Seminar Registration

To register for the Cybersecurity Seminar on Thursday 14 March 2019, please complete the form below.

[]
1 Step 1
Registration Details
First name
Second name
Your company name
Your job role/position
Contact phone number
Are you an existing Qubic Customer?
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right

Details

Thursday, 14 March 2019
10:00 to 14:30

Amazon Liverpool Street
1 Principal Place
Worship Street
London EC2A 2FA

For further details, call Qubic on 020 8601 7000

We collect your details to help us organise the Seminar and inform you of any changes. We may use your information to contact you with marketing information relating to similar products or services. We will not pass your information to any third-party. If you would like to see a copy of any information we hold or would like to have your information deleted, please contact SAR@qubicgroup.com.

The Seminar

This must attend FREE seminar is your opportunity to find out how you can mitigate the potentially catastrophic consequences of a cyberattack.

The threats from attack are increasing across all sectors and all business sizes. The types of attack fall into four broad categories; cyber-crime, cyber war, cyber-espionage and ‘hacktivism’. Whatever the motivation, they all come with a cost. It can be the cost of cleaning and restoring your systems, the opportunity cost of lost business, the reputational cost of a data breach or the legislative fines associated with a breach. This seminar is aimed at any organisation looking to mitigate the financial impact of a cyberattack.

In attendance, we will have some industry experts explaining how you can set about avoiding a cyber-attack, how to recover from a cyber-attack and how to mitigate the fallout from a cyber-attack.

Agenda

10:00 – Registration, Coffee & Networking

10:30 – Welcome & Introduction

10:35 – Keynote Address
John Frost, Head of Business Continuity, Marks & Spencer Group plc
John Frost MBCI is responsible for Marks and Spencer Group Business Continuity across 46 operational countries supporting 85,000 colleagues. John Chair’s the RBCA (Retail Business Continuity Association).

10:55 – Clouded judgment?
Amazon Web Services – Rob Hale – Where is your information safer – on a server in your office or in the cloud? AWS discuss the physical and technological measures taken to keep your information safe and how to quickly recover from any attack.

11:25 – Premium insurance?
Beazley Group – Raf Sanchez – Insuring against cyberattack surely makes sense – yes, you might get some financial recompense but what about recovering from the incident, reputational damage and fines? With such a complex area and a wide variety of threats, you need the insurer with the right policy that is designed to support and protect your business if it experiences an attack or a data breach.

11:45 – Break & Coffee

12:00 – Planning for continuity
URIM – Justin Rhodes – Something goes wrong – an employee clicks on a ‘bad attachment’, someone leaves their phone on the train, a server crashes taking your booking system down, you are in the middle of a denial of service attack – what do you do now? What you do next could make all the difference to the potential outcomes. Wouldn’t it be great if everyone in your organisation knew ‘the right thing to do’ and could let the right people know about the problem?

12:20 – GDPR keeping data safe?
Qubic – Shane Gohil – Last year, many organisations were pulled into the world of data protection for the first time – for some it felt like a box ticking exercise – was their privacy policy up to date, did they have double opt-in emails, did they have an appointed DPO? In fact, a year on, some companies are starting to find that the legislation is actually giving them a practical framework both to avoid cyberattacks and data breaches, and to minimise any potential financial implications.

12:40 – Questions

13:00 – Lunch and Networking plus a live demonstration from Dark Beam – identify vulnerabilities associated with your domain in real-time…

14:30 – Close

[themeone_spacer height=”30px”]
[themeone_icon_txt title=”Adding Value through People” color=”accent-color1″ anim=”pulse” icon=”icon-et-profile-male”]We have team of highly skilled individuals
Most of our engineers have been with us for over 10 years
We invest heavily in professional training
Advice to get the right solution first time[/themeone_icon_txt]

[themeone_button text=”Through People” url=”#” size=”small” type=”standard” border=”full-rounded” style=”to-button-bg” txtcolor=”second-bgcolor” bgcolor=”accent-color1″ bganim=”true” target=”_self” iconanim=”” icon=”icon-et-profile-male”/]

[themeone_icon_txt title=”Adding Value through Technology” color=”accent-color1″ anim=”pulse” icon=”icon-et-gears”]Delivering innovative technological solutions
Enhancing products like Microsoft Office 365
Powerful UK core infrastructure
Redundant multi-vendor interconnect giving high levels of resilience[/themeone_icon_txt]

[themeone_button text=”Through Technology” url=”#” size=”regular” type=”standard” border=”full-rounded” style=”to-button-bg” txtcolor=”second-bgcolor” bgcolor=”accent-color1″ bganim=”true” target=”_self” iconanim=”” icon=”icon-et-gears”/]

[themeone_icon_txt title=”Adding Value through Process” color=”accent-color1″ anim=”pulse” icon=”media-sliders-side”]Proactive monitoring and management
We can deliver round the clock 24/7 support
We are accredited to the highest standards
including ISO 27001:2013 and ISO 9001
We employ PRINCE2 project management [/themeone_icon_txt]

[themeone_button text=”Through Process” url=”#” size=”regular” type=”standard” border=”full-rounded” style=”to-button-bg” txtcolor=”second-bgcolor” bgcolor=”accent-color1″ bganim=”true” target=”_self” iconanim=”” icon=”media-sliders-side”/]

Leave a Reply