Imago Techmedia Ltd is registered in England and Wales under Company No. 04865455. VAT No. GB 843 8456 01
Registered Office: Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Business Address: Imago Techmedia, 2C Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Imago Techmedia Sweden, Nod, Borgarfjordsgatan 12, Kista, Stockholm, Sweden
Imago Techmedia is a subsidiary of Clarion Events Limited
Here is a list of all confirmed Seminars for 2017. You can add these to your planner by clicking the 'add to schedule' button
- Valtech Sweden
- Advenica AB
- Aerohive Networks
- Amazon Web Services
- Arbor Networks
- BAE Systems Applied Intelligence
- Cato Networks
- Chef software
- Cognizant Technology Solutions
- Darktrace Ltd
- DataCore Software
- Digital Shadows
- Duo Security
- Framtiden Management
- Heimdal Security
- imCode Partner AB
- International Sustainable Development Resource Centre
- Kemp Technologies
- LINK Mobility GmbH
- MariaDB Corporation
- Oblong Industries
- Open Source Sweden
- Quest Software
- Sharp Cookie
- Toradex AG
- Wed 20th Sep 10:00 - 10:40
What does the Future hold for Sweden’s Digital Economy? Add to Schedule
Wed 20th Sep 10:00 to 10:40
What does the Future hold for Sweden’s Digital Economy?
Sweden has a long established reputation as a hotbed for innovation with many tech startups from the region enjoying global success. During Fredrik’s long tenure startups such as Skype, Spotify, Mojang and King took advantage of this culture and quickly became global giants in their respective markets. In this fascinating session Fredrik will reveal the backstory on what created this culture and his opinions on the challenges Sweden now faces in the current political climate.
Photo Speaker Name Profile Fredrik Reinfeldt View Profile
- Wed 20th Sep 11:40 - 12:10
Session with Monty Widenius Add to Schedule
- Wed 20th Sep 12:25 - 12:55
Ransomless Ransomware - Disruption and Smoke Screens Add to Schedule
Wed 20th Sep 12:25 to 12:55
Ransomless Ransomware - Disruption and Smoke Screens
This year we’ve witnessed unprecedented ransomware attacks, both in scale and impact. With ransoms drawing staggering amounts of money to the malware economy, the context is set for increasingly aggressive and complex attacks. How can organizations cope and thrive with cybercriminals knocking on every backdoor? This is what we aim to explore in this talk, which focuses on mitigating malware attacks based on traffic analysis to and from the endpoint.
Photo Speaker Name Profile Mikkel Pedersen View Profile
- Wed 20th Sep 13:30 - 14:00
Fascinating Tales of A Strange Tomorrow Add to Schedule
Wed 20th Sep 13:30 to 14:00
Fascinating Tales of A Strange Tomorrow
AI has become the hottest topic in the IT industry. In this talk, we’ll explain how Deep Learning — a subset of AI — can help you solve complex problems. We’ll look at how you can add Deep Learning capabilities to your applications and why Cloud technology can get you there faster.
Photo Speaker Name Profile Julien Simon View Profile
- Wed 20th Sep 14:10 - 14:40
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense Add to Schedule
Wed 20th Sep 14:10 to 14:40
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.
Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.
Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.
Photo Speaker Name Profile Andrew Tsonchev View Profile
- Wed 20th Sep 14:50 - 15:20
Humanity’s Most Serious Challenge Add to Schedule
Wed 20th Sep 14:50 to 15:20
Humanity’s Most Serious Challenge
Artificial Intelligence is not science fiction. It is here and now, changing our world at breathtaking speed. We – as individuals and as institutions – must be informed, prepared and ready to redefine ourselves at breathtaking speeds as well.
AI can help us digesting and analyzing big data, macro managing our resources, defining unseen challenges and securing our food chain, our environment and a sustainable future.
AI can hurt us If we turn over too much responsibility too soon, we can lose control to a super intelligence which is learning at lightning speed.
There is no guarantee that we will always be Darwin’s Darling.
Photo Speaker Name Profile Jay Tuck View Profile
- Wed 20th Sep 15:30 - 16:00
AI in the Workplace: Emergence of the Cognitive Room Add to Schedule
Wed 20th Sep 15:30 to 16:00
AI in the Workplace: Emergence of the Cognitive Room
The physical world and the digital world are becoming more intertwined in all aspects of life. In the enterprise, this trend is exhibited by the emergence of the cognitive room. Cognitive rooms, which harness the power of the team as well as the power of AI, are poised to transform the future of work.
Enterprises need to learn to capture the value in this new world order—and starting with the human element is key. Innovative human-centered UIs must be used to augment a user’s ability to gain insight from the massive amounts of unstructured data that are part of today’s enterprise workflow and the lifeblood of cognitive rooms.
Mary Ann will be addressing the challenge organizations face today to transcend traditional, sequential analytical processes in favor of faster parallel and real-time working processes that deliver the greatest business impact.
