Seminars

Cyber Security Nordic is located at IP EXPO Nordic.

  • Wed 20th Sep 10:00 - 10:40
  • What does the Future hold for Sweden’s Digital Economy? Add to Schedule Fredrik Reinfeldt  |     |   Keynote

    Keynote Theatre

    Wed 20th Sep 10:00 to 10:40

    What does the Future hold for Sweden’s Digital Economy?

    Sweden has a long established reputation as a hotbed for innovation with many tech startups from the region enjoying global success. During Fredrik’s long tenure startups such as Skype, Spotify, Mojang and King took advantage of this culture and quickly became global giants in their respective markets. In this fascinating session Fredrik will reveal the backstory on what created this culture and his opinions on the challenges Sweden now faces in the current political climate.

    Speaker

    Photo Speaker Name Profile
    Fredrik Reinfeldt Fredrik Reinfeldt View Profile
  • FIKA 10:50 - 11:30
  • Wed 20th Sep 11:40 - 12:10
  • Session with Monty Widenius Add to Schedule Monty Widenius  |   MariaDB Corporation  |   Keynote

    Keynote Theatre

    Wed 20th Sep 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Monty Widenius Monty Widenius View Profile
  • How does WatchGuard deliver a holistic security solution from beginning to end? Add to Schedule Andy Cespedes  |   Watchguard  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 11:40 to 12:10

    How does WatchGuard deliver a holistic security solution from beginning to end?

    How does Watchguard protect assets all the way from the cloud, through the perimeter and down to the client with visualization and automation in multiple layers?

    Speaker

    Photo Speaker Name Profile
    Andy Cespedes Andy Cespedes View Profile
  • Hybrid Active Directory Security and Governance Add to Schedule Colin Truran  |   Quest Software  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 11:40 to 12:10

    Hybrid Active Directory Security and Governance

    Roughly 70% of Fortune 500 companies purchased Office 365 in the last year. But, many organizations don’t realize their on-premises Active Directory (AD) is still the authoritative source for authentication requests to Office 365 through Azure AD.

    To achieve a stable Azure AD, your on-premises AD must be streamlined with a normalised structure, consolidated OUs, good security delegation and solid provisioning. Otherwise your infrastructure becomes more vulnerable to a host of potential breaches, threats and disasters. 

    This session will tell you how to:

    • Make your hybrid directory environment manageable and available
    • Reduce your potential attack area
    • Bolster your cloud security posture

    Speaker

    Photo Speaker Name Profile
    Colin Truran Colin Truran View Profile
  • Wed 20th Sep 12:25 - 12:55
  • Ransomless Ransomware - Disruption and Smoke Screens Add to Schedule Mikkel Pedersen  |   Heimdal Security A/S & Heimdal Security SrL  |   Keynote

    Keynote Theatre

    Wed 20th Sep 12:25 to 12:55

    Ransomless Ransomware - Disruption and Smoke Screens

    This year we’ve witnessed unprecedented ransomware attacks, both in scale and impact. With ransoms drawing staggering amounts of money to the malware economy, the context is set for increasingly aggressive and complex attacks. How can organizations cope and thrive with cybercriminals knocking on every backdoor? This is what we aim to explore in this talk, which focuses on mitigating malware attacks based on traffic analysis to and from the endpoint.  

    Speaker

    Photo Speaker Name Profile
    Mikkel Pedersen Mikkel Pedersen View Profile
  • Attackers are monitoring your digital footprint, are you? Add to Schedule Andy Holmes   |   Digital Shadows   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 12:25 to 12:55

    Attackers are monitoring your digital footprint, are you?

    Organisations’ digital footprints are expanding and changing at an overwhelming rate. Attackers are using this information to exploit organisations and launch their attacks. Traditional security solutions that focus on the perimeter can’t address these risks by themselves because the boundary is disappearing. Learn how you can help manage your digital risk, minimise your digital shadow and protect against; cyber threats, data exposure and brand exposure.

    Speaker

    Photo Speaker Name Profile
    Andy Holmes Andy Holmes View Profile
  • Brought to you by Innosoft Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 12:25 to 12:55

  • Wed 20th Sep 13:30 - 14:00
  • Fascinating Tales of A Strange Tomorrow Add to Schedule Julien Simon  |   Amazon Web Services   |   Keynote

    Keynote Theatre

    Wed 20th Sep 13:30 to 14:00

    Fascinating Tales of A Strange Tomorrow

    AI has become the hottest topic in the IT industry. In this talk, we’ll explain how Deep Learning — a subset of AI — can help you solve complex problems. We’ll look at how you can add Deep Learning capabilities to your applications and why Cloud technology can get you there faster.

