We are delighted to reveal the full lists of finalists for SC Awards 2017 Europe. Winners will be revealed at the Awards Night on Tuesday 6 June.

We are delighted to reveal the complete list of finalists for the SC Awards Europe 2017. Please be sure to join us on Awards Night, Tuesday 6 June 2017, at Old Billingsgate - a stunning venue on the Thames in the heart of the City of London - to find out who the winners will be.


Upcoming Webcasts

Wed May 17, 9:00 AM ET

Vendor Webcast

Threat Intelligence is Dead. Long Live Threat Intelligence!

17th May at 2:00pm BST || Join us as we discuss what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence...

x

Threat Intelligence is Dead. Long Live Threat Intelligence!

Threat Intelligence is a very hot topic at the moment and many organisations are looking to establish their own Threat Intelligence capabilities. Everybody wants their own reliable, comprehensive and actionable feed of Threat Intelligence that can inform and bolster their cyber-security controls, but with such a vast multitude of available indicators, how do you make sense of them all?


In this live webcast, Rafe Pilling, Senior Researcher with the SecureWorks Counter Threat Unit (CTU), cuts through the hype to explain firstly, what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence into your cyber defences.

More Info

Sponsored by: SecureWorks

Thu May 18, 9:00 AM ET

Vendor Webcast

How to do Flow-Based Security Monitoring at 100G

18th May at 2:00pm BST || Are you ready to detect threats at any speed?

x

How to do Flow-Based Security Monitoring at 100G

The ability to detect threats at any speed is a challenge, but with networks now operating at 40G and 100G, these challenges become even more complex. And with a severe lack of commercial offerings capable of meeting industry demands, many enterprises and cloud service providers are driven to build their own security solutions. But how do you build an efficient solution that provides complete traffic visibility at 100G?
Join this webinar to hear ntop founder Luca Deri explain how they helped a global hyperscale Internet company do just that. By developing a 1:1 NetFlow solution with zero packet loss, they successfully enabled complete and efficient traffic visibility, even at 100G.
More Info

Sponsored by: Napatech

Tue June 13, 9:00 AM ET

Vendor Webcast

De-Perimeterisation and Going Beyond Multi-Factor Authentication

13th June at 2:00pm BST || Learn about how business environments can use MFA on the road to de-perimeterisation and zero-trust models to improve internal security...

x

De-Perimeterisation and Going Beyond Multi-Factor Authentication

Once you have multi-factor authentication (MFA) installed, how do you take it further in your overall access control programme? 

The idea of getting rid of the perimeter can be intimidating for businesses to contemplate, especially if they’ve only recently solidified one. So let’s not think of it as getting rid of the perimeter, but rather as tightening security on the inside so that the perimeter isn’t the only thing keeping the attacker at bay.

If you’re already in the hybrid environment -- with some of your infrastructure on-premises and some in the cloud -- it’s time to think about re-balancing your security policies, because you already have assets that aren’t within your perimeter.
More Info

Sponsored by: Duo Security

Wed June 21, 9:00 AM ET

Vendor Webcast

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

21st June at 2:00pm BST || There is a data storm coming your way, make sure you are prepared for the storm!

x

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

Enterprises in U.K. are experiencing a storm of global proportions around their data – It starts with a growing need for data to power business growth, and expands with strict regulatory requirements, advanced technology deployments and escalating cyber-attacks – and it’s putting their data at risk.

In this webinar we’ll look deeply into the results for the 5th annual 2017 Thales Data Threat report, with a focus on the results for the U.K. and comparisons against global competitors.  Learn both about the threats, but also about what enterprises are doing about them – and best practice recommendations from IT security analysts at 451 Research.

  • How data breaches keep growing in spite of increased IT security spend – and what some of the reasons for that trend are
  • How advanced technologies such as Containers, IoT, Big Data and Cloud change the required approach to protecting critical and sensitive information
  • How new data privacy regulations are shaping enterprise plans for data security
  • What barriers enterprises encounter to deploying and using data security tools – and how to overcome them

 

More Info

Sponsored by: Thales e-Security

Upcoming Roundtable

London - 16 May 2017: Preparing for GDPR: 5 Reasons You Should Start With Email. GDPR raises new risks for all organisations globally, with potentially devastating penalties for non-compliance.Given the GDPR's scope and complexities - with its specific policy, structural, and procedural requirements - organisations must retool for GDPR compliance today. Email is especially prone to GDPR violations, given its role as a medium for sharing and storing personal data, as well as its vulnerability to cyber-criminal exploits. Share best practice and learn what others are doing to avoid the swinging fines that ARE going to be levied.

For consideration of an invitation, please click here.

In association with our partner:



SC Congress London




 

SC Congress London 2017: Another Winning Event

SC Congress London on 23 February was an outstanding success. Thank you to all who joined us to hear from our esteemed speakers, participatef in our cutting-edge dialogues and networked with industry colleagues and thoughts leaders. Over 200 of cyber-security's finest professionals were on hand for our fourth edition of this popular conference and exhibit hall at the ILEC Conference Centre in Earl's Court.

Feedback from all sectors of the cyber-security community was extremely positive. Delegates were impressed with our agenda and caliber of speakers and our sponsors were pleased with the quality of attendees that they were able to engage with.

Please stay tuned for more information as our next event is scheduled for 22 February 2018.

We look forward to seeing you there!