nordic it security forum 2015 agenda
TRANSCRIPT
Stockholmsmässan November 3rd 2015, Stockholm, Sweden
8th annual information security forum
Nordic IT Security#nordicitsec
Limited tickets available for FREE: www.nordicitsecurity.com/register-today/
70+ Exhibitors 25+ Speakers 600+ Minutes of networking
www.nordicitsecurity.com
Partners 2015
Riga, LatviaData Security Solutions
Platinum Partners
Gold Partners
Silver Partners
Partners
Media Partners
Tagline Font: Myriad Pro RegularBold 12pt
EDITOR’S NOTE
Cybersecurity is experiencing enormous growth, as an industry and as a theme in the daily lives of people and businesses using technology. And because our technology keeps changing at an astounding rate, threats are evolving fast too – with cybercrimi-nals finding new and creative ways to exploit users and technology all the time. To combat the threat in 2015, information security professionals must understand the trends.
2014 has been a year of what seems like a never-ending stream of cyberthreats and data breaches, affecting banks, retailers, gaming networks, governments and more. We’ve seen more evidence that manufacturers of Internet of Things (IoT) devices have failed to implement basic security standards. Internet of Things attacks move from proof-of-concept to mainstream risks. Furthermore mobile payment systems were the talk of 2014 after Apple stormed ahead with Apple Pay.
The patchwork nature of regulation around the world is likely to become an increas-ing burden on organizations. The law moves slowly compared to the technology and security fields, but massive regulatory changes that have been a long time coming are very nearly here.
This year’s Nordic IT Security will take place on November 3rd, 2015 in Stockholm and will gather senior IT security professionals from across the Nordics and industry verticals to cover key areas of concerns for organizations from both public and private sector. Over the course of one day, you will experience recent case studies, insightful demos, dedicated roundtables, in-depth workshops, technological lightning talks, and plenty of networking opportunities to give you greater insight on strategic implemen-tations of the latest technology showcased in the Exhibition Hall.
I look forward to meeting you in Stockholm.
Heidi Scheiffele Content Director Nordic IT Security 2015
CONTENT2 Editor’s Note
3 Advisory Board
4 Participants Profile
5 What our delegates say
6 Features
7 Sharktank
8 Conference at a Glance
9-17 Program
18 Location
19 Seeking a Partnership
ADVISORY BOARD 2015
Anne-Marie Eklund Löwinder, Head of Security, .SEAnne-Marie is Head of Security at .SE. She has been ranked as one of Sweden’s foremost experts on IT security by the magazine Computer Sweden. She is a member of the board of CENTR, of IRI (The Swedish Law and Informatics Research Institute), the foundation for Development of Telematiques (TU-stiftelsen) and SNUS (the Swedish Network Users’ Society). She is furthermore a member of the information security council of the Swedish Civil Contingencies Agency (MSB) and is one of the handful of individuals assigned as Trusted Com-munity Representative and participates in the DNSSEC key generation for the internet root zone as Crypto Officer, appointed by ICANN (the internet Corporation for Assigned Names and Numbers). She is also a member of the swedish Digitalization Commissions expert group. Ms. Eklund Löwinder was also a member of the very first groups that helped the Swedish Standards Institute (SIS) and Swedac to develop what now is known as the ISO 27000-standard for information security management.
Paolo Balboni, Founding Partner of ICT Legal Consulting & Scientific Director of the Euro-pean Privacy Association Paolo Balboni (Ph.D.) is a top tier European ICT, Privacy & Data Protection lawyer and serves as Data Pro-tection Officer (DPO) for multinational companies. Dr. Balboni is a Founding Partner of ICT Legal Consulting (ICTLC), a law firm with offices around the world. He provides legal counsel across Europe to multinational companies specializing in the fields of Personal Data Protection, Data Security, Information and Communication Tech-nology (ICT), and Intellectual Property Law. Dr. Balboni has considerable experience in Information Technolo-gies including Cloud Computing, Big Data, Analytics, and the Internet of Things, Healthcare, Insurance, Banking, Anti-Money Laundering (AML) and Counter-Terrorist Financing (CFT). Dr. Balboni is the Scientific Director of the European Privacy Association based in Brussels, the Cloud Computing Sector Director and Responsible for Foreign Affairs at the Italian Institute for Privacy based in Rome.