    Speaker

    Photo Speaker Name Profile
    Julien Simon Julien Simon View Profile
  • Beyond The Hype; How Attackers Win Add to Schedule Steve Manzuik  |   Duo  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 13:30 to 14:00

    Beyond The Hype; How Attackers Win

    Movies, TV and even some non-fictional press leads most to believe that a cyber attack is a complicated endeavor conducted by teams of highly skilled people. The reality is, that most successful attacks are not complicated in the least. This presentation will highlight real world attacks, why the attackers were successful and how they could have been stopped. Some new open source tools to battle phishing will be covered as well as a strategy to deal with disappearing network perimeter. 

    Speaker

    Photo Speaker Name Profile
    Steve Manzuik Steve Manzuik View Profile
  • The Game Has Changed: Principles to build a strong foundation to secure the new enterprise Add to Schedule Marcelo Pereira   |   Flexera  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 13:30 to 14:00

    The Game Has Changed: Principles to build a strong foundation to secure the new enterprise

    “Software is eating the world!” - It’s a provocative sentence, but what does it mean for you and your business?

    It means the fast pace of change in technology and infrastructure creates the need to tear down the walls that oppose security and availability requirements. This is probably a change hard to achieve, but necessary. 

    Join us for a session to talk about principles to build a strong foundation to secure the enterprise.

    Speaker

    Speaker Name Profile
    Marcelo Pereira View Profile
  • Wed 20th Sep 14:10 - 14:40
  • The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense Add to Schedule Andrew Tsonchev  |   Darktrace   |   Keynote

    Keynote Theatre

    Wed 20th Sep 14:10 to 14:40

    The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis. 

    Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.

    Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense,  is relied upon by organizations around the world, and can cover up to millions of devices.  

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Firewall-as-a-Service: Enterprise Grade Security for Everyone Add to Schedule Mark Bayne  |   Cato Networks   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 14:10 to 14:40

    Firewall-as-a-Service: Enterprise Grade Security for Everyone

    Firewalls and UTMs have been the cornerstone of network security for the past 20 years. Yet, deploying appliances at every remote office, creates multiple challenges for organizations: the capital needed to buy, upgrade and retire hardware solutions and the tough tradeoff between hardware capacity and strong security. Organizations end up compromising on strength of protection or the end user experience.

    Even when running smoothly, firewalls and UTMs are location bound and can't effectively protect the mobile users and cloud infrastructure that are now an integral part of the business.

    Speaker

    Photo Speaker Name Profile
    Mark Bayne Mark Bayne View Profile
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 14:10 to 14:40

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Wed 20th Sep 14:50 - 15:20
  • Humanity’s Most Serious Challenge Add to Schedule Jay Tuck  |     |   Keynote

    Keynote Theatre

    Wed 20th Sep 14:50 to 15:20

    Humanity’s Most Serious Challenge

    Artificial Intelligence is not science fiction. It is here and now, changing our world at breathtaking speed. We – as individuals and as institutions – must be informed, prepared and ready to redefine ourselves at breathtaking speeds as well.

    AI can help us digesting and analyzing big data, macro managing our resources, defining unseen challenges and securing our food chain, our environment and a sustainable future.

    AI can hurt us If we turn over too much responsibility too soon, we can lose control to a super intelligence which is learning at lightning speed.

    There is no guarantee that we will always be Darwin’s Darling.

    Speaker

    Photo Speaker Name Profile
    Jay Tuck Jay Tuck View Profile
  • GDPR, Petya & Wannacry: When things go wrong who is ultimately responsible - The Board or IT? Add to Schedule Sander Hofman  |   Mimecast  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 14:50 to 15:20

    GDPR, Petya & Wannacry: When things go wrong who is ultimately responsible - The Board or IT?

    As Petya and Wannacry have shown, organisations across the globe need to re-evaluate their readiness for the next wave of threats.  It is critical for companies to deploy a proactive cyber resilience strategy while remaining GDPR compliant.

    The time to up your defences is now.

    Speaker

    Photo Speaker Name Profile
    Sander Hofman Sander Hofman View Profile
  • Stop the Most Sophisticated Cyber Attacks With Layered Next-Gen Endpoint Protection Add to Schedule Joseph Abou-Haidar  |   Bitdefender  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 14:50 to 15:20

    Stop the Most Sophisticated Cyber Attacks With Layered Next-Gen Endpoint Protection

    Sophisticated threats such as file-less attacks, modern ransomware and phishing evade traditional endpoint security tools.

