19 - 20 SEPTEMBER 2018 / Stockholmsmässan

Here is a list of all confirmed Seminars for 2018. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 19th Sep 09:00 - 09:50
  • Microsoft AI – Empowering Transformation Add to Schedule Alessio Bagnaresi  |   Microsoft  |   Keynote

    Keynote Theatre

    Wed 19th Sep 09:00 to 09:50

    Microsoft AI – Empowering Transformation

    In this session we explore how companies strive to become AI-driven organizations in order to innovate their business model and drive sustainable growth. We will begin the session with our AI vision and show some of the most transformative customer success stories achieved through the adoption of AI.  We will touch upon topics like how companies start their AI journey,  how they decide on the use cases to prioritize and last but not least how they build capabilities and skills on AI.

    Speaker

    Photo Speaker Name Profile
    Alessio Bagnaresi Alessio Bagnaresi View Profile
  • Wed 19th Sep 10:00 - 10:30
  • The Next Generation of Wi-Fi, 802.11ax Add to Schedule Jonas Mellander  |   Aerohive Networks   |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 10:00 to 10:30

    The Next Generation of Wi-Fi, 802.11ax

    With the advent of the next standard in Wi-Fi, 802.11ax, possibly the biggest change in Wi-FI and 802.11 ever is taking place. Through a range of different techniques, the new standard  is aiming at further improving efficiency in what today is most people’s primary access network.

    Speaker

    Photo Speaker Name Profile
    Jonas Mellander Jonas Mellander View Profile
  • Automate for quality, consistency and confidence Add to Schedule Bas Peters  |   GitHub  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 10:00 to 10:30

    Automate for quality, consistency and confidence

    When we think about automation in our development workflows, the first things that come to mind are continuous integration and continuous delivery. If you work in operations you might also think of infrastructure as code. However, there are other automation best practices that can help you to improve the quality of your software, to bring consistency in your work and give developers confidence to contribute.

    In this talk Bas will discuss the benefits of automation, when to automate and he will provide examples on how GitHub supports automating parts of your workflow and share best practices we follow at GitHub to build GitHub.

    Speaker

    Photo Speaker Name Profile
    Bas Peters Bas Peters View Profile
  • Enterprise computation: the next frontier in AI and Data Science Add to Schedule Conrad Wolfram  |   Wolfram Research  |   Keynote

    Keynote Theatre

    Wed 19th Sep 10:00 to 10:30

    Enterprise computation: the next frontier in AI and Data Science

    Organisations are investing heavily in data science and AI to empower a new era of analytics driven decision-making, but are often disappointed with the results. Why? A key cause has been ineffective use of today’s multi-paradigm computation. Common problems include fixation on one domain/approach, limited workflow automation, different computation tools for similar tasks, non-computable data and legacy interfaces. Given the needs of computation today’s data-rich organisations, the formation of an Enterprise-wide Computation Strategy is crucial. Conrad Wolfram will discuss what’s involved and demo live how the Wolfram Technology Stack—developed over 30 years—uniquely supports Enterprise Computation.

    Speaker

    Photo Speaker Name Profile
    Conrad Wolfram Conrad Wolfram View Profile
  • Demystifying the AI black box ACCESS PLUS Add to Schedule Adrian Hornsby  |   Amazon Web Services  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 10:00 to 10:30

    Demystifying the AI black box

    Self-Driving cars. Commercial drones. Smart cameras. Movie and music creation. Powerful & intelligent robots. Over the past few years, a new revolution has brought AI almost to the level of science-fiction. However, most companies are not worried about far-off futuristic applications of AI, they want to know what AI can do - today - for their organisations. Distinguishing the hype from reality can be a bit confusing, especially when you consider the attention that AI gets from the media and commentators. So, how can your organisation get started and put AI to work for you? That is the question I will answer in this talk. From greater customer intimacy, increasing competitive advantage and improving efficiency, I will discuss and show how AI can be used today and help the organisation in more impactful ways.

    Speaker

    Photo Speaker Name Profile
    Adrian Hornsby Adrian Hornsby View Profile
  • Four keys to tackle software vulnerabilities in commercial and in-house software Add to Schedule Jeroen Braak  |   Flexera   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 10:00 to 10:30

    Four keys to tackle software vulnerabilities in commercial and in-house software

    The world shifted to a paradigm that accepts that breaches will inevitably happen and they need to be detected and responded to in a more efficient fashion. However, the need and cost-effectiveness of prevention is still a reality that organizations have not been able to master, and application vulnerabilities remain at the top of security professionals concerns.

    With more than 50 new vulnerabilities disclosed every day in commercial software, it’s hard to stay focused and be effective. When you add vulnerabilities being introduced in the code being written in-house, the task just becomes unfeasible. Join us for this talk about how visibility, curation, prioritization and automation kick in for security, operations and engineering to work together towards a more secure software supply chain.

    Speaker

    Speaker Name Profile
    Jeroen Braak View Profile
  • PAM: The critical missing piece in your security strategy Add to Schedule Chris Clarkson  |   Bomgar   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 10:00 to 10:30

    PAM: The critical missing piece in your security strategy

    Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM).

    This session will cover what ‘privilege’ means to your business and how implementing a PAM solution drives significant improvements across the organisation. It will discuss:

    -        Why organisations should make PAM their top 2019 investment

    -        Why quickly controlling and automating key PAM capabilities is critical to your organisation’s success

    -        Tools to prepare the business case for your PAM project and to get Executive Leadership buy in

    Speaker

    Photo Speaker Name Profile
    Chris Clarkson Chris Clarkson View Profile
  • Wed 19th Sep 11:00 - 11:30
  • Zero Trust & The Flaming Sword of Justice Add to Schedule Dave Lewis  |   Duo Security  |   Keynote

    Keynote Theatre

    Wed 19th Sep 11:00 to 11:30

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 
The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify. 

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Predictive security in a changing world Add to Schedule Erkan Djafer  |   Cisco  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 11:00 to 11:30

    Predictive security in a changing world

    The internet can no longer be viewed as a static entity, it is by its very nature a living organism. It grows and evolves just like a human being. Most security today focuses on static protection, a living dynamic entity such as the internet requires protection that also lives and grows dynamically. This presentation will cover mega trends in security, including how the evolution makes it more difficult to protect us and what predictive security intelligence can do to cope with the modern threats that lie ahead.

