Email Updates

To receive updates on SC Magazine events, please sign-up here.

Events

SC Awards 2015

Nominations for the SC Awards U.S. 2015 are now open!

SC Congress Toronto 2014

Canada’s premier information security conference & expo experience.

SC Congress New York 2014

The highly anticipated event in the Big Apple will take place on October 30 this year.

SC Congress Chicago 2014

Registration for the big event in the Windy City will open soon!

Virtual Events

Chat with our exhibitors during the live eConference events.

Editorial Webcasts

Wanted: Buy-in from the board

As massive breaches occur with more frequency, consumers have become increasingly anxious about just how large retail, financial and other companies with which they're dealing are protecting their personal information.

Unlocking the conundrum of advanced evasion techniques (AETs)

As various industry organizations, such as the Community Emergency Response Team (CERT) in Finland, work with numerous IT security vendors and other experts to figure out the countless vulnerabilities that can allow advanced evasion techniques (AETs) to sneak through networks, organizations plagued by AETs are facing their own, more immediate pressures to come to terms with these rising attacks.

Make It Stop! Protecting Corporate Data Assets Against Breach

SCMagazine's 2014 Data Breach Survey shows companies are taking steps to raise security awareness and investing in IT security and risk management practices but given the number of breaches and other high profile cyber crimes that have occurred more recently, are they doing enough?

Vendor Webcasts

How PCI 3.0 impacts your security posture & compliance

During this webinar Christopher Strand, Senior Director of Compliance at Bit9 + Carbon Black and Mordecai Kraushar, Director of Audit at CipherTechs will review how the update to PCI DSS 3.0 will impact your systems and cybersecurity.

Threat intelligence revolution

Real-world intelligence has been used for thousands of years to thwart an enemy's intentions. With the evolving sophistication of cyber threats growing at a rapid pace, today, internet and network connectivity has become the lifeblood of enterprise operations.

Persistent Threats are ever evolving. Is your security?

These are trying times for IT professional. Each and every day you face the risk of your network being hacked by the newest zero-day threat. Recently, it was the HeartBleed bug and then the IE vulnerability.

Sign up to our newsletters