Agenda

Browse event agenda and watch insightful presentations.

Time

We found 28 sessions that match your criteria

LOKE

13 October

07:30 - 08:10
Other
Registration Starts

Registration starts with morning breakfast for onsite conference participants

08:10 - 08:30
Other
Presented by
Chairman Opening Remarks

Official opening of the conference

08:30 - 08:50
Keynote
Presented by
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats?

Critical infrastructure requires different aspects for risk management to be considered and enforce different priorities when designing the infrastructure due to potential impact from failures, but still the basics of cyber security remain the same.

09:00 - 09:30
Keynote
Presented by
Swedish National Security in a global business perspective

This presentation will explore how the "New Swedish National Security Protection Act" is putting a lot of demands on those who are engaged in “Security sensitive activities”

09:30 - 09:50
Keynote
Presented by
How to allow change and stay secure: A case study of the Swedish Police Authority

In this session, Christian talks about the challenges facing the Swedish Police authority. Due to the nature of police work modern tools, high availability and mobility is needed without compromising information security and confidentiality.

09:50 - 10:20
Keynote
Presented by
1500+ Cyber Investigations Later: Trends To Beware

With over 1,500 cyber incidents investigated worldwide in 2019 across a wide range of industries, Andrew will deep dive into the growing sophistication and latest threats, as well as actionable steps to strengthen preparedness, detection and response within your organisations.

10:20 - 10:40
Break
11:40 - 12:10
Keynote
Presented by
It’s time to rethink your model: Sassy new ideas

The future of network security is in the cloud! - There have been several major shifts in computing technology, networking, mobility and cloud.

12:10 - 13:00
Lunch Break
Lunch Break & One-to-One Meetings

Peer-to-peer networking by both online delegates and onsite delegates. Visit the virtual Expo Area and explore our partners products/services.

13:00 - 15:20
Other
Presented by
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats? - Round Table Discussion

During the round table discussions John will use the ENISA definition of security measures for operators of essential services (OES) to discuss what best practice and baseline security measures to be applied and relate it to our joint experience from working with cyber security.

13:00 - 15:20
Other
Presented by
TIBER EU, the European framework for Threat Intelligence-based Ethical Red Teaming - Round Table Discussion

The TIBER-EU has been developed by the European Central Bank. The purpose is to establish a common framework for testing, and improving, resilience against sophisticated cyber attacks.

13:00 - 15:20
Other
Presented by
Cloud requirements and opportunities - how can technology, law and business meet? - Round Table Discussion

13:00 - 15:20
Other
Presented by
How Should Security Leaders Embrace the Intertwining of Compliance, Privacy, and Cybersecurity? - Round Table Discussion

We’re seeing a deeper convergence of compliance, privacy, and cybersecurity as key elements of a core business strategy. This round table will explore whether security leaders are equipped to support the business and how security can influence other areas of the business without posing obstacles.

13:00 - 15:20
Other
Presented by
Penetration testing: Godsend or necessary evil? - Round Table Discussion

The expansion of regulatory frameworks in multiple domains (e.g. PSD2, NIS, GDPR) had led to increased focus in how organizations manage their Information Security and how they verify that they deploy effective controls.

13:00 - 15:20
Other
Presented by
Information Security Awareness & Training Initiatives - Round Table Discussion

In this round table session, Secana will explore information security awareness and cyber hygiene as a mean to improve cyber security within organizations and, by extension, in society at large.

14:20 - 15:40
Break
Coffee Break & Networking In The Expo Area

Afternoon Networking Coffee Break

14:40 - 16:00
Keynote
Presented by
“Tax by design – the Swedish model goes tech”

15:00 - 16:45
Panel
Presented by
New Technologies and the changing Cyber Security Landscape

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

15:00 - 16:45
Panel
Presented by
New Technologies and the changing Cyber Security Landscape

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

15:00 - 16:45
Panel
Presented by
New Technologies and the changing Cyber Security Landscape

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

15:45 - 17:15
Keynote
Presented by
XM Cyber – Defense by Offense

Even when your organization has deployed and configured modern security controls, applied patches and refined policies, can you be assured no attack vectors still exist from mistakes and human error?

16:15 - 17:45
Keynote
Presented by
Privilege Access Management Applied to Industrial IT-OT Processes

A photograph of the current challenges in adapting Cybersecurity policies and discipline across the continuum of IT and OT.

16:45 - 17:55
Other
Presented by
Event Chairman's Closing Remarks

16:55 - 18:30
Networking Break

SAGA

10:40 - 11:10
Breakout
Presented by
Automated Penetration Testing: The Latest Advance in Security Validation

In this session Sivan will discuss the value Automated Penetration Testing brings by enabling continuous risk validation and raising and maintaining your cyber resilience to the highest level.

11:10 - 11:40
Breakout
Presented by
Device Visibility and Control: Build and Deploy Network Segmentation at Scale

The mass expansion and proliferation of IT, IoT and OT devices poses new questions to network security: Legacy and vulnerable devices, non-compliant and misconfigured endpoints, and IoT and OT devices must all be identified.

EMBLA

10:40 - 11:10
Breakout
Presented by
A Strong Finish: Disposing of Data Securely & Completely in a Post-Covid World

Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before.

11:10 - 11:40
Breakout
Presented by
Risk Exchanges: The Key to Vendor Risk Management Efficiency

Your vendors often handle your most sensitive data. This presents new challenges as third-party risk, security, privacy, legal and IT teams struggle to vet and manage the vendors they rely on most.