20 - 21 SEPTEMBER 2017 / Stockholmsmässan
Register Free

Here is a list of all confirmed Seminars for 2017. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 20th Sep 10:00 - 10:40
  • What does the Future hold for Sweden’s Digital Economy? Add to Schedule Fredrik Reinfeldt  |     |   Keynote

    Keynote Theatre

    Wed 20th Sep 10:00 to 10:40

    What does the Future hold for Sweden’s Digital Economy?

    Sweden has a long established reputation as a hotbed for innovation with many tech startups from the region enjoying global success. During Fredrik’s long tenure startups such as Skype, Spotify, Mojang and King took advantage of this culture and quickly became global giants in their respective markets. In this fascinating session Fredrik will reveal the backstory on what created this culture and his opinions on the challenges Sweden now faces in the current political climate.

    Speaker

    Photo Speaker Name Profile
    Fredrik Reinfeldt Fredrik Reinfeldt View Profile
  • FIKA 10:50 - 11:30
  • Wed 20th Sep 11:40 - 12:10
  • How to Make Money with Open Source Add to Schedule Monty Widenius  |   MariaDB Corporation  |   Keynote

    Keynote Theatre

    Wed 20th Sep 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Monty Widenius Monty Widenius View Profile
  • How does WatchGuard deliver a holistic security solution from beginning to end? Add to Schedule Peter Johansson  |   Watchguard   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 11:40 to 12:10

    How does WatchGuard deliver a holistic security solution from beginning to end?

    How does Watchguard protect assets all the way from the cloud, through the perimeter and down to the client with visualization and automation in multiple layers?

    Speaker

    Photo Speaker Name Profile
    Peter Johansson Peter Johansson View Profile
  • Hybrid Active Directory Security and Governance Add to Schedule Colin Truran  |   Quest Software  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 11:40 to 12:10

    Hybrid Active Directory Security and Governance

    Roughly 70% of Fortune 500 companies purchased Office 365 in the last year. But, many organizations don’t realize their on-premises Active Directory (AD) is still the authoritative source for authentication requests to Office 365 through Azure AD.

    To achieve a stable Azure AD, your on-premises AD must be streamlined with a normalised structure, consolidated OUs, good security delegation and solid provisioning. Otherwise your infrastructure becomes more vulnerable to a host of potential breaches, threats and disasters. 

    This session will tell you how to:

    • Make your hybrid directory environment manageable and available
    • Reduce your potential attack area
    • Bolster your cloud security posture

    Speaker

    Photo Speaker Name Profile
    Colin Truran Colin Truran View Profile
  • Wed 20th Sep 12:25 - 12:55
  • Ransomless Ransomware - Disruption and Smoke Screens Add to Schedule Mikkel Pedersen  |   Heimdal Security A/S & Heimdal Security SrL  |   Keynote

    Keynote Theatre

    Wed 20th Sep 12:25 to 12:55

    Ransomless Ransomware - Disruption and Smoke Screens

    This year we’ve witnessed unprecedented ransomware attacks, both in scale and impact. With ransoms drawing staggering amounts of money to the malware economy, the context is set for increasingly aggressive and complex attacks. How can organizations cope and thrive with cybercriminals knocking on every backdoor? This is what we aim to explore in this talk, which focuses on mitigating malware attacks based on traffic analysis to and from the endpoint.  

    Speaker

    Photo Speaker Name Profile
    Mikkel Pedersen Mikkel Pedersen View Profile
  • Attackers are monitoring your digital footprint, are you? Add to Schedule Andy Holmes   |   Digital Shadows   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 12:25 to 12:55

    Attackers are monitoring your digital footprint, are you?

    Organisations’ digital footprints are expanding and changing at an overwhelming rate. Attackers are using this information to exploit organisations and launch their attacks. Traditional security solutions that focus on the perimeter can’t address these risks by themselves because the boundary is disappearing. Learn how you can help manage your digital risk, minimise your digital shadow and protect against; cyber threats, data exposure and brand exposure.

    Speaker

    Photo Speaker Name Profile
    Andy Holmes Andy Holmes View Profile
  • Stop the Most Sophisticated Cyber Attacks With Layered Next-Gen Endpoint Protection Add to Schedule Joseph Abou-Haidar  |   Bitdefender  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 12:25 to 12:55

    Stop the Most Sophisticated Cyber Attacks With Layered Next-Gen Endpoint Protection

    Sophisticated threats such as file-less attacks, modern ransomware and phishing evade traditional endpoint security tools.

