Role-Play
We will do a practical case that is presented to us in our business. Within what is required for the position of technical-commercial (in our company, Product Manager), we will see that the technique and knowledge about the product, its manufacturing, and characteristics are key to solving the presented case. Similarly, knowledge of technical specifications and mediation between the client and the supplier is a crucial point to consider for this case.
The case in question will be provided to you a few days before carrying out the activity with as many details as possible so that you can get into context. During a session, we will have a joint debate on this case from different approaches that you propose, but with a joint guide that will lead us to make a final decision. It is a highly participative session since you will be the ones deciding how to approach the case according to your knowledge, way of thinking, and the information provided.
If this activity had to be defined, it would be like a laboratory practice but in the business and industrial world, a script, your knowledge, and action!
Date: May 2nd
Time:13:30 - 14:30
Location: pending
Targeted at: Any profile attending the fair, but particularly those who are highly participative.
Registration on THIS FORM (open until Sunday, April 14th)
We propose to carry out two types of related activities, in two groups of up to 8 people each, one focusing on the management aspects of the day-to-day operations of any production and service company, and the other on cybersecurity.
We offer you the opportunity to participate in an activity at our headquarters as an introduction to the world of cybersecurity in corporate environments so that you can gain knowledge from a different perspective of the digital world. The activity will specifically consist of creating scenarios where each of you will have to face decision-making to respond to a security incident (Kahoot-type) and assess whether the decisions made lead to a catastrophe or not. The order of the activity would be:
- Welcome and presentation of the company and its facilities.
- Introduction to the world of cybersecurity in corporate environments.
- What we do from the technical systems and security teams in our day-to-day operations.
- Activity: How to respond to different security incidents:
- Activity 1: Recovery from a ransomware attack.
- Activity 2: Phishing detection.
- Activity 3: Data security.
- Brief discussion about the experience and breakfast.
We offer you the opportunity to participate in an activity at our headquarters as a presentation of the daily use of technology in the company. The activity will specifically involve the use of Microsoft products in the development of practical examples in which you will participate as potential members of final companies from different sectors. The order of the activity would be:
- Welcome and presentation of the company and its facilities.
- Presentation of the scope of technology in the company and its evolution.
- Activity 1: MYFOOD TERMINAL Example of a terminal circuit for meat plant manufacturing.
- Activity 2: MYWHATSAPP Example of integration of the latest technologies from both the business world and networks.
- Activity 3: MYSGA PDA Example of a warehouse circuit. Brief discussion about the experience and breakfast.
Date: May 8th
Time:9:30 - 13:00
Location: On-site at the company's facilities. Transportation provided by the company.
Targeted at: Computer engineers, interested in cybersecurity, mathematicians, and physicists (limited spots available).
Registration on THIS FORM (open until Sunday April 21th)
Faculties taking part in the Forum
Get 1,5 ECTS participating in the Business Forum!
In exchange for the inscription to the Business Forum, visit at least ten enterprises, participate in two of the scheduled activities and present a summary report of your experience at the Forum.