20 - 21 SEPTEMBER 2017 / Stockholmsmässan
Register Free

Here is a list of all confirmed Seminars for 2017. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 20th Sep 11:40 - 12:10
  • How does WatchGuard deliver a holistic security solution from beginning to end? Add to Schedule Peter Johansson  |   Watchguard   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 11:40 to 12:10

    How does WatchGuard deliver a holistic security solution from beginning to end?

    How does Watchguard protect assets all the way from the cloud, through the perimeter and down to the client with visualization and automation in multiple layers?

    Speaker

    Photo Speaker Name Profile
    Peter Johansson Peter Johansson View Profile
  • Wed 20th Sep 12:25 - 12:55
  • Attackers are monitoring your digital footprint, are you? Add to Schedule Andy Holmes   |   Digital Shadows   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 12:25 to 12:55

    Attackers are monitoring your digital footprint, are you?

    Organisations’ digital footprints are expanding and changing at an overwhelming rate. Attackers are using this information to exploit organisations and launch their attacks. Traditional security solutions that focus on the perimeter can’t address these risks by themselves because the boundary is disappearing. Learn how you can help manage your digital risk, minimise your digital shadow and protect against; cyber threats, data exposure and brand exposure.

    Speaker

    Photo Speaker Name Profile
    Andy Holmes Andy Holmes View Profile
  • Wed 20th Sep 13:30 - 14:00
  • Beyond The Hype; How Attackers Win Add to Schedule Steve Manzuik  |   Duo  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 13:30 to 14:00

    Beyond The Hype; How Attackers Win

    Movies, TV and even some non-fictional press leads most to believe that a cyber attack is a complicated endeavor conducted by teams of highly skilled people. The reality is, that most successful attacks are not complicated in the least. This presentation will highlight real world attacks, why the attackers were successful and how they could have been stopped. Some new open source tools to battle phishing will be covered as well as a strategy to deal with disappearing network perimeter. 

    Speaker

    Photo Speaker Name Profile
    Steve Manzuik Steve Manzuik View Profile
  • Wed 20th Sep 14:10 - 14:40
  • Firewall-as-a-Service: Enterprise Grade Security for Everyone Add to Schedule Mark Bayne  |   Cato Networks   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 14:10 to 14:40

    Firewall-as-a-Service: Enterprise Grade Security for Everyone

    Firewalls and UTMs have been the cornerstone of network security for the past 20 years. Yet, deploying appliances at every remote office, creates multiple challenges for organizations: the capital needed to buy, upgrade and retire hardware solutions and the tough tradeoff between hardware capacity and strong security. Organizations end up compromising on strength of protection or the end user experience.

    Even when running smoothly, firewalls and UTMs are location bound and can't effectively protect the mobile users and cloud infrastructure that are now an integral part of the business.

    Speaker

    Photo Speaker Name Profile
    Mark Bayne Mark Bayne View Profile
  • Wed 20th Sep 14:50 - 15:20
  • GDPR, Petya & Wannacry: When things go wrong who is ultimately responsible - The Board or IT? Add to Schedule Sander Hofman  |   Mimecast  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 14:50 to 15:20

    GDPR, Petya & Wannacry: When things go wrong who is ultimately responsible - The Board or IT?

    As Petya and Wannacry have shown, organisations across the globe need to re-evaluate their readiness for the next wave of threats.  It is critical for companies to deploy a proactive cyber resilience strategy while remaining GDPR compliant.

    The time to up your defences is now.

    Speaker

    Photo Speaker Name Profile
    Sander Hofman Sander Hofman View Profile
  • Wed 20th Sep 15:30 - 16:00
  • The Recipe for SaaS success? ‘Smother customers with time, love and attention’ Add to Schedule Andy Nolan  |   Lifesize   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 15:30 to 16:00

    The Recipe for SaaS success? ‘Smother customers with time, love and attention’

    Lifesize is a microcosm of the transition many enterprises face today, as they grapple with the transformation from traditional one-off product sales to a modern subscription-based services business model. How the philosophy of putting customer success at the heart of your strategy is by the best way to ensure success.

    Speaker

    Photo Speaker Name Profile
    Andy Nolan Andy Nolan View Profile
  • FIKA 10:50 - 11:30
  • Thu 21th Sep 11:40 - 12:10
  • Crossing the NIS and GDPR mine field Add to Schedule Jonas Dellenvall  |   Advenica AB  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 11:40 to 12:10

    Crossing the NIS and GDPR mine field

    In the wake of GDPR buzz it is now time for the next directive in the field of information security: the NIS Directive. The Directive on Security of Network and Information Systems is intended to raise Member States' level of protection of critical infrastructure.

    At first glance, it is easy to conclude that GDPR and NIS have a large overlap, but in fact, the differences are greater than the similarities. This session looks at the greatest initiatives in many years to raise the information security level and awareness within the European Union.

    Speaker

    Photo Speaker Name Profile
    Jonas Dellenvall Jonas Dellenvall View Profile
  • Thu 21th Sep 12:25 - 12:55
  • The Shift to Self-Defending Networks Add to Schedule Andrew Tsonchev  |   Darktrace   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 12:25 to 12:55

    The Shift to Self-Defending Networks

    In this session, Darktrace will present a live demonstration of its dynamic 3D interface, the Threat Visualizer.  This industry-leading visualization and detection tool graphically represents an organisation’s entire network and demonstrates the threat level that it faces at any given time. Utilizing powerful visualization techniques, the Visualizer provides 100% network visibility and enables organisations to investigate the anomalies detected by the Enterprise Immune System.  

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Thu 21th Sep 13:30 - 14:00
  • How secure is a password, what’s next in authentication Add to Schedule Dan McLoughlin  |   Vasco  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 13:30 to 14:00

    How secure is a password, what’s next in authentication

    This Seminar will outline the fundamental flaw in what is still the most common Authentication Mechanism the Simple Password. With New guidelines from NIST around password security, you will see what the current password security levels are, including hacking demo’s, what are the best practices and what the future holds for user authentication.

    Speaker

    Photo Speaker Name Profile
    Dan McLoughlin Dan McLoughlin View Profile
  • Thu 21th Sep 14:10 - 14:40
  • How does WatchGuard deliver a holistic security solution from beginning to end? Add to Schedule Andy Cespedes  |   Watchguard  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:10 to 14:40

    How does WatchGuard deliver a holistic security solution from beginning to end?

    How does Watchguard protect assets all the way from the cloud, through the perimeter and down to the client with visualization and automation in multiple layers?

    Speaker

    Photo Speaker Name Profile
    Andy Cespedes Andy Cespedes View Profile
  • Thu 21th Sep 14:50 - 15:20
  • From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone Add to Schedule Giuseppe Trotta  |   FortConsult  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:50 to 15:20

    From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone

    In this session, Giuseppe Trotta will show how he got full access to a company’s corporate network by breaking in to an Android device…belonging to the receptionist. Using freely available information about the receptionist, he succeeded in luring her in to downloading an APK file with a reverse shell. With full access to the phone, he connected to the guest Wi-Fi of the company, and exploited unsafe configurations on the network to gain full access to the internal corporate network, including persistent access through domain admin credentials.

    Speaker

    Photo Speaker Name Profile
    Giuseppe Trotta Giuseppe Trotta View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top