19 - 20 SEPTEMBER 2018 / Stockholmsmässan

Here is a list of all confirmed Seminars for 2018. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 19th Sep 10:00 - 10:30
  • Four keys to tackle software vulnerabilities in commercial and in-house software Add to Schedule Jeroen Braak  |   Flexera   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 10:00 to 10:30

    Four keys to tackle software vulnerabilities in commercial and in-house software

    The world shifted to a paradigm that accepts that breaches will inevitably happen and they need to be detected and responded to in a more efficient fashion. However, the need and cost-effectiveness of prevention is still a reality that organizations have not been able to master, and application vulnerabilities remain at the top of security professionals concerns.

    With more than 50 new vulnerabilities disclosed every day in commercial software, it’s hard to stay focused and be effective. When you add vulnerabilities being introduced in the code being written in-house, the task just becomes unfeasible. Join us for this talk about how visibility, curation, prioritization and automation kick in for security, operations and engineering to work together towards a more secure software supply chain.

    Speaker

    Speaker Name Profile
    Jeroen Braak View Profile
  • PAM: The critical missing piece in your security strategy Add to Schedule Chris Clarkson  |   Bomgar   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 10:00 to 10:30

    PAM: The critical missing piece in your security strategy

    Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM).

    This session will cover what ‘privilege’ means to your business and how implementing a PAM solution drives significant improvements across the organisation. It will discuss:

    -        Why organisations should make PAM their top 2019 investment

    -        Why quickly controlling and automating key PAM capabilities is critical to your organisation’s success

    -        Tools to prepare the business case for your PAM project and to get Executive Leadership buy in

    Speaker

    Photo Speaker Name Profile
    Chris Clarkson Chris Clarkson View Profile
  • Wed 19th Sep 11:00 - 11:30
  • Zero Trust & The Flaming Sword of Justice Add to Schedule Dave Lewis  |   Duo Security  |   Keynote

    Keynote Theatre

    Wed 19th Sep 11:00 to 11:30

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 
The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify. 

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Predictive security in a changing world Add to Schedule Erkan Djafer  |   Cisco  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 11:00 to 11:30

    Predictive security in a changing world

    The internet can no longer be viewed as a static entity, it is by its very nature a living organism. It grows and evolves just like a human being. Most security today focuses on static protection, a living dynamic entity such as the internet requires protection that also lives and grows dynamically. This presentation will cover mega trends in security, including how the evolution makes it more difficult to protect us and what predictive security intelligence can do to cope with the modern threats that lie ahead.

    Speaker

    Photo Speaker Name Profile
    Erkan Djafer Erkan Djafer View Profile
  • HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS Add to Schedule Gavin Jay  |   CrowdStrike   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 11:00 to 11:30

    HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS

    This session explores the evolution of threats- from discrete criminal events to an offensive weapon. We’ll lift the lid on the latest attack techniques, adopted by nation state actors, which invariably find their way into the mainstream criminal world and are therefore an indicator of what to prepare for.
    Gavin will reference who the most active and advanced adversaries are, what attack vectors they typically employ, and how we can apply this intelligence to prevent, protect and respond.  Using simulated attack scenarios and personal examples of the speaker’s experience, attendees will learn how to spot indicators of compromise and attack, and how to safeguard their organisation accordingly.

    What attendees will learn:

    • How nation-state threats are crafted and how their Tactics, Techniques, and Procedures (TTPs) help identify them from more routine advanced attacks
    • Who are today’s most notable adversaries and the key European security themes based on the latest intelligence compiled across CrowdStrike’s global intelligence gathering operation
    • What are the indicators of attack and how you can apply them to defeat the adversary?

