What we do
How can you best plan for a cyber breach and respond swiftly when they happen?
At this seminar, we discuss five key steps to detect, restrict and recover from a cyber-attack based on the latest market analysis and experience from Softcat’s security technologist and key partners, Forcepoint, Druva and Cylance.
When a car accident happens today, inbuilt computers capture valuable data surrounding the incident. This data helps manufacturers understand the circumstances surrounding the incident, restrict its impact and reduce the chance of it happening again.
The steps taken are similar to the principles that Softcat recommend to customers when planning a response to a data breach. These are:
9:00am Coffee, Tea and Refreshments
9:35am Step 0: Plan with Sean Huggett, Data Protection & Information Assurance Consultant
9:55am Step 1: Gather with Adam Louca, Chief Security Technologist, Softcat
10:15am Step 2: Investigate with Brad Towers, SE Director for UK&I, Forcepoint
10:30am Step 3: Recover with Martin Edwards, Director Presales (EMEA), Druva
10:45am Comfort break
10:55am Step 4: Respond with Patrick Bayle, EMEA Channel SE, Cylance
11:10am Step 5: Avoid with Adam Louca, Chief Security Technologist, Softcat
11:30am Q&A - Panel
11:45am Networking and Light Lunch