    Speaker

    Photo Speaker Name Profile
    Erkan Djafer Erkan Djafer View Profile
  • Get started with DevOps in government Add to Schedule Mieke Deenen  |   UWV, Netherlands  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 11:00 to 11:30

    Get started with DevOps in government

    It is about how you get started with DevOps when you are a government agency or a process oriented enterprise organization. I created a model based on our experiences to guide people from start at zero to results and beyond.

    The talk will be about our journey, why we started and how we are transforming into a DevOps organization, with all the hiccups we suffered and approaches to manage them. It is about the important pillars of DevOps and about using the strength of the organization to create technical and organizational confidence and to overachieve business and financial expectations.

    Speaker

    Photo Speaker Name Profile
    Mieke Deenen Mieke Deenen View Profile
  • HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS Add to Schedule Gavin Jay  |   CrowdStrike   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 11:00 to 11:30

    HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS

    This session explores the evolution of threats- from discrete criminal events to an offensive weapon. We’ll lift the lid on the latest attack techniques, adopted by nation state actors, which invariably find their way into the mainstream criminal world and are therefore an indicator of what to prepare for.
    Gavin will reference who the most active and advanced adversaries are, what attack vectors they typically employ, and how we can apply this intelligence to prevent, protect and respond.  Using simulated attack scenarios and personal examples of the speaker’s experience, attendees will learn how to spot indicators of compromise and attack, and how to safeguard their organisation accordingly.

    What attendees will learn:

    • How nation-state threats are crafted and how their Tactics, Techniques, and Procedures (TTPs) help identify them from more routine advanced attacks
    • Who are today’s most notable adversaries and the key European security themes based on the latest intelligence compiled across CrowdStrike’s global intelligence gathering operation
    • What are the indicators of attack and how you can apply them to defeat the adversary?

    Speaker

    Photo Speaker Name Profile
    Gavin Jay Gavin Jay View Profile
  • Channel Focused BDR Solution – Replibit DRaaS - Chain Free Backup! Add to Schedule Josh Chrisman  |   eFolder/Axcient  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 11:00 to 11:30

  • AI model life cycle on Azure ACCESS PLUS Add to Schedule Stephen Hall  |   Microsoft  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 11:00 to 11:30

    AI model life cycle on Azure

    Machine learning models deliver their value in a context. Ease of deployment and life cycle management is need to ensure that those model will keep delivering their value. Azure DataBricks and  Azure Machine Learning help create, tune and deploy machine learning models easily while keeping track of the multitude experiments need in the process. Enjoy the flexibility and variety of hardware of Azure to train and run your model on CPU, GPU or FPGA clusters.

    Speaker

    Photo Speaker Name Profile
    Stephen Hall Stephen Hall View Profile
  • Wed 19th Sep 11:40 - 12:10
  • The Intrapreneurs’ Survival Guide: The 10 questions every Intrapreneur should be ready to answer Add to Schedule Brian Curran  |   Oracle  |   Keynote

    Keynote Theatre

    Wed 19th Sep 11:40 to 12:10

    The Intrapreneurs’ Survival Guide: The 10 questions every Intrapreneur should be ready to answer

    Congratulations! You’ve volunteered (or you’ve been volunteered) to lead innovation in your company. Now comes the hard part. Your organization, despite its best intentions and efforts, may not be well designed to embrace innovation and the people who are changing “business as usual”. We know innovation is hard, so Intrapreneurs need a survival guide.

    Join Oracle's Brian J. Curran, Vice President of Innovation & Design, as he shares the 10 Questions every intrapreneur must be prepared to answer in order to survive the corporate gauntlet trying to kill them and their innovations.

    Speaker

    Photo Speaker Name Profile
    Brian Curran Brian Curran View Profile
  • Automation is more than just an IT trend Add to Schedule Kevin Reeuwijk  |   Puppet   |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 11:40 to 12:10

    Automation is more than just an IT trend

    Automating infrastructure configuration and application release management at scale is the new competitive edge. Catching up means starting the journey toward pervasive automation. How does your enterprise compare and how does the journey begin?

    Speaker

    Photo Speaker Name Profile
    Kevin Reeuwijk Kevin Reeuwijk View Profile
  • The Convergence of Data Science and Software Development ACCESS PLUS Add to Schedule Margriet Groenendijk  |   IBM  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 11:40 to 12:10

    The Convergence of Data Science and Software Development

    In order to move past the hype and achieve the full potential of machine learning, data scientists and software developers need to work more closely together towards their common goal of delivering well-architected, data-driven applications. Every industry is in the process of being transformed by software and data. It is in the collaboration between data scientists and software developers where the real value can be found by creating integrated data workflows that benefit from the unique knowledge and skill sets of each discipline.

    Speaker

    Photo Speaker Name Profile
    Margriet Groenendijk Margriet Groenendijk View Profile
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule Suzette Loubser  |   Darktrace  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 11:40 to 12:10

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    In this session Suzette will discuss:

    ·         Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats

    ·         How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time

    ·         How to achieve 100% visibility of your entire business including cloud, network and IoT environments

    ·         Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk

    ·         Real-world examples of subtle, unknown threats that routinely bypass traditional controls

    Speaker

    Photo Speaker Name Profile
    Suzette Loubser Suzette Loubser View Profile
  • Ask not what the cloud can do for you – tell the cloud what you want Add to Schedule Anna Rehnström  |   Basefarm  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 11:40 to 12:10

    Ask not what the cloud can do for you – tell the cloud what you want

    In 2018, we have seen the use of cloud services increase like an avalanche. Applications created for the cloud that can scale themselves according to load. This imposes a different set-up of the control mechanisms throughout the organization. How do you know if your services running in the cloud matches your security expectations?

    The IT department is shifting its focus from traditional infrastructure to development of digital services, and the daily balance act of security versus "Faster time to market" and flexibility can sometimes be more reactive than proactive.

    Be prepared! Involuntary surprises are not an option any longer for you and your organization.

    Become the world class jumper horse who knows and respects the obstacles enough to be able to overcome them.

    Speaker

    Photo Speaker Name Profile
    Anna Rehnström Anna Rehnström View Profile
  • Turtles, Trust and the Future of Cybersecurity Add to Schedule Jeremy Agenais  |   Varonis   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 11:40 to 12:10

    Turtles, Trust and the Future of Cybersecurity

    Faith in our institutions is collapsing, and GDPR is here. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world?  It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.

