SC Magazine UK's events

SC Magazine UK events

InfoSecurity Europe 2014 Day 1

Considered one of the top information security events is the world, InfoSecurity Europe 2014 brought together some of the brightest minds in the industry to ...

SC Congress exceeds expectations

The ILEC Conference Centre in London played host to a raft of industry expert speakers and an audience of some 180 senior industry professionals at ...

SC Congress London: Bottom-up security awareness has C-level benefits

A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in ...

Infosecurity Europe 2014 Day 2

The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing ...

SC Awards Europe 2015 winners announced

Congratulations to all the winners at the SC Awards Europe 2015 announced last night - full list of winners published.

Hundreds attend SC Congress in London

Around 400 cyber-security professionals, including more than 300 delegates as well as speakers, sponsors and press, packed out the SC Congress conference in London on ...

Security on the agenda

Cyber-security has become a boardroom issue, but too few boards give the topic the time or resources required, our experts agreed at a recent SC ...















Vendor Webcasts How a reliable CA can help with the Certificate Lifecycle

How a reliable CA can help with the Certificate Lifecycle

Join us for a complimentary webinar that covers, in-depth, how a reliable CA helps with the certificate lifecycle.

Vendor Webcasts EU GDPR Planning - Prioritising your checklist

EU GDPR Planning - Prioritising your checklist

Will YOU be EU GDPR compliant on 25th May 2018? If you draw up your plan today you'll have 18 months to implement it. There are no extensions or extenuating circumstances - it's the law and applies to everyone with data on EU citizens.

Webcasts Stay out of the headlines: A Planned Path to Reducing Risk

Stay out of the headlines: A Planned Path to Reducing Risk

Today's breaches all have a common attack vector - stolen usernames and passwords. Attackers are making major headway into our businesses with simple tactics that exploit our weakest points.

Sign up to our newsletters