    To fortify their endpoints, your customers need a layered defense approach with unified prevention, multi-stage detection and automated response.

    Speaker

    Photo Speaker Name Profile
    Joseph Abou-Haidar Joseph Abou-Haidar View Profile
  • Wed 20th Sep 13:30 - 14:00
  • Fascinating Tales of A Strange Tomorrow Add to Schedule Julien Simon  |   Amazon Web Services   |   Keynote

    Keynote Theatre

    Wed 20th Sep 13:30 to 14:00

    Fascinating Tales of A Strange Tomorrow

    AI has become the hottest topic in the IT industry. In this talk, we’ll explain how Deep Learning — a subset of AI — can help you solve complex problems. We’ll look at how you can add Deep Learning capabilities to your applications and why Cloud technology can get you there faster.

    Speaker

    Photo Speaker Name Profile
    Julien Simon Julien Simon View Profile
  • Beyond The Hype; How Attackers Win Add to Schedule Steve Manzuik  |   Duo  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 13:30 to 14:00

    Beyond The Hype; How Attackers Win

    Movies, TV and even some non-fictional press leads most to believe that a cyber attack is a complicated endeavor conducted by teams of highly skilled people. The reality is, that most successful attacks are not complicated in the least. This presentation will highlight real world attacks, why the attackers were successful and how they could have been stopped. Some new open source tools to battle phishing will be covered as well as a strategy to deal with disappearing network perimeter. 

    Speaker

    Photo Speaker Name Profile
    Steve Manzuik Steve Manzuik View Profile
  • The Game Has Changed: Principles to build a strong foundation to secure the new enterprise Add to Schedule Marcelo Pereira   |   Flexera  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 13:30 to 14:00

    The Game Has Changed: Principles to build a strong foundation to secure the new enterprise

    “Software is eating the world!” - It’s a provocative sentence, but what does it mean for you and your business?

    It means the fast pace of change in technology and infrastructure creates the need to tear down the walls that oppose security and availability requirements. This is probably a change hard to achieve, but necessary. 

    Join us for a session to talk about principles to build a strong foundation to secure the enterprise.

    Speaker

    Photo Speaker Name Profile
    Marcelo Pereira Marcelo Pereira View Profile
  • Wed 20th Sep 14:10 - 14:40
  • The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense Add to Schedule Andrew Tsonchev  |   Darktrace   |   Keynote

    Keynote Theatre

    Wed 20th Sep 14:10 to 14:40

    The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis. 

    Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.

    Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense,  is relied upon by organizations around the world, and can cover up to millions of devices.  

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Firewall-as-a-Service: Enterprise Grade Security for Everyone Add to Schedule Mark Bayne  |   Cato Networks   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 14:10 to 14:40

    Firewall-as-a-Service: Enterprise Grade Security for Everyone

    Firewalls and UTMs have been the cornerstone of network security for the past 20 years. Yet, deploying appliances at every remote office, creates multiple challenges for organizations: the capital needed to buy, upgrade and retire hardware solutions and the tough tradeoff between hardware capacity and strong security. Organizations end up compromising on strength of protection or the end user experience.

    Even when running smoothly, firewalls and UTMs are location bound and can't effectively protect the mobile users and cloud infrastructure that are now an integral part of the business.

    Speaker

    Photo Speaker Name Profile
    Mark Bayne Mark Bayne View Profile
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 14:10 to 14:40

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Wed 20th Sep 14:50 - 15:20
  • Humanity’s Most Serious Challenge Add to Schedule Jay Tuck  |     |   Keynote

    Keynote Theatre

    Wed 20th Sep 14:50 to 15:20

    Humanity’s Most Serious Challenge

    Artificial Intelligence is not science fiction. It is here and now, changing our world at breathtaking speed. We – as individuals and as institutions – must be informed, prepared and ready to redefine ourselves at breathtaking speeds as well.

    AI can help us digesting and analyzing big data, macro managing our resources, defining unseen challenges and securing our food chain, our environment and a sustainable future.

    AI can hurt us If we turn over too much responsibility too soon, we can lose control to a super intelligence which is learning at lightning speed.

