed, back in the day, email addresses were easy to harvest from website subscriptions and people were more willing to give them away. Eventually people got sick of irrelevant messages. And as email filters became more and more sophisticated, spammers had to find new targets and creative ways to get their messages across. Moving on to texts messages, spammers plagued mobile phones with unwanted ads or texts – the last one I got was about collecting my tax refund. What’s yours?

Nowadays, it harder than ever to obtain someone’s email or mobile number (unless they willingly give it, of course), so the prime targets for spam are social media accounts. Many of us have been followed by a fake account – a fake online identity used for purposes of deception – which send us texts and automatically comments on our posts (e.g. “Nice photo. Please check out X by following this link [link] or Please check you DM when you can).

How to Handle Suspicious Messages

Spam is cheap to send and it still works, so cyber criminals will continue to use it. Therefore, it’s important to understand how to recognize a suspicious email/message and approach it with caution. Here are some of our tips:

  • DON’T CLICK ON ANY LINKS (unless you’re 100% sure they are legit)
  • Use caution when opening any email attachments (attachments are often used as part of phishing scams).
  • Avoid downloading any programs/software on your computer
  • If the email is from someone you know (e.g. colleague or friend), but it still looks suspicious, make sure you double-check they actually sent it (by giving them a call).
  • Make sure you turn on the privacy mode on your social media accounts, so you can control who’s following you. This can help to shield you from fake accounts and their dodgy messages.

By Elizabeth Nikolova

Over the past few weeks, news of Bitcoin, the cryptocurrency, has taken the world by storm. Its valuation continues to smash through price barriers with the value of one Bitcoin rising as high as $18,000. Those who were lucky enough to be in the know and invested during the currencies infancy are said to have made fortunes since its dramatic rise. “For the love of Money” by the O’Jays will certainly be ringing out for them.


Naturally, this garnered immediate interest with news outlets around the world covering the minute-by-minute trading sessions while many in the general public, many of whom were hearing the term Bitcoin for the first time, wanted a piece of the pie.


But what is Bitcoin? How secure is it? Should I be investing? All valid questions that the everyday person on the street is asking… So, here is what you need to know…


Bitcoin is a digital currency, which is created and stored electronically. There is no physical form for Bitcoin – they are not printed. The details of any transaction made using the currency is recorded within an online ledger called the blockchain.


To generate Bitcoin, people use computer software to solve mathematical problems and in return can produce Bitcoin. This is referred to as ‘mining’. Even though it is said that only 21 million Bitcoin in total can be mined, in theory, anyone can join the online community and ‘mine’. As the software is open sourced, the mining activity and overall network can be monitored and regulated to ensure the network remains stable and secure.


To store Bitcoin securely, it is advised that the user acquires a security wallet, with the most common wallets installed either on the user’s desktop or on their mobile device. Each wallet is secured with encryption and accessed with a password.


However, like all things in life, there are negatives associated with Bitcoin. Bitcoin has a dark past and is a main currency used for illegal activity on the Dark Web – such as drug trading. In addition, the security methods have been plagued by a sequence of high profile cyber attacks, with the latest striking the Slovenian based Bitcoin mining marketplace NiceHash, where nearly $64m in Bitcoin was stolen.


Yes, the currency is increasing in value and yes, it is making a lot of noise but there are some that are sceptical. Many within the digital and financial industries are keeping a close eye on this ‘bubble’, which many believe will inevitably burst.


Like any investment, research into a product is always advised and bitcoin is no exception. This is an entry-level introduction to Bitcoin and the information provided should in no way give you the confidence to invest. So, do your homework before purchasing!