Agenda
09:00 - 09:50 |
Registration and Networking Break |
09:50 - 10:00 |
Chairman’s welcome |
10:00 - 10:20 |
► Complying with NIS2 in a global organization – impossible or doable? Bjørn R. Watne, Senior Vice President & Group CSO, Telenor Group
|
10:20 - 10:40 |
► Both prevention and recovery Filip Verloy, Field CTO EMEA & APJ, Rubrik
|
10:40 - 11:00 |
► Cybersecurity’s Entangled Landscape Dr. Manfred Boudreaux-Dehmer, CIO, NATO We often approach cybersecurity improvements as if we were on an island where protection starts at the shore. But, while we may be on an island, it is part of an archipelago where we are all interconnected with bridges. What we do affects our customers and what suppliers do affects us and vice versa.
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
► Resilience in the times of uncertainties Jani Räty, CISO/Associate Director, Nordic Investment Bank & Matias Virta, Chief Business Continuity & Security Manager, Nordic Investment Bank
|
11:50 - 12:30 |
► Education Seminar Session 1 Delegates will be able to choose from the following education seminars:
|
12:30 - 13:30 |
Lunch and Networking Break |
10:20 - 10:40 |
► Third-party risk management from a third-party perspective Andrea Szeiler, Global CISO, Transcom
|
13:50 - 14:10 |
► Living in a world of fakes Jelle Wieringa, Security Awareness Advocate, EMEA, KnowBe4
|
14:10 - 14:30 |
► Merging Security with DevOps Practices Sami Vellonen, Director, InfoSec & Engineering, Terveystalo
|
14:30 - 14:50 |
► Rise and fall of a fraudster www-site Timo Wiander, CISO, Enfuce Enfuce's www-pages were copied by an external attacker. They used a copied version of enfuce.com and used our real job advertisements for phishing user id's etc. This presentation will go through:
|
14:50 - 15:20 |
Networking Break |
15:20 - 16:00 |
► CISO Panel Discussion Vesa Tupala, Group CISO, Mandatum;
|
16:00 |
Conference Close |
Education seminars
Generative AI: Amplifying attackers and defenders
Julius Nicklasson, Manager, Intelligence Services, Recorded Future
Generative AI empowers scalable consumption and production for both attackers and defenders, ushering in a wave of surprising use cases. This presentation shifts the focus from potential malicious uses to practical takeaways. Join us to explore how generative AI can be harnessed for positive impact, providing you with actionable insights and strategies to navigate transformative possibilities. Main topics to be discussed:
- Real world examples and use cases
- A practical lens for defenders
- Think about things differently
- Recorded Future AI in action
The Importance of Zero Trust in Kubernetes Environments
Olli Tuominen, Solutions Architect, SUSE
Deep network visibility is the most important part of container security at runtime. With traditional perimeter-based security, administrators use firewalls to isolate or block attacks before they reach the workload. Inspecting container network traffic reveals how an application communicates with other applications and is the only way to stop attacks before they reach the application or workload. SUSE NeuVector is the only 100% open source security platform for containers with continuous auditing throughout the lifecycle.
- Perform Deep Packet Inspection (DPI)
- Real-time protection with the industry's only container firewall
- Monitor east-west and north-south container traffic
- Capture packets for troubleshooting and threat investigation