David Jacoby, Senior Security Researcher, Kaspersky LabDavid is a security evangelist who is currently working as Senior Security Researcher for Kaspersky Lab. He is responsible for not only research but also technical PR activities in the Nordic and Benelux region where his tasks often include vulnerability research and management, penetration tests, security research and public speaking engagements. His day to day job is about improving awareness of the current and future threats and vulnerabilities to which Internet users are exposed and fight cybercrime. David has about 15 years of experience working in the IT security field. This have given him the opportunity to work in many interesting fields such as: Vulnerability and Threat Management, Customer Experience, Penetration Testing, Development and Fighting Cybercrime.
Karen Lawrence Öqvist, CEO, Digital TracePrivacy Advocate & Expert - Cannot be Controlled - Cannot be Manipulated - Let the Voice of the Citizen be heard!” is her personal tagline. Karen cares passionately about the right to personal privacy and the right of ownership of our digital identities, Personal Identifying Information (PII), and our digital footprint. She is an author, speaker and entrepreneur, with an MSc Information Security (Royal Holloway University of London) and an MBA (Henley, Reading University). With over 20 years experience in information security, her career has taken her from UK to: Cern in Geneva, Novell in Zurich, Stockholm, and Hewlett-Packard. She is today CEO of Dgtlb Information Security AB and President of Digital TRACE in Sweden and Norway.
Mika Kataikko, Director, Cyber SecurityMika Kataikko is director for Cyber Security both in the Jyväskylä Regional Development Company Jykes Ltd. and in the national Cyber Security business development program driven by the Finnish Funding Agency for Innovation (Tekes). Mika has a long and diverse background in the Telecom, ICT and Security busi-nesses, in the positions from supervisory role to product and product area life cycle management, including also quality and security related management and development responsibilities. His versatile job history gives him a wide experience and viewpoint in the different areas of businesses and business making, especially in the areas of ICT and Cyber Security.
Ulf Berglund, M.Sc, CISM, President, Cloud Security Alliance SwedenUlf Berglund is the president of the Swedish chapter of CSA, Cloud Security Alliance, a worldwide organization. He is also co-author of the book Guide to the Cloud. Ulf has a long experience from leading positions in the field of information security. He has a background as an officer, his last active years he was principal officer, IT security and information security expert at the Military Intelligence and Security Service (MUST). He has held positions as CTO, senior consultant and senior consultant for companies such Pointsec, Ernst & Young and Technology Nexus. Ulf’s consultant and the experience derived from companies like Scania, Swedish Match, the Stockholm Stock Exchange (OMX), the Swedish Central Bank, Apoteket AB (pharmacy) and Hennes&Mauritz AB. He has his own company, U&I Security Group AB.
Per Thorsheim, Security Adviser, God Praksis ASPer Thorsheim works as an independent security adviser, based in Bergen, Norway. He is the founder and main organizer of PasswordsCon.org, the worlds first and only conference about passwords. He has a personal project on convincing the world to implement RFC3207 STARTTLS support for opportunistic email encryption. Per was a finalist for the annual Rosing IT security award in 2012, and was awarded the Com-manding General of the Norwegian Armed Forces Cyber Defence Coin in spring 2014 for his contributions to information security. He also claims to know your next password. He currently holds the CISA and CISM certifications from ISACA, and CISSP-ISSAP from (ISC)2.
