A LOOK AT SC EVENTS

SC Magazine UK's events

SC Magazine UK events

InfoSecurity Europe 2014 Day 1

Considered one of the top information security events is the world, InfoSecurity Europe 2014 brought together some of the brightest minds in the industry to ...

SC Congress exceeds expectations

The ILEC Conference Centre in London played host to a raft of industry expert speakers and an audience of some 180 senior industry professionals at ...

SC Congress London: Bottom-up security awareness has C-level benefits

A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in ...

Infosecurity Europe 2014 Day 2

The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing ...

SC Awards Europe 2015 winners announced

Congratulations to all the winners at the SC Awards Europe 2015 announced last night - full list of winners published.

Hundreds attend SC Congress in London

Around 400 cyber-security professionals, including more than 300 delegates as well as speakers, sponsors and press, packed out the SC Congress conference in London on ...

Security on the agenda

Cyber-security has become a boardroom issue, but too few boards give the topic the time or resources required, our experts agreed at a recent SC ...

SC MAGAZINE UK EVENTS







  

 

                     

Webcasts

Vendor Webcasts

Global Security Performance: How Top Nations Stack Up

How do some of the most prominent nations in the international economy differ in cybersecurity performance? As organizations increasingly open offices offshores, their networks face global security threats.

Vendor Webcasts

The key role threat intelligence can play in your cyber security strategy

Information security is ultimately focused on one key goal: reduction of risks. Risks of data loss, reputation damage, and disruption to the productivity of your organisation. But what drives the actions of your security teams?

Vendor Webcasts Struggling to make time for Cyber Threat Hunting? Learn how with Huntsman

Struggling to make time for Cyber Threat Hunting? Learn how with Huntsman

Chances are that over time you've added layers of security controls which have resulted in a growing number of alerts that need investigation. Analytics are key to threat resolution but effective cyber security is no longer a human scale process. With each new layer of defence the volume of alerts has grown to the point where only automation can help SOC analyst keep pace.

Sign up to our newsletters