    Speaker

    Photo Speaker Name Profile
    Gavin Jay Gavin Jay View Profile
  • Channel Focused BDR Solution – Replibit DRaaS - Chain Free Backup! Add to Schedule Josh Chrisman  |   eFolder/Axcient  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 11:00 to 11:30

  • Wed 19th Sep 11:40 - 12:10
  • The Intrapreneurs’ Survival Guide: The 10 questions every Intrapreneur should be ready to answer Add to Schedule Brian Curran  |   Oracle  |   Keynote

    Keynote Theatre

    Wed 19th Sep 11:40 to 12:10

    The Intrapreneurs’ Survival Guide: The 10 questions every Intrapreneur should be ready to answer

    Congratulations! You’ve volunteered (or you’ve been volunteered) to lead innovation in your company. Now comes the hard part. Your organization, despite its best intentions and efforts, may not be well designed to embrace innovation and the people who are changing “business as usual”. We know innovation is hard, so Intrapreneurs need a survival guide.

    Join Oracle's Brian J. Curran, Vice President of Innovation & Design, as he shares the 10 Questions every intrapreneur must be prepared to answer in order to survive the corporate gauntlet trying to kill them and their innovations.

    Speaker

    Photo Speaker Name Profile
    Brian Curran Brian Curran View Profile
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule Suzette Loubser  |   Darktrace  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 11:40 to 12:10

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    In this session Suzette will discuss:

    ·         Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats

    ·         How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time

    ·         How to achieve 100% visibility of your entire business including cloud, network and IoT environments

    ·         Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk

    ·         Real-world examples of subtle, unknown threats that routinely bypass traditional controls

    Speaker

    Photo Speaker Name Profile
    Suzette Loubser Suzette Loubser View Profile
  • Turtles, Trust and the Future of Cybersecurity Add to Schedule Jeremy Agenais  |   Varonis   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 11:40 to 12:10

    Turtles, Trust and the Future of Cybersecurity

    Faith in our institutions is collapsing, and GDPR is here. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world?  It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.

    Speaker

    Photo Speaker Name Profile
    Jeremy Agenais Jeremy Agenais View Profile
  • Wed 19th Sep 13:20 - 13:50
  • The future of authentication. Secure passwordless login for employees and customers. Add to Schedule Claire Galbois-Alcaix  |   Yubico   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 13:20 to 13:50

    The future of authentication. Secure passwordless login for employees and customers.

    Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?

    Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?

    This session will change your perceptions and eventually protect your online accounts.

    Speaker

    Photo Speaker Name Profile
    Claire Galbois-Alcaix Claire Galbois-Alcaix View Profile
  • People and Passwords Add to Schedule Pedro Martins  |   LastPass by LogMeIn  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 13:20 to 13:50

    People and Passwords

    Despite the increased use of two-factor authentication, single sign-on, and biometrics, passwords are still the most common form of authentication. In the first analyst report on Enterprise Password Management (EPM), Forrester acknowledged the password problem and the risks that they present to businesses.

    In this talk, we will look at why employees still use weak passwords despite knowing the risks and provide guidance for security and IT professionals on keeping password costs and risks under control, without losing employee buy-in.

    Speaker

    Photo Speaker Name Profile
    Pedro Martins Pedro Martins View Profile
  • Wed 19th Sep 14:00 - 14:30
  • GDPR - the calm after the storm Add to Schedule Karen Lawrence Öqvist  |   Privasee  |   Keynote

    Keynote Theatre

    Wed 19th Sep 14:00 to 14:30

    GDPR - the calm after the storm

    The 25th May has come and gone, but the storm is still in full swing. What is there more to do? How long will it last? And what kind of animal will privacy compliance within the EU -and beyond- grow into over the next 5 years?
     
    Privasee was the ‘first on the block’ founded to address the 6 most important words in the GDPR, “data protection by design by default”. Karen Lawrence Öqvist is founder/CEO and calls herself a ‘Privacy Practitioner’. She is a privacy advocate, author and speaker. She has hosted a privacy blog since 2007, published 2 books: ‘Virtual Shadows: Your Privacy in the Information Society’ (published by the British Computer Society, 2009), and ‘A Hands on Approach to GDPR Compliance’ (International Association of Privacy Professionals, 2018).