43% were partners
showcasing their tools, solutions and products
to support our delegates
PARTICIPANTS PROFILE 2014
57%were end users
looking for new ideas, processes, and
solutions
260+
Participants attended our 7th
Edition
Job Titles
(ISC)2 Sweden.SE24 Solutions AB2makeIT ABAbsolute SoftwareAccumulateAcronis InternationalAdvanze ConsultingAdvenicaAirWatchAltemarkAmentorAndritzAP4ArbetsförmedlingenArbor Networks UK Ltd.Arctic Innovation GroupArxan Technologies Inc.Ascom Network TestingASSA ABLOY ABAvepointBackBoxBGTG ABBlocketBomgar CorporationBorderlight ABBuypass ASCapricode OyCarspect ABCDON GroupCGICGI Sverige ABCloud Security AllianceConsistor WebTechCSISCybercomDanderyds SjukhusDanderyds Sjukhus ABDe Visscher ConsultingDeltaco ABDgtlb Information Security ABDIGILEDirectis RelationsEgoSecure GmbHEkonomistyrningsverketEnterCardEntrust Inc.ErcomEricssonEricsson ABErik Thun ABExclusive NetworksEyasysFinancial ART SolutionsFinansiell ID-Teknik BID ABFootBalance System LtdFörsäkringskassanGentekniknämndenGiesecke & DevrientGod Praksis ASGoogleGoyada ABH&MHammarskiöld&CoHI3G Access AB
Hi3G Danmark ApSHMS Industrial Networks ABHPHåbo kommunIBMICA ABICT Legal ConsultingIISPInera ABInfrasec sweden ABIT TotaliZettle ABJordbruksverketJyväskylä Regional Development Company Jykes Ltd.Kallmyra System & Produktion ABKarolinska InstituteKaspersky LabKBZKIKikusema ABKnivsta kommunKPMGKrisberedskapsförbundet POSOMKSM ConsultoriaKTHLandstinget BlekingeLandstinget i Jönköpings LänLaninet SolutionsLantmännenLequaMarginalen BankMcAfee N.A. ABMigrationsverketMobiTVMyndigheten för samhällsskydd och beredskap (MSB)NackademinNasdaqNaturvårdsverketNBC ABNearshore business solutionsNet EntertainmentNet Entertainment NE ABNIU IFMONokiaNordeaNordea BankNorsk Tipping ASNorwegian Hull ClubNRD CS / InfobaltOpen InvestOpen Invest OY LtdOP-Pohjola GroupPanda Security Sweden ABPBRPeab Support ABPedab SwedenPensionsmyndighetenPowerbit Security ABProjectplaceQualysQualys TechnologiesRadpoint ABRiksdagsförvaltningen
RiksgaldenRiksrevisjonenRoplan ABSafeNetSamhallSCBSchneider ElectricSEBSecMaker ABSecure MailboxSecurEnvoySICS Swedish ICTSICS Swedish ICT – Security LabSkandiabankenSkatteverketSLSLUSMS PasscodeSMS PASSCODE A/SSocialstyrelsenSoftronic ABSolarflare CommunicationsSoprano DesignSpar Nord Bank A/SSSABStay Secure Sweden ABStockholm County PoliceStockholms Läns LandstingStokabStorebrand ASASuper Micro Computer, Inc.Svea Ekonomi ABSwedbank ABSweDeltaco ABSwedish Armed ForcesSwedish Customs Law EnforcementSwedish Gene Technology Advisory BoardSwedish National Police BoardTeleTrusT – IT Security Association GermanyTeliaSoneraTraceTrafikverketTriOptimaTrusteqTS SolutionsTullverketU&I Security grpUppsala kommunUppsala UniversitetWapack LabsWatchguardVattenfall ABVattenfall Eldistribution ABVeriscanVerizonVirtual Management ABVodafoneYrkesförmedlingenÅFÅlandsbanken AbpÖrebro läns landsting
Participating Organizations
CIO
CISO
CTO
Head of Information Security
Head of IT
Director Cyber Security
Head of IT Infrastructure
Senior Compliance Manager
Enterprise Architect
“The Nordic IT Security 2014 was a good sanity check for verifying that we are on the right track and dealing with the relevant issues in regards to information security”
- Information Security Architect, EnterCard
“Very useful, rich in content and good opportunity for networking”
- Managing Director, InfoSecure Nordics
“A different, but exciting way to learn from others experiences”
- IT Security Manager, Försvarsmakten
“This conference is getting better every year! A good mix of vendors and industry specialists”
- Chief Trust Officer, Projectplace
“The concept is good: presentations and round table discussions. Preselected subjects is a good way to focus on certain topics, and meet people sharing the similar interests”
- Product Manager, Ericsson
“Det var bra föredrag och nyttiga diskussioner kring säkerhetsfrågor”
- IT Security Manager, Swedish Court of Patent Appeals
WHAT OUR DELEGATES SAY
BEFORE THE CONFERENCE
Nordic IT Security SocialThe Nordic IT Security Forum has a long history and an extended network of IT security experts. Meeting once a year to dis-cuss and honor these relationships seemed a bit rare to us, our partners and delegates. Join our informal Social After Works, exclusively for the Nordic IT Security community and bring friends, your peers and people that are interested in IT Security.