    To fortify their endpoints, your customers need a layered defense approach with unified prevention, multi-stage detection and automated response.

    Speaker

    Photo Speaker Name Profile
    Joseph Abou-Haidar Joseph Abou-Haidar View Profile
  • Wed 20th Sep 15:30 - 16:00
  • AI in the Workplace: Emergence of the Cognitive Room Add to Schedule Mary Ann de Lares Norris  |   Oblong Industries  |   Keynote

    Keynote Theatre

    Wed 20th Sep 15:30 to 16:00

    AI in the Workplace: Emergence of the Cognitive Room

    The physical world and the digital world are becoming more intertwined in all aspects of life. In the enterprise, this trend is exhibited by the emergence of the cognitive room. Cognitive rooms, which harness the power of the team as well as the power of AI, are poised to transform the future of work.

    Enterprises need to learn to capture the value in this new world order—and starting with the human element is key. Innovative human-centered UIs must be used to augment a user’s ability to gain insight from the massive amounts of unstructured data that are part of today’s enterprise workflow and the lifeblood of cognitive rooms.

    Mary Ann will be addressing the challenge organizations face today to transcend traditional, sequential analytical processes in favor of faster parallel and real-time working processes that deliver the greatest business impact.

    Speaker

    Photo Speaker Name Profile
    Mary Ann de Lares Norris Mary Ann de Lares Norris View Profile
  • The Recipe for SaaS success? ‘Smother customers with time, love and attention’ Add to Schedule Andy Nolan  |   Lifesize   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 15:30 to 16:00

    The Recipe for SaaS success? ‘Smother customers with time, love and attention’

    Lifesize is a microcosm of the transition many enterprises face today, as they grapple with the transformation from traditional one-off product sales to a modern subscription-based services business model. How the philosophy of putting customer success at the heart of your strategy is by the best way to ensure success.

    Speaker

    Photo Speaker Name Profile
    Andy Nolan Andy Nolan View Profile
  • From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone Add to Schedule Giuseppe Trotta  |   FortConsult  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 15:30 to 16:00

    From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone

    In this session, Giuseppe Trotta will show how he got full access to a company’s corporate network by breaking in to an Android device…belonging to the receptionist. Using freely available information about the receptionist, he succeeded in luring her in to downloading an APK file with a reverse shell. With full access to the phone, he connected to the guest Wi-Fi of the company, and exploited unsafe configurations on the network to gain full access to the internal corporate network, including persistent access through domain admin credentials.

    Speaker

    Photo Speaker Name Profile
    Giuseppe Trotta Giuseppe Trotta View Profile
  • Wed 20th Sep 16:10 - 17:00
  • Privacy Program Management: How to capture the business value and stakeholders' enthusiasm Add to Schedule Sofia Edvardsen  |   Sharp Cookie Advisors  |   Keynote

    Keynote Theatre

    Wed 20th Sep 16:10 to 17:00

    Privacy Program Management: How to capture the business value and stakeholders' enthusiasm

    Learn how to proactively manage privacy in the GDPR era in your organisation with the tools and insights from Managing Partner Sofia Edvardsen's experience of setting up and managing privacy programs of leading enterprises. A key factor to success Sofia Edvardsen will shed light on, not often covered in privacy management, is how to perform and stay relevant in the eyes of top management.

    Speaker

    Photo Speaker Name Profile
    Sofia Edvardsen Sofia Edvardsen View Profile
  • Reserved Session Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 16:10 to 17:00

  • Thu 21th Sep 10:00 - 10:40
  • Collaboration when Disruption is the New Normal Add to Schedule Snorre Kjesbu  |   Cisco  |   Keynote

    Keynote Theatre

    Thu 21th Sep 10:00 to 10:40

    Collaboration when Disruption is the New Normal

    Four of five CEOs question if their products will be relevant in three years, so it is no surprise that rapid innovation is at the top of the CEO agenda. With talent retention and revenue growth at stake, even traditional industries are facing disruption. But as Forbes reports, “businesses are finally realizing they need new ways to work, collaborate and meet”. What is this new way of working? How can IT leaders enable workforces to get more done, faster? We will demonstrate how IT leaders are using new collaboration tools to gain this competitive advantage.

    Speaker

    Photo Speaker Name Profile
    Snorre Kjesbu Snorre Kjesbu View Profile
  • FIKA 10:50 - 11:30
  • Thu 21th Sep 11:40 - 12:10
  • A day in the life of a GDPR breach Add to Schedule Simon Ogden  |   Splunk   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 11:40 to 12:10

    A day in the life of a GDPR breach

    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018.

