Protecting your business against the cyber threats of today and tomorrow
Hear from the the Cyber Security Experts
Businesses face a rising number of diverse cyber security threats, as well as more stringent data protection laws. Meanwhile, the hybrid working model has presented more opportunities for cyber criminals and more challenges for hard-working IT teams.
Gain insights on how you can protect your data, reputation, and bottom line - watch and listen to the experts on our cyber security webinar.
Our Speakers
Quentyn Taylor
Things that Keep CISO’s Up at Night – hear from Quentyn Taylor, Senior Director of Product, Information Security, and Global Incident Response at Canon EMEA, on how geopolitics is shaping information security and the relationship with cyber threats. How do you know when you've done enough to protect your organisation and how do you prioritise the many alerts, issues and vulnerabilities vying for your attention? What are the key aspects to protecting your business and where should your focus be?
Quentyn has been with Canon for 22 years and has a wealth of knowledge surrounding all things security. Educating business customers to minimise their security risk, Quentyn uses the power of stories and his own experience of testing products to destruction.
Paul Colwell
Cyber Criminal Gangs – Paul Colwell, Chief Technology Officer at Wavenet, gives us an understanding of who they are, where they are and what they are after.
Paul has over 20 years’ experience in IT and Technology working with a variety of sectors. Wavenet is a managed services provider of industry-leading cyber security, communications, and technology solutions.
Related Products and Solutions
Explore Further
4 ways cloud computing will change our lives
Cloud computing is changing our lives in many ways and it's here to stay in one form or another.
Cybersecurity: questions everyone should ask
5 questions enterprises should ask themselves when assessing the cyber hygiene of their organisation.
What's the cost of a security breach for you
The security threats posed by the flow of information in hybrid environments are numerous and complex.