    Speaker

    Photo Speaker Name Profile
    Jeremy Agenais Jeremy Agenais View Profile
  • Wed 19th Sep 13:20 - 13:50
  • The Perfect Storm: How wireless mini-sensors and simple, scalable IoT are changing everything Add to Schedule Tarjei Vassbotn  |   Disruptive Technologies  |   Keynote

    Keynote Theatre

    Wed 19th Sep 13:20 to 13:50

    The Perfect Storm: How wireless mini-sensors and simple, scalable IoT are changing everything

    IoT holds great promise; over 40% of global CIOs believe that IoT will disrupt their business models within five years. And it will… Now with wireless mini-sensors the size of a keyboard key and with ultra-long battery life, organizations have access to an unprecedented amount of data to optimize their operations and reduce costs.

    Tarjei Vassbotn reveals the recent breakthroughs in IoT you need to know for a successful IoT program. He’ll also share use cases for key industries from real estate and manufacturing to energy and healthcare.

    Speaker

    Photo Speaker Name Profile
    Tarjei Vassbotn Tarjei Vassbotn View Profile
  • Managing and protecting Data in Cloud-based infrastructures Add to Schedule Nicolas Köllerstedt   |   Rubrik  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 13:20 to 13:50

    Managing and protecting Data in Cloud-based infrastructures

    The technical landscape is changing as organizations are redefining what hybridity means. Whether an application is running on-premises or in the public cloud, it’s important to ensure every application is easily and quickly protected, secured, and restored without sacrificing the scale-out. Learn how to manage all your data in this new reality that needs unlimited scale, API integration, automated control and global visibility.

    Speaker

    Photo Speaker Name Profile
    Nicolas Köllerstedt Nicolas Köllerstedt View Profile
  • What you see is what you get… for AWS infrastructure Add to Schedule Anton Babenko  |   Anton Babenko  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 13:20 to 13:50

    What you see is what you get… for AWS infrastructure

    Cloud solution architects and DevOps engineers want to have a faster conversion from idea to product. What if there would be a way to draw an architecture online and get the infrastructure for it implemented as code automatically. This is the reality.

    Speaker

    Photo Speaker Name Profile
    Anton Babenko Anton Babenko View Profile
  • The Artificial Intelligence race is on, and much bigger than you think ACCESS PLUS Add to Schedule Dr. Christian Guttmann  |   Nordic AI Institute  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 13:20 to 13:50

    The Artificial Intelligence race is on, and much bigger than you think

    Every business turns their eyes to new markets and opportunities in the area of Artificial Intelligence (AI), but very few business are really ready to seize these opportunities. I will outline how you move from your initial AI baby steps to capturing emerging markets, what is required to position yourself well, and what competencies you need to bring globally competitive products and services to your current and future customers.

    Speaker

    Photo Speaker Name Profile
    Dr. Christian Guttmann Dr. Christian Guttmann View Profile
  • The future of authentication. Secure passwordless login for employees and customers. Add to Schedule Claire Galbois-Alcaix  |   Yubico   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 13:20 to 13:50

    The future of authentication. Secure passwordless login for employees and customers.

    Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?

    Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?

    This session will change your perceptions and eventually protect your online accounts.

    Speaker

    Photo Speaker Name Profile
    Claire Galbois-Alcaix Claire Galbois-Alcaix View Profile
  • People and Passwords Add to Schedule Pedro Martins  |   LastPass by LogMeIn  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 13:20 to 13:50

    People and Passwords

    Despite the increased use of two-factor authentication, single sign-on, and biometrics, passwords are still the most common form of authentication. In the first analyst report on Enterprise Password Management (EPM), Forrester acknowledged the password problem and the risks that they present to businesses.

    In this talk, we will look at why employees still use weak passwords despite knowing the risks and provide guidance for security and IT professionals on keeping password costs and risks under control, without losing employee buy-in.

    Speaker

    Photo Speaker Name Profile
    Pedro Martins Pedro Martins View Profile
  • Wed 19th Sep 14:00 - 14:30
  • GDPR - the calm after the storm Add to Schedule Karen Lawrence Öqvist  |   Privasee  |   Keynote

    Keynote Theatre

    Wed 19th Sep 14:00 to 14:30

    GDPR - the calm after the storm

    The 25th May has come and gone, but the storm is still in full swing. What is there more to do? How long will it last? And what kind of animal will privacy compliance within the EU -and beyond- grow into over the next 5 years?
     
    Privasee was the ‘first on the block’ founded to address the 6 most important words in the GDPR, “data protection by design by default”. Karen Lawrence Öqvist is founder/CEO and calls herself a ‘Privacy Practitioner’. She is a privacy advocate, author and speaker. She has hosted a privacy blog since 2007, published 2 books: ‘Virtual Shadows: Your Privacy in the Information Society’ (published by the British Computer Society, 2009), and ‘A Hands on Approach to GDPR Compliance’ (International Association of Privacy Professionals, 2018).

    Speaker

    Photo Speaker Name Profile
    Karen Lawrence Öqvist Karen Lawrence Öqvist View Profile
  • The best kept secret in the Network Security industry about Huawei and why you should care Add to Schedule Frank Ip  |   Huawei Technologies USA, Inc.  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 14:00 to 14:30

  • Data Driven DevOps: Measure What Matters. Innovate Faster. Add to Schedule Neil MacGowan  |   New Relic Inc.  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 14:00 to 14:30

    Data Driven DevOps: Measure What Matters. Innovate Faster.

    DevOps adoption varies across industries and enterprises of all size.  Its promise of speed, agility and better software however is not just interesting for unicorns anymore.  Many challenges exist but the biggest challenge is data silos which limits the DevOps culture to thrive and be actionable. Successful DevOps journeys have mastered and optimized for the right culture; have adopted various automation technologies; leverage the concept of lean and have mastered measuring its success with full-stack visibility understanding real-time impact of their work. This session will explore the necessary evil of real-time analytics for the entire DevOps team.