    There is no guarantee that we will always be Darwin’s Darling.

    Speaker

    Photo Speaker Name Profile
    Jay Tuck Jay Tuck View Profile
  • GDPR, Petya & Wannacry: When things go wrong who is ultimately responsible - The Board or IT? Add to Schedule Sander Hofman  |   Mimecast  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 14:50 to 15:20

    GDPR, Petya & Wannacry: When things go wrong who is ultimately responsible - The Board or IT?

    As Petya and Wannacry have shown, organisations across the globe need to re-evaluate their readiness for the next wave of threats.  It is critical for companies to deploy a proactive cyber resilience strategy while remaining GDPR compliant.

    The time to up your defences is now.

    Speaker

    Photo Speaker Name Profile
    Sander Hofman Sander Hofman View Profile
  • Understanding Ransomware Add to Schedule Peter Gustafsson  |   Barracuda Networks  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 14:50 to 15:20

    Understanding Ransomware

    Ransomware is a type of malware that lets attackers find and encrypt your most important data. They then offer to provide the decryption key only if you pay a ransom, within a short time.  This is the number one IT security challenge that you face today, with resource-limited small and mid-size businesses the most likely targets.

    Cybercriminals exploit a variety of threat vectors, including email, network traffic, user behavior, and application traffic to insert ransomware. Without a comprehensive security strategy that secures all these vectors, you are almost certain to become a victim.

    Barracuda provides a complete family of solutions that work together to help you detect, prevent, and recover from ransomware attacks.

    Speaker

    Photo Speaker Name Profile
    Peter Gustafsson Peter Gustafsson View Profile
  • Wed 20th Sep 15:30 - 16:00
  • AI in the Workplace: Emergence of the Cognitive Room Add to Schedule Mary Ann de Lares Norris  |   Oblong Industries  |   Keynote

    Keynote Theatre

    Wed 20th Sep 15:30 to 16:00

    AI in the Workplace: Emergence of the Cognitive Room

    The physical world and the digital world are becoming more intertwined in all aspects of life. In the enterprise, this trend is exhibited by the emergence of the cognitive room. Cognitive rooms, which harness the power of the team as well as the power of AI, are poised to transform the future of work.

    Enterprises need to learn to capture the value in this new world order—and starting with the human element is key. Innovative human-centered UIs must be used to augment a user’s ability to gain insight from the massive amounts of unstructured data that are part of today’s enterprise workflow and the lifeblood of cognitive rooms.

    Mary Ann will be addressing the challenge organizations face today to transcend traditional, sequential analytical processes in favor of faster parallel and real-time working processes that deliver the greatest business impact.

    Speaker

    Photo Speaker Name Profile
    Mary Ann de Lares Norris Mary Ann de Lares Norris View Profile
  • The Recipe for SaaS success? ‘Smother customers with time, love and attention’ Add to Schedule Andy Nolan  |   Lifesize   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 15:30 to 16:00

    The Recipe for SaaS success? ‘Smother customers with time, love and attention’

    Lifesize is a microcosm of the transition many enterprises face today, as they grapple with the transformation from traditional one-off product sales to a modern subscription-based services business model. How the philosophy of putting customer success at the heart of your strategy is by the best way to ensure success.

    Speaker

    Photo Speaker Name Profile
    Andy Nolan Andy Nolan View Profile
  • From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone Add to Schedule Giuseppe Trotta  |   FortConsult  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 15:30 to 16:00

    From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone

    In this session, Giuseppe Trotta will show how he got full access to a company’s corporate network by breaking in to an Android device…belonging to the receptionist. Using freely available information about the receptionist, he succeeded in luring her in to downloading an APK file with a reverse shell. With full access to the phone, he connected to the guest Wi-Fi of the company, and exploited unsafe configurations on the network to gain full access to the internal corporate network, including persistent access through domain admin credentials.