6th of May Sheraton Hotel, Stockholm Sweden, 17:00-19:00
1-to-1 MeetingsTo ensure the best possible networking onsite, take advantage of the online meeting system before the conference so that you can schedule private meetings with the peers that you want to meet.
Keynote Visionary keynote sessions will open and close the conference, giving the audience an inspirational look into the future of IT Se-curity, and what they can expect to change in the coming years.
TracksA diversity of key topics within IT Security will be discussed in several dedicated tracks. Each track has several focus ses-sions, so that participants can go deeper into each topic.
ExpoVisit the on-floor exhibition where the leading vendors, new-comers and experts showcase technologies and services.
Networking Extend your network, do business, generate leads, meet peers and have a cup of coffee with the ones you’ve always wanted to chat with in networking dedicated breaks and meeting hubs.
AT THE CONFERENCE
27th of August Location TBA, Stockholm Sweden, 17:00-19:00
8th of October Location TBA, Stockholm Sweden, 17:00-19:00
Shark tankOur IT Security Shark Tank gives you the opportunity to brand and present your breakthrough thoughts to exclusively selected investors and distributors who are interested in reviewing and investing.
SHARK TANK
Who can join? Start-uppers
Innovators
Thought Leaders
Established non-Scandinavian vendors who are seeking partnerships in the Nordics
Evaluation Criteria Investment profile - What is the amount of investment & type of partnership you are looking for?
Market potential - Describe the viability & selling potential
Investment profile - What is the investment, review or type of partnership you are looking for?
Background and history within IT Security - How much experience do you have, what’s your or your companies profile?
Pitch requirements - The applicant will present only trustworthy industryrelevant information and will not solely rely on speculations and forecasts. The information is transmitted in a clear, concise and attractive way for the sharks and will be presented on the 3rd of November in a separate track in front of the sharks within a 15 minutes presentation.
How it worksApply online under:www.nordicitsecurity.com and fill out our application form
Copperberg will review the applications and select the ones that meet the evaluation criteria
Receive your registration by email and prepare your 15 min. pitch
Send us your presentation until 15th of October!
Pitch the Sharks on 3rd of November 2015 at Nordic IT Security in a separate track in front of the sharks
Free to Attend
15-min Pitches
2-4 pmApply until 15th of October
Shark tankOur IT Security Shark Tank gives you the opportunity to brand and present your breakthrough thoughts to exclusively selected investors and distributors who are interested in reviewing and investing.
CONFERENCE AT A GLANCE
16.00 - 16.45 Thought Leaders: Key Speaker Sessions
16.45 Closing of Conference
17.00 After Work Networking & Drinks
18.00 Closing of Expo
8.15 Registration
8.45 - 9.45 Thought Leaders: Key Speaker Sessions
9.45 - 10.45 Mindleader Speaking Sessions
Track 1:Cybersecurity I
Track 2:Mobile & Cloud Security I
Track 3:Data Protection I
Track 4:Trends & Innovation I
10.45 - 11.30 Expo & Networking
11.30 - 12.45 Mindleader Speaking Sessions & Expert Panel
Track 1:Cybersecurity II
Track 2:Mobile & Cloud Security II
Track 3:Data Protection II
Track 4:Trends & Innovation II
12.45 - 14.00 Expo & Networking & Lunch-Break
14.00 - 16.00
Track 1: Shark Tank
Track 2: Masterclasses
“Welcome to Sweden”
Track 3: Identity & Access
Management
Track 4: Compliance & Governance
n
n
n
n
n
n
n
n
n
n
n
n
Exhibition opens
PROGRAM
9.15
Thought Leader Session
Breaking the ground: Cloud of Clouds
In the future digital age, no business will be successful unless it makes the most of the cloud. How to connect eas-ily and securely to the applications and the data you need, independently of where they are hosted. How the cloud of clouds-vision builds on a roadmap for future service delivery and is underpinned by a wide range of services and industry sector solutions. All about the next-generation of federated cloud IT!
8.15
Registration
8.45
Though Leader Session
Cyber Fraud Impact on Utilities, Financial Services the Insurance Industry
BT Group
Speaker TBA
About BT Group
BT is one of the world’s leading communications services companies, serving the needs of customers in the UK and in more than 170 countries worldwide. Their main activities are the provision of fixed-line services, broadband, mobile and TV products and services as well as networked IT services.