    Speaker

    Photo Speaker Name Profile
    Karen Lawrence Öqvist Karen Lawrence Öqvist View Profile
  • Common encryption myths busted Add to Schedule Jörgen Jansson  |   Gemalto  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 14:00 to 14:30

    Common encryption myths busted

    The Session will give you a updated view on what is going on in the information security space today when it comes to encryption. We will discuss incidents in the region and some global events that gives a good perspective on what is about to come. We will explain why we keep ignore the usage of basic security techniques and we will present a suggestion on how encryption can be deployed internally, externally and in the cloud.

    Speaker

    Photo Speaker Name Profile
    Jörgen Jansson Jörgen Jansson View Profile
  • HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS Add to Schedule Gavin Jay  |   CrowdStrike   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 14:00 to 14:30

    HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS

    This session explores the evolution of threats- from discrete criminal events to an offensive weapon. We’ll lift the lid on the latest attack techniques, adopted by nation state actors, which invariably find their way into the mainstream criminal world and are therefore an indicator of what to prepare for.

    Gavin will reference who the most active and advanced adversaries are, what attack vectors they typically employ, and how we can apply this intelligence to prevent, protect and respond.  Using simulated attack scenarios and personal examples of the speaker’s experience, attendees will learn how to spot indicators of compromise and attack, and how to safeguard their organisation accordingly.

    What attendees will learn:

    • How nation-state threats are crafted and how their Tactics, Techniques, and Procedures (TTPs) help identify them from more routine advanced attacks
    • Who are today’s most notable adversaries and the key European security themes based on the latest intelligence compiled across CrowdStrike’s global intelligence gathering operation
    • What are the indicators of attack and how you can apply them to defeat the adversary?

    Speaker

    Photo Speaker Name Profile
    Gavin Jay Gavin Jay View Profile
  • Wed 19th Sep 15:00 - 15:30
  • Work Smart and Stay Safe Add to Schedule Pritam Pabla  |   Google  |   Keynote

    Keynote Theatre

    Wed 19th Sep 15:00 to 15:30

    Work Smart and Stay Safe

    Google Chrome Enterprise offers proactive protections, granular policy controls and continuous vulnerability management. Join us to learn how to protect users and data at every cloud entry point with Chrome OS and Chrome Browser.

    Speaker

    Photo Speaker Name Profile
    Pritam Pabla Pritam Pabla View Profile
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Peter Wilson  |   Onetrust  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 15:00 to 15:30

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations is upon us, security and compliance professionals must make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Speaker Name Profile
    Peter Wilson View Profile
  • Privileged Account Management, Ensuring Least Privilege – a highly practical guide Add to Schedule Scott Shields  |   Thycotic Software   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 15:00 to 15:30

    Privileged Account Management, Ensuring Least Privilege – a highly practical guide

    Recent reports show 85% of reported breaches involve compromised endpoints, and 80% of breaches involve Privileged Credentials. Traditional Antivirus and Anti-malware blacklisting can’t keep up with new and advanced threats targeting desktops, laptops and servers. Whilst if you are storing privileged account passwords and credentials in spreadsheets, you will have no doubt this poses a serious security risk.
     
    Join us as we take you through a number of tools and techniques that you can implement in order to quickly cut down your excess privilege exposure and take back full control of your most precious and important privileged accounts. Register today!
     

    Speaker

    Photo Speaker Name Profile
    Scott Shields Scott Shields View Profile
  • Wed 19th Sep 15:40 - 16:10
  • AI and security Add to Schedule Daniel Akenine  |   Microsoft  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Wed 19th Sep 15:40 to 16:10

    AI and security

    We are as a society giving more and more power to algorithms and AI. They will fly our planes and drive our vehicles, they will do surgery and take care of your money. What are the challenges for security and privacy when it comes to AI and what can we do to address them?

    Speaker

    Photo Speaker Name Profile
    Daniel Akenine Daniel Akenine View Profile
  • The Secret World of the Formula 1 pit lane Add to Schedule Marc Priestley   |   Independent  |   Keynote

    Keynote Theatre

    Wed 19th Sep 15:40 to 16:10

    The Secret World of the Formula 1 pit lane

    Marc spent ten years as a mechanic on the McLaren Formula One pit crew. Looking at every aspect of F1, he explains the communication, teamwork, pressure and strategy to secure marginal gains. With each car generating 10mb of data per lap, analysts look ever more closely at competitors’ decisions in an effort to optimise their own team performance. Marc also provides insight for Sky Sports, and is part of the ITV team covering the electrically-powered Formula E, showcasing the latest British racing technology.

