19 - 20 SEPTEMBER 2018 / Stockholmsmässan

Here is a list of all confirmed Seminars for 2017. You can add these to your planner by clicking the 'add to schedule' button

  • Thu 21th Sep 10:00 - 10:40
  • Collaboration when Disruption is the New Normal Add to Schedule Snorre Kjesbu  |   Cisco  |   Keynote

    Keynote Theatre

    Thu 21th Sep 10:00 to 10:40

    Collaboration when Disruption is the New Normal

    Four of five CEOs question if their products will be relevant in three years, so it is no surprise that rapid innovation is at the top of the CEO agenda. With talent retention and revenue growth at stake, even traditional industries are facing disruption. But as Forbes reports, “businesses are finally realizing they need new ways to work, collaborate and meet”. What is this new way of working? How can IT leaders enable workforces to get more done, faster? We will demonstrate how IT leaders are using new collaboration tools to gain this competitive advantage.

    Speaker

    Photo Speaker Name Profile
    Snorre Kjesbu Snorre Kjesbu View Profile
  • FIKA 10:50 - 11:30
  • Thu 21th Sep 11:40 - 12:10
  • Architecting the Future: learnings from Google Add to Schedule Otso Juntunen  |   Google  |   Keynote

    Keynote Theatre

    Thu 21th Sep 11:40 to 12:10

    Architecting the Future: learnings from Google

    Cloud is a rising trend, but one that is really in its infancy. Google shares its view of the cloud as a platform-first mindset, opening the possibility of changing the fundamentals of computing to achieve new capabilities from compute architectures to data processing and machine learning. The next stage of machine intelligence offers both long and short term opportunities for those that can apply machine learning to analytics at web scale to relevant real world data that apply to your business.

    Speaker

    Photo Speaker Name Profile
    Otso Juntunen Otso Juntunen View Profile
  • Crossing the NIS and GDPR mine field Add to Schedule Jonas Dellenvall  |   Advenica AB  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 11:40 to 12:10

    Crossing the NIS and GDPR mine field

    In the wake of GDPR buzz it is now time for the next directive in the field of information security: the NIS Directive. The Directive on Security of Network and Information Systems is intended to raise Member States' level of protection of critical infrastructure.

    At first glance, it is easy to conclude that GDPR and NIS have a large overlap, but in fact, the differences are greater than the similarities. This session looks at the greatest initiatives in many years to raise the information security level and awareness within the European Union.

    Speaker

    Photo Speaker Name Profile
    Jonas Dellenvall Jonas Dellenvall View Profile
  • A day in the life of a GDPR breach Add to Schedule Simon Ogden  |   Splunk   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 11:40 to 12:10

    A day in the life of a GDPR breach

    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018.

    Speaker

    Photo Speaker Name Profile
    Simon Ogden Simon Ogden View Profile
  • Thu 21th Sep 12:25 - 13:15
  • A Hacker’s Confessions Pt. II Add to Schedule Michael Moltke  |   FortConsult  |   Keynote

    Keynote Theatre

    Thu 21th Sep 12:25 to 13:15

    A Hacker’s Confessions Pt. II

    FortConsult's Head of Technical Security Consulting Michael Moltke will show how a hacker operates in real life and shed light on the bad guys’ attack methods. Besides showing various types of phishing and spear-phishing attacks, Michael will illustrate what the hacker can do once a device is compromised. You will witness the whole attack scenario from initiation to post-exploitation – including gaining complete control of the infected device, using it to move seamlessly through a corporate network, gaining domain admin privileges, and retaining persistent (and unnoticed) access to the network.

    Speaker

    Photo Speaker Name Profile
    Michael Moltke Michael Moltke View Profile
  • The Shift to Self-Defending Networks Add to Schedule Andrew Tsonchev  |   Darktrace   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 12:25 to 12:55

    The Shift to Self-Defending Networks

    In this session, Darktrace will present a live demonstration of its dynamic 3D interface, the Threat Visualizer.  This industry-leading visualization and detection tool graphically represents an organisation’s entire network and demonstrates the threat level that it faces at any given time. Utilizing powerful visualization techniques, the Visualizer provides 100% network visibility and enables organisations to investigate the anomalies detected by the Enterprise Immune System.  

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • More Visibility or More Data? The CTI Conundrum Add to Schedule Darren Anstee  |   Arbor Networks  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 12:25 to 12:55

    More Visibility or More Data? The CTI Conundrum

    Security best practice tells us that defense in depth is the answer. Multiple layers of security designed to detect and contain attacks. CTI will help our technology identify and block the latest and greatest threats. But, what is the output from all of this?  People still make decisions in security and will do for at least next few years. Our security posture must deliver our analysts visibility - not just more and more data. Darren Anstee will discuss the need for better threat visibility, automated data collation and workflow to help us manage risk.