    Speaker

    Photo Speaker Name Profile
    Neil MacGowan Neil MacGowan View Profile
  • Delivering Analytics at Scale with a Governed Data Lake ACCESS PLUS Add to Schedule Jean-Michel Franco  |   Talend   |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 14:00 to 14:30

    Delivering Analytics at Scale with a Governed Data Lake

    Data privacy is on everyone's mind right now. Regulations such as GDPR, as well as public sentiment, mean that governance and compliance are must-have capabilities for data lakes. Learn how to curate meaningful data from your data lake, accelerate governance and compliance, and enable your organization with searchable, trusted datasets.

    Speaker

    Photo Speaker Name Profile
    Jean-Michel Franco Jean-Michel Franco View Profile
  • Common encryption myths busted Add to Schedule Jörgen Jansson  |   Gemalto  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 14:00 to 14:30

    Common encryption myths busted

    The Session will give you a updated view on what is going on in the information security space today when it comes to encryption. We will discuss incidents in the region and some global events that gives a good perspective on what is about to come. We will explain why we keep ignore the usage of basic security techniques and we will present a suggestion on how encryption can be deployed internally, externally and in the cloud.

    Speaker

    Photo Speaker Name Profile
    Jörgen Jansson Jörgen Jansson View Profile
  • HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS Add to Schedule Gavin Jay  |   CrowdStrike   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 14:00 to 14:30

    HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS

    This session explores the evolution of threats- from discrete criminal events to an offensive weapon. We’ll lift the lid on the latest attack techniques, adopted by nation state actors, which invariably find their way into the mainstream criminal world and are therefore an indicator of what to prepare for.

    Gavin will reference who the most active and advanced adversaries are, what attack vectors they typically employ, and how we can apply this intelligence to prevent, protect and respond.  Using simulated attack scenarios and personal examples of the speaker’s experience, attendees will learn how to spot indicators of compromise and attack, and how to safeguard their organisation accordingly.

    What attendees will learn:

    • How nation-state threats are crafted and how their Tactics, Techniques, and Procedures (TTPs) help identify them from more routine advanced attacks
    • Who are today’s most notable adversaries and the key European security themes based on the latest intelligence compiled across CrowdStrike’s global intelligence gathering operation
    • What are the indicators of attack and how you can apply them to defeat the adversary?

    Speaker

    Photo Speaker Name Profile
    Gavin Jay Gavin Jay View Profile
  • Wed 19th Sep 15:00 - 15:30
  • Work Smart and Stay Safe Add to Schedule Pritam Pabla  |   Google  |   Keynote

    Keynote Theatre

    Wed 19th Sep 15:00 to 15:30

    Work Smart and Stay Safe

    Google Chrome Enterprise offers proactive protections, granular policy controls and continuous vulnerability management. Join us to learn how to protect users and data at every cloud entry point with Chrome OS and Chrome Browser.

    Speaker

    Photo Speaker Name Profile
    Pritam Pabla Pritam Pabla View Profile
  • Data privacy & protection: A logical extension to DevOps Add to Schedule Chris Kerswell  |   Redgate Software   |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 15:00 to 15:30

    Data privacy & protection: A logical extension to DevOps

    As a data professional you are likely responsible, in some part, for ensuring that your organization meets their data privacy and protection obligations. You are also familiar with the positive impact that standardizing your Database DevOps processes has for ensuring greater productivity and increased speed of delivery.

    But are you also considering data privacy and protection as part of your DevOps process? 

    In light of legislation like GDPR, making sure that any personally identifiable information (PII) is protected as it moves through your development and testing environments, is now an essential part of the process to ensure that your Database DevOps practices are compliant.

    Speaker

    Photo Speaker Name Profile
    Chris Kerswell Chris Kerswell View Profile
  • Can the Nordics Keep Up with AI Investments Around the World? ACCESS PLUS Add to Schedule Anders Arpteg  |   Peltarion  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 15:00 to 15:30

    Can the Nordics Keep Up with AI Investments Around the World?

    We have seen a large number of AI investments around the world recently, both from industry and from governments that are building nationwide AI programs. The United States are leading today, but China has declared its intention to become "the world's primary AI innovation center" by 2030. The European Commission has outlined a three-pronged approach to increase public and private investment in AI. Countries such as France, Germany, Finland, and now also Sweden are building nation-wide AI programs. Why are we seeing all these investments now, what are the most recent AI advances, and can the Nordics keep up?

    Speaker

    Photo Speaker Name Profile
    Anders Arpteg Anders Arpteg View Profile
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Peter Wilson  |   Onetrust  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 15:00 to 15:30

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations is upon us, security and compliance professionals must make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Speaker Name Profile
    Peter Wilson View Profile
  • Privileged Account Management, Ensuring Least Privilege – a highly practical guide Add to Schedule Scott Shields  |   Thycotic Software   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 15:00 to 15:30

    Privileged Account Management, Ensuring Least Privilege – a highly practical guide

    Recent reports show 85% of reported breaches involve compromised endpoints, and 80% of breaches involve Privileged Credentials. Traditional Antivirus and Anti-malware blacklisting can’t keep up with new and advanced threats targeting desktops, laptops and servers. Whilst if you are storing privileged account passwords and credentials in spreadsheets, you will have no doubt this poses a serious security risk.
     
    Join us as we take you through a number of tools and techniques that you can implement in order to quickly cut down your excess privilege exposure and take back full control of your most precious and important privileged accounts. Register today!
     

    Speaker

    Photo Speaker Name Profile
    Scott Shields Scott Shields View Profile
  • Towards Intent-Driven Network Add to Schedule Mark Wu   |   Huawei  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 15:00 to 15:30

    Speaker

    Photo Speaker Name Profile
    Mark Wu Mark Wu View Profile
  • Wed 19th Sep 15:40 - 16:10
  • AI and security Add to Schedule Daniel Akenine  |   Microsoft  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 15:40 to 16:10

    AI and security

    We are as a society giving more and more power to algorithms and AI. They will fly our planes and drive our vehicles, they will do surgery and take care of your money. What are the challenges for security and privacy when it comes to AI and what can we do to address them?

    Speaker

    Photo Speaker Name Profile
    Daniel Akenine Daniel Akenine View Profile
  • The Secret World of the Formula 1 pit lane Add to Schedule Marc Priestley   |   Independent  |   Keynote

    Keynote Theatre

    Wed 19th Sep 15:40 to 16:10

    The Secret World of the Formula 1 pit lane

    Marc spent ten years as a mechanic on the McLaren Formula One pit crew. Looking at every aspect of F1, he explains the communication, teamwork, pressure and strategy to secure marginal gains. With each car generating 10mb of data per lap, analysts look ever more closely at competitors’ decisions in an effort to optimise their own team performance. Marc also provides insight for Sky Sports, and is part of the ITV team covering the electrically-powered Formula E, showcasing the latest British racing technology.