Photo Speaker Name Profile Mary Ann de Lares Norris View Profile
- Wed 20th Sep 16:10 - 17:00
Privacy Program Management: How to capture the business value and stakeholders' enthusiasm Add to Schedule
Wed 20th Sep 16:10 to 17:00
Privacy Program Management: How to capture the business value and stakeholders' enthusiasm
Learn how to proactively manage privacy in the GDPR era in your organisation with the tools and insights from Managing Partner Sofia Edvardsen's experience of setting up and managing privacy programs of leading enterprises. A key factor to success Sofia Edvardsen will shed light on, not often covered in privacy management, is how to perform and stay relevant in the eyes of top management.
Photo Speaker Name Profile Sofia Edvardsen View Profile
- Thu 21th Sep 10:00 - 10:40
Collaboration when Disruption is the New Normal Add to Schedule
Thu 21th Sep 10:00 to 10:40
Collaboration when Disruption is the New Normal
Four of five CEOs question if their products will be relevant in three years, so it is no surprise that rapid innovation is at the top of the CEO agenda. With talent retention and revenue growth at stake, even traditional industries are facing disruption. But as Forbes reports, “businesses are finally realizing they need new ways to work, collaborate and meet”. What is this new way of working? How can IT leaders enable workforces to get more done, faster? We will demonstrate how IT leaders are using new collaboration tools to gain this competitive advantage.
Photo Speaker Name Profile Snorre Kjesbu View Profile
- Thu 21th Sep 11:40 - 12:10
Architecting the Future: learnings from Google Add to Schedule
Thu 21th Sep 11:40 to 12:10
Architecting the Future: learnings from Google
Cloud is a rising trend, but one that is really in its infancy. Google shares its view of the cloud as a platform-first mindset, opening the possibility of changing the fundamentals of computing to achieve new capabilities from compute architectures to data processing and machine learning. The next stage of machine intelligence offers both long and short term opportunities for those that can apply machine learning to analytics at web scale to relevant real world data that apply to your business.
Photo Speaker Name Profile Otso Juntunen View Profile
- Thu 21th Sep 12:25 - 13:15
A Hacker’s Confessions Pt. II Add to Schedule
Thu 21th Sep 12:25 to 13:15
A Hacker’s Confessions Pt. II
FortConsult's Head of Technical Security Consulting Michael Moltke will show how a hacker operates in real life and shed light on the bad guys’ attack methods. Besides showing various types of phishing and spear-phishing attacks, Michael will illustrate what the hacker can do once a device is compromised. You will witness the whole attack scenario from initiation to post-exploitation – including gaining complete control of the infected device, using it to move seamlessly through a corporate network, gaining domain admin privileges, and retaining persistent (and unnoticed) access to the network.
Photo Speaker Name Profile Michael Moltke View Profile
- Thu 21th Sep 13:30 - 14:00
It's not only Hollywood... It's real life: Cyber Security - what to do when you find your business in the crosshair of a global threat group Add to Schedule
Thu 21th Sep 13:30 to 14:00
It's not only Hollywood... It's real life: Cyber Security - what to do when you find your business in the crosshair of a global threat group
There used to be a time when the movies pushed our imagination as to what is possible. Lucky for us, or unlucky depending on where you stand, what we see in real life in the cyber security world is nothing less exciting than a multimillion dollar Hollywood blockbuster.
Join us for a thrilling journey as one Fortune 500 company finds themselves in the crosshair of a global threat group, how the attack evolves, how they push back and what they do to keep the business running. Hint: it wasn't about shutting down the internet.
Photo Speaker Name Profile Bulent Teksoz View Profile
- Thu 21th Sep 14:10 - 14:40
Innovations fuelled by IoT and the cloud Add to Schedule
Thu 21th Sep 14:10 to 14:40
Innovations fuelled by IoT and the cloud
Speed and agility are essential with today’s businesses. The quicker you can get from an idea to first results, the more you can experiment and innovate with your data, perform ad-hoc analysis, and drive answers to new business questions. During this talk, Adrian will take in key features of the AWS IoT platform, latest developments and live demos & walk-throughs featuring Raspberry Pi.
Photo Speaker Name Profile Adrian Hornsby View Profile
- Thu 21th Sep 14:50 - 15:20
Measuring Security Culture is more than just counting people Add to Schedule
Thu 21th Sep 14:50 to 15:20
Measuring Security Culture is more than just counting people
Much has been said about improving security culture, but nothing can be done unless we can prove the effectiveness of our programs. In this talk I will share how to measure security culture using available tools and techniques.
Photo Speaker Name Profile Kai Roer View Profile
- Thu 21th Sep 15:30 - 16:00
Tools and techniques to make GDPR compliance work across your organisation Add to Schedule
Thu 21th Sep 15:30 to 16:00
Tools and techniques to make GDPR compliance work across your organisation
Cut the ”legal speak” and find a language, and tools/techniques which works across your organization on compliance with the General Data Protection Regulation (GDPR). The GDPR will replace existing EU data protection laws on 25th May 2018 in Sweden and every EU member state. and heavy fines await companies that do not comply.
It all seems so complicated, but in fact if you dig deep enough you will find hidden simplicity. Data privacy rules, at least the lowest common denominator in privacy have been around since 1980. There are quite simply 8 privacy principles. Privacy laws globally are all founded on these 8 principles, including the GDPR. By taking the lowest common denominator in privacy you can build a global privacy program using the GDPR as your privacy standard.
Photo Speaker Name Profile Karen Lawrence Öqvist View Profile