IT Security Insights 2020

virtual event

13 October 2020

07:30 - 18:30

Hybrid Event, Sweden

Add to calendar 10/13/2020 07:30 10/13/2020 18:30 Europe/Bucharest IT Security Insights 2020 Welcome to the 4th Edition of the IT Security Insights 2020.  It is a great pleasure to have you on this year's edition as it might well be the most important one so far. As we are still in the middle of the COVID-19 O Pandemic, many wonder how society and business will look like in a year. 
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

Presentations

This event has 4 different presentation tracks. Browse each track to find useful & interesting resources.

07:30 - 08:10 | Other

Registration Starts

Registration starts with morning breakfast to all conference participants

add to calendar 10/13/2020 07:30 10/13/2020 08:10 Europe/Bucharest IT Security Insights 2020 - Registration Starts Registration starts with morning breakfast to all conference participants
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

08:10 - 08:30 | Other

Chairman Opening Remarks

Official opening of the conference

add to calendar 10/13/2020 08:10 10/13/2020 08:30 Europe/Bucharest IT Security Insights 2020 - Chairman Opening Remarks Official opening of the conference
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com
powered by

08:30 - 08:50 | Keynote

Cyber Security for critical infrastructure: How to prepare and respond to cyber threats?

Critical infrastructure requires different aspects for risk management to be considered and enforce different priorities when designing the infrastructure due to potential impact from failures, but still the basics of cyber security remain the same.

add to calendar 10/13/2020 08:30 10/13/2020 08:50 Europe/Bucharest IT Security Insights 2020 - Cyber Security for critical infrastructure: How to prepare and respond to cyber threats? Critical infrastructure requires different aspects for risk management to be considered and enforce different priorities when designing the infrastructure due to potential impact from failures, but still the basics of cyber security remain the same.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

09:00 - 09:30 | Keynote

Swedish National Security in a global business perspective

This presentation will explore how the "New Swedish National Security Protection Act" is putting a lot of demands on those who are engaged in “Security sensitive activities”

add to calendar 10/13/2020 09:00 10/13/2020 09:30 Europe/Bucharest IT Security Insights 2020 - Swedish National Security in a global business perspective This presentation will explore how the "New Swedish National Security Protection Act" is putting a lot of demands on those who are engaged in “Security sensitive activities”
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

09:30 - 09:50 | Keynote

How to allow change and stay secure: A case study of the Swedish Police Authority

In this sessio, Christian talks about the challenges facing the Swedish Police authority. Due to the nature of police work modern tools, high availability and mobility is needed without compromising information security and confidentiality. By combining information security and technical testing an

add to calendar 10/13/2020 09:30 10/13/2020 09:50 Europe/Bucharest IT Security Insights 2020 - How to allow change and stay secure: A case study of the Swedish Police Authority In this sessio, Christian talks about the challenges facing the Swedish Police authority. Due to the nature of police work modern tools, high availability and mobility is needed without compromising information security and confidentiality. By combining information security and technical testing an
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com
powered by

09:50 - 10:20 | Keynote

1500+ Cyber Investigations Later: Trends To Beware

With over 1,500 cyber incidents investigated worldwide in 2019 across a wide range of industries, Andrew will deep dive into the growing sophistication and latest threats, as well as actionable steps to strengthen preparedness, detection and response within your organisations.

add to calendar 10/13/2020 09:50 10/13/2020 10:20 Europe/Bucharest IT Security Insights 2020 - 1500+ Cyber Investigations Later: Trends To Beware With over 1,500 cyber incidents investigated worldwide in 2019 across a wide range of industries, Andrew will deep dive into the growing sophistication and latest threats, as well as actionable steps to strengthen preparedness, detection and response within your organisations.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

10:20 - 10:40 | Break

Coffee Break & Networking In The Expo Area

Coffee Break

powered by

10:40 - 11:10 | Breakout

Automated Penetration Testing: The Latest Advance in Security Validation

In this session Sivan will discuss the value Automated Penetration Testing brings by enabling continuous risk validation and raising and maintaining your cyber resilience to the highest level.

powered by

11:10 - 11:40 | Breakout

Device Visibility and Control: Build and Deploy Network Segmentation at Scale

The mass expansion and proliferation of IT, IoT and OT devices poses new questions to network security: Legacy and vulnerable devices, non-compliant and misconfigured endpoints, and IoT and OT devices must all be identified.

powered by

11:40 - 12:10 | Keynote

It’s time to rethink your model: Sassy new ideas

The future of network security is in the cloud! - There have been several major shifts in computing technology, networking, mobility and cloud.

