Display:
View:
View all sessions from this track +23 LOKE
07:30 - 08:10 (GMT+03:00)
Oct 13, 2020
Other
Registration starts with morning breakfast for onsite conference participants
08:10 - 08:30 (GMT+03:00)
Oct 13, 2020
Other
Powered by:
Länsförsäkringar AB
Official opening of the conference
Ulf Berglund
Event Chairman & Information Security Officer
Länsförsäkringar AB
08:30 - 08:50 (GMT+03:00)
Oct 13, 2020
Keynote
Powered by:
ISACA Sweden Chapter
Critical infrastructure requires different aspects for risk management to be considered and enforce different priorities when designing the infrastructure due to potential impact from failures, but still the basics of cyber security remain the same.
John Wallhoff
President
ISACA Sweden Chapter
09:00 - 09:30 (GMT+03:00)
Oct 13, 2020
Keynote
Powered by:
Telia Sverige
This presentation will explore how the "New Swedish National Security Protection Act" is putting a lot of demands on those who are engaged in “Security sensitive activities”
Björn Gustafsson
Head of National Security
09:30 - 09:50 (GMT+03:00)
Oct 13, 2020
Keynote
Powered by:
Swedish Police Authority
In this session, Christian talks about the challenges facing the Swedish Police authority. Due to the nature of police work modern tools, high availability and mobility is needed without compromising information security and confidentiality.
Christian Abdelmassih
IT Security Specialist
Swedish Police Authority
09:50 - 10:20 (GMT+03:00)
Oct 13, 2020
Keynote
Powered by:
Kroll Inc
With over 1,500 cyber incidents investigated worldwide in 2019 across a wide range of industries, Andrew will deep dive into the growing sophistication and latest threats, as well as actionable steps to strengthen preparedness, detection and response within your organisations.
Andrew Beckett
Managing Director and EMEA Cyber Risk Leader
Kroll Inc
10:20 - 10:40 (GMT+03:00)
Oct 13, 2020
Break
11:40 - 12:10 (GMT+03:00)
Oct 13, 2020
Keynote
Powered by:
Zscaler Inc.
The future of network security is in the cloud! - There have been several major shifts in computing technology, networking, mobility and cloud.
James Tucker
Sales Engineering Manager
Zscaler, Inc.
12:10 - 13:00 (GMT+03:00)
Oct 13, 2020
Lunch Break
Peer-to-peer networking by both online delegates and onsite delegates. Visit the virtual Expo Area and explore our partners products/services.
13:00 - 15:20 (GMT+03:00)
Oct 13, 2020
Other
Powered by:
ISACA Sweden Chapter
During the round table discussions John will use the ENISA definition of security measures for operators of essential services (OES) to discuss what best practice and baseline security measures to be applied and relate it to our joint experience from working with cyber security.
John Wallhoff
President
ISACA Sweden Chapter
13:00 - 15:20 (GMT+03:00)
Oct 13, 2020
Other
Powered by:
CSA Sweden Chapter
The TIBER-EU has been developed by the European Central Bank. The purpose is to establish a common framework for testing, and improving, resilience against sophisticated cyber attacks.
Kjell Löfgren
President
CSA Sweden Chapter
13:00 - 15:20 (GMT+03:00)
Oct 13, 2020
Other
Powered by:
Sig Security
13:00 - 15:20 (GMT+03:00)
Oct 13, 2020
Other
Powered by:
Kroll Inc
We’re seeing a deeper convergence of compliance, privacy, and cybersecurity as key elements of a core business strategy. This round table will explore whether security leaders are equipped to support the business and how security can influence other areas of the business without posing obstacles.
Andrew Beckett
Managing Director and EMEA Cyber Risk Leader
Kroll Inc
13:00 - 15:20 (GMT+03:00)
Oct 13, 2020
Other
Powered by:
Trustly