    Speaker

    Photo Speaker Name Profile
    Marc Priestley Marc Priestley View Profile
  • Analytics through the DevOps lifecycle Add to Schedule Ulf Thornander  |   Splunk   |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 15:40 to 16:10

    Speaker

    Photo Speaker Name Profile
    Ulf Thornander Ulf Thornander View Profile
  • Are Smart Cities Failing? ACCESS PLUS Add to Schedule Kajsa Arvidsson  |   Nokia, Europe  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 15:40 to 16:10

    Are Smart Cities Failing?

    Many Smart City applications, from smart parking to smart rubbish collection and environmental monitoring, have been developed in siloed departments, without the joined-up thinking that was needed to change the way people live their lives.  In today’s Smart Cities, most applications simply do things in a new way, without triggering the radical shift in how citizens interact with their environment we were promised. Is there a better way?

    Speaker

    Photo Speaker Name Profile
    Kajsa Arvidsson Kajsa Arvidsson View Profile
  • Futureproof with Immediate Impact Add to Schedule Imran Idrees  |   Cisco Meraki   |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 15:40 to 16:10

    Futureproof with Immediate Impact

    For a business the network is ultimately a tool that’s used to deliver an objective. In today’s digital world business are vying to roll out new initiatives to gain a competitive edge. During this session we will cover how Cisco Meraki technology can help organisations be first to achieve their digital ambitions whilst also providing an immediate impact to their bottom line in the form of operational savings.

    Attendees will receive a free Cisco Meraki Access Point

    Speaker

    Photo Speaker Name Profile
    Imran Idrees Imran Idrees View Profile
  • The importance of Data Availability and Data Recovery Add to Schedule Helen McHugh  |   eFolder/Axcient  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 15:40 to 16:10

    Speaker

    Photo Speaker Name Profile
    Helen McHugh Helen McHugh View Profile
  • Thu 20th Sep 09:00 - 09:50
  • The State of Hacking & Cybercrime Add to Schedule Samy Kamkar  |   Independent  |   Keynote

    Keynote Theatre

    Thu 20th Sep 09:00 to 09:50

    The State of Hacking & Cybercrime

    Samy Kamkar: Fun, Fascinating, Terrifying

     

    Meet the man who changed the internet forever.

     

    Best known for creating the fastest spreading virus of all time, the MySpace Worm, Samy Kamkar is a cyber security expert whose work is cited by the NSA, triggers hearings on Capitol Hill, and is used as the basis for security advancements across virtually all web browsers, smartphones, and other technologies. He is speaking at IP EXPO Nordic about the insecurities in every day technologies in his seminar “The State of Hacking and Cyber Crime” which is described as revealing something fun, fascinating and terrifying. Expect eye opening live hacks, demonstrations, audience involvement from the hacker that changed the internet forever.

    Speaker

    Photo Speaker Name Profile
    Samy Kamkar Samy Kamkar View Profile
  • Thu 20th Sep 10:00 - 10:30
  • The utopian trap: (Dis)information and (fake) news on the Nordics Add to Schedule Carl Marklund  |   Sodertorn University  |   Keynote

    Keynote Theatre

    Thu 20th Sep 10:00 to 10:30

    The utopian trap: (Dis)information and (fake) news on the Nordics

    Being small, the Nordic countries are dependent upon their international reputation of being prosperous and peaceful. Not only for attracting global business and media, but for their self-identity. However, this also means the Nordics are extra sensitive to (dis)information and (fake) news that contradict this sometimes ”utopian” image abroad. News on the Nordics go viral when they confront, rather than confirm, the positive reputation. While some of this reporting reflects actual problems and real challenges, there is also growing evidence that the Nordics – Sweden in particular – attract disinformation efforts, primarily due to their ”progressive” reputation internationally, but also polarization domestically.

    Speaker

    Photo Speaker Name Profile
    Carl Marklund Carl Marklund View Profile
  • “Get Back to the Future with PRTG” Add to Schedule Jörg Hollerith  |   Paessler AG - PRTG Network Monitor  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Thu 20th Sep 10:00 to 10:30

    “Get Back to the Future with PRTG”

    Join the team from PAESSLER for this compelling presentation, showing you how PRTG our unified monitoring platform can be used to monitor all generations of computing. 

    Speaker

    Photo Speaker Name Profile
    Jörg Hollerith Jörg Hollerith View Profile
  • How Security/Compliance teams can be good citizens in a DevOps Practice Add to Schedule Pieter Hagen  |   Chef   |   DevOps and Serverless

    DevOps and Serverless Theatre

    Thu 20th Sep 10:00 to 10:30

    How Security/Compliance teams can be good citizens in a DevOps Practice

    DevOps makes software deployment faster but, without proper controls, that often means developers are also releasing security vulnerabilities and non-compliant applications more quickly. Organizations must learn how to decrease risk by shipping software quickly, but with higher efficiency and lower risk. The solution is to not deal with information security right before or even in production.

    Organizations can achieve both speed and safety by extending Agile, Lean, and DevOps (ALDO) principles to their information security teams and by adopting automation tools, which can turn compliance into code and integrate security into your full development cycle.

    Speaker

    Photo Speaker Name Profile
    Pieter Hagen Pieter Hagen View Profile
  • Solve your Security Challenges with Splunk Add to Schedule Simon Odgen  |   Splunk   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 10:00 to 10:30

    Solve your Security Challenges with Splunk

    Do you need ways to gain visibility and control of your organization’s security posture and answer fundamental  questions of “what, who,  when,  where,  how, and what do I do next.” A “single source of truth”  can help security teams answer these questions quickly  and effectively,  helping make better-informed  security decisions.

    Speaker

    Photo Speaker Name Profile
    Simon Odgen Simon Odgen View Profile
  • ONE product to cover ALL your security needs! Add to Schedule Martin Hansen  |   Bitdefender  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Thu 20th Sep 10:00 to 10:30

    ONE product to cover ALL your security needs!