add to calendar 10/13/2020 11:40 10/13/2020 12:10 Europe/Bucharest IT Security Insights 2020 - It’s time to rethink your model: Sassy new ideas The future of network security is in the cloud! - There have been several major shifts in computing technology, networking, mobility and cloud.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

12:10 - 13:00 | Lunch Break

Lunch Break & One-to-One Meetings

Networking between conference participants via onsite one-to-one meetings and 1-1 Chatts during the lunch break

powered by

13:00 - 14:20 | Other

TIBER EU, the European framework for Threat Intelligence-based Ethical Red Teaming - Round Table Discussion

The TIBER-EU has been developed by the European Central Bank. The purpose is to establish a common framework for testing, and improving, resilience against sophisticated cyber attacks.

add to calendar 10/13/2020 13:00 10/13/2020 14:20 Europe/Bucharest IT Security Insights 2020 - TIBER EU, the European framework for Threat Intelligence-based Ethical Red Teaming - Round Table Discussion The TIBER-EU has been developed by the European Central Bank. The purpose is to establish a common framework for testing, and improving, resilience against sophisticated cyber attacks.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com
powered by

13:00 - 14:20 | Other

Cloud requirements and opportunities - how can technology, law and business meet? - Round Table Discussion

add to calendar 10/13/2020 13:00 10/13/2020 14:20 Europe/Bucharest IT Security Insights 2020 - Cloud requirements and opportunities - how can technology, law and business meet? - Round Table Discussion
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com
powered by

13:00 - 14:20 | Other

How Should Security Leaders Embrace the Intertwining of Compliance, Privacy, and Cybersecurity? - Round Table Discussion

We’re seeing a deeper convergence of compliance, privacy, and cybersecurity as key elements of a core business strategy. This round table will explore whether security leaders are equipped to support the business and how security can influence other areas of the business without posing obstacles.

add to calendar 10/13/2020 13:00 10/13/2020 14:20 Europe/Bucharest IT Security Insights 2020 - How Should Security Leaders Embrace the Intertwining of Compliance, Privacy, and Cybersecurity? - Round Table Discussion We’re seeing a deeper convergence of compliance, privacy, and cybersecurity as key elements of a core business strategy. This round table will explore whether security leaders are equipped to support the business and how security can influence other areas of the business without posing obstacles.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

13:00 - 14:20 | Other

Penetration testing: Godsend or necessary evil? - Round Table Discussion

The expansion of regulatory frameworks in multiple domains (e.g. PSD2, NIS, GDPR) had led to increased focus in how organizations manage their Information Security and how they verify that they deploy effective controls.

add to calendar 10/13/2020 13:00 10/13/2020 14:20 Europe/Bucharest IT Security Insights 2020 - Penetration testing: Godsend or necessary evil? - Round Table Discussion The expansion of regulatory frameworks in multiple domains (e.g. PSD2, NIS, GDPR) had led to increased focus in how organizations manage their Information Security and how they verify that they deploy effective controls.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com
powered by

13:00 - 14:20 | Other

Information Security Awareness & Training Initiatives - Round Table Discussion

In this round table session, Secana will explore information security awareness and cyber hygiene as a mean to improve cyber security within organizations and, by extension, in society at large.

add to calendar 10/13/2020 13:00 10/13/2020 14:20 Europe/Bucharest IT Security Insights 2020 - Information Security Awareness & Training Initiatives - Round Table Discussion In this round table session, Secana will explore information security awareness and cyber hygiene as a mean to improve cyber security within organizations and, by extension, in society at large.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com
powered by

13:00 - 14:20 | Other

Security and Compliance - Round Table Discussion

Many regulations and contractual requirements are addressing information and cyber security requirements. The session has ISO 27000 series as a possible base.

add to calendar 10/13/2020 13:00 10/13/2020 14:20 Europe/Bucharest IT Security Insights 2020 - Security and Compliance - Round Table Discussion Many regulations and contractual requirements are addressing information and cyber security requirements. The session has ISO 27000 series as a possible base.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

13:00 - 14:20 | Other

“When can we achieve sufficient efficiency? With infinite ways of breaching security how do we implement countermeasures to be secure enough?”- Round Table Discussion

It is hard to keep track of our it-environment as new initiatives are taken, transformation to cloud and mobility is constantly moving. A discussion about how we manage to take control over a complex situation and how we decide what countermeasures are needed to obtain adequate security.

add to calendar 10/13/2020 13:00 10/13/2020 14:20 Europe/Bucharest IT Security Insights 2020 - “When can we achieve sufficient efficiency? With infinite ways of breaching security how do we implement countermeasures to be secure enough?”- Round Table Discussion It is hard to keep track of our it-environment as new initiatives are taken, transformation to cloud and mobility is constantly moving. A discussion about how we manage to take control over a complex situation and how we decide what countermeasures are needed to obtain adequate security.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com
powered by

