Email Updates

To receive updates on SC Magazine events, please sign-up here.

Events

SC Awards 2015

Nominations for the SC Awards U.S. 2015 are now open!

SC Congress Toronto 2014

Canada’s premier information security conference & expo experience.

SC Congress New York 2014

The highly anticipated event in the Big Apple will take place on October 21 this year.

SC Congress Chicago 2014

Registration is now open for SC Congress Chicago!

Virtual Events

Chat with our exhibitors during the live eConference events.

Upcoming Webcasts

Vendor Webcasts

Defend your network now: The top 5 things you need to know

Bad guys are lurking in your network neighborhood, kicking doors and testing entry points, all the time. Threatscape 2015 is evolving rapidly, but your resources and staff may not be enough to meet these challenges.

Vendor Webcasts

The good, the bad and the secure of mobile identities

Take a deeper dive into mobile identity, system architecture, threats and best security practices for mobile application development.

Vendor Webcasts

Rapid threat containment: Detect & respond quickly to high-impact threats

In this webcast, LogRhythm and Cisco will share some of the latest techniques used by attackers to penetrate networks.

Vendor Webcasts

Malware detection: How to spot infections early with AlienVault USM

Join us for a live demo to learn about the most common types of malware, and how you can detect infections quickly with AlienVault USM.

Vendor Webcasts

5 top security issues enterprises should prepare for in 2016

Join for a special online discussion with Chief Technology Officer, Amrit Williams and CMO Mitch Bishop as they discuss what are expected to be some of the most pressing security issues in 2016, and advice on how to plan ahead.

Vendor Webcasts

Security 101: Is my sensitive data safe?

Join experts from Informatica who will address in detail the challenges companies face in knowing how to recognize sensitive data, discover where their data resides and how to protect it from attackers.

Vendor Webcasts

Why manufacturers are using the cloud to deliver infosec

We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

Turning tables on cybercriminals

The attacker defender asymmetry is well known. While it's impossible to defend all possible places of network compromise, defenders can shift the balance in their favor once the attacker has breached an endpoint.

Six steps to SIEM success sponsored by AlienVault

Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.

Editorial Webcasts

Why manufacturers are using the cloud to deliver infosec

We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

Turning tables on cybercriminals

The attacker defender asymmetry is well known. While it's impossible to defend all possible places of network compromise, defenders can shift the balance in their favor once the attacker has breached an endpoint.

Six steps to SIEM success sponsored by AlienVault

Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.

Sign up to our newsletters