The expansion of regulatory frameworks in multiple domains (e.g. PSD2, NIS, GDPR) had led to increased focus in how organizations manage their Information Security and how they verify that they deploy effective controls.
Dimitrios Stergiou
CISO
Trustly
13:00 - 15:20 (GMT+03:00)
Oct 13, 2020
Other
Powered by:
Secana  AB
In this round table session, Secana will explore information security awareness and cyber hygiene as a mean to improve cyber security within organizations and, by extension, in society at large.
Sarah Backman
Cybersecurity Consultant
Secana AB
14:20 - 15:40 (GMT+03:00)
Oct 13, 2020
Break
Afternoon Networking Coffee Break
14:40 - 16:00 (GMT+03:00)
Oct 13, 2020
Keynote
Powered by:
Länsförsäkringar AB
Johan Schauman
Head Digital Co-development
Swedish Tax Agency
15:00 - 16:45 (GMT+03:00)
Oct 13, 2020
Panel
Powered by:
Schneider Electric
Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
Josef Joo
Head of Global Cyber Defense & Incident Response
Schneider Electric
15:00 - 16:45 (GMT+03:00)
Oct 13, 2020
Panel
Powered by:
Bravida Sverige AB
Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
Emil Dahlin
Group CIO
Bravida Sverige AB
15:00 - 16:45 (GMT+03:00)
Oct 13, 2020
Panel
Powered by:
Ericsson
Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
Sofia Cerwall
Group Security Advisor
Ericsson
15:45 - 17:15 (GMT+03:00)
Oct 13, 2020
Keynote
Powered by:
XM Cyber
Even when your organization has deployed and configured modern security controls, applied patches and refined policies, can you be assured no attack vectors still exist from mistakes and human error?
Tilman Epha
Sales Director
XM Cyber
16:15 - 17:45 (GMT+03:00)
Oct 13, 2020
Keynote
Powered by:
WALLIX
A photograph of the current challenges in adapting Cybersecurity policies and discipline across the continuum of IT and OT.
Mark De Simone
Vice President Global Industry Practice
WALLIX
16:45 - 17:55 (GMT+03:00)
Oct 13, 2020
Other
Powered by:
Länsförsäkringar AB
Ulf Berglund
Event Chairman & Information Security Officer
Länsförsäkringar AB
16:55 - 18:30 (GMT+03:00)
Oct 13, 2020
Networking Break
View all sessions from this track +1 SAGA
10:40 - 11:10 (GMT+03:00)
Oct 13, 2020
Breakout
Powered by:
Pcysys
In this session Sivan will discuss the value Automated Penetration Testing brings by enabling continuous risk validation and raising and maintaining your cyber resilience to the highest level.
Sivan Harel
Sales Director Nothern Europe
Pcysys
11:10 - 11:40 (GMT+03:00)
Oct 13, 2020
Breakout
Powered by:
Forescout Technologies
The mass expansion and proliferation of IT, IoT and OT devices poses new questions to network security: Legacy and vulnerable devices, non-compliant and misconfigured endpoints, and IoT and OT devices must all be identified.
Chris Sherry
Regional Vice President, EMEA Central
Forescout Technologies
View all sessions from this track +1 EMBLA
10:40 - 11:10 (GMT+03:00)
Oct 13, 2020
Breakout
Powered by:
Blancco Technology Group Sweden AB
Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before.
Fredrik Forslund
Vice President, Enterprise & Cloud Erasure Solutions
11:10 - 11:40 (GMT+03:00)
Oct 13, 2020
Breakout
Powered by:
OneTrust
Your vendors often handle your most sensitive data. This presents new challenges as third-party risk, security, privacy, legal and IT teams struggle to vet and manage the vendors they rely on most.
Jacob Eborn
Senior Privacy Consultant
OneTrust
Agenda filters
Event days
August 2022
Su
Mo
Tu
We
Th
Fr
Sa
31
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
01
02
03
04
05
06
07
08
09
10
Event tracks
Display future/passed sessions - selected: all
About speaker:

