IP EXPO Nordic 2018 - Seminars 2018
19 - 20 SEPTEMBER 2018 / Stockholmsmässan

Here is a list of all confirmed Seminars for 2018. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 19th Sep 10:00 - 10:30
  • Four keys to tackle software vulnerabilities in commercial and in-house software Add to Schedule Alejandro Lavie  |   Flexera   |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 10:00 to 10:30

    Four keys to tackle software vulnerabilities in commercial and in-house software

    The world shifted to a paradigm that accepts that breaches will inevitably happen and they need to be detected and responded to in a more efficient fashion. However, the need and cost-effectiveness of prevention is still a reality that organizations have not been able to master, and application vulnerabilities remain at the top of security professionals concerns.

    With more than 50 new vulnerabilities disclosed every day in commercial software, it’s hard to stay focused and be effective. When you add vulnerabilities being introduced in the code being written in-house, the task just becomes unfeasible. Join us for this talk about how visibility, curation, prioritization and automation kick in for security, operations and engineering to work together towards a more secure software supply chain.

    Speaker

    Photo Speaker Name Profile
    Alejandro Lavie Alejandro Lavie View Profile
  • PAM: The critical missing piece in your security strategy Add to Schedule Chris Clarkson  |   Bomgar   |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 10:00 to 10:30

    PAM: The critical missing piece in your security strategy

    Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM).

    This session will cover what ‘privilege’ means to your business and how implementing a PAM solution drives significant improvements across the organisation. It will discuss:

    -        Why organisations should make PAM their top 2019 investment

    -        Why quickly controlling and automating key PAM capabilities is critical to your organisation’s success

    -        Tools to prepare the business case for your PAM project and to get Executive Leadership buy in

    Speaker

    Photo Speaker Name Profile
    Chris Clarkson Chris Clarkson View Profile
  • Wed 19th Sep 11:00 - 11:30
  • Zero Trust & The Flaming Sword of Justice Add to Schedule Dave Lewis  |   Duo Security  |   Keynote

    Keynote Theatre

    Wed 19th Sep 11:00 to 11:30

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 
The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify. 

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Predictive security in a changing world Add to Schedule Erkan Djafer  |   Cisco  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 11:00 to 11:30

    Predictive security in a changing world

    The internet can no longer be viewed as a static entity, it is by its very nature a living organism. It grows and evolves just like a human being. Most security today focuses on static protection, a living dynamic entity such as the internet requires protection that also lives and grows dynamically. This presentation will cover mega trends in security, including how the evolution makes it more difficult to protect us and what predictive security intelligence can do to cope with the modern threats that lie ahead.

    Speaker

    Photo Speaker Name Profile
    Erkan Djafer Erkan Djafer View Profile
  • HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS Add to Schedule Gavin Jay  |   CrowdStrike   |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 11:00 to 11:30

    HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS

    This session explores the evolution of threats- from discrete criminal events to an offensive weapon. We’ll lift the lid on the latest attack techniques, adopted by nation state actors, which invariably find their way into the mainstream criminal world and are therefore an indicator of what to prepare for.
    Gavin will reference who the most active and advanced adversaries are, what attack vectors they typically employ, and how we can apply this intelligence to prevent, protect and respond.  Using simulated attack scenarios and personal examples of the speaker’s experience, attendees will learn how to spot indicators of compromise and attack, and how to safeguard their organisation accordingly.

    What attendees will learn:

    • How nation-state threats are crafted and how their Tactics, Techniques, and Procedures (TTPs) help identify them from more routine advanced attacks
    • Who are today’s most notable adversaries and the key European security themes based on the latest intelligence compiled across CrowdStrike’s global intelligence gathering operation
    • What are the indicators of attack and how you can apply them to defeat the adversary?

    Speaker

    Photo Speaker Name Profile
    Gavin Jay Gavin Jay View Profile
  • Channel Focused BDR Solution – Replibit DRaaS - Chain Free Backup! Add to Schedule Josh Chrisman  |   eFolder/Axcient  |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 11:00 to 11:30

  • Wed 19th Sep 11:40 - 12:10
  • The Intrapreneurs’ Survival Guide: The 10 questions every Intrapreneur should be ready to answer Add to Schedule Brian Curran  |   Oracle  |   Keynote

    Keynote Theatre

    Wed 19th Sep 11:40 to 12:10

    The Intrapreneurs’ Survival Guide: The 10 questions every Intrapreneur should be ready to answer

    Congratulations! You’ve volunteered (or you’ve been volunteered) to lead innovation in your company. Now comes the hard part. Your organization, despite its best intentions and efforts, may not be well designed to embrace innovation and the people who are changing “business as usual”. We know innovation is hard, so Intrapreneurs need a survival guide.

