Your cyber intelligence source

VIEW MORE

Webinars

Our Webinars are truly informative, so that you will come away knowing more about the topic than you did before, and ideally with actionable information that you can apply in your organisation. Editorially independent moderators will quiz expert presenters and panellists, as well as asking questions from listeners to tease out the answers that you need to improve your performance. Listen today, engage with the experts, ask a question, and improve your understanding of the issues that matter to you.

Watch

Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant. 

  • image
    Bhavna Sondhi Principal Security Consultant, Coalfire
  • image
    Trevor Morgan Head of Product Marketing, comforte AG
  • image
    Kathryn Cave Associate editor, SC Media (host)
Watch

In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.

  • image
    Ashton D'Cruz Director - CAO, CGO & CISO, NatWest Markets (India)
  • image
    Mitesh Chauhan Global Product Director, Cloud & Security Services, Entrust Data Protection Solutions
  • image
    Niamh Vianney Muldoon Global Data Protection Officer , OneLogin
  • image
    Simon Newman Head of Cyber and Business Services, Police Crime Prevention Initiatives
  • image
    Edward Craig Acting Commissioning Editor, SC Media (host)
VIEW MORE

Expert reports

When you need a background briefing on a topic, or a more in-depth update on a particular issue that is causing you a problem, there is sure to be an SC Whitepaper to meet your needs. SC Whitepapers extend from wide-ranging overviews to in-depth analysis of specific issues of interest to cyber-security professionals. Our Whitepapers are written by authoritative acknowledged experts in their fields and range from Access to Zero days, with insider threats, ransomware, DDoS, breaches, planning, remediation, behavioural analysis, regulation (including GDPR) and updates on specific threats among topics covered. We work in cooperation with selected commercial partners, ensuring that the information provided is independent, unbiased and authoritative.

VIEW MORE
VIEW MORE