Ulf Berglund

Event Chairman & Information Security Officer
Länsförsäkringar AB

Ulf Berglund has a long experience from leading positions in the field of information security. He has been an honourable President of the CSA Sweden Chapter which he  launched in Sweden back in 2012. He is also co-author of the book Guide to the Cloud. He has a background as an officer, his last active years he was principal officer, IT security and information security expert at the Military Intelligence and Security Service (MUST). He has held positions as CTO, senior consultant and senior consultant for companies such Pointsec, Ernst & Young and Technology Nexus. Ulf's consultant and the experience derived from companies like Skandia, Scania, Swedish Match, the Stockholm Stock Exchange (OMX), the Swedish Central Bank, Apoteket AB (pharmacy), H&M and Länsförsäkringar Bank AB. He is the founder and owner of U&I Security Group AB.

Ulf's sessions:
Chairman Opening Remarks
Official opening of the conference
Ulf's sessions:
Chairman Opening Remarks
Official opening of the conference
About speaker:

John Wallhoff

President
ISACA Sweden Chapter

John Wallhoff (CISA, CISM, CISSP), President of ISACA Sweden Chapter & independent advisor. He is an experienced expert in the field of IT-Governance, IT Service Management and Information Security. Over the past 25 years he has been working with a wide range of organisations in different industries/sectors.

John's sessions:
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats?
Critical infrastructure requires different aspects for risk management to be considered and enforce different priorities when designing the infrastructure due to potential impact from failures, but still the basics of cyber security remain the same.
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats? - Round Table Discussion
During the round table discussions John will use the ENISA definition of security measures for operators of essential services (OES) to discuss what best practice and baseline security measures to be applied and relate it to our joint experience from working with cyber security.
John's sessions:
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats?
Critical infrastructure requires different aspects for risk management to be considered and enforce different priorities when designing the infrastructure due to potential impact from failures, but still the basics of cyber security remain the same.
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats? - Round Table Discussion
During the round table discussions John will use the ENISA definition of security measures for operators of essential services (OES) to discuss what best practice and baseline security measures to be applied and relate it to our joint experience from working with cyber security.
About speaker:

Björn Gustafsson

Head of National Security

Björn Gustafsson is currently Head of National Security at Telia Sverige AB since 2016. Before joining Telia he served as a CISO of Stockholm's municipality and City for 8 years where he was responsible for effectively managing and coordinating the development of the Stockholm City’s security work. During his tenure he led numerous projects and processes in information security, security protection and the city's risk and vulnerability analysis. Björn has also 20 years of experience at the Swedish Armed Forces where he worked at the command and control regiment security department as chief information security officer. Besides, he is a renowned educator that shares his works and findings to others in the security community.

 

Björn's sessions:
Swedish National Security in a global business perspective
This presentation will explore how the "New Swedish National Security Protection Act" is putting a lot of demands on those who are engaged in “Security sensitive activities”
Björn's sessions:
Swedish National Security in a global business perspective
This presentation will explore how the "New Swedish National Security Protection Act" is putting a lot of demands on those who are engaged in “Security sensitive activities”
About speaker:

Christian Abdelmassih

IT Security Specialist
Swedish Police Authority

Christian works with Enterprise-level Security Architecture and InfoSec-related tasks at the IT Security Division of the Swedish Police Authority. Before focusing on security, he was a Full Stack Developer and DevOps enthusiast. He supports developers in building secure web apps and sysadmins in safer operations. Today, he implements access controls, identity and access management solutions, conduct audits and risk analyses and secures one of the most important organizations in Sweden

Christian's sessions:
How to allow change and stay secure: A case study of the Swedish Police Authority
In this session, Christian talks about the challenges facing the Swedish Police authority. Due to the nature of police work modern tools, high availability and mobility is needed without compromising information security and confidentiality.
Christian's sessions:
How to allow change and stay secure: A case study of the Swedish Police Authority
In this session, Christian talks about the challenges facing the Swedish Police authority. Due to the nature of police work modern tools, high availability and mobility is needed without compromising information security and confidentiality.
About speaker:

Andrew Beckett

Managing Director and EMEA Cyber Risk Leader
Kroll Inc

Andrew Beckett is a managing director and EMEA leader for Kroll's Cyber Risk Practice. Andrew began his career at GCHQ where he held a variety of roles including head of the branch responsible for providing cyber security advice to government departments and penetration testing.  He also served in the Organization for the Prohibition of Chemical Weapons (OPCW). This is an International Civil Service organization operating under the auspices of the UN where Andrew was the first head of the Office of Confidentiality and Security and charged with setting up this team. Andrew went on to run his own commercial consultancies before joining Airbus Defense and Space in the UK as the head of Cyber Defense, a role he filled for five years before joining Kroll. Andrew is a visiting professor of Cyber Security at the University of South Wales.