    Join Oracle's Brian J. Curran, Vice President of Innovation & Design, as he shares the 10 Questions every intrapreneur must be prepared to answer in order to survive the corporate gauntlet trying to kill them and their innovations.

    Speaker

    Photo Speaker Name Profile
    Brian Curran Brian Curran View Profile
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule Suzette Loubser  |   Darktrace  |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 11:40 to 12:10

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    In this session Suzette will discuss:

    ·         Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats

    ·         How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time

    ·         How to achieve 100% visibility of your entire business including cloud, network and IoT environments

    ·         Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk

    ·         Real-world examples of subtle, unknown threats that routinely bypass traditional controls

    Speaker

    Photo Speaker Name Profile
    Suzette Loubser Suzette Loubser View Profile
  • Turtles, Trust and the Future of Cybersecurity Add to Schedule Jeremy Agenais  |   Varonis   |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 11:40 to 12:10

    Turtles, Trust and the Future of Cybersecurity

    Faith in our institutions is collapsing, and GDPR is here. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world?  It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.

    Speaker

    Photo Speaker Name Profile
    Jeremy Agenais Jeremy Agenais View Profile
  • Wed 19th Sep 13:20 - 14:10
  • Lessons from a red team exercise Add to Schedule Rob Shapland  |   Falanx Group  |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 13:20 to 14:10

    Lessons from a red team exercise

    Ethical hackers from Falanx Group conduct red team tests to help organisations understand where they are vulnerable to advanced attacks. This presentation describes each step of a real-world exercise: planning and recon, spear phishing, telephone social engineering, building access, network exploitation and data exfiltration.As the story develops, you will discover how an attacker thinks, why they choose a particular strategy and what you can do to minimise your organisation’s vulnerability to advanced threats.

    Speaker

    Photo Speaker Name Profile
    Rob Shapland Rob Shapland View Profile
  • The future of authentication. Secure passwordless login for employees and customers. Add to Schedule

    Cyber Strategies Theatre

    Wed 19th Sep 13:20 to 13:50

    The future of authentication. Secure passwordless login for employees and customers.

    Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?

    Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?

    This session will change your perceptions and eventually protect your online accounts.

  • Wed 19th Sep 14:00 - 14:30
  • GDPR - the calm after the storm Add to Schedule Karen Lawrence Öqvist  |   Privasee  |   Keynote

    Keynote Theatre

    Wed 19th Sep 14:00 to 14:30

    GDPR - the calm after the storm

    The 25th May has come and gone, but the storm is still in full swing. What is there more to do? How long will it last? And what kind of animal will privacy compliance within the EU -and beyond- grow into over the next 5 years?
     
    Privasee was the ‘first on the block’ founded to address the 6 most important words in the GDPR, “data protection by design by default”. Karen Lawrence Öqvist is founder/CEO and calls herself a ‘Privacy Practitioner’. She is a privacy advocate, author and speaker. She has hosted a privacy blog since 2007, published 2 books: ‘Virtual Shadows: Your Privacy in the Information Society’ (published by the British Computer Society, 2009), and ‘A Hands on Approach to GDPR Compliance’ (International Association of Privacy Professionals, 2018).

    Speaker

    Photo Speaker Name Profile
    Karen Lawrence Öqvist Karen Lawrence Öqvist View Profile
  • Common encryption myths busted Add to Schedule Jörgen Jansson  |   Gemalto  |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 14:00 to 14:30

    Common encryption myths busted

    The Session will give you a updated view on what is going on in the information security space today when it comes to encryption. We will discuss incidents in the region and some global events that gives a good perspective on what is about to come. We will explain why we keep ignore the usage of basic security techniques and we will present a suggestion on how encryption can be deployed internally, externally and in the cloud.

    Speaker

    Photo Speaker Name Profile
    Jörgen Jansson Jörgen Jansson View Profile
  • Wed 19th Sep 15:00 - 15:30
  • Work Smart and Stay Safe Add to Schedule Pritam Pabla  |   Google  |   Keynote

    Keynote Theatre

    Wed 19th Sep 15:00 to 15:30

    Work Smart and Stay Safe

    Google Chrome Enterprise offers proactive protections, granular policy controls and continuous vulnerability management. Join us to learn how to protect users and data at every cloud entry point with Chrome OS and Chrome Browser.