    Speaker

    Photo Speaker Name Profile
    Marc Priestley Marc Priestley View Profile
  • The importance of Data Availability and Data Recovery Add to Schedule Helen McHugh  |   eFolder/Axcient  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Wed 19th Sep 15:40 to 16:10

    Speaker

    Photo Speaker Name Profile
    Helen McHugh Helen McHugh View Profile
  • Thu 20th Sep 09:00 - 09:50
  • The State of Hacking & Cybercrime Add to Schedule Samy Kamkar  |   Independent  |   Keynote

    Keynote Theatre

    Thu 20th Sep 09:00 to 09:50

    The State of Hacking & Cybercrime

    Samy Kamkar: Fun, Fascinating, Terrifying

     

    Meet the man who changed the internet forever.

     

    Best known for creating the fastest spreading virus of all time, the MySpace Worm, Samy Kamkar is a cyber security expert whose work is cited by the NSA, triggers hearings on Capitol Hill, and is used as the basis for security advancements across virtually all web browsers, smartphones, and other technologies. He is speaking at IP EXPO Nordic about the insecurities in every day technologies in his seminar “The State of Hacking and Cyber Crime” which is described as revealing something fun, fascinating and terrifying. Expect eye opening live hacks, demonstrations, audience involvement from the hacker that changed the internet forever.

    Speaker

    Photo Speaker Name Profile
    Samy Kamkar Samy Kamkar View Profile
  • Thu 20th Sep 10:00 - 10:30
  • The utopian trap: (Dis)information and (fake) news on the Nordics Add to Schedule Carl Marklund  |   Sodertorn University  |   Keynote

    Keynote Theatre

    Thu 20th Sep 10:00 to 10:30

    The utopian trap: (Dis)information and (fake) news on the Nordics

    Being small, the Nordic countries are dependent upon their international reputation of being prosperous and peaceful. Not only for attracting global business and media, but for their self-identity. However, this also means the Nordics are extra sensitive to (dis)information and (fake) news that contradict this sometimes ”utopian” image abroad. News on the Nordics go viral when they confront, rather than confirm, the positive reputation. While some of this reporting reflects actual problems and real challenges, there is also growing evidence that the Nordics – Sweden in particular – attract disinformation efforts, primarily due to their ”progressive” reputation internationally, but also polarization domestically.

    Speaker

    Photo Speaker Name Profile
    Carl Marklund Carl Marklund View Profile
  • Solve your Security Challenges with Splunk Add to Schedule Simon Odgen  |   Splunk   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 10:00 to 10:30

    Solve your Security Challenges with Splunk

    Do you need ways to gain visibility and control of your organization’s security posture and answer fundamental  questions of “what, who,  when,  where,  how, and what do I do next.” A “single source of truth”  can help security teams answer these questions quickly  and effectively,  helping make better-informed  security decisions.

    Speaker

    Photo Speaker Name Profile
    Simon Odgen Simon Odgen View Profile
  • ONE product to cover ALL your security needs! Add to Schedule Martin Hansen  |   Bitdefender  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Thu 20th Sep 10:00 to 10:30

    ONE product to cover ALL your security needs!

    GravityZone is automatically trained based on trillions of samples from more than 500 million endpoints worldwide. Regardless of how much a malware is modified, Bitdefender can detect these new patterns. A zero-trust policy ensures all running processes are monitored and stops ransomware activities in their tracks.

