A LOOK AT SC EVENTS

SC Magazine UK's events

SC Magazine UK events

InfoSecurity Europe 2014 Day 1

Considered one of the top information security events is the world, InfoSecurity Europe 2014 brought together some of the brightest minds in the industry to ...

SC Congress exceeds expectations

The ILEC Conference Centre in London played host to a raft of industry expert speakers and an audience of some 180 senior industry professionals at ...

SC Congress London: Bottom-up security awareness has C-level benefits

A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in ...

Infosecurity Europe 2014 Day 2

The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing ...

SC Awards Europe 2015 winners announced

Congratulations to all the winners at the SC Awards Europe 2015 announced last night - full list of winners published.

Hundreds attend SC Congress in London

Around 400 cyber-security professionals, including more than 300 delegates as well as speakers, sponsors and press, packed out the SC Congress conference in London on ...

Security on the agenda

Cyber-security has become a boardroom issue, but too few boards give the topic the time or resources required, our experts agreed at a recent SC ...

SC MAGAZINE UK EVENTS







 

 

 

                               



  


 

 

 

 

 

 

                     



Webcasts

Vendor Webcasts Activated Charcoal - Making sense of endpoint data

Activated Charcoal - Making sense of endpoint data

Security operations is all about understanding and acting upon of large amounts of data.

Vendor Webcasts How Trusted Identities can help you accelerate your Digital Business Transformation

How Trusted Identities can help you accelerate your Digital Business Transformation

We all know that in business today the old perimeter is gone. So too are the days of dealing strictly with your own employees, all housed under one roof.

Vendor Webcasts Instilling a security culture among staff to underpin your BYOD strategy

Instilling a security culture among staff to underpin your BYOD strategy

Regulations and policies to manage the security risk of personal devices are all well and good, but the underlying technology of BYOD also needs to be considered. How effective can BYOD security be?

Sign up to our newsletters