Seminars

Cyber Security Nordic is located at IP EXPO Nordic.

  • Wed 19th Sep 10:00 - 10:30
  • Brought to you by Flexera Add to Schedule

    Cyber Strategies Theatre

    Wed 19th Sep 10:00 to 10:30

  • Leveraging Identity Management to Achieve Acceptable Losses Add to Schedule Karl Lankford  |   Bomgar   |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 10:00 to 10:30

    Leveraging Identity Management to Achieve Acceptable Losses

    When you’re under attack, being able to block intrusions with aggressive and automated identity management makes a huge difference in minimizing your losses and keeping your organization’s name out of the data breach headlines. During this session, Karl will explain how to redesign and automate your organization’s identity management to achieve acceptable losses, even during a cyberattack.

    Speaker

    Photo Speaker Name Profile
    Karl Lankford Karl Lankford View Profile
  • Wed 19th Sep 11:00 - 11:30
  • Zero Trust & The Flaming Sword of Justice Add to Schedule Dave Lewis  |   Duo Security  |   Keynote

    Keynote Theatre

    Wed 19th Sep 11:00 to 11:30

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 
The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify. 

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Predictive security in a changing world Add to Schedule Erkan Djafer  |   Cisco  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 11:00 to 11:30

    Predictive security in a changing world

    The internet can no longer be viewed as a static entity, it is by its very nature a living organism. It grows and evolves just like a human being. Most security today focuses on static protection, a living dynamic entity such as the internet requires protection that also lives and grows dynamically. This presentation will cover megatrends in security, including how the evolution makes it more difficult to protect us and what predictive security intelligence can do to cope with the modern threats that lie ahead.

    Speaker

    Photo Speaker Name Profile
    Erkan Djafer Erkan Djafer View Profile
  • HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks Add to Schedule Gavin Jay  |   Crowdstrike   |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 11:00 to 11:30

    HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks

    CrowdStrike continues to expose unprecedented efforts by highly sophisticated adversaries targeting -- and in some cases, selectively leaking -- information stolen from sensitive government, corporate and private networks. These intrusions reflect a broad range of motives and targets, revealing many never-before-seen tactics, techniques and procedures (TTPs) that are advancing the art of data manipulation and attack obfuscation, while raising the bar significantly for organizations seeking to protect themselves from these potentially disruptive and destructive attacks.

    This session will shed light on alarming new trends CrowdStrike has observed in the global cyber threat landscape, and the evolving best practices that are proving most successful against criminal, hacktivist and nation-state adversaries.

    Speaker

    Photo Speaker Name Profile
    Gavin Jay Gavin Jay View Profile
  • Brought to you by Innosoft Add to Schedule

    Cyber Technologies Theatre

    Wed 19th Sep 11:00 to 11:30

  • Wed 19th Sep 11:40 - 12:10
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule Suzette Loubser  |   Darktrace  |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 11:40 to 12:10

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    In this session Suzette will discuss:

    ·         Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats

    ·         How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time

    ·         How to achieve 100% visibility of your entire business including cloud, network and IoT environments

    ·         Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk

    ·         Real-world examples of subtle, unknown threats that routinely bypass traditional controls

    Speaker

    Photo Speaker Name Profile
    Suzette Loubser Suzette Loubser View Profile
  • Turtles, Trust and the Future of Cybersecurity Add to Schedule Jeremy Agenais  |   Varonis   |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 11:40 to 12:10

    Turtles, Trust and the Future of Cybersecurity

    Faith in our institutions is collapsing, and GDPR is here. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world?  It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.

    Speaker

    Photo Speaker Name Profile
    Jeremy Agenais Jeremy Agenais View Profile
  • Wed 19th Sep 13:20 - 14:30
  • Brought to you by First Base Technologies Add to Schedule Rob Shapland  |   First Base Technologies LLP  |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 13:20 to 14:30

    Speaker

    Photo Speaker Name Profile
    Rob Shapland Rob Shapland View Profile
  • Wed 19th Sep 14:00 - 14:30
  • Common encryption myths busted Add to Schedule Jorgen Jansson  |   Gemalto  |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 14:00 to 14:30

    Common encryption myths busted

    Gemalto will dispel some common encryption myths and reveal some easy encryption approaches that can be applied by any size organisation.