    Speaker

    Photo Speaker Name Profile
    Simon Ogden Simon Ogden View Profile
  • Architecting the Future: learnings from Google Add to Schedule Otso Juntunen  |   Google  |   Keynote

    Keynote Theatre

    Thu 21th Sep 11:40 to 12:10

    Architecting the Future: learnings from Google

    Cloud is a rising trend, but one that is really in its infancy. Google shares its view of the cloud as a platform-first mindset, opening the possibility of changing the fundamentals of computing to achieve new capabilities from compute architectures to data processing and machine learning. The next stage of machine intelligence offers both long and short term opportunities for those that can apply machine learning to analytics at web scale to relevant real world data that apply to your business.

    Speaker

    Photo Speaker Name Profile
    Otso Juntunen Otso Juntunen View Profile
  • Crossing the NIS and GDPR mine field Add to Schedule Jonas Dellenvall  |   Advenica AB  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 11:40 to 12:10

    Crossing the NIS and GDPR mine field

    In the wake of GDPR buzz it is now time for the next directive in the field of information security: the NIS Directive. The Directive on Security of Network and Information Systems is intended to raise Member States' level of protection of critical infrastructure.

    At first glance, it is easy to conclude that GDPR and NIS have a large overlap, but in fact, the differences are greater than the similarities. This session looks at the greatest initiatives in many years to raise the information security level and awareness within the European Union.

    Speaker

    Photo Speaker Name Profile
    Jonas Dellenvall Jonas Dellenvall View Profile
  • Thu 21th Sep 12:25 - 12:55
  • The Shift to Self-Defending Networks Add to Schedule Andrew Tsonchev  |   Darktrace   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 12:25 to 12:55

    The Shift to Self-Defending Networks

    In this session, Darktrace will present a live demonstration of its dynamic 3D interface, the Threat Visualizer.  This industry-leading visualization and detection tool graphically represents an organisation’s entire network and demonstrates the threat level that it faces at any given time. Utilizing powerful visualization techniques, the Visualizer provides 100% network visibility and enables organisations to investigate the anomalies detected by the Enterprise Immune System.  

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • More Visibility or More Data? The CTI Conundrum Add to Schedule Darren Anstee  |   Arbor Networks  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 12:25 to 12:55

    More Visibility or More Data? The CTI Conundrum

    Security best practice tells us that defense in depth is the answer. Multiple layers of security designed to detect and contain attacks. CTI will help our technology identify and block the latest and greatest threats. But, what is the output from all of this?  People still make decisions in security and will do for at least next few years. Our security posture must deliver our analysts visibility - not just more and more data. Darren Anstee will discuss the need for better threat visibility, automated data collation and workflow to help us manage risk.

    Speaker

    Photo Speaker Name Profile
    Darren Anstee Darren Anstee View Profile
  • A Hacker’s Confessions Pt. II Add to Schedule Michael Moltke  |   FortConsult  |   Keynote

    Keynote Theatre

    Thu 21th Sep 12:25 to 13:15

    A Hacker’s Confessions Pt. II

    FortConsult's Head of Technical Security Consulting Michael Moltke will show how a hacker operates in real life and shed light on the bad guys’ attack methods. Besides showing various types of phishing and spear-phishing attacks, Michael will illustrate what the hacker can do once a device is compromised. You will witness the whole attack scenario from initiation to post-exploitation – including gaining complete control of the infected device, using it to move seamlessly through a corporate network, gaining domain admin privileges, and retaining persistent (and unnoticed) access to the network.

    Speaker

    Photo Speaker Name Profile
    Michael Moltke Michael Moltke View Profile
  • Thu 21th Sep 13:30 - 14:00
  • It's not only Hollywood... It's real life: Cyber Security - what to do when you find your business in the crosshair of a global threat group Add to Schedule Bulent Teksoz  |   BAE Systems Applied Intelligence  |   Keynote

    Keynote Theatre

    Thu 21th Sep 13:30 to 14:00

    It's not only Hollywood... It's real life: Cyber Security - what to do when you find your business in the crosshair of a global threat group

    There used to be a time when the movies pushed our imagination as to what is possible. Lucky for us, or unlucky depending on where you stand, what we see in real life in the cyber security world is nothing less exciting than a multimillion dollar Hollywood blockbuster.

    Join us for a thrilling journey as one Fortune 500 company finds themselves in the crosshair of a global threat group, how the attack evolves, how they push back and what they do to keep the business running. Hint: it wasn't about shutting down the internet.