Andrew's sessions:
1500+ Cyber Investigations Later: Trends To Beware
With over 1,500 cyber incidents investigated worldwide in 2019 across a wide range of industries, Andrew will deep dive into the growing sophistication and latest threats, as well as actionable steps to strengthen preparedness, detection and response within your organisations.
How Should Security Leaders Embrace the Intertwining of Compliance, Privacy, and Cybersecurity? - Round Table Discussion
We’re seeing a deeper convergence of compliance, privacy, and cybersecurity as key elements of a core business strategy. This round table will explore whether security leaders are equipped to support the business and how security can influence other areas of the business without posing obstacles.
Andrew's sessions:
1500+ Cyber Investigations Later: Trends To Beware
With over 1,500 cyber incidents investigated worldwide in 2019 across a wide range of industries, Andrew will deep dive into the growing sophistication and latest threats, as well as actionable steps to strengthen preparedness, detection and response within your organisations.
How Should Security Leaders Embrace the Intertwining of Compliance, Privacy, and Cybersecurity? - Round Table Discussion
We’re seeing a deeper convergence of compliance, privacy, and cybersecurity as key elements of a core business strategy. This round table will explore whether security leaders are equipped to support the business and how security can influence other areas of the business without posing obstacles.
About speaker:

James Tucker

Sales Engineering Manager
Zscaler, Inc.

Originally from the Washington, D.C. Area, James Tucker has been working in network security since 2006. He is passionate about Intrusion Prevention and gateway security. For the past 11 years, he has been based in Stockholm Sweden, working for many of the top security vendors. Today, he leads Zscaler's sales engineers in Northern Europe. He is also interested in Intellectual Property and privacy laws, and enjoys craft beer, a good cigar, and malicious packet captures

James's sessions:
It’s time to rethink your model: Sassy new ideas
The future of network security is in the cloud! - There have been several major shifts in computing technology, networking, mobility and cloud.
James's sessions:
It’s time to rethink your model: Sassy new ideas
The future of network security is in the cloud! - There have been several major shifts in computing technology, networking, mobility and cloud.
About speaker:

Kjell Löfgren

President
CSA Sweden Chapter

Kjell has 15 years of experience in Cyber ​​Security. In 2018 he became chairman of the Cloud Security Alliance Swedish chapter. He also works at NCC Group as Regional Manager, Sweden. Among other things, Kjell participated and built up Stay Secure, which became the Swedish market leader in E-mail Security. He also has many years of experience in EDR, Endpoint Detection and Response, SIEM and Web Security. 

Kjell's sessions:
TIBER EU, the European framework for Threat Intelligence-based Ethical Red Teaming - Round Table Discussion
The TIBER-EU has been developed by the European Central Bank. The purpose is to establish a common framework for testing, and improving, resilience against sophisticated cyber attacks.
Kjell's sessions:
TIBER EU, the European framework for Threat Intelligence-based Ethical Red Teaming - Round Table Discussion
The TIBER-EU has been developed by the European Central Bank. The purpose is to establish a common framework for testing, and improving, resilience against sophisticated cyber attacks.
About speaker:

Conny Larsson

Chairman
Sig Security

Conny is the chairman of Sig Security, a Swedish non-profit organization specialized in information and IT security. Conny has a master degree in Law and IT and is specialized in Telecommunication and Information Technology Law. Between 2009 and 2017 he worked for the Swedish law firm Gärde & Partners AB in Stockholm and now in his own law firm since 2018. Before that he was a corporate counsel at the major Swedish telecom operator TeliaSonera for nearly fifteen years and also at Flextronics Network Services. In addition he was a legal counsel at the Swedish Telecom Agency and the Swedish Enforcement Agency. Altogether he has been working as a lawyer specialized in Law and IT for more than 30 years.

