nordic it security forum 2015 agenda

20
Stockholmsmässan November 3 rd 2015, Stockholm, Sweden 8 th annual information security forum Nordic IT Security #nordicitsec Limited tickets available for FREE: www.nordicitsecurity.com/register-today/ 70+ Exhibitors 25+ Speakers 600+ Minutes of networking www.nordicitsecurity.com Partners 2015 Riga, Latvia Data Security Solutions Platinum Partners Gold Partners Silver Partners Partners Media Partners

Upload: copperberg

Post on 25-Jul-2015

64 views

Category:

Education


2 download

TRANSCRIPT

Page 1: Nordic IT Security Forum 2015 Agenda

Stockholmsmässan November 3rd 2015, Stockholm, Sweden

8th annual information security forum

Nordic IT Security#nordicitsec

Limited tickets available for FREE: www.nordicitsecurity.com/register-today/

70+ Exhibitors 25+ Speakers 600+ Minutes of networking

www.nordicitsecurity.com

Partners 2015

Riga, LatviaData Security Solutions

Platinum Partners

Gold Partners

Silver Partners

Partners

Media Partners

Tagline Font: Myriad Pro RegularBold 12pt

Page 2: Nordic IT Security Forum 2015 Agenda

EDITOR’S NOTE

Cybersecurity is experiencing enormous growth, as an industry and as a theme in the daily lives of people and businesses using technology. And because our technology keeps changing at an astounding rate, threats are evolving fast too – with cybercrimi-nals finding new and creative ways to exploit users and technology all the time. To combat the threat in 2015, information security professionals must understand the trends.

2014 has been a year of what seems like a never-ending stream of cyberthreats and data breaches, affecting banks, retailers, gaming networks, governments and more. We’ve seen more evidence that manufacturers of Internet of Things (IoT) devices have failed to implement basic security standards. Internet of Things attacks move from proof-of-concept to mainstream risks. Furthermore mobile payment systems were the talk of 2014 after Apple stormed ahead with Apple Pay.

The patchwork nature of regulation around the world is likely to become an increas-ing burden on organizations. The law moves slowly compared to the technology and security fields, but massive regulatory changes that have been a long time coming are very nearly here.

This year’s Nordic IT Security will take place on November 3rd, 2015 in Stockholm and will gather senior IT security professionals from across the Nordics and industry verticals to cover key areas of concerns for organizations from both public and private sector. Over the course of one day, you will experience recent case studies, insightful demos, dedicated roundtables, in-depth workshops, technological lightning talks, and plenty of networking opportunities to give you greater insight on strategic implemen-tations of the latest technology showcased in the Exhibition Hall.

I look forward to meeting you in Stockholm.

Heidi Scheiffele Content Director Nordic IT Security 2015

CONTENT2 Editor’s Note

3 Advisory Board

4 Participants Profile

5 What our delegates say

6 Features

7 Sharktank

8 Conference at a Glance

9-17 Program

18 Location

19 Seeking a Partnership

Page 3: Nordic IT Security Forum 2015 Agenda

ADVISORY BOARD 2015

Anne-Marie Eklund Löwinder, Head of Security, .SEAnne-Marie is