13:00 - 14:20 | Other

Cyber Security for critical infrastructure: How to prepare and respond to cyber threats? - Round Table Discussion

During the round table discussions John will use the ENISA definition of security measures for operators of essential services (OES) to discuss what best practice and baseline security measures to be applied and relate it to our joint experience from working with cyber security.

add to calendar 10/13/2020 13:00 10/13/2020 14:20 Europe/Bucharest IT Security Insights 2020 - Cyber Security for critical infrastructure: How to prepare and respond to cyber threats? - Round Table Discussion During the round table discussions John will use the ENISA definition of security measures for operators of essential services (OES) to discuss what best practice and baseline security measures to be applied and relate it to our joint experience from working with cyber security.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

14:20 - 14:40 | Break

Coffee Break & Networking In The Expo Area

Afternoon Networking Coffee Break

14:40 - 15:00 | Keynote

“Tax by design – the Swedish model goes tech”

add to calendar 10/13/2020 14:40 10/13/2020 15:00 Europe/Bucharest IT Security Insights 2020 - “Tax by design – the Swedish model goes tech”
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

15:00 - 15:45 | Panel

New Technologies and the changing Cyber Security Landscape

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

add to calendar 10/13/2020 15:00 10/13/2020 15:45 Europe/Bucharest IT Security Insights 2020 - New Technologies and the changing Cyber Security Landscape Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

15:00 - 15:45 | Panel

New Technologies and the changing Cyber Security Landscape

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

add to calendar 10/13/2020 15:00 10/13/2020 15:45 Europe/Bucharest IT Security Insights 2020 - New Technologies and the changing Cyber Security Landscape Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

15:00 - 15:45 | Panel

New Technologies and the changing Cyber Security Landscape

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

add to calendar 10/13/2020 15:00 10/13/2020 15:45 Europe/Bucharest IT Security Insights 2020 - New Technologies and the changing Cyber Security Landscape Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

15:45 - 16:15 | Keynote

Navigating the landscape of global regulatory developments for Data Protection and Privacy; Finding a path in a global company

More than a year on from GDPR, one could assume we all know what is needed and are implementing it all flawlessly? Are we really? Or has GDPR triggered a global evolution on data privacy regulatory reform? And do we know how to handle it? Or Who to handle it? Or who is best to handle it?

add to calendar 10/13/2020 15:45 10/13/2020 16:15 Europe/Bucharest IT Security Insights 2020 - Navigating the landscape of global regulatory developments for Data Protection and Privacy; Finding a path in a global company More than a year on from GDPR, one could assume we all know what is needed and are implementing it all flawlessly? Are we really? Or has GDPR triggered a global evolution on data privacy regulatory reform? And do we know how to handle it? Or Who to handle it? Or who is best to handle it?
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com
powered by

16:15 - 16:45 | Keynote

Privilege Access Management Applied to Industrial IT-OT Processes

A photograph of the current challenges in adapting Cybersecurity policies and discipline across the continuum of IT and OT. Existing risks and vulnerabilities in extending the perimeter of Cybersecurity protection across operating environments in critical infrastructures, factories & office space.

add to calendar 10/13/2020 16:15 10/13/2020 16:45 Europe/Bucharest IT Security Insights 2020 - Privilege Access Management Applied to Industrial IT-OT Processes A photograph of the current challenges in adapting Cybersecurity policies and discipline across the continuum of IT and OT. Existing risks and vulnerabilities in extending the perimeter of Cybersecurity protection across operating environments in critical infrastructures, factories & office space.
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

16:45 - 16:55 | Other

Event Chairman's Closing Remarks

add to calendar 10/13/2020 16:45 10/13/2020 16:55 Europe/Bucharest IT Security Insights 2020 - Event Chairman's Closing Remarks
https://myconnector.ro/virtual/it-security-insights-2020/414
Hybrid Event info@itsecinsights.com

16:55 - 18:30 | Networking Break

Networking Cocktail Reception Starts

10:40 - 11:10 | Breakout

TBA

TBA

11:10 - 11:40 | Breakout

TBA

TBA

10:40 - 11:10 | Breakout

TBA

TBA

11:10 - 11:40 | Breakout

TBA

TBA

10:40 - 11:10 | Breakout

TBA

TBA

powered by

11:10 - 11:40 | Breakout

Risk Exchanges: The Key to Vendor Risk Management Efficiency

Your vendors often handle your most sensitive data. This presents new challenges as third-party risk, security, privacy, legal and IT teams struggle to vet and manage the vendors they rely on most.