19 - 20 SEPTEMBER 2018 / Stockholmsmässan

Here is a list of all confirmed Seminars for 2017. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 20th Sep 11:40 - 12:10
  • Hybrid Active Directory Security and Governance Add to Schedule Colin Truran  |   Quest Software  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 11:40 to 12:10

    Hybrid Active Directory Security and Governance

    Roughly 70% of Fortune 500 companies purchased Office 365 in the last year. But, many organizations don’t realize their on-premises Active Directory (AD) is still the authoritative source for authentication requests to Office 365 through Azure AD.

    To achieve a stable Azure AD, your on-premises AD must be streamlined with a normalised structure, consolidated OUs, good security delegation and solid provisioning. Otherwise your infrastructure becomes more vulnerable to a host of potential breaches, threats and disasters. 

    This session will tell you how to:

    • Make your hybrid directory environment manageable and available
    • Reduce your potential attack area
    • Bolster your cloud security posture

    Speaker

    Photo Speaker Name Profile
    Colin Truran Colin Truran View Profile
  • Wed 20th Sep 12:25 - 12:55
  • Brought to you by Innosoft Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 12:25 to 12:55

  • Wed 20th Sep 13:30 - 14:00
  • The Game Has Changed: Principles to build a strong foundation to secure the new enterprise Add to Schedule Marcelo Pereira   |   Flexera  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 13:30 to 14:00

    The Game Has Changed: Principles to build a strong foundation to secure the new enterprise

    “Software is eating the world!” - It’s a provocative sentence, but what does it mean for you and your business?

    It means the fast pace of change in technology and infrastructure creates the need to tear down the walls that oppose security and availability requirements. This is probably a change hard to achieve, but necessary. 

    Join us for a session to talk about principles to build a strong foundation to secure the enterprise.

    Speaker

    Speaker Name Profile
    Marcelo Pereira View Profile
  • Wed 20th Sep 14:10 - 14:40
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 14:10 to 14:40

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Wed 20th Sep 14:50 - 15:20
  • Stop the Most Sophisticated Cyber Attacks With Layered Next-Gen Endpoint Protection Add to Schedule Joseph Abou-Haidar  |   Bitdefender  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 14:50 to 15:20

    Stop the Most Sophisticated Cyber Attacks With Layered Next-Gen Endpoint Protection

    Sophisticated threats such as file-less attacks, modern ransomware and phishing evade traditional endpoint security tools.

    To fortify their endpoints, your customers need a layered defense approach with unified prevention, multi-stage detection and automated response.

    Speaker

    Photo Speaker Name Profile
    Joseph Abou-Haidar Joseph Abou-Haidar View Profile
  • Wed 20th Sep 15:30 - 16:00
  • From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone Add to Schedule Giuseppe Trotta  |   FortConsult  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 15:30 to 16:00

    From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone

    In this session, Giuseppe Trotta will show how he got full access to a company’s corporate network by breaking in to an Android device…belonging to the receptionist. Using freely available information about the receptionist, he succeeded in luring her in to downloading an APK file with a reverse shell. With full access to the phone, he connected to the guest Wi-Fi of the company, and exploited unsafe configurations on the network to gain full access to the internal corporate network, including persistent access through domain admin credentials.

    Speaker

    Photo Speaker Name Profile
    Giuseppe Trotta Giuseppe Trotta View Profile
  • FIKA 10:50 - 11:30
  • Thu 21th Sep 11:40 - 12:10
  • A day in the life of a GDPR breach Add to Schedule Simon Ogden  |   Splunk   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 11:40 to 12:10

    A day in the life of a GDPR breach

    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018.

    Speaker

    Photo Speaker Name Profile
    Simon Ogden Simon Ogden View Profile
  • Thu 21th Sep 12:25 - 12:55
  • More Visibility or More Data? The CTI Conundrum Add to Schedule Darren Anstee  |   Arbor Networks  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 12:25 to 12:55

    More Visibility or More Data? The CTI Conundrum

    Security best practice tells us that defense in depth is the answer. Multiple layers of security designed to detect and contain attacks. CTI will help our technology identify and block the latest and greatest threats. But, what is the output from all of this?  People still make decisions in security and will do for at least next few years. Our security posture must deliver our analysts visibility - not just more and more data. Darren Anstee will discuss the need for better threat visibility, automated data collation and workflow to help us manage risk.

    Speaker

    Photo Speaker Name Profile
    Darren Anstee Darren Anstee View Profile
  • Thu 21th Sep 13:30 - 14:00
  • The Swedish IT Security Index – the tool to benchmark your capability Add to Schedule Anders Strömberg  |   Advenica AB  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 13:30 to 14:00

    The Swedish IT Security Index – the tool to benchmark your capability

    The digitalization wave affects all organisations. IoT, Big Data and Cloud bridges IT-systems and blurs borders when handling information. Meanwhile is the cybersecurity threat changing in shape, motive and means which requires better tools and insights to defend against these threats. 

    To assess the operative and strategic information security maturity there is an online tool that can be used. Advenica presents the result from the online tool showing some interesting findings that are worth noting. For instance, less than 15% handle cybersecurity on a Board level. Also, 20% of the respondents has not identified its protective assets.

    Speaker

    Photo Speaker Name Profile
    Anders Strömberg Anders Strömberg View Profile
  • Thu 21th Sep 14:50 - 15:20
  • You are already exposed, you just don’t know it. Add to Schedule Erik Karlsson  |   Framtiden Management  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 14:50 to 15:20

    Speaker

    Speaker Name Profile
    Erik Karlsson View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top