    Speaker

    Photo Speaker Name Profile
    Martin Hansen Martin Hansen View Profile
  • Thu 20th Sep 11:00 - 12:10
  • Bytesize Panel – Future Trends: Blockchain, Machine Learning, DevOps Culture, Edge Computing Add to Schedule Tech Leaders  |  Keynote

    Keynote Theatre

    Thu 20th Sep 11:00 to 12:10

    Bytesize Panel – Future Trends: Blockchain, Machine Learning, DevOps Culture, Edge Computing

    The IP EXPO Bytesize panels are designed to give attendees an executive overview of the latest trends in IT. Four panellists, each a leading expert in their respective field, will each share a bite sized overview of a given topic during one education packed session. The sessions are designed to be interactive so attendees plus our social followers will have the opportunity to ask their questions to the panel in an extended Q&A.
     

    Panelists:

    • Erik Beijnoff - Blockchain
    • Neil Macgowan - Machine Learning
    • Renee Lung - DevOps Culture
    • Martin Thunman - Edge computing

    Speakers

    Photo Speaker Name Profile
    Erik Beijnoff Erik Beijnoff View Profile
    Martin Thunman Martin Thunman View Profile
    Neil MacGowan Neil MacGowan View Profile
    Renee Lung Renee Lung View Profile
  • Predictive security in a changing world Add to Schedule Erkan Djafer  |   Cisco  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Thu 20th Sep 11:00 to 11:30

    Predictive security in a changing world

    The internet can no longer be viewed as a static entity, it is by its very nature a living organism. It grows and evolves just like a human being. Most security today focuses on static protection, a living dynamic entity such as the internet requires protection that also lives and grows dynamically. This presentation will cover megatrends in security, including how the evolution makes it more difficult to protect us and what predictive security intelligence can do to cope with the modern threats that lie ahead.

    Speaker

    Photo Speaker Name Profile
    Erkan Djafer Erkan Djafer View Profile
  • DRaaS – Flexible, Channel focused Business Continuity for Profit Minded MSP’s Add to Schedule Tech Leaders  |  Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 11:00 to 11:30

  • People and Passwords Add to Schedule Pedro Martins  |   LastPass by LogMeIn  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Thu 20th Sep 11:00 to 11:30

    People and Passwords

    Despite the increased use of two-factor authentication, single sign-on, and biometrics, passwords are still the most common form of authentication. In the first analyst report on Enterprise Password Management (EPM), Forrester acknowledged the password problem and the risks that they present to businesses.

    In this talk, we will look at why employees still use weak passwords despite knowing the risks and provide guidance for security and IT professionals on keeping password costs and risks under control, without losing employee buy-in.

    Speaker

    Photo Speaker Name Profile
    Pedro Martins Pedro Martins View Profile
  • Thu 20th Sep 11:40 - 12:10
  • Dark Markets, economics of the Cybersecurity threat landscape Add to Schedule Thoralf Storulv  |   Microsoft  |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 11:40 to 12:10

    Dark Markets, economics of the Cybersecurity threat landscape

    Cyber attacks are bought and sold on the Dark Market. In this session Microsoft will give you their insights into the Dark Markets. Who are the Dark Market actors? What motivates them? What is the price of an attack?

    Speaker

    Photo Speaker Name Profile
    Thoralf Storulv Thoralf Storulv View Profile
  • ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts Add to Schedule Jacob Eborn  |   OneTrust   |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Thu 20th Sep 11:40 to 12:10

    ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts

    Together, security and privacy teams share a common goal: Protect the organization from reputational damage, lawsuits, and regulatory trouble. On one hand, ISO 27001 focuses on the assessment of risks and protection of the organization. On the other, the GDPR aims to assess and protect the rights and freedoms of individuals. With a joint goal in mind, it is crucial that security and privacy teams work together to develop a common language that produces greater productivity and takes advantage of collective efforts. In this session, OneTrust will present findings from research conducted in cooperation with the International Association of Privacy Professionals (IAPP), sharing how ISO 27001 and the GDPR overlap, as well as how security and privacy teams can work together to become more effective.

    Speaker

    Photo Speaker Name Profile
    Jacob Eborn Jacob Eborn View Profile
  • Thu 20th Sep 13:20 - 13:50
  • How to Recover from a Ransomware Infection; LIVE! Add to Schedule Ben Jenkins   |   Datto   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 13:20 to 13:50

    How to Recover from a Ransomware Infection; LIVE!

