Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

United Kingdom Security & Compliance User Group

Public Group | Founded: 02 Aug 2010 | Serving 38 members

Welcome to the United Kingdom Security & Compliance User Group website!

If you live in the UK and use any Symantec Security or Compliance products, we invite you to join our User Group! To become an official member, log into Symantec Connect and then click "Request Membership".

Why join our User Group and attend our meetings?

  • Learn and share best practices
  • Network with your peers
  • Find answers to challenges
  • Receive latest information on Symantec products
  • Earn Connect Points and redeem for prizes!
  • Enjoy free food!

Group Activity

Show:
New blog entry 03 Jun 2014
Recently I commented a blog entry at "In Defense of Data" - a blog written by a variety of data security thought leaders and architects. The article is titled "Security and the Price of Coffee", and raised a very good point: ...
New blog entry 03 Jun 2014
In the past few weeks I was quite often involved into discussions about cloud security frameworks, proper attestation of security controls, and what criteria should apply for selecting cloud service provider. The lack of a widely agreed cloud risk or ...
New blog entry 03 Jun 2014
Late January 2012, the EU Commission presented the first proposal of a comprehensive reform of the existing EU Data Protection Directive. No doubt, the current Data Protection Directive requires more than just a slight refreshment, it requires a ...
New blog entry 03 Jun 2014
The role of the board of directors in Enterprise Risk Management (ERM) is changing significantly and becomes increasingly challenging due to major trends like cloud migration or big data, as well as initiative in mobile computing such as ...
New blog entry 03 Jun 2014
Today I found a small article in my daily RSS feeds titled "Miracle Battery-Saver App Harvests Email Addresses for Spamming". The article is a brief analysis of a malicious application that tricks the user by pretending to do something great ...
New blog entry 19 May 2014
Organisations are realizing a transformation from being "system-centric" to "information centric" – with a greater focus on the importance of data that will be increasingly distributed to a wide range of endpoints and devices. ...
New blog entry 19 May 2014
Effective IT strategy requires a comprehensive approach that aligns IT and the business by addressing multiple areas of discipline including IT risk management, operational efficiency, IT best practice and technology enablement. In particular, it ...