    GravityZone is automatically trained based on trillions of samples from more than 500 million endpoints worldwide. Regardless of how much a malware is modified, Bitdefender can detect these new patterns. A zero-trust policy ensures all running processes are monitored and stops ransomware activities in their tracks.

    Speaker

    Photo Speaker Name Profile
    Martin Hansen Martin Hansen View Profile
  • 5G, IoT and AI – why we know nothing yet ACCESS PLUS Add to Schedule Mats Guldbrand  |   Ericsson  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Thu 20th Sep 10:00 to 10:30

    5G, IoT and AI – why we know nothing yet

    1G, 2G, 3G and 4G we built it primarily for consumers. With 5G we are creating things we didn't even know we could, only 10 years ago. People, business and society have started to make the best use of mobile broadband. And yet, we have only scratched the surface of the possibilities. Embark on a journey where you might know less than when you came, but will be wanting to learn more.

    Speaker

    Photo Speaker Name Profile
    Mats Guldbrand Mats Guldbrand View Profile
  • Thu 20th Sep 11:00 - 12:10
  • Bytesize Panel – Future Trends: Blockchain, Machine Learning, DevOps Culture, Edge Computing Add to Schedule Tech Leaders  |  Keynote

    Keynote Theatre

    Thu 20th Sep 11:00 to 12:10

    Bytesize Panel – Future Trends: Blockchain, Machine Learning, DevOps Culture, Edge Computing

    The IP EXPO Bytesize panels are designed to give attendees an executive overview of the latest trends in IT. Four panellists, each a leading expert in their respective field, will each share a bite sized overview of a given topic during one education packed session. The sessions are designed to be interactive so attendees plus our social followers will have the opportunity to ask their questions to the panel in an extended Q&A.
     

    Panelists:

    • Erik Beijnoff - Blockchain
    • Neil Macgowan - Machine Learning
    • Renee Lung - DevOps Culture
    • Martin Thunman - Edge computing

    Speakers

    Photo Speaker Name Profile
    Erik Beijnoff Erik Beijnoff View Profile
    Martin Thunman Martin Thunman View Profile
    Neil MacGowan Neil MacGowan View Profile
    Renee Lung Renee Lung View Profile
  • Predictive security in a changing world Add to Schedule Erkan Djafer  |   Cisco  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Thu 20th Sep 11:00 to 11:30

    Predictive security in a changing world

    The internet can no longer be viewed as a static entity, it is by its very nature a living organism. It grows and evolves just like a human being. Most security today focuses on static protection, a living dynamic entity such as the internet requires protection that also lives and grows dynamically. This presentation will cover megatrends in security, including how the evolution makes it more difficult to protect us and what predictive security intelligence can do to cope with the modern threats that lie ahead.

    Speaker

    Photo Speaker Name Profile
    Erkan Djafer Erkan Djafer View Profile
  • From batch to pipelines - why Mesos and DC/OS are a solution for emerging patterns in data processing Add to Schedule Matt Jarvis  |   Mesosphere Inc  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Thu 20th Sep 11:00 to 11:30

    From batch to pipelines - why Mesos and DC/OS are a solution for emerging patterns in data processing

    Data processing paradigms are undergoing a paradigm shift as we move more and more towards real time processing. Emerging software models such as the SMACK stack are at the forefront of this change, focused on a pipeline processing model, but are also introducing new levels of operational complexity in running multiple complex distributed systems such as Spark, Kafka and Cassandra. In this talk, I'll introduce both Apache Mesos and DC/OS as a solution to this growing problem, and describe the benefits are of running these new kinds of systems for emerging cloud native workloads.

    Speaker

    Photo Speaker Name Profile
    Matt Jarvis Matt Jarvis View Profile
  • Do you want to succeed with AI? Step One: Change your data platform! ACCESS PLUS Add to Schedule Jonas Dahlberg  |   Microsoft  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Thu 20th Sep 11:00 to 11:30

  • DRaaS – Flexible, Channel focused Business Continuity for Profit Minded MSP’s Add to Schedule Tech Leaders  |  Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 11:00 to 11:30

  • People and Passwords Add to Schedule Pedro Martins  |   LastPass by LogMeIn  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Thu 20th Sep 11:00 to 11:30

    People and Passwords

    Despite the increased use of two-factor authentication, single sign-on, and biometrics, passwords are still the most common form of authentication. In the first analyst report on Enterprise Password Management (EPM), Forrester acknowledged the password problem and the risks that they present to businesses.

    In this talk, we will look at why employees still use weak passwords despite knowing the risks and provide guidance for security and IT professionals on keeping password costs and risks under control, without losing employee buy-in.

    Speaker

    Photo Speaker Name Profile
    Pedro Martins Pedro Martins View Profile
  • Thu 20th Sep 11:40 - 12:10
  • What’s Next? The power of co-innovation in the cloud. Add to Schedule Tech Leaders  |  Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Thu 20th Sep 11:40 to 12:10

    What’s Next? The power of co-innovation in the cloud.

    We have the technology and the ability to make your visions a reality in the workplace. With our skills to leverage cloud technology and your ability to ideate around new ideas to disrupt the market; we can improve on areas within your business that you may think are out of reach. We can hold your hand, work together , co innovate and show you what you can actually achieve with technology today. 

    Speakers

    Photo Speaker Name Profile
    Frederic Drevet Frederic Drevet View Profile
    James Fain James Fain View Profile
  • DevOps By The Numbers Add to Schedule Maarten Kennis  |   XebiaLabs  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Thu 20th Sep 11:40 to 12:10

    DevOps By The Numbers

    There's no mistaking how important initiatives like DevOps and Continuous Delivery have become to organizations seeking to gain a competitive edge. But without the right metrics, enterprises that have adopted DevOps or Continuous Delivery strategies have no way of measuring their effectiveness in the context of their digital transformation goals. 

    How are you able to identify and high light data from a multitude of disparate tools (legacy Java, .net or other, or container-based applications)?
     
    So, what are the right measures that can answer questions like "are we getting better at delivering high-quality software faster and at scale?" and "has all this effort been worth it?!"

    Speaker

    Photo Speaker Name Profile
    Maarten Kennis Maarten Kennis View Profile
  • A Nordic AI Journey ACCESS PLUS Add to Schedule Andreas Rosenqvist  |   Inovia Group  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Thu 20th Sep 11:40 to 12:10

    A Nordic AI Journey

    Working with AI in the Nordics.

