Presentations already confirmed include:
► The future of authentification
Morgan Hottonier, Acting Head of Group Security, Kindred Group
- The evolution of IDAM
- Buzzwords vs. reality
- Beyond passwords
► Cybercrime – a shared responsibility
Jan Olsson, Police Superintendent, Swedish Police Authority, Swedish Cybercrime Center, SC3
- Fostering Collaboration between private sector and law enforcement
- Prevention - the only way out
- Fraud - what are the costs to society?
► Transforming Cybersecurity Risk Management, Monitoring & Reporting
Thomas Norlin, Regional Sales Manager, Nordics, BitSight Technologies
- Prioritization, justification and validation of IT security investments to underpin businesses’ digital transformation
- Managing third- and fourth-party risk in today’s hyper-connected environment
- Supporting audit and compliance tracking including GDPR
► Safeguarding data at the heart of education
Ulrika Sundling, Information Security Officer, Uppsala University
- GDPR as a catalyzer for collaboration in critical national infrastructure
- Managing the intricacies of information classification & risk analysis
- Raising awareness and leading change in the wake of regulatory evolution
► Executive panel discussion
Fraud leaders in the finacial sector; competitors in business, allies in the face of fraud.
- Marcus Brandel, Head of Card fraud prevention, Swedbank AB
- Helena Wall, Head of Fraud Intelligence, Nordea
- Shane Murion, Security Specialist, Skandia Bank
► Identity at the Center of a Zero Trust Network: Taking a Governance-Based Approach to Security
Mikael Wikstrom, Sales Engineer, SailPoint
- Identity Governance - imperative in a Zero Trust world.
- The future of trust – Predictive Identity.
- Assume your network is already compromised!
- Do you truly drive least privilege?
► The millenial compromise - Regulation or Innovation?
Kristine Falgren, Tech Advisor, Danish Ministry of Foreign Affairs
- How can the public sector support new technologies
- Denmark and its AI ambitions
- Considering the risks and laying the foundations for sustainable and ethical innovation
► SSL Decryption, Privacy and Security, a Balancing Act
Marc Lueck, CISO Northern Europe, Zscaler
- Countering the threat from bad actors who exploit SSL/TLS to cloak their activities
- Protecting corporate data with SSL/TLS encryption
- Using SSL/TLS inspection methodologies to mitigate the risks hidden in encrypted traffic
- Protecting employees and the business, legal, and security implications of managing these risks
► Executive panel discussion
Implementing transformation processes means that cybersecurity is the critical foundation upon which digital transformation rests. How do we equip cybersecurity to support digitalisation?
- Morgan Hotonnier, Acting Head of Group Security, Kindred Group
- Kristine Helen Falgren, Special Advisor, Ministry of Foreign Affairs of Denmark
- Jonas Danson, Senior Group Security Advisor, Ericsson
► Bestsellers in the Underground Economy: Measuring Malware Popularity by Forum
Jason Steer, Director of EMEA Presales, Recorded Future
- How the majority of the top 10 mentions of malware in multiple languages included openly available dual-use tools, open-source malware, or cracked malware.
- How many key malware families are over three years old or can be mitigated with basic security precautions.
- How activity in underground forums correlates to growth in malware in the real world.
► Cybersecurity: No big deal. The unimportance of cybersecurity and what that means for today’s information security leader
Amanda Oon, Head of Events Programming and Deputy Editor, AKJ Associates
- Do we have the cybersecurity we deserve? If cybersecurity does not pose an existential threat, then how can we expect businesses to take it seriously? Is the “band-aid” approach good enough?
- Should we be employing the same approaches as physical security to cybersecurity? Is cybersecurity the new health and safety? Or the new climate change?
- Cyber-risk is not like other risk. How the operational risk leaders view cyber-risk and how it compares to other forms of operational risk
- But where has all the money gone? A roadmap to the muddy waters of the cyber-solutions market
Compliance Does Not Equal Security: How To Identify Gaps In Your Protection Strategy
Liviu Arsene, Global Cybersecurity Researcher, Bitdefender
As the human-technology blend is becoming the new norm, security has evolved to the point where it’s no longer just about protecting against malware, but about protecting, and giving you control over, every piece of data that you generate. With an ever-increasing attack surface brought forward by new hardware, technologies and services, the complexity of securing that data has increased exponentially.
- Specific techniques and tools to assess where your gaps are.
- What should be the new security paradigm and what you need to know?
- A three-pronged approach to realize the best protection
Your data is critical: would you have noticed the theft ?
Nicolas (Nico) Fischbach, Global Chief Technology Officer, Forcepoint
In today’s world of digital transformation data is the new gold, and once created takes a life of its own that is very difficult to track and control. To be more exact, once data has been created and stored somewhere in the ever changing hybrid IT landscape made of endpoints, systems, cloud and apps, how do you notice when somebody, from employees leaving the enterprise to nation state actors try to exfiltrate and steal your enterprise’s critical data ? This is what will be address”.
- Introduction to data protection in the DX context
- Data protection use-cases, e.g. data exfiltration
- How to defend your hybrid IT system and protect your critical data
Can’t change the Cybersecurity Game? Change Its Structure.
Rijk Vonk, Regional Director Benelux & Nordics, Synack
Within companies, cybersecurity has a finite setup; with procedures, protocols, plans and structures all taking up capacity and time. When created, these setups align with available cycles. Today, however, with agile development cycles, we must adjust and align the update cycles with testing cycles. No longer does “one-size-fit-all” work. And postponing this change is a recipe for disaster.
In this session you will learn:
- How an elite army of global ethical hackers with infinite creativity and tools can help you overcome these challenges.
- How these embraced hackers can support you in your fight against hackers with malicious intentions.
- And how to let them help you win the infinite game you are up against.
Advanced security monitoring techniques: augmenting SIEM with UEBA
Siddharth Sharath Kumar, Product Evangelist, ManageEngine
In an age of advanced threats and sophisticated malicious insiders, security teams face an uphill task. In order to detect and mitigate security incidents, organizations must revisit their security monitoring strategy and ensure that they are equipped with the right set of tools. This session looks at the latest trends in security information and event management (SIEM) and examines why it is important to incorporate machine-learning techniques to leverage user and entity behavior analytics (UEBA).
- Challenges in security monitoring
- Integrating event and non-event information into your SIEM solution
- Anomaly-based detection with UEBA
- Key concepts and use cases
Dissecting Today’s Attacks to See the Future of Cybersecurity
Dean Ferrando, Lead Systems Engineer, Tripwire
Dissecting the current threat landscape and analysing major data breaches from the last decade, this session explores how these insights can help us predict the future of cybersecurity. We’ll look at the key factors that many high-profile breaches have in common, and why cybercriminals continue to leverage tried-and-tested tactics to be successful in their attacks. Attendees will learn the emerging trends shaping the future state of cybersecurity, and what foundational controls, industry frameworks and resources organisations can use today to better prepare for tomorrow’s threats. In this session you will:
- Learn about the key factors many high-profile breaches have in common.
- Understand the emerging trends shaping the future state of cybersecurity.
- Understand what foundational controls to use today to bolster your cybersecurity strategy.
- Understand how employee education can help reduce the success of cyber-attacks.
- Learn about resources and industry frameworks to help strengthen your overall security posture.