    Speaker

    Photo Speaker Name Profile
    Darren Anstee Darren Anstee View Profile
  • Thu 21th Sep 13:30 - 14:00
  • It's not only Hollywood... It's real life: Cyber Security - what to do when you find your business in the crosshair of a global threat group Add to Schedule Bulent Teksoz  |   BAE Systems Applied Intelligence  |   Keynote

    Keynote Theatre

    Thu 21th Sep 13:30 to 14:00

    It's not only Hollywood... It's real life: Cyber Security - what to do when you find your business in the crosshair of a global threat group

    There used to be a time when the movies pushed our imagination as to what is possible. Lucky for us, or unlucky depending on where you stand, what we see in real life in the cyber security world is nothing less exciting than a multimillion dollar Hollywood blockbuster.

    Join us for a thrilling journey as one Fortune 500 company finds themselves in the crosshair of a global threat group, how the attack evolves, how they push back and what they do to keep the business running. Hint: it wasn't about shutting down the internet.

    Speaker

    Photo Speaker Name Profile
    Bulent Teksoz Bulent Teksoz View Profile
  • Brought to you by Vasco Add to Schedule

    Cyber Threat Protection Theatre

    Thu 21th Sep 13:30 to 14:00

  • The Swedish IT Security Index – the tool to benchmark your capability Add to Schedule Anders Strömberg  |   Advenica AB  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 13:30 to 14:00

    The Swedish IT Security Index – the tool to benchmark your capability

    The digitalization wave affects all organisations. IoT, Big Data and Cloud bridges IT-systems and blurs borders when handling information. Meanwhile is the cybersecurity threat changing in shape, motive and means which requires better tools and insights to defend against these threats. 

    To assess the operative and strategic information security maturity there is an online tool that can be used. Advenica presents the result from the online tool showing some interesting findings that are worth noting. For instance, less than 15% handle cybersecurity on a Board level. Also, 20% of the respondents has not identified its protective assets.

    Speaker

    Photo Speaker Name Profile
    Anders Strömberg Anders Strömberg View Profile
  • Thu 21th Sep 14:10 - 14:40
  • Innovations fuelled by IoT and the cloud Add to Schedule Adrian Hornsby  |   Amazon Web Services  |   Keynote

    Keynote Theatre

    Thu 21th Sep 14:10 to 14:40

    Innovations fuelled by IoT and the cloud

    Speed and agility are essential with today’s businesses. The quicker you can get from an idea to first results, the more you can experiment and innovate with your data, perform ad-hoc analysis, and drive answers to new business questions. During this talk, Adrian will take in key features of the AWS IoT platform, latest developments and live demos & walk-throughs featuring Raspberry Pi. 

    Speaker

    Photo Speaker Name Profile
    Adrian Hornsby Adrian Hornsby View Profile
  • Brought to you by Innosoft Add to Schedule

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:10 to 14:40

  • Thu 21th Sep 14:50 - 15:20
  • Measuring Security Culture is more than just counting people Add to Schedule Kai Roer  |   CLTRe  |   Keynote

    Keynote Theatre

    Thu 21th Sep 14:50 to 15:20

    Measuring Security Culture is more than just counting people

    Much has been said about improving security culture, but nothing can be done unless we can prove the effectiveness of our programs. In this talk I will share how to measure security culture using available tools and techniques. 

    Speaker

    Photo Speaker Name Profile
    Kai Roer Kai Roer View Profile
  • From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone Add to Schedule Giuseppe Trotta  |   FortConsult  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:50 to 15:20

    From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone

    In this session, Giuseppe Trotta will show how he got full access to a company’s corporate network by breaking in to an Android device…belonging to the receptionist. Using freely available information about the receptionist, he succeeded in luring her in to downloading an APK file with a reverse shell. With full access to the phone, he connected to the guest Wi-Fi of the company, and exploited unsafe configurations on the network to gain full access to the internal corporate network, including persistent access through domain admin credentials.

    Speaker

    Photo Speaker Name Profile
    Giuseppe Trotta Giuseppe Trotta View Profile
  • You are already exposed, you just don’t know it. Add to Schedule

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 14:50 to 15:20

  • Thu 21th Sep 15:30 - 16:00
  • Tools and techniques to make GDPR compliance work across your organisation Add to Schedule Karen Lawrence Öqvist  |     |   Keynote

    Keynote Theatre

    Thu 21th Sep 15:30 to 16:00

    Tools and techniques to make GDPR compliance work across your organisation

    Cut the ”legal speak” and find a language, and tools/techniques which works across your organization on compliance with the General Data Protection Regulation (GDPR). The GDPR will replace existing EU data protection laws on 25th May 2018 in Sweden and every EU member state. and heavy fines await companies that do not comply. 

    It all seems so complicated, but in fact if you dig deep enough you will find hidden simplicity. Data privacy rules, at least the lowest common denominator in privacy have been around since 1980. There are quite simply 8 privacy principles. Privacy laws globally are all founded on these 8 principles, including the GDPR. By taking the lowest common denominator in privacy you can build a global privacy program using the GDPR as your privacy standard.

    Speaker

    Photo Speaker Name Profile
    Karen Lawrence Öqvist Karen Lawrence Öqvist View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top