    Speaker

    Photo Speaker Name Profile
    Giuseppe Trotta Giuseppe Trotta View Profile
  • Wed 20th Sep 16:10 - 17:00
  • Privacy Program Management: How to capture the business value and stakeholders' enthusiasm Add to Schedule Sofia Edvardsen  |   Sharp Cookie Advisors  |   Keynote

    Keynote Theatre

    Wed 20th Sep 16:10 to 17:00

    Privacy Program Management: How to capture the business value and stakeholders' enthusiasm

    Learn how to proactively manage privacy in the GDPR era in your organisation with the tools and insights from Managing Partner Sofia Edvardsen's experience of setting up and managing privacy programs of leading enterprises. A key factor to success Sofia Edvardsen will shed light on, not often covered in privacy management, is how to perform and stay relevant in the eyes of top management.

    Speaker

    Photo Speaker Name Profile
    Sofia Edvardsen Sofia Edvardsen View Profile
  • Countering the evolving cybersecurity challenge with Fortinet Security Fabric  Add to Schedule Niklas Henriksson  |   Fortinet  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 16:10 to 17:00

    Countering the evolving cybersecurity challenge with Fortinet Security Fabric 

    The Fortinet Security Fabric is an intelligent framework designed around scalable, interconnected security combined with high awareness, actionable threat intelligence, and open API standards for maximum flexibility and integration to protect even the most demanding enterprise environments. Fortinet’s security technologies have earned the most independent certifications for security effectiveness and performance in the industry. When woven together, the Fortinet Security Fabric closes gaps left by legacy point products and platforms by providing the broad, powerful, and automated protections today’s organizations require across their physical and virtual environments, and from endpoint to the cloud. 

    Speaker

    Photo Speaker Name Profile
    Niklas Henriksson Niklas Henriksson View Profile
  • Thu 21th Sep 10:00 - 10:40
  • Collaboration when Disruption is the New Normal Add to Schedule Snorre Kjesbu  |   Cisco  |   Keynote

    Keynote Theatre

    Thu 21th Sep 10:00 to 10:40

    Collaboration when Disruption is the New Normal

    Four of five CEOs question if their products will be relevant in three years, so it is no surprise that rapid innovation is at the top of the CEO agenda. With talent retention and revenue growth at stake, even traditional industries are facing disruption. But as Forbes reports, “businesses are finally realizing they need new ways to work, collaborate and meet”. What is this new way of working? How can IT leaders enable workforces to get more done, faster? We will demonstrate how IT leaders are using new collaboration tools to gain this competitive advantage.

    Speaker

    Photo Speaker Name Profile
    Snorre Kjesbu Snorre Kjesbu View Profile
  • FIKA 10:50 - 11:30
  • Thu 21th Sep 11:40 - 12:10
  • Architecting the Future: learnings from Google Add to Schedule Otso Juntunen  |   Google  |   Keynote

    Keynote Theatre

    Thu 21th Sep 11:40 to 12:10

    Architecting the Future: learnings from Google

    Cloud is a rising trend, but one that is really in its infancy. Google shares its view of the cloud as a platform-first mindset, opening the possibility of changing the fundamentals of computing to achieve new capabilities from compute architectures to data processing and machine learning. The next stage of machine intelligence offers both long and short term opportunities for those that can apply machine learning to analytics at web scale to relevant real world data that apply to your business.

    Speaker

    Photo Speaker Name Profile
    Otso Juntunen Otso Juntunen View Profile
  • Crossing the NIS and GDPR mine field Add to Schedule Jonas Dellenvall  |   Advenica AB  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 11:40 to 12:10

    Crossing the NIS and GDPR mine field

    In the wake of GDPR buzz it is now time for the next directive in the field of information security: the NIS Directive. The Directive on Security of Network and Information Systems is intended to raise Member States' level of protection of critical infrastructure.

    At first glance, it is easy to conclude that GDPR and NIS have a large overlap, but in fact, the differences are greater than the similarities. This session looks at the greatest initiatives in many years to raise the information security level and awareness within the European Union.

    Speaker

    Photo Speaker Name Profile
    Jonas Dellenvall Jonas Dellenvall View Profile
  • A day in the life of a GDPR breach Add to Schedule Simon Ogden  |   Splunk   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 11:40 to 12:10

    A day in the life of a GDPR breach

    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018.