    Speaker

    Photo Speaker Name Profile
    Pritam Pabla Pritam Pabla View Profile
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 15:00 to 15:30

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations is upon us, security and compliance professionals must make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Privileged Account Management, Ensuring Least Privilege – a highly practical guide Add to Schedule Scott Shields  |   Thycotic Software   |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 15:00 to 15:30

    Privileged Account Management, Ensuring Least Privilege – a highly practical guide

    Recent reports show 85% of reported breaches involve compromised endpoints, and 80% of breaches involve Privileged Credentials. Traditional Antivirus and Anti-malware blacklisting can’t keep up with new and advanced threats targeting desktops, laptops and servers. Whilst if you are storing privileged account passwords and credentials in spreadsheets, you will have no doubt this poses a serious security risk.
     
    Join us as we take you through a number of tools and techniques that you can implement in order to quickly cut down your excess privilege exposure and take back full control of your most precious and important privileged accounts. Register today!
     

    Speaker

    Photo Speaker Name Profile
    Scott Shields Scott Shields View Profile
  • Wed 19th Sep 15:40 - 16:10
  • Brought to you by Microsoft Add to Schedule

    Cyber Strategies Theatre

    Wed 19th Sep 15:40 to 16:10

  • The Secret World of the Formula 1 pit lane Add to Schedule Marc Priestley   |   Independent  |   Keynote

    Keynote Theatre

    Wed 19th Sep 15:40 to 16:10

    The Secret World of the Formula 1 pit lane

    Marc spent ten years as a mechanic on the McLaren Formula One pit crew. Looking at every aspect of F1, he explains the communication, teamwork, pressure and strategy to secure marginal gains. With each car generating 10mb of data per lap, analysts look ever more closely at competitors’ decisions in an effort to optimise their own team performance. Marc also provides insight for Sky Sports, and is part of the ITV team covering the electrically-powered Formula E, showcasing the latest British racing technology.

    Speaker

    Photo Speaker Name Profile
    Marc Priestley Marc Priestley View Profile
  • The importance of Data Availability and Data Recovery Add to Schedule Helen McHugh  |   eFolder/Axcient  |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 15:40 to 16:10

    Speaker

    Photo Speaker Name Profile
    Helen McHugh Helen McHugh View Profile
  • Thu 20th Sep 09:00 - 09:50
  • The State of Hacking & Cybercrime Add to Schedule Samy Kamkar  |   Independent  |   Keynote

    Keynote Theatre

    Thu 20th Sep 09:00 to 09:50

    The State of Hacking & Cybercrime

    Samy Kamkar: Fun, Fascinating, Terrifying

     

    Meet the man who changed the internet forever.

     

    Best known for creating the fastest spreading virus of all time, the MySpace Worm, Samy Kamkar is a cyber security expert whose work is cited by the NSA, triggers hearings on Capitol Hill, and is used as the basis for security advancements across virtually all web browsers, smartphones, and other technologies. He is speaking at IP EXPO Nordic about the insecurities in every day technologies in his seminar “The State of Hacking and Cyber Crime” which is described as revealing something fun, fascinating and terrifying. Expect eye opening live hacks, demonstrations, audience involvement from the hacker that changed the internet forever.

    Speaker

    Photo Speaker Name Profile
    Samy Kamkar Samy Kamkar View Profile
  • Thu 20th Sep 10:00 - 10:30
  • Solve your Security Challenges with Splunk Add to Schedule Robin Crohns  |   Splunk  |   Cyber Strategies

    Cyber Strategies Theatre

    Thu 20th Sep 10:00 to 10:30

    Solve your Security Challenges with Splunk

    Do you need ways to gain visibility and control of your organization’s security posture and answer fundamental  questions of “what, who,  when,  where,  how, and what do I do next.” A “single source of truth”  can help security teams answer these questions quickly  and effectively,  helping make better-informed  security decisions.

