Agenda

Browse event agenda and watch insightful presentations.

Time

We found 35 sessions that match your criteria

LOKE

13 October

07:30 - 08:10
Other
Registration Starts

Registration starts with morning breakfast to all conference participants

08:10 - 08:30
Other
Chairman Opening Remarks

Official opening of the conference

08:30 - 08:50
Keynote
Powered by
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats?

Critical infrastructure requires different aspects for risk management to be considered and enforce different priorities when designing the infrastructure due to potential impact from failures, but still the basics of cyber security remain the same.

09:00 - 09:30
Keynote
Swedish National Security in a global business perspective

This presentation will explore how the "New Swedish National Security Protection Act" is putting a lot of demands on those who are engaged in “Security sensitive activities”

09:30 - 09:50
Keynote
How to allow change and stay secure: A case study of the Swedish Police Authority

In this session, Christian talks about the challenges facing the Swedish Police authority. Due to the nature of police work modern tools, high availability and mobility is needed without compromising information security and confidentiality.

09:50 - 10:20
Keynote
Powered by
1500+ Cyber Investigations Later: Trends To Beware

With over 1,500 cyber incidents investigated worldwide in 2019 across a wide range of industries, Andrew will deep dive into the growing sophistication and latest threats, as well as actionable steps to strengthen preparedness, detection and response within your organisations.

10:20 - 10:40
Break
10:40 - 11:10
Breakout
Powered by
Automated Penetration Testing: The Latest Advance in Security Validation

In this session Sivan will discuss the value Automated Penetration Testing brings by enabling continuous risk validation and raising and maintaining your cyber resilience to the highest level.

11:10 - 11:40
Breakout
Powered by
Device Visibility and Control: Build and Deploy Network Segmentation at Scale

The mass expansion and proliferation of IT, IoT and OT devices poses new questions to network security: Legacy and vulnerable devices, non-compliant and misconfigured endpoints, and IoT and OT devices must all be identified.

11:40 - 12:10
Keynote
Powered by
It’s time to rethink your model: Sassy new ideas

The future of network security is in the cloud! - There have been several major shifts in computing technology, networking, mobility and cloud.

12:10 - 13:00
Lunch Break
Lunch Break & One-to-One Meetings

Networking between conference participants via onsite one-to-one meetings and 1-1 Chatts during the lunch break

13:00 - 14:20
Other
“When can we achieve sufficient efficiency? With infinite ways of breaching security how do we implement countermeasures to be secure enough?”- Round Table Discussion

It is hard to keep track of our it-environment as new initiatives are taken, transformation to cloud and mobility is constantly moving. A discussion about how we manage to take control over a complex situation and how we decide what countermeasures are needed to obtain adequate security.

13:00 - 14:20
Other
Powered by
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats? - Round Table Discussion

During the round table discussions John will use the ENISA definition of security measures for operators of essential services (OES) to discuss what best practice and baseline security measures to be applied and relate it to our joint experience from working with cyber security.

13:00 - 14:20
Other
Powered by
TIBER EU, the European framework for Threat Intelligence-based Ethical Red Teaming - Round Table Discussion

The TIBER-EU has been developed by the European Central Bank. The purpose is to establish a common framework for testing, and improving, resilience against sophisticated cyber attacks.

13:00 - 14:20
Other
Powered by
Cloud requirements and opportunities - how can technology, law and business meet? - Round Table Discussion

13:00 - 14:20
Other
Powered by
How Should Security Leaders Embrace the Intertwining of Compliance, Privacy, and Cybersecurity? - Round Table Discussion

We’re seeing a deeper convergence of compliance, privacy, and cybersecurity as key elements of a core business strategy. This round table will explore whether security leaders are equipped to support the business and how security can influence other areas of the business without posing obstacles.

13:00 - 14:20
Other
Penetration testing: Godsend or necessary evil? - Round Table Discussion

The expansion of regulatory frameworks in multiple domains (e.g. PSD2, NIS, GDPR) had led to increased focus in how organizations manage their Information Security and how they verify that they deploy effective controls.

13:00 - 14:20
Other
Powered by
Information Security Awareness & Training Initiatives - Round Table Discussion

In this round table session, Secana will explore information security awareness and cyber hygiene as a mean to improve cyber security within organizations and, by extension, in society at large.

13:00 - 14:20
Other
Powered by
Security and Compliance - Round Table Discussion

Many regulations and contractual requirements are addressing information and cyber security requirements. The session has ISO 27000 series as a possible base.

14:20 - 14:40
Break
Coffee Break & Networking In The Expo Area

Afternoon Networking Coffee Break

14:40 - 15:00
Keynote
“Tax by design – the Swedish model goes tech”

15:00 - 15:45
Panel
New Technologies and the changing Cyber Security Landscape

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

15:00 - 15:45
Panel
New Technologies and the changing Cyber Security Landscape

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

15:00 - 15:45
Panel
New Technologies and the changing Cyber Security Landscape

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

15:45 - 16:15
Keynote
Navigating the landscape of global regulatory developments for Data Protection and Privacy; Finding a path in a global company

More than a year on from GDPR, one could assume we all know what is needed and are implementing it all flawlessly? Are we really? Or has GDPR triggered a global evolution on data privacy regulatory reform? And do we know how to handle it? Or Who to handle it? Or who is best to handle it?

16:15 - 16:45
Keynote
Powered by
Privilege Access Management Applied to Industrial IT-OT Processes

A photograph of the current challenges in adapting Cybersecurity policies and discipline across the continuum of IT and OT. Existing risks and vulnerabilities in extending the perimeter of Cybersecurity protection across operating environments in critical infrastructures, factories & office space.

16:45 - 16:55
Other
Event Chairman's Closing Remarks

16:55 - 18:30
Networking Break

TOR1

10:40 - 11:10
Breakout
TBA

TBA

10:40 - 11:10
Breakout
Powered by
TBA

11:10 - 11:40
Breakout
Powered by
Risk Exchanges: The Key to Vendor Risk Management Efficiency

Your vendors often handle your most sensitive data. This presents new challenges as third-party risk, security, privacy, legal and IT teams struggle to vet and manage the vendors they rely on most.

TOR2

10:40 - 11:10
Breakout
TBA

TBA

11:10 - 11:40
Breakout
TBA

TBA

EMBLA

10:40 - 11:10
Breakout
TBA

TBA

11:10 - 11:40
Breakout
TBA

TBA