In the UK they are a leading communications services provider, selling products and services to consumers, small and medium sized enterprises and the public sector.
BT Group also sell wholesale products and services to communications providers in the UK and around the world. Globally, they supply managed networked IT services to multinational corporations, domestic businesses and national and local government organisations.
8.40
Opening
Tuesday, 3rd of November
PROGRAM
n Cyber Security n Mobile & Cloud Security
Cyber security has the greatest impact on our under- standing on security in coming years
The distinction between physical and digital is blurring, what implications this means to security?
What are the main five strategic trends which you should follow in cyber security?
Hear from the Best Security Company 2014, awarded by SC Magazine
How to lower the cost of compliance by delivering critical security intelligence on demand
How to automate the full spectrum of auditing, compliance and protection for IT systems and web applications
About Jarno
Jarno Limnéll works as a professor of cyber security in Aalto University in Finland and also as a VP (cyber security) in Insta Group Plc. Prof Limnéll has a long exprience on security issues and he holds a doctor´s degree in Military science.
About Qualys
Qualys, Inc. is a provider of cloud security, compliance and related services for small and medium-sized businesses and large corporations based in Redwood Shores, California
Prof. Jarno Limnell, INSTA, VP Cyber Security & Business development and Aalto University
Qualys, Speaker TBA
The future trends of cyber security Cloud is the platform of opportunity for business transformation
9.45
Caught between a Tsunami and a Knife-Fight
Cloud computing and its impact on IT Security pros
About Arbor Networks
Arbor Networks is a software company which sellsnetwork security and network monitoring software, used – according to the company’s claims – by over 90% of all Internet service pro-viders.The company’s products are used to protect networks from denial-of-service attacks, botnets, computer worms, and efforts to disable network routers.
Will future enterprise computing will be treated as a utility?
Why security staff need to help business executives understand why configuration management is worth doing
What to do to not lose control over your IT infrastructure
What’s the incident response in the new era of targeted attacks?
How to address emerging DDoS attacks and advances threats
What’s the solution? ...Layered protection backed by global threat intelligence
Arbor Networks, Speaker TBA
In discussions around cloud computing, security is often highest on the list of concerns. But what about its impact on IT Security pros?
10.15
PROGRAM
n Data Protection n Trends & Innovation
Data is the holy grail of the 21st century. However, gone are the days when consumers took a back seat in protecting their data online.
However, as humans starts leaving a digital footprint, what are governments and the EU doing in terms of data protection, and how can enterprises ensure that they protect 3rd party data?
Billions of products will be connected by 2020. While the potential it offers to enterprises and customers alike is huge, so are the threats and risks of smart products entering into contact with each other. A Reddit user posted a story about a boss’s computer that was infected with malware after plugging an infected e-cigarette into the USB port to recharge. What are the solutions?
The holy grail of the 21st century How the Internet of Things and Smart Services will Change Society
IAM & IoT are not necessarily enough. Why we are going more and more towards applying these technologies in the area of other businesses
Why the Industrial Internet, Critical Infrastructure and Finance gain more attention
9.45
Orchestrate all security controls Gamification in IT Security - Boost awareness in IT security training
About Tufin
Tufin is a network security company specializing in the management of next generation and network layer firewalls, routers, network switches, load balancers and other network security devices; IoT, Software defined data center, Hybrid Cloud Services
About David
David is a security evangelist who is currently working as Senior Security Researcher for Kaspersky Lab. He is respon-sible for not only research but also technical PR activities in the Nordic and Benelux region where his tasks often include vulnerability research and management, penetration tests, se-curity research and public speaking engagements. David has about 15 years of experience working in the IT security field.
One of the most efficient methods to strengthen network security is to orchestrate all security controls throughout the entire network.
How to ensure that both perimeters and the internal security controls (on physical and cloud platforms) are orchestrated to maximize security
How to prevent intrusion and how to effectively contain vulner-abilities when detected
Tufin, Speaker TBA
What can we learn from common gamification in the real?
Listen to successful case studies and best practices
How to implement the principles of gaming to a business problem?
David Jacoby, Senior Security Researcher, Kaspersky Lab
10.15
About Palo Alto
Palo Alto is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider net-works from cyber threats. They are the fastest growing security company in the market. Their security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. Because these functions are natively built into the platform and share important information across the respective disciplines, Palo Alto ensure better security than legacy firewalls, UTMs, or point threat detection products.