    • The challenges of infrastructure, Big Data, training material for the Nordics languages etc.
    • Opportunities with AI technology in the Nordics today.
    • The future of AI in Nordics.

    Speaker

    Photo Speaker Name Profile
    Andreas Rosenqvist Andreas Rosenqvist View Profile
  • Dark Markets, economics of the Cybersecurity threat landscape Add to Schedule Thoralf Storulv  |   Microsoft  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 11:40 to 12:10

    Dark Markets, economics of the Cybersecurity threat landscape

    Cyber attacks are bought and sold on the Dark Market. In this session Microsoft will give you their insights into the Dark Markets. Who are the Dark Market actors? What motivates them? What is the price of an attack?

    Speaker

    Photo Speaker Name Profile
    Thoralf Storulv Thoralf Storulv View Profile
  • ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts Add to Schedule Jacob Eborn  |   OneTrust   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Thu 20th Sep 11:40 to 12:10

    ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts

    Together, security and privacy teams share a common goal: Protect the organization from reputational damage, lawsuits, and regulatory trouble. On one hand, ISO 27001 focuses on the assessment of risks and protection of the organization. On the other, the GDPR aims to assess and protect the rights and freedoms of individuals. With a joint goal in mind, it is crucial that security and privacy teams work together to develop a common language that produces greater productivity and takes advantage of collective efforts. In this session, OneTrust will present findings from research conducted in cooperation with the International Association of Privacy Professionals (IAPP), sharing how ISO 27001 and the GDPR overlap, as well as how security and privacy teams can work together to become more effective.

    Speaker

    Photo Speaker Name Profile
    Jacob Eborn Jacob Eborn View Profile
  • Thu 20th Sep 13:20 - 13:50
  • Disrupted Add to Schedule Stefan Månsby  |   Basefarm  |   Keynote

    Keynote Theatre

    Thu 20th Sep 13:20 to 13:50

    Disrupted

    "Disrupted" is an inspirational lecture on Artificial Intelligence and Machine Learning. What does tomorrow's company look like? And how do you work best with Artificial Intelligence (AI) in your team? Will we be "disrupted" by advances in Artificial Intelligence and Machine Learning? These are questions that are best answered with the help of a new mindset - AI thinking.

    See the teaser here https://www.basefarm.com/se/mot-oss-event-2018?utm_source=Externalweb&utm_medium=IPExpoNordicDisrupted

    Speaker

    Photo Speaker Name Profile
    Stefan Månsby Stefan Månsby View Profile
  • Things you can't cloud your way out of Add to Schedule Jessica Brown   |   Fastly  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Thu 20th Sep 13:20 to 13:50

    Things you can't cloud your way out of

    The Cloud has become a tool that most engineers rely on daily. It's a trusty technology that we incorporated to our arsenal of ways to get our ideas and solutions working.I started my journey out with these tools at my disposal, and growing alongside Amazon Web Services. Moving to Fastly was a whirlwind in the other direction, but in a primarily hardware-based environment I couldn't use the tools I had grown so accustomed to. What's a girl to do?Over the last year at Fastly, I've learned many things, such as the fact that building an Edge for the Cloud means that I can't rely on the Cloud.  In order to support the Cloud, we need to work with traditional components, however the old ways of working won't provide the velocity needed.  I'll discuss how to provide core datacenter features, but using the modern cloud-native techniques, and more importantly, a cloud-native mindset.

    Speaker

    Photo Speaker Name Profile
    Jessica Brown Jessica Brown View Profile
  • Fact Based DevOps: How To Ensure You Have The Right Data To Make Accurate Decisions Quickly Add to Schedule John Rakowski  |   AppDynamics  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Thu 20th Sep 13:20 to 13:50

    Fact Based DevOps: How To Ensure You Have The Right Data To Make Accurate Decisions Quickly

    Ask any technologist what DevOps means and you will get varying answers. The truth is that DevOps requires a transformation of traditional IT, its people, processes and the technology stack. It requires an outside-in mindset that gets everyone centered on how applications and associated technologies drive user and business value. To act accurately and quickly around these areas requires the right data and insights, to ensure that decisions are based on facts, and not perceptions. The session will explore best practices around the real-time data and insights that DevOps teams need for success.

    Speaker

    Photo Speaker Name Profile
    John Rakowski John Rakowski View Profile
  • The disruptive potential of open networks, enabled by blockchain technology ACCESS PLUS Add to Schedule Erik Beijnoff  |   Repertoire - Decentralised music rights management  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Thu 20th Sep 13:20 to 13:50

    The disruptive potential of open networks, enabled by blockchain technology

    Most or all markets that exist today are imperfect by design. The majority of all business models builds on cornering of markets. This has caused rent-seeking business patterns to emerge in most industries across the world. This is particularly prevalent in global markets. The promise of open networks enabled through blockchain technology is to shortcut those business patterns to release exponential efficiency gains and at the same time cause the biggest transfer of wealth in the history of the world.

    Speaker

    Photo Speaker Name Profile
    Erik Beijnoff Erik Beijnoff View Profile
  • How to Recover from a Ransomware Infection; LIVE! Add to Schedule Ben Jenkins   |   Datto   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 13:20 to 13:50

    How to Recover from a Ransomware Infection; LIVE!

    Are you sick and tired of liquid nitrogen freezing your servers and plunging your business into downtime? Do sub-zero temperatures destroy your data, cool your customers and put a crack in your profits?! Yep, we thought so. Come along to our session and see how we recover a ransomware-infected, frozen server in a matter of seconds! It’s enough to give anyone the goosebumps! Our platform is built specifically for MSPs and we have the answers you need! Wrap up warm: this is a demo you won’t want to miss!

    Speaker

    Photo Speaker Name Profile
    Ben Jenkins Ben Jenkins View Profile
  • Confessions of a Hacker – Under the Hoodie Add to Schedule Magnus Jansson  |   Rapid7  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Thu 20th Sep 13:20 to 14:10

    Confessions of a Hacker – Under the Hoodie

    In this revealing session discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today. Low tech and high tech methods will be presented in an effort to help attendees understand the true level of risk faced by their organizations and where the gaps may be in their defence perimeter.

