A LOOK AT SC EVENTS

SC Magazine UK's events

SC Magazine UK events

InfoSecurity Europe 2014 Day 1

Considered one of the top information security events is the world, InfoSecurity Europe 2014 brought together some of the brightest minds in the industry to ...

SC Congress exceeds expectations

The ILEC Conference Centre in London played host to a raft of industry expert speakers and an audience of some 180 senior industry professionals at ...

SC Congress London: Bottom-up security awareness has C-level benefits

A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in ...

Infosecurity Europe 2014 Day 2

The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing ...

SC Awards Europe 2015 winners announced

Congratulations to all the winners at the SC Awards Europe 2015 announced last night - full list of winners published.

Hundreds attend SC Congress in London

Around 400 cyber-security professionals, including more than 300 delegates as well as speakers, sponsors and press, packed out the SC Congress conference in London on ...

Security on the agenda

Cyber-security has become a boardroom issue, but too few boards give the topic the time or resources required, our experts agreed at a recent SC ...

SC MAGAZINE UK EVENTS

 


  

                     

Webcasts

Vendor Webcasts

Intrusion vs. Breach: How security analytics & automated response can improve your chances of avoiding a breach

60% of breached organisations included in the 2015 Verizon DBIR were initially compromised within minutes, and yet for most of those organisations it took hundreds of days to detect the intruders. Fortunately, an intrusion does not equal a breach. In fact, there are usually several steps that typically follow an initial compromise before the bad guys get away with the goods or disrupt a critical service.

Vendor Webcasts

Before the kill chain: What attackers are doing and how you can spot them

Attackers can't hide on the Internet—in fact, they leave behind fingerprints in areas you may not realize. Prior to launching an attack, the bad guys need to set up servers, obtain IP addresses, and register domains to use in the campaign. This often happens before they perform reconnaissance on their targets or create the malware payload. All of this activity leaves clues about the attackers.

Vendor Webcasts

UK Economy Under Siege: Business and Economic Consequences of Inadequate Cybersecurity

Cyberattacks cost UK businesses £18 billion in lost revenue and £16 billion in increased IT spending per year as a result of breaches. And the issue is widespread, 81 percent of UK businesses reported a breach in 2014.

Sign up to our newsletters