    Are you sick and tired of liquid nitrogen freezing your servers and plunging your business into downtime? Do sub-zero temperatures destroy your data, cool your customers and put a crack in your profits?! Yep, we thought so. Come along to our session and see how we recover a ransomware-infected, frozen server in a matter of seconds! It’s enough to give anyone the goosebumps! Our platform is built specifically for MSPs and we have the answers you need! Wrap up warm: this is a demo you won’t want to miss!

    Speaker

    Photo Speaker Name Profile
    Ben Jenkins Ben Jenkins View Profile
  • Confessions of a Hacker – Under the Hoodie Add to Schedule Magnus Jansson  |   Rapid7  |   Cyber Security Technologies

    Cyber Security Technologies Theatre

    Thu 20th Sep 13:20 to 14:10

    Confessions of a Hacker – Under the Hoodie

    In this revealing session discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today. Low tech and high tech methods will be presented in an effort to help attendees understand the true level of risk faced by their organizations and where the gaps may be in their defence perimeter.

    Speaker

    Photo Speaker Name Profile
    Magnus Jansson Magnus Jansson View Profile
  • Thu 20th Sep 14:00 - 14:30
  • Microsoft Keynote - Digital Transformation for real Add to Schedule Annica Wallenbro Stojcevski  |   Microsoft  |   Keynote

    Keynote Theatre

    Thu 20th Sep 14:00 to 14:30

    Microsoft Keynote - Digital Transformation for real

    We have all learnt a lot during the past years in the Digital Transformation era. How to make change to be a natural part of everyday business, to constant adapt to new technologies, to create real value and the most important part – how to get going. During this session we share our learnings and insights on how companies and organisations in the Nordics are winning with solutions built on Microsoft AI. Making it real.

    Speaker

    Photo Speaker Name Profile
    Annica Wallenbro Stojcevski Annica Wallenbro Stojcevski View Profile
  • Effortless Protection Against the Latest Security Threats Add to Schedule Imran Idrees  |   Cisco Meraki   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 14:00 to 14:30

    Effortless Protection Against the Latest Security Threats

    Cyber security threats, particularly new ones, are probably the cause of multiple hours of lost sleep for many IT executives and business owners. Most victims of recent high-profile vulnerabilities were broadly as a result of outdated threat signature libraries. Join us in this session to discover how Cisco Meraki’s solution, integrated with renowned industry-leading security groups such as Talos and Snort, can seamlessly protect your organisation against the latest security vulnerabilities.

    Attendees will receive a free Cisco Meraki Security Appliance

    Speaker

    Photo Speaker Name Profile
    Imran Idrees Imran Idrees View Profile
  • Thu 20th Sep 15:00 - 16:00
  • Bytesize panel – The year ahead: GDPR, Digital Transformation, Security Breaches and more Add to Schedule Tech Leaders  |  Keynote

    Keynote Theatre

    Thu 20th Sep 15:00 to 16:00

    Bytesize panel – The year ahead: GDPR, Digital Transformation, Security Breaches and more

    Elections throw up interesting issues, and following the Swedish election in September this is bound to be a fascinating session by industry leaders looking ahead to what 2019 might bring for the tech market.

    Panellists: John Rakowski, Philip Appleton, Thomas Sundstrom, Ian Evans

    Speakers

    Photo Speaker Name Profile
    Jacob Eborn Jacob Eborn View Profile
    John Rakowski John Rakowski View Profile
    Philip Appleton View Profile
    Tomas Sundstrom Tomas Sundstrom View Profile
  • Cyber security, the human element Add to Schedule Ragnar Sigurdsson  |   AwareGo   |   Cyber Security Strategies

    Cyber Security Strategies Theatre

    Thu 20th Sep 15:00 to 15:30

    Cyber security, the human element

    Technical solutions are just not enough these days, with employee manipulation and mistakes a part of up to 95% of breaches, IT cannot look past the need for security awareness.

    Speaker

    Photo Speaker Name Profile
    Ragnar Sigurdsson Ragnar Sigurdsson View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top