    Speaker

    Speaker Name Profile
    Jorgen Jansson View Profile
  • Wed 19th Sep 15:40 - 16:10
  • The Secret World of the Formula 1 pit lane Add to Schedule Marc Priestley   |   Independent  |   Keynote

    Keynote Theatre

    Wed 19th Sep 15:40 to 16:10

    The Secret World of the Formula 1 pit lane

    Marc spent ten years as a mechanic on the McLaren Formula One pit crew. Looking at every aspect of F1, he explains the communication, teamwork, pressure and strategy to secure marginal gains. With each car generating 10mb of data per lap, analysts look ever more closely at competitors’ decisions in an effort to optimise their own team performance. Marc also provides insight for Sky Sports, and is part of the ITV team covering the electrically-powered Formula E, showcasing the latest British racing technology.

    Speaker

    Photo Speaker Name Profile
    Marc Priestley Marc Priestley View Profile
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 15:40 to 16:10

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations is upon us, security and compliance professionals must make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Brought to you by Innosoft Add to Schedule

    Cyber Technologies Theatre

    Wed 19th Sep 15:40 to 16:10

  • Thu 20th Sep 09:00 - 09:50
  • The State of Hacking & Cybercrime Add to Schedule Samy Kamkar  |   Independent  |   Keynote

    Keynote Theatre

    Thu 20th Sep 09:00 to 09:50

    Speaker

    Photo Speaker Name Profile
    Samy Kamkar Samy Kamkar View Profile
  • Thu 20th Sep 10:00 - 10:30
  • Solve your Security Challenges with Splunk Add to Schedule Robin Crohns  |   Splunk  |   Cyber Strategies

    Cyber Strategies Theatre

    Thu 20th Sep 10:00 to 10:30

    Speaker

    Speaker Name Profile
    Robin Crohns View Profile
  • Thu 20th Sep 11:00 - 11:30
  • Predictive security in a changing world Add to Schedule Erkan Djafer  |   Cisco  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Thu 20th Sep 11:00 to 11:30

    Predictive security in a changing world

    The internet can no longer be viewed as a static entity, it is by its very nature a living organism. It grows and evolves just like a human being. Most security today focuses on static protection, a living dynamic entity such as the internet requires protection that also lives and grows dynamically. This presentation will cover megatrends in security, including how the evolution makes it more difficult to protect us and what predictive security intelligence can do to cope with the modern threats that lie ahead.

    Speaker

    Photo Speaker Name Profile
    Erkan Djafer Erkan Djafer View Profile
  • Brought to you by Innosoft Add to Schedule

    Cyber Strategies Theatre

    Thu 20th Sep 11:00 to 11:30

  • Thu 20th Sep 11:40 - 12:10
  • ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts Add to Schedule Ian Evans  |   OneTrust   |   Cyber Technologies

    Cyber Technologies Theatre

    Thu 20th Sep 11:40 to 12:10

    ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts

    Together, security and privacy teams share a common goal: Protect the organization from reputational damage, lawsuits, and regulatory trouble. On one hand, ISO 27001 focuses on the assessment of risks and protection of the organization. On the other, the GDPR aims to assess and protect the rights and freedoms of individuals. With a joint goal in mind, it is crucial that security and privacy teams work together to develop a common language that produces greater productivity and takes advantage of collective efforts. In this session, OneTrust will present findings from research conducted in cooperation with the International Association of Privacy Professionals (IAPP), sharing how ISO 27001 and the GDPR overlap, as well as how security and privacy teams can work together to become more effective.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Thu 20th Sep 13:20 - 13:50
  • Brought to you by Datto Add to Schedule

    Cyber Strategies Theatre

    Thu 20th Sep 13:20 to 13:50

  • Cyber Hack Add to Schedule

    Cyber Technologies Theatre

    Thu 20th Sep 13:20 to 14:30

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top