With the persistent nature of today’s attacks, applications can easily be compromised when security is not considered in each phase of the development lifecycle.
Palo Alto, Speaker TBA
What applications are being hacked – and How
Why perimeters and firewalls are no longer enough
Why every app needs to be self-aware and self-protecting
Rikard Kullenberg, Regional Sales Manager, Arxan
Tagline Font: Myriad Pro RegularBold 12pt
PROGRAM
Defend - Detect - React
n Cyber Securityn Mobile & Cloud Security
How to plan your cyber-security strategy
How t stay current on privacy concerns and technologies like IPS?
How to enter the net level of actionable threat intelligence?
Staying ahead of the ever-changing cyber- security threat landscape
11.30
10.45
Expo Visit & 1-2-1 Meetings
Expert PanelExpert Panel
12.00
12.45
Expo Visit & 1-2-1 Meetings
When your content is user generated and your product empow-ers people in their daily lives, how can you protect them against fraud, cams and criminal activities?
Understanding who is behind them—their motives and methods—can provide a more nuanced understanding of cybersecurity trends.
Beyond any geopolitical tensions, socio-economic trends influ-ence the path of cyber activity—particularly that of criminals. Criminality thrives in environments with large IT-literate popu-lations and relatively lax law enforcement around cybercrimes. Examples include Russia, Brazil, India and South Africa.
PROGRAM
Protecting your users (from themselves) White Collar Crime, Artificial Intelligence and Seeker Bots: The Profile of the Modern Fraudster
n Data Protection n Trends & Innovation
11.30
10.45
Expo Visit & 1-2-1 Meetings
Expert Panel Expert Panel
12.00
12.45
Expo Visit & 1-2-1 Meetings
PROGRAM
Welcome to Sweden: Distributors mapping the Scandinavian IT Security market: Vol. 1
n Shark Tank n Masterclass Room: Entering the Scandinavian Market
Start-uppers, Innovators, Thought Leaders and stablished non-Scandinavian vendors who are seeking partnership in the Nordics, brand and present their breakthrough thoughts 10 minute pitches to exclusively selected investors and distribu-tors who are interested in reviewing and investing.
14.00 - 16.00 14.00
Welcome to Sweden: Distributors mapping the Scandinavian IT Security market: Vol. 2
14.00
PROGRAM
About Bomgar
Control, monitor and manage privileged access to critical systems by insiders and vendors. Gain visibility and define how users connect, without hindering productivity.
Learn how to enable efficient and scalable IA processes using Enterprise GRC and ERM processes. Leverage latest tools in a “Governance as a Service” implementation. Enable Audit effec-tiveness to present in real time Audit Committee Dashboards eliminating Excel and any form of reporting redundancy. Enable global Collaboration in real time with Governance Chatter with Internal Audit co-sourced partners as well as External Audit partners. This is the Audit process of the future.
Stretch & Break established IAM
Changes brought on by cloud computing, mobile endpoint adoption and and external identity providers stretch and break established IAM architectures and and challenge security lead-ers to deliver successful IAM programs.
Implementing “Any Time, Any Device, Any Where”
What are the major trends for IAM moving forward toward 2020?
How IAM functionality and delivery models must change to be ready
How identify standards must evolve to support the change
Bomgar, Speaker TBA
14.00
n Identity & Access Management n Governance & Compliance
14.00
About SafeNet
SafeNet, Inc. is an information security company based in Belcamp, Maryland, United States. It is notably one of the largest suppliers of encryption technology to the United States Government. SafeNet and Gemalto join forces, becoming the world’s leading provider of data, transaction, and identity pro-tection solutions for enterprises, governments, and financial institutions. Authentication, Encryption, Software Monetization.
Building an Enterprise Risk Management (ERM) program can be challenging. For organizations struggling to gain organiza-tional buy-in, the investment required in purpose-built tech-nology to enable self-assessment, association with corporate objectives, risk aggregation, adjusted risk weightings, and centralized reporting can be daunting. Even with conceptual agreement from management to tackle ERM, if an organiza-tion’s size prohibits a large investment, balancing the cost of “doing it right” with the potential rewards can be challenging in the early stages-particularly when the organization is still trying to figure out what “right” looks like.
