As one of the UK’s largest independent security service providers, SecureData is a prominent industry thought-leader. You can find our team at many high-profile events throughout the year, whether as attendees, sponsors or hosts. We believe in complete, proactive security across the attack continuum that empowers organisations with the contextual intelligence to identify and eliminate relevant threats.
With a 23 year heritage in IT security and 1000 blue-chip customers worldwide, SecureData has a wealth of expertise under its roof.
We put that knowledge to good use: sponsoring many high-profile industry events throughout the year, as well as hosting our own thought-leadership event, Security Focuses, each November. Joined by customers and guest speakers, we dedicate a full day to discussing the biggest issues in cybersecurity for the year ahead, setting the agenda every organisation should be thinking about.
If you would like to know where you can meet members of the SecureData team, or hear them speak, the events calendar below is updated periodically throughout the year.
SecureData would like to invite you to an event that will take place in May at two iconic locations: Chelsea Football Club and Manchester United Football Club.
During this informative event we will discuss real world challenges and scenarios, including solutions for the very latest cyber threats – Ransomware and Spear Phishing.
Guest speakers include: Kevin Ely (VP TrapX), Darren Turnball (VP CTO Fortinet), Steve Mulhearn (Enhanced Technology Director, Fortinet), Marty Legg (Cloud Services Director, SecureData). Register today.
Join SecureData and F5 Networks webinar to fully understand how the F5 platform can simplify your network and fully secure your services to withstand even the most complex DDoS attacks. F5 and SecureData can support hybrid solutions and deliver on-prem and off-prem DDoS mitigation.
Traditional Firewalls have always been the cornerstone of IT security for the past 15 years, they’re relatively easy to deploy and can defeat some network threats.
However attackers are more determined than ever; they now use sophisticated and constantly changing techniques, tactics and procedures to bypass traditional security measures.