    Speaker

    Photo Speaker Name Profile
    Simon Ogden Simon Ogden View Profile
  • Thu 21th Sep 12:25 - 13:15
  • A Hacker’s Confessions Pt. II Add to Schedule Michael Moltke  |   FortConsult  |   Keynote

    Keynote Theatre

    Thu 21th Sep 12:25 to 13:15

    A Hacker’s Confessions Pt. II

    FortConsult's Head of Technical Security Consulting Michael Moltke will show how a hacker operates in real life and shed light on the bad guys’ attack methods. Besides showing various types of phishing and spear-phishing attacks, Michael will illustrate what the hacker can do once a device is compromised. You will witness the whole attack scenario from initiation to post-exploitation – including gaining complete control of the infected device, using it to move seamlessly through a corporate network, gaining domain admin privileges, and retaining persistent (and unnoticed) access to the network.

    Speaker

    Photo Speaker Name Profile
    Michael Moltke Michael Moltke View Profile
  • The Shift to Self-Defending Networks Add to Schedule Andrew Tsonchev  |   Darktrace   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 12:25 to 12:55

    The Shift to Self-Defending Networks

    In this session, Darktrace will present a live demonstration of its dynamic 3D interface, the Threat Visualizer.  This industry-leading visualization and detection tool graphically represents an organisation’s entire network and demonstrates the threat level that it faces at any given time. Utilizing powerful visualization techniques, the Visualizer provides 100% network visibility and enables organisations to investigate the anomalies detected by the Enterprise Immune System.  

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • More Visibility or More Data? The CTI Conundrum Add to Schedule Darren Anstee  |   Arbor Networks  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 12:25 to 12:55

    More Visibility or More Data? The CTI Conundrum

    Security best practice tells us that defense in depth is the answer. Multiple layers of security designed to detect and contain attacks. CTI will help our technology identify and block the latest and greatest threats. But, what is the output from all of this?  People still make decisions in security and will do for at least next few years. Our security posture must deliver our analysts visibility - not just more and more data. Darren Anstee will discuss the need for better threat visibility, automated data collation and workflow to help us manage risk.

    Speaker

    Photo Speaker Name Profile
    Darren Anstee Darren Anstee View Profile
  • Thu 21th Sep 13:30 - 14:00
  • Adaptive Intelligence - What is next in Business Analytics Add to Schedule Mats Stellwall  |   EMEA Big Data Analytics SWAT Team, Oracle  |   Keynote

    Keynote Theatre

    Thu 21th Sep 13:30 to 14:00

    Adaptive Intelligence - What is next in Business Analytics

    Adaptive is not Artificial but focus on the intersection between people judgment and machine automation. This session is about what Oracle see as the next step in analytics and what that means, focus is on different use case and examples.

    Speaker

    Speaker Name Profile
    Mats Stellwall View Profile
  • How secure is a password, what’s next in authentication Add to Schedule Dan McLoughlin  |   Vasco  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 13:30 to 14:00

    How secure is a password, what’s next in authentication

    This Seminar will outline the fundamental flaw in what is still the most common Authentication Mechanism the Simple Password. With New guidelines from NIST around password security, you will see what the current password security levels are, including hacking demo’s, what are the best practices and what the future holds for user authentication.

    Speaker

    Photo Speaker Name Profile
    Dan McLoughlin Dan McLoughlin View Profile
  • The Swedish IT Security Index – the tool to benchmark your capability Add to Schedule Anders Strömberg  |   Advenica AB  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 13:30 to 14:00

    The Swedish IT Security Index – the tool to benchmark your capability

    The digitalization wave affects all organisations. IoT, Big Data and Cloud bridges IT-systems and blurs borders when handling information. Meanwhile is the cybersecurity threat changing in shape, motive and means which requires better tools and insights to defend against these threats. 

    To assess the operative and strategic information security maturity there is an online tool that can be used. Advenica presents the result from the online tool showing some interesting findings that are worth noting. For instance, less than 15% handle cybersecurity on a Board level. Also, 20% of the respondents has not identified its protective assets.

    Speaker

    Photo Speaker Name Profile
    Anders Strömberg Anders Strömberg View Profile
  • Thu 21th Sep 14:10 - 14:40
  • Innovations fuelled by IoT and the cloud Add to Schedule Adrian Hornsby  |   Amazon Web Services  |   Keynote

    Keynote Theatre

    Thu 21th Sep 14:10 to 14:40

    Innovations fuelled by IoT and the cloud

    Speed and agility are essential with today’s businesses. The quicker you can get from an idea to first results, the more you can experiment and innovate with your data, perform ad-hoc analysis, and drive answers to new business questions. During this talk, Adrian will take in key features of the AWS IoT platform, latest developments and live demos & walk-throughs featuring Raspberry Pi. 