Beyond Passwords: Something You Have, Something You Know, Something You Are
For years, passwords have provided a sense of security online, but today the question is whether a password alone is enough. Advances in biometrics and security tokens can offer an ad-ditional layer of security and are already being embraced by many industries.
Budget Friendly, Yet Effective ERM
SafeNet, Inc., Speaker TBA
14.00 14.00
PROGRAM
n Shark Tank n Masterclass Room: Entering the Scandinavian Market
14.00 - 16.00 15.00
Welcome to Sweden: Distributors mapping the Scandinavian IT Security market: Vol. 3
Start-uppers, Innovators, Thought Leaders and stablished non-Scandinavian vendors who are seeking partnership in the Nordics, brand and present their breakthrough thoughts 10 minute pitches to exclusively selected investors and distribu-tors who are interested in reviewing and investing.
16.00 - 18.00
Expo Visit & 1-2-1 Meetings
PROGRAM
About Ping Identity
Ping Identity delivers single sign-on and identity management with their SAML SSO. We provide increasing IT security and provide secure mobile access.
Ping Identity, Speaker TBA How can organizations realize the obvious financial benefits of the cloud while ensuring information culled from public cloud sources is secure and trustworthy?
The answer is governance. Learn how governance practices and principles apply in today’s cloud and hybrid cloud/on -premises data environments.
n Identity & Access Management n Governance & Compliance
15.00 15.00
Chatter about the cloud is everywhere. You can’t turn on your TV, look at your smart phone, open a magazine, or browse web sites without being inundated with messages about the cloud. Proponents tell you the cloud will save you time, give you a place to store data, a way to manage hard drive space on your phone, and much, much more. Detractors will scare you with stories of hackers gaining access to personal photos and bank account numbers. In the realm of business information technology, the conflicting stories are much the same: will the cloud will save you money on your balance sheet, or the cloud will expose your sensitive data to unwanted prying eyes?
The Case For Next Generation IAM
What’s the three big trends driving industry changes?
What is the future state of smart devices?
Hear about a paradigm shift and the next generation IAM.
Information Governance and the Cloud
16.00
Thought Leader Session:
Paying with Apples - Secure?Attackers increase focus on mobile payment systems. Mobile payment systems were the talk of 2014 after Apple stormed ahead with Apple Pay. As consumer adoption of mobile devices approaches 100 percent, mobile identity can become more useful than passwords, physical identifications, or any other mechanism to verify identity.
New approaches around mobile identity technologies are enabling more companies in the payments chain to effectively par-ticipate in stopping fraud. While the merchant was typically on the sidelines hoping others would protect their transactions and prevent fraud, they can now proactively take actions of their own. With the ubiquity of mobile phones, there is little barrier to consumer adoption, and simple API integrations mean rapid deployment.
16.45 Closing
17.00 After Work Networking & Drinks
18.00 Closing of Expo
LOCATION
StockholmsmässanStockholm, Sweden
VenueWe chose the Nordics largest meeting place for our this years IT Security Forum! Stockholmsmässan is located approximately ten kilometers south of Stockholm City.
How to get there:
By Public Transportation
There are 8-14 commuter train departures every hour from Stockholm Central Station to Älvsjö Station, which is only a 200-meter walk from Stockholmsmässan’s Main entrance. The journey takes just ten minutes.
The commuter train from Arlanda Airport also stops at Älvsjö station. The train departs two times an hour and the journey takes 47 minutes. The train departs from Sky City, between terminals 4 and 5.
By car
Take the E4/E20 and follow the signs for Mässan/Älvsjö.
Adress: Mässvägen 1, Älvsjö
www.stockholmsmassan.se
Introducing Anastasia Lodhi
Limited tickets available for FREE: www.nordicitsecurity.com/register-today/
As a partner manager with the Nordic IT Security Forum, Anastasia has been developing and managing sponsorship programs for this leading Scandinavian IT Security Forum with great sucess. With her dedication and creativity, she ensures the best business value to the partners and unforgettable events for the audience.
“Annual Nordic IT Security Forum has been marked as Scandinavia’s leadership forum and it represents a blend of top-tier strategic discussion with over 300 minutes of structured com-mercial networking for C level decision makers from private and public sectors. Book your participation, influence the content and benefit from extended marketing campaign.”
Anastasia Lodhi
Partner Manager
+46 (0) 723 273 999
Introducing Anastasia Lodhi
I look forward to working with you!
PARTNERSHIP