Conny's sessions:
Conny's sessions:
About speaker:

Martin Bergling

Board Member
Sig Security

Martin is a Senior Security Consultant at NIXU. Martin has a broad security background and has previously worked as Deputy Security Manager at the Central Bank of Sweden and as technical manager at FMV / CSEC, Sweden's certification body for IT security. He has also worked with project management, risk analysis, requirements specification, accreditation and security audits at IBM, the Swedish Armed Forces and Telia. Martin has several certifications, e.g. CISSP, CISA and CRISC, and he is also involved in SIG Security, ISACA and Dataföreningen in Sweden.

Martin's sessions:
Martin's sessions:
About speaker:

Dimitrios Stergiou

CISO
Trustly

Dimitrios is currently employed as the Chief Information Security Officer for Trustly. He is an experienced senior Information Security and Risk professional with over 20 years’ experience in Risk Management, IT audits and Information security. Before joining Trustly, Dimitrios held positions at Modern Times Group, NetEnt, Entraction, Innova S.A and Intracom S.A. Dimitrios holds a M.Sc. in Information Security and is a Certified Lead Implementer for ISO 27001:2013, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified Risk and Information Systems Control (CRISC) professional and Certified Information Systems Security Professional (CISSP). He is also a Certified Information Privacy Manager (CIPM) and a Certified Information Privacy Professional / Europe (CIPP/E).

Dimitrios's sessions:
Penetration testing: Godsend or necessary evil? - Round Table Discussion
The expansion of regulatory frameworks in multiple domains (e.g. PSD2, NIS, GDPR) had led to increased focus in how organizations manage their Information Security and how they verify that they deploy effective controls.
Dimitrios's sessions:
Penetration testing: Godsend or necessary evil? - Round Table Discussion
The expansion of regulatory frameworks in multiple domains (e.g. PSD2, NIS, GDPR) had led to increased focus in how organizations manage their Information Security and how they verify that they deploy effective controls.
About speaker:

Sarah Backman

Cybersecurity Consultant
Secana AB

Sarah Backman is a cybersecurity consultant at Secana AB and a PhD-student at Stockholm University with a focus on cyber crisis management. Sarah has extensive experience working with strategic cybersecurity issues, crisis management and privacy issues in both private and public sectors.

Sarah's sessions:
Information Security Awareness & Training Initiatives - Round Table Discussion
In this round table session, Secana will explore information security awareness and cyber hygiene as a mean to improve cyber security within organizations and, by extension, in society at large.
Sarah's sessions:
Information Security Awareness & Training Initiatives - Round Table Discussion
In this round table session, Secana will explore information security awareness and cyber hygiene as a mean to improve cyber security within organizations and, by extension, in society at large.
About speaker:

Johan Schauman

Head Digital Co-development
Swedish Tax Agency

Johan/Mr Schauman has been working at the Swedish tax agency for almost twenty years in many different roles. More recently as a change leader for the agency´s digital transformation and currently as head of co-development, creating prerequisites and enabling external parties to develop solutions with the agency´s data, code or professional experience and expertise. He is utterly convinced that the only way to create a sustainable digital community is through collaboration between the private and the public sector.

Johan's sessions:
Johan's sessions:
About speaker:

Josef Joo

Head of Global Cyber Defense & Incident Response
Schneider Electric

Josef has extensive experience in the IT Industry spanning over 28 years, 15 of which he has spent at Schneider Electric in various senior roles. He is currently the Head of Global Cyber Defence & Incident Response. Prior to that he served as the Regional EMEA CISO for 8 years and he was the Regional Nordic IT manager for the company for over 5 years before assuming the EMEA position

Josef's sessions:
New Technologies and the changing Cyber Security Landscape
Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
Josef's sessions:
New Technologies and the changing Cyber Security Landscape
Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
About speaker:

Emil Dahlin

Group CIO
Bravida Sverige AB

Emil Dahlin has over 30 years documented experience in the IT industry and he is currently Group CIO at Bravida, a the leading servicing and installation company in the Nordics specialising in maintaining functions for electricity, heating and cooling, water, ventilation and security. He has also worked as a strategic advisor and consultant on a senior level for different consultant vendors. In addition, he has held top positions such as:  SVP Digital Business Development & IT at Svevia AB, Head of Group IT-Infra, PMO & SAM at PostNord AB, CIO at Qbranch AB & Axians SE and CTO at Norsk Hydro AB.

Emil's sessions:
New Technologies and the changing Cyber Security Landscape
Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
Emil's sessions:
New Technologies and the changing Cyber Security Landscape
Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
About speaker:

Sofia Cerwall

Group Security Advisor
Ericsson

“Sofia Cerwall is a Security Specialist and Group Security advisor at the multinational telecommunications company Ericsson. During her years at Ericsson she has gained insights in multiple parts of the security organization. Sofia is today the Global Domain Lead of Crisis Management within Ericsson. Prior to her  current role she has worked with cybersecurity related to corporate investigations and forensics. Sofia has a background within Computer Science, and holds a Bachelor´s degree from Stockholm University. She is also has a particular set of skills in global management, and is a well appreciated leader and colleague at Ericsson.”
 

Sofia's sessions:
New Technologies and the changing Cyber Security Landscape
Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
Sofia's sessions:
New Technologies and the changing Cyber Security Landscape
Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.
About speaker:

Tilman Epha

Sales Director
XM Cyber

Tilman Epha is responsible for the DACH region at XM Cyber as Sales Director from the Munich office. Tilman Epha has worked in the IT industry for more than 20 years. After studying economics in Erlangen and Nuremberg, the 54-year-old worked as a consultant in the aviation industry with stations in East Africa, South America, and the Caribbean. He then began a successful career in the IT industry with stations at a Munich system integrator, Aladdin Knowledge Systems/SafeNet, CyberArk, Cyberbit, and Exabeam.

Tilman's sessions:
XM Cyber – Defense by Offense
Even when your organization has deployed and configured modern security controls, applied patches and refined policies, can you be assured no attack vectors still exist from mistakes and human error?
Tilman's sessions:
XM Cyber – Defense by Offense
Even when your organization has deployed and configured modern security controls, applied patches and refined policies, can you be assured no attack vectors still exist from mistakes and human error?
About speaker:

Mark De Simone

Vice President Global Industry Practice
WALLIX

Mark De Simone is an energizing global CEO and entrepreneur for innovative businesses which create significant customer, employee and shareholder value. He leads the international operations of Cybersecurity leader WALLIX, the Privilege Access Expert from Europe with a focus on Nordics, UK, Italy, Middle East, Pakistan, Africa, Asia Pacific and India. He is also leading the Industrial Cybersecurity Practice for the company focusing on vulnerability challenges of Industry 4.0 and the interaction between OT and IT in today’s factory environments. 

Mark is a McKinsey alumnus and spent his business formative years with General Electric in the Healthcare sector in the USA and France, then as a Cisco VP driving the adoption of new services models in telecom leading the emerging markets, as an entrepreneur led a Management Buy In and created a Cloud Telco in 2012 called Clouditalia where he was CEO . Mark has been active in Cybersecurity starting at Cisco and Safety as CEO of Aegate to verify Medicine authenticity. Mark is based in London and has also an office in Paris.