    Speaker

    Photo Speaker Name Profile
    Adrian Hornsby Adrian Hornsby View Profile
  • How does WatchGuard deliver a holistic security solution from beginning to end? Add to Schedule Andy Cespedes  |   Watchguard  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:10 to 14:40

    How does WatchGuard deliver a holistic security solution from beginning to end?

    How does Watchguard protect assets all the way from the cloud, through the perimeter and down to the client with visualization and automation in multiple layers?

    Speaker

    Photo Speaker Name Profile
    Andy Cespedes Andy Cespedes View Profile
  • Countering the evolving cybersecurity challenge with Fortinet Security Fabric  Add to Schedule Niklas Henriksson  |   Fortinet  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 14:10 to 14:40

    Countering the evolving cybersecurity challenge with Fortinet Security Fabric 

    The Fortinet Security Fabric is an intelligent framework designed around scalable, interconnected security combined with high awareness, actionable threat intelligence, and open API standards for maximum flexibility and integration to protect even the most demanding enterprise environments. Fortinet’s security technologies have earned the most independent certifications for security effectiveness and performance in the industry. When woven together, the Fortinet Security Fabric closes gaps left by legacy point products and platforms by providing the broad, powerful, and automated protections today’s organizations require across their physical and virtual environments, and from endpoint to the cloud. 

    Speaker

    Photo Speaker Name Profile
    Niklas Henriksson Niklas Henriksson View Profile
  • Thu 21th Sep 14:50 - 15:20
  • Measuring Security Culture is more than just counting people Add to Schedule Kai Roer  |   CLTRe  |   Keynote

    Keynote Theatre

    Thu 21th Sep 14:50 to 15:20

    Measuring Security Culture is more than just counting people

    Much has been said about improving security culture, but nothing can be done unless we can prove the effectiveness of our programs. In this talk I will share how to measure security culture using available tools and techniques. 

    Speaker

    Photo Speaker Name Profile
    Kai Roer Kai Roer View Profile
  • From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone Add to Schedule Giuseppe Trotta  |   FortConsult  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:50 to 15:20

    From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone

    In this session, Giuseppe Trotta will show how he got full access to a company’s corporate network by breaking in to an Android device…belonging to the receptionist. Using freely available information about the receptionist, he succeeded in luring her in to downloading an APK file with a reverse shell. With full access to the phone, he connected to the guest Wi-Fi of the company, and exploited unsafe configurations on the network to gain full access to the internal corporate network, including persistent access through domain admin credentials.

    Speaker

    Photo Speaker Name Profile
    Giuseppe Trotta Giuseppe Trotta View Profile
  • You are already exposed, you just don’t know it. Add to Schedule Erik Karlsson  |   Framtiden Management  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 14:50 to 15:20

    You are already exposed, you just don’t know it.

    You are already exposed, you just don’t know it. Why waste hours in trying to find a way into your corporation, when your employees can give me the key? More than 5 Billion credentials is out there….

    Speaker

    Speaker Name Profile
    Erik Karlsson View Profile
  • Thu 21th Sep 15:30 - 16:00
  • Tools and techniques to make GDPR compliance work across your organisation Add to Schedule Karen Lawrence Öqvist  |     |   Keynote

    Keynote Theatre

    Thu 21th Sep 15:30 to 16:00

    Tools and techniques to make GDPR compliance work across your organisation

    Cut the ”legal speak” and find a language, and tools/techniques which works across your organization on compliance with the General Data Protection Regulation (GDPR). The GDPR will replace existing EU data protection laws on 25th May 2018 in Sweden and every EU member state. and heavy fines await companies that do not comply. 

    It all seems so complicated, but in fact if you dig deep enough you will find hidden simplicity. Data privacy rules, at least the lowest common denominator in privacy have been around since 1980. There are quite simply 8 privacy principles. Privacy laws globally are all founded on these 8 principles, including the GDPR. By taking the lowest common denominator in privacy you can build a global privacy program using the GDPR as your privacy standard.

    Speaker

    Photo Speaker Name Profile
    Karen Lawrence Öqvist Karen Lawrence Öqvist View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top