    Speaker

    Photo Speaker Name Profile
    Magnus Jansson Magnus Jansson View Profile
  • Thu 20th Sep 14:00 - 14:30
  • Microsoft Keynote - Digital Transformation for real Add to Schedule Annica Wallenbro Stojcevski  |   Microsoft  |   Keynote

    Keynote Theatre

    Thu 20th Sep 14:00 to 14:30

    Microsoft Keynote - Digital Transformation for real

    We have all learnt a lot during the past years in the Digital Transformation era. How to make change to be a natural part of everyday business, to constant adapt to new technologies, to create real value and the most important part – how to get going. During this session we share our learnings and insights on how companies and organisations in the Nordics are winning with solutions built on Microsoft AI. Making it real.

    Speaker

    Photo Speaker Name Profile
    Annica Wallenbro Stojcevski Annica Wallenbro Stojcevski View Profile
  • Predictive Analytics: Detect incidents – before they happen Add to Schedule Douglas Sundel  |   Splunk  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Thu 20th Sep 14:00 to 14:30

    Predictive Analytics: Detect incidents – before they happen

    Do you want to know before a service breaks down and be able to prevent it? With Splunk it’s back to the future: you can detect incidents before they actually occur!

    Speaker

    Speaker Name Profile
    Douglas Sundel View Profile
  • Activate Your Emotion Chip: Coaching for Engineers and Beyond Add to Schedule Renee Lung  |   Pagerduty  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Thu 20th Sep 14:00 to 14:30

    Activate Your Emotion Chip: Coaching for Engineers and Beyond

    Coaching and mentoring are not one-sided relationships; when there is a good fit and a desire from both parties to build trust, everyone benefits, including teammates and colleagues. I'll share my experience coaching from an engineering perspective, how it has helped me grow not just my leadership but also my technical skills, and finally, how nurturing a culture of mentorship and coaching can build one of the most essential aspects of a lasting and effective DevOps culture: empathy. The audience will leave with strategies to implement mentoring and coaching relationships within their own teams, and a fresh perspective on how to jump-start learning within their own career paths.

    Speaker

    Photo Speaker Name Profile
    Renee Lung Renee Lung View Profile
  • 5 reasons to adopt Edge Computing for Connecting your Machinery ACCESS PLUS Add to Schedule Martin Thunman  |   Crosser Technologies AB  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Thu 20th Sep 14:00 to 14:30

    5 reasons to adopt Edge Computing for Connecting your Machinery

    Edge Computing is predicted to be one of the essential components for the development of the future industry, also known as Factory 4.0 or Industrial Internet.

    Moving computing powers, filtering and analytics closer to the data source will be essential for any global machine manufacturer when connecting their products and assets for a global market.

    Speaker

    Photo Speaker Name Profile
    Martin Thunman Martin Thunman View Profile
  • Effortless Protection Against the Latest Security Threats Add to Schedule Imran Idrees  |   Cisco Meraki   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 14:00 to 14:30

    Effortless Protection Against the Latest Security Threats

    Cyber security threats, particularly new ones, are probably the cause of multiple hours of lost sleep for many IT executives and business owners. Most victims of recent high-profile vulnerabilities were broadly as a result of outdated threat signature libraries. Join us in this session to discover how Cisco Meraki’s solution, integrated with renowned industry-leading security groups such as Talos and Snort, can seamlessly protect your organisation against the latest security vulnerabilities.

    Attendees will receive a free Cisco Meraki Security Appliance

    Speaker

    Photo Speaker Name Profile
    Imran Idrees Imran Idrees View Profile
  • Thu 20th Sep 15:00 - 16:00
  • Bytesize panel – The year ahead: GDPR, Digital Transformation, Security Breaches and more Add to Schedule Tech Leaders  |  Keynote

    Keynote Theatre

    Thu 20th Sep 15:00 to 16:00

    Bytesize panel – The year ahead: GDPR, Digital Transformation, Security Breaches and more

    Elections throw up interesting issues, and following the Swedish election in September this is bound to be a fascinating session by industry leaders looking ahead to what 2019 might bring for the tech market.

    Panellists: John Rakowski, Philip Appleton, Thomas Sundstrom, Ian Evans

    Speakers

    Photo Speaker Name Profile
    Jacob Eborn Jacob Eborn View Profile
    John Rakowski John Rakowski View Profile
    Philip Appleton View Profile
    Tomas Sundstrom Tomas Sundstrom View Profile
  • Test Data as Code Add to Schedule Johan Backstrom  |   Claremont  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Thu 20th Sep 15:00 to 15:30

    Test Data as Code

    How do you deal with test data in your software development process? Not at all? Subsetting and masking? There are other strategies that can be much more effective in dealing with test data!

    With the rise of agile and DevOps, new ways of, and tools for, dealing with infrastructure and configuration management have emerged. What I propose is to apply those same concepts to test data. I will show how building a capacity to rapidly adapt your test data to changed requirements and new knowledge will enable high quality development and testing.

    Speaker

    Photo Speaker Name Profile
    Johan Backstrom Johan Backstrom View Profile
  • IoT industrial and Consumer Products: Global Megatrends and Manufacturing Focus Shaping IoT, AI, Blockchain ACCESS PLUS Add to Schedule Justinas Liuima  |   Euromonitor  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Thu 20th Sep 15:00 to 15:30

    IoT industrial and Consumer Products: Global Megatrends and Manufacturing Focus Shaping IoT, AI, Blockchain

    Business IoT presents the best growth opportunities for IT companies and hi-tech goods providers. Energy, transportation services and manufacturing industries are the most ready to implement IoT solutions. Cost reduction, increased operational flexibility and better precision are the key factors driving demand for business IoT solutions. Rising demand will in turn kick start global hi-tech goods industry and offer new growth opportunities for telecommunications, cyber security and computer service providers. The best growth opportunities are anticipated in North America, Western Europe and Asia Pacific.

    Speaker

    Photo Speaker Name Profile
    Justinas Liuima Justinas Liuima View Profile
  • Cyber security, the human element Add to Schedule Ragnar Sigurdsson  |   AwareGo   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 15:00 to 15:30

    Cyber security, the human element

    Technical solutions are just not enough these days, with employee manipulation and mistakes a part of up to 95% of breaches, IT cannot look past the need for security awareness.

    Speaker

    Photo Speaker Name Profile
    Ragnar Sigurdsson Ragnar Sigurdsson View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top