    Speaker

    Photo Speaker Name Profile
    Bulent Teksoz Bulent Teksoz View Profile
  • Brought to you by Vasco Add to Schedule

    Cyber Threat Protection Theatre

    Thu 21th Sep 13:30 to 14:00

  • The Swedish IT Security Index – the tool to benchmark your capability Add to Schedule Anders Strömberg  |   Advenica AB  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 13:30 to 14:00

    The Swedish IT Security Index – the tool to benchmark your capability

    The digitalization wave affects all organisations. IoT, Big Data and Cloud bridges IT-systems and blurs borders when handling information. Meanwhile is the cybersecurity threat changing in shape, motive and means which requires better tools and insights to defend against these threats. 

    To assess the operative and strategic information security maturity there is an online tool that can be used. Advenica presents the result from the online tool showing some interesting findings that are worth noting. For instance, less than 15% handle cybersecurity on a Board level. Also, 20% of the respondents has not identified its protective assets.

    Speaker

    Photo Speaker Name Profile
    Anders Strömberg Anders Strömberg View Profile
  • Thu 21th Sep 14:10 - 14:40
  • Innovations fuelled by IoT and the cloud Add to Schedule Adrian Hornsby  |   Amazon Web Services  |   Keynote

    Keynote Theatre

    Thu 21th Sep 14:10 to 14:40

    Innovations fuelled by IoT and the cloud

    Speed and agility are essential with today’s businesses. The quicker you can get from an idea to first results, the more you can experiment and innovate with your data, perform ad-hoc analysis, and drive answers to new business questions. During this talk, Adrian will take in key features of the AWS IoT platform, latest developments and live demos & walk-throughs featuring Raspberry Pi. 

    Speaker

    Photo Speaker Name Profile
    Adrian Hornsby Adrian Hornsby View Profile
  • Brought to you by Innosoft Add to Schedule

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:10 to 14:40

  • Reserved Session Add to Schedule

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 14:10 to 14:40

  • Thu 21th Sep 14:50 - 15:20
  • Measuring Security Culture is more than just counting people Add to Schedule Kai Roer  |   CLTRe  |   Keynote

    Keynote Theatre

    Thu 21th Sep 14:50 to 15:20

    Measuring Security Culture is more than just counting people

    Much has been said about improving security culture, but nothing can be done unless we can prove the effectiveness of our programs. In this talk I will share how to measure security culture using available tools and techniques. 

    Speaker

    Photo Speaker Name Profile
    Kai Roer Kai Roer View Profile
  • From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone Add to Schedule Giuseppe Trotta  |   FortConsult  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:50 to 15:20

    From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone

    In this session, Giuseppe Trotta will show how he got full access to a company’s corporate network by breaking in to an Android device…belonging to the receptionist. Using freely available information about the receptionist, he succeeded in luring her in to downloading an APK file with a reverse shell. With full access to the phone, he connected to the guest Wi-Fi of the company, and exploited unsafe configurations on the network to gain full access to the internal corporate network, including persistent access through domain admin credentials.

    Speaker

    Photo Speaker Name Profile
    Giuseppe Trotta Giuseppe Trotta View Profile
  • You are already exposed, you just don’t know it. Add to Schedule Erik Karlsson  |   Framtiden Management  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 14:50 to 15:20

    Speaker

    Speaker Name Profile
    Erik Karlsson View Profile
  • Thu 21th Sep 15:30 - 16:00
  • Tools and techniques to make GDPR compliance work across your organisation Add to Schedule Karen Lawrence Öqvist  |     |   Keynote

    Keynote Theatre

    Thu 21th Sep 15:30 to 16:00

    Tools and techniques to make GDPR compliance work across your organisation

    Cut the ”legal speak” and find a language, and tools/techniques which works across your organization on compliance with the General Data Protection Regulation (GDPR). The GDPR will replace existing EU data protection laws on 25th May 2018 in Sweden and every EU member state. and heavy fines await companies that do not comply. 

    It all seems so complicated, but in fact if you dig deep enough you will find hidden simplicity. Data privacy rules, at least the lowest common denominator in privacy have been around since 1980. There are quite simply 8 privacy principles. Privacy laws globally are all founded on these 8 principles, including the GDPR. By taking the lowest common denominator in privacy you can build a global privacy program using the GDPR as your privacy standard.

    Speaker

    Photo Speaker Name Profile
    Karen Lawrence Öqvist Karen Lawrence Öqvist View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top