A LOOK AT SC EVENTS

SC Magazine UK's events

SC Magazine UK events

InfoSecurity Europe 2014 Day 1

Considered one of the top information security events is the world, InfoSecurity Europe 2014 brought together some of the brightest minds in the industry to ...

SC Congress exceeds expectations

The ILEC Conference Centre in London played host to a raft of industry expert speakers and an audience of some 180 senior industry professionals at ...

SC Congress London: Bottom-up security awareness has C-level benefits

A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in ...

Infosecurity Europe 2014 Day 2

The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing ...

SC Awards Europe 2015 winners announced

Congratulations to all the winners at the SC Awards Europe 2015 announced last night - full list of winners published.

Hundreds attend SC Congress in London

Around 400 cyber-security professionals, including more than 300 delegates as well as speakers, sponsors and press, packed out the SC Congress conference in London on ...

Security on the agenda

Cyber-security has become a boardroom issue, but too few boards give the topic the time or resources required, our experts agreed at a recent SC ...

SC MAGAZINE UK EVENTS







  

 

                     

Webcasts

Vendor Webcasts

What are The most important things you need to know about Enterprise Mobility Management?

Learn how to take an integrated, comprehensive approach to managing and securing mobile devices, the content they contain, the applications and mobile transactions they deliver - while enabling and not hindering users.

Vendor Webcasts

Global Security Performance: How Top Nations Stack Up

How do some of the most prominent nations in the international economy differ in cybersecurity performance? As organizations increasingly open offices offshores, their networks face global security threats.

Vendor Webcasts The key role threat intelligence can play in your cyber security strategy

The key role threat intelligence can play in your cyber security strategy

Information security is ultimately focused on one key goal: reduction of risks. Risks of data loss, reputation damage, and disruption to the productivity of your organisation. But what drives the actions of your security teams?

Sign up to our newsletters