Our Events Hub is the best place to keep up to date with all of the latest goings on at Secarma. This is your one stop shop for all of our upcoming events, webinars, and training sessions.

We're all about in-person events and you can often find us at conferences, talks, and seminars, both as guest speakers and enthusiastic attendees. Secarma has had a presence at TeissEvents, The Future of Cybersecurity NewStatesman and many more.

Keep an eye on our LinkedIn and Twitter accounts to see where our experts are popping up.

We'll also be updating this page regularly, so be sure to check back for new event announcements. We look forward to seeing you at one of our upcoming events!


Training

The cybersecurity experts at Secarma are excited to launch a brand new selection of offensive security training days - for both businesses and individuals.

Our Hacking & Defending Web Apps course is designed to teach web application developers the tools and techniques we use when targeting web apps during real world penetration tests.

Keep an eye on our Eventbrite for new training sessions to be announced.


UnLocked

Look out for more UnLocked events coming soon. Join the experts at Secarma for cybersecurity talks, discussions, and networking - plus free food + drink.

We’ll also be exhibiting at a number of cybersecurity events this year, including:-

Future of Cyber Security – 8th February at Old Trafford, Manchester

National Cyber Security Show – 30th April – 2nd May at NEC Birmingham

DTX Manchester – 22-23rd May at Manchester Central

Hardware Pioneers – 28-29th May at Business Design Centre, London

International Cyber Expo – 24-25th September at London Olympia

And many more to be announced.

For more updates on our events, check out our EventBrite page.


Hacked Off Podcast

Latest Episode:105. Rob Demain: SOCs and SMEs

Past Episodes: listen to previous Hacked Off podcasts here.


Webinars

Have you seen our latest? Head over to the link below:


For information about webinars, conventions, and other cybersecurity-related get togethers that we've hosted or attended in the past, head over to the Past Events section of our site where you can find our event archive.

Looking to partner with us on an event? Contact us here.

 

Looking for vulnerabilities in systems

Ethical Hacking: Unveiling the Positive Side of Penetration Testing

Penetration testing, white-hat hacking, and ethical hacking are terms used to describe the practice...

cybersecurity news infosec tech updates

Cybersecurity in Retail: Protecting Customer Data and Transactions

Cybersecurity in retail is critical for the industry, which handles vast amounts of sensitive...

emerging ransomware threats

Emerging Ransomware Threats: Evolution and Prevention

In today’s business world, the ever-increasing emerging ransomware threats pose a significant...

Colonial Pipeline tech news infosec hackers ransomware

The Cloud's Silver Lining: Ensuring Data Security in Cloud Environments

When it comes to cloud storage, there are some common myths that it's not secure. However, these...

Origins of cybercrime

Next-Gen Firewalls: Defending Against Advanced Threats

Traditional firewalls are increasingly inadequate due to their lack of application awareness,...

online learning cybersecurity

The Human Factor: Psychology of Cybersecurity Awareness

In the digital age there is an exponential increase in the relevance of psychological factors....

fintech cybersecurity consultation

Fintech Cybersecurity Consultation and its Role in Innovation

As of 2023, the global fintech market was valued at approximately $194.1 billion and is projected...

Person writing and typin on computer keyboard

Healthcare Cyber Security Challenges: Protecting Patient Data

In the digital age, the healthcare cyber security challenges the industry faces are formidable,...

emerging ransomware threats

Securing Financial Transactions in the Digital Age

The digital revolution has radically changed how we both handle our money and the steps to securing...

fintech cybersecurity consultation

The Role of AI in Cybersecurity Friend or Foe

In this article, we'll explore the role of AI in Cybersecurity the potential benefits it provides,...

Consulting on IoT and PSTI for manufacturers

IOT Self-Statement of Compliance for PSTI?

Often when our IoT consultants find themselves deep in conversation about the Product Security and...

fintech penetration testing

Understanding the Importance of Fintech Penetration Testing

Fintech Penetration testing aids in the identification and remediation of vulnerabilities within an...