Skip to the content
DATE: Thursday, 10 June 2021  TIME: 4:00 PM  LOCATION: Online
We would like to invite you to our round table on the 10th June, Hackers don't sleep! Can you respond to an incident around the clock?.

We will be joined by a small group of invited industry peers and security experts from Chess to explore the main security challenges organisations are facing today and share learnings and best practices how to cope with these in a post COVID-19 era. 

Please RSVP by Thursday, 3rd June. 

We look forward to hosting you!

Networking

You will be mixing business with pleasure, the serious business of fine wine tasting together with the pleasure of connecting with senior-level colleagues from major UK organisations.

*A selection of fine wine will be delivered to your door. Please provide your preferred address for delivery.

Agenda

4.00 pm: Arrival to the virtual event

4.10 pm: Welcome and Introductions

4:20 pm: New 2021 ransomware report and discussion

4:45 pm: Customer Q&A with Spicerhaart

5:00 pm: Wine tasting hosted by a professional Sommelier*

Register Now

Security Resources

Five Significant Savings with Synchronised Security

Five Significant Savings with Synchronised Security

With Sophos' decision to retire on-premise legacy security platforms and focus on next-generation products, I thought today we would have a quick look at the key advantages of synchronised security and how it can save you money.

Managed Security Services: What you need to know

Managed Security Services: What you need to know

The rise of remote working makes protecting endpoints more difficult. Many companies have created vulnerabilities in their networks. Often infections can go undetected for days and weeks, costing you thousands not only in lost revenue and customers but also in reputational damages.

Sophos MTR – Cybersecurity Evolved

Sophos MTR – Cybersecurity Evolved

The only constant in the world of cybersecurity is change. As fast as new products and technologies are launched into the market, then so do the capabilities and approaches of attackers. It’s a constant game of cat and mouse.