Mark's sessions:
Privilege Access Management Applied to Industrial IT-OT Processes
A photograph of the current challenges in adapting Cybersecurity policies and discipline across the continuum of IT and OT.
Mark's sessions:
Privilege Access Management Applied to Industrial IT-OT Processes
A photograph of the current challenges in adapting Cybersecurity policies and discipline across the continuum of IT and OT.
About speaker:

Sivan Harel

Sales Director Nothern Europe
Pcysys

Sivan specializes in consultative sales to C-Level executives at large corporations. Sivan has held several Sales Management and Account Management positions in global companies, such as Comverse, Hewlett-Packard, Earnix, and now Pcysys. Sivan combines people and process consulting, with deep cybersecurity subject matter expertise to solve business problems while introducing a complete solution

Sivan's sessions:
Automated Penetration Testing: The Latest Advance in Security Validation
In this session Sivan will discuss the value Automated Penetration Testing brings by enabling continuous risk validation and raising and maintaining your cyber resilience to the highest level.
Sivan's sessions:
Automated Penetration Testing: The Latest Advance in Security Validation
In this session Sivan will discuss the value Automated Penetration Testing brings by enabling continuous risk validation and raising and maintaining your cyber resilience to the highest level.
About speaker:

Chris Sherry

Regional Vice President, EMEA Central
Forescout Technologies

Chris Sherry joined ForeScout Technologies in 2016 as Regional Director for UK&I and Northern Europe. After successfully growing the team and increasing revenue consistently over three years, he recently took on a new challenge and now leads the Central Team which covers the DACH region, Nordics and Benelux. 

In this role, he provides strategic and commercial leadership for ForeScout’s private and public sector programs in this region as well as driving customer awareness on technology use cases such as IT/OT convergence, ransomware and disruptionware. 

Chris is passionate about helping organizations embrace the proliferation of IoT devices and cloud adoption to enable better service and protect customer data. He regularly participates in speaking engagements on continuous monitoring, visibility, access control and automation. 

Prior to joining ForeScout Technologies, Chris worked in senior leadership roles for F5 and Dell. 

Chris's sessions:
Device Visibility and Control: Build and Deploy Network Segmentation at Scale
The mass expansion and proliferation of IT, IoT and OT devices poses new questions to network security: Legacy and vulnerable devices, non-compliant and misconfigured endpoints, and IoT and OT devices must all be identified.
Chris's sessions:
Device Visibility and Control: Build and Deploy Network Segmentation at Scale
The mass expansion and proliferation of IT, IoT and OT devices poses new questions to network security: Legacy and vulnerable devices, non-compliant and misconfigured endpoints, and IoT and OT devices must all be identified.
About speaker:

Fredrik Forslund

Vice President, Enterprise & Cloud Erasure Solutions

Fredrik Forslund serves as Vice President, Enterprise & Cloud Erasure Solutions for Blancco. With a keen eye for streamlining corporate IT security efficiencies and maintaining compliance with data privacy legislation, he is often regarded as a trusted advisor among customers. Forslund understands the operational, financial and cultural nuances of driving global business growth. When he’s not guiding customers through data erasure, or working with Blancco’s internal teams, he can be found speaking at industry conferences.

Fredrik's sessions:
A Strong Finish: Disposing of Data Securely & Completely in a Post-Covid World
Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before.
Fredrik's sessions:
A Strong Finish: Disposing of Data Securely & Completely in a Post-Covid World
Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before.
About speaker:

Jacob Eborn

Senior Privacy Consultant
OneTrust

Jacob Eborn is a Senior Privacy Consultant for OneTrust EMEA, the #1 most widely used privacy, security and trust technology platform trusted by more than 5,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. At OneTrust Jacob, works with GDPR Project teams and C-level stakeholders in the Nordics to automate and strengthen their core privacy processes. Jacob has over 10 years of software industry experience, working with organisations throughout the Nordics and globally to help enable change and transformation programs. Jacob has a Master of Science, Business and Administration and holds a CIPP/E Certification.

Jacob's sessions:
Risk Exchanges: The Key to Vendor Risk Management Efficiency
Your vendors often handle your most sensitive data. This presents new challenges as third-party risk, security, privacy, legal and IT teams struggle to vet and manage the vendors they rely on most.
Jacob's sessions:
Risk Exchanges: The Key to Vendor Risk Management Efficiency
Your vendors often handle your most sensitive data. This presents new challenges as third-party risk, security, privacy, legal and IT teams struggle to vet and manage the vendors they rely on most.
Exchange business card with test 1..

Exchange business card with test 1..asdads