Listen to this Post
Infosec Europe is one of the largest cybersecurity events, offering a unique opportunity to engage with vendors, startups, and industry leaders. While some criticize it for being too “corporate,” understanding its purpose can help you extract maximum value.
You Should Know:
1. Vendor Engagement Strategies
- Skip the Demo Dance: Instead of scheduling multiple meetings, use Infosec to quickly evaluate vendors.
- Linux Command to Organize Contacts:
grep -i "vendor_name" contacts.txt | sort -u > prioritized_vendors.txt
- Windows PowerShell to Track Follow-ups:
Get-Content .\prioritized_vendors.txt | ForEach-Object { Write-Output "Follow up: $_" }
2. Evaluating Startup Solutions
- Startup Village Insights: Use these commands to research startups before attending:
- Linux (curl + jq for API queries):
curl -s https://api.startup-list.com/cyber | jq '.[] | select(.funding > 1000000)'
- Windows (PowerShell Web Request):
Invoke-RestMethod -Uri "https://api.startup-list.com/cyber" | Where-Object { $_.funding -gt 1000000 }
3. Automating Vendor Follow-ups
- Bash Script for Email Automation:
!/bin/bash for vendor in $(cat prioritized_vendors.txt); do echo "Scheduling follow-up for $vendor" | mail -s "Infosec Follow-up" [email protected] done
- Windows Batch Script:
@echo off for /f "tokens=" %%V in (prioritized_vendors.txt) do ( echo Scheduling follow-up for %%V >> followups.log )
4. Networking & Logging Contacts
- Linux (Using `contacts` CLI Tool):
contacts add "Nate Dunning" "CEO, Ossprey Security" "[email protected]" --tags "Infosec2024"
- Windows (Exporting LinkedIn Contacts via CSV):
Import-Csv .\linkedin_contacts.csv | Export-Csv .\infosec_contacts.csv -Append
What Undercode Say:
Infosec Europe is not DEFCON or BSides—it’s a vendor expo. Leverage it for rapid vendor assessments, startup discoveries, and industry networking. Automate follow-ups, log contacts efficiently, and prioritize high-value engagements.
Prediction:
Future Infosec events will integrate more AI-driven matchmaking between vendors and attendees, reducing manual scheduling efforts.
Expected Output:
- Prioritized vendor list (
prioritized_vendors.txt
) - Automated follow-up emails/logs
- Curated startup research from API queries
- Consolidated contact database (
infosec_contacts.csv
)
IT/Security Reporter URL:
Reported By: Ndunning Infoseceu – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