    Speaker

    Photo Speaker Name Profile
    Robin Crohns Robin Crohns View Profile
  • Thu 20th Sep 11:00 - 12:10
  • Bytesize Panel Add to Schedule Tech Leaders  |  Keynote

    Keynote Theatre

    Thu 20th Sep 11:00 to 12:10

    Bytesize Panel

    The IP EXPO Bytesize panels are designed to give attendees an executive overview of the latest trends in IT. Four panellists, each a leading expert in their respective field, will each share a bite sized overview of a given topic during one education packed session. The sessions are designed to be interactive so attendees plus our social followers will have the opportunity to ask their questions to the panel in an extended Q&A.
     

    Speakers

    Photo Speaker Name Profile
    Erik Beijnoff Erik Beijnoff View Profile
    Eveline Oehrlich Eveline Oehrlich View Profile
    Martin Thunman Martin Thunman View Profile
    Renee Lung Renee Lung View Profile
  • Predictive security in a changing world Add to Schedule Erkan Djafer  |   Cisco  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Thu 20th Sep 11:00 to 11:30

    Predictive security in a changing world

    The internet can no longer be viewed as a static entity, it is by its very nature a living organism. It grows and evolves just like a human being. Most security today focuses on static protection, a living dynamic entity such as the internet requires protection that also lives and grows dynamically. This presentation will cover megatrends in security, including how the evolution makes it more difficult to protect us and what predictive security intelligence can do to cope with the modern threats that lie ahead.

    Speaker

    Photo Speaker Name Profile
    Erkan Djafer Erkan Djafer View Profile
  • DRaaS – Flexible, Channel focused Business Continuity for Profit Minded MSP’s Add to Schedule Tech Leaders  |  Cyber Strategies

    Cyber Strategies Theatre

    Thu 20th Sep 11:00 to 11:30

  • People and Passwords Add to Schedule Pedro Martins  |   LastPass by LogMeIn  |   Cyber Technologies

    Cyber Technologies Theatre

    Thu 20th Sep 11:00 to 11:30

    Speaker

    Speaker Name Profile
    Pedro Martins View Profile
  • Thu 20th Sep 11:40 - 12:10
  • Brought to you by Microsoft Add to Schedule

    Cyber Strategies Theatre

    Thu 20th Sep 11:40 to 12:10

  • ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts Add to Schedule Ian Evans  |   OneTrust   |   Cyber Technologies

    Cyber Technologies Theatre

    Thu 20th Sep 11:40 to 12:10

    ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts

    Together, security and privacy teams share a common goal: Protect the organization from reputational damage, lawsuits, and regulatory trouble. On one hand, ISO 27001 focuses on the assessment of risks and protection of the organization. On the other, the GDPR aims to assess and protect the rights and freedoms of individuals. With a joint goal in mind, it is crucial that security and privacy teams work together to develop a common language that produces greater productivity and takes advantage of collective efforts. In this session, OneTrust will present findings from research conducted in cooperation with the International Association of Privacy Professionals (IAPP), sharing how ISO 27001 and the GDPR overlap, as well as how security and privacy teams can work together to become more effective.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Thu 20th Sep 13:20 - 13:50
  • How to Recover from a Ransomware Infection; LIVE! Add to Schedule

    Cyber Strategies Theatre

    Thu 20th Sep 13:20 to 13:50

  • Thu 20th Sep 14:00 - 14:30
  • Microsoft Keynote - Digital Transformation & Future of Work Add to Schedule

    Keynote Theatre

    Thu 20th Sep 14:00 to 14:30

  • Effortless Protection Against the Latest Security Threats Add to Schedule Imran Idrees  |   Cisco Meraki   |   Cyber Strategies

    Cyber Strategies Theatre

    Thu 20th Sep 14:00 to 14:30

    Effortless Protection Against the Latest Security Threats

    Cyber security threats, particularly new ones, are probably the cause of multiple hours of lost sleep for many IT executives and business owners. Most victims of recent high-profile vulnerabilities were broadly as a result of outdated threat signature libraries. Join us in this session to discover how Cisco Meraki’s solution, integrated with renowned industry-leading security groups such as Talos and Snort, can seamlessly protect your organisation against the latest security vulnerabilities.

    Attendees will receive a free Cisco Meraki Security Appliance

    Speaker

    Speaker Name Profile
    Imran Idrees View Profile
  • Thu 20th Sep 15:00 - 15:30
  • Panel: The Year Ahead Add to Schedule

    Keynote Theatre

    Thu 20th Sep 15:00 to 15:30

    Panel: The Year Ahead

    Elections throw up interesting issues, and following the Swedish election in September this is bound to be a fascinating session by industry leaders looking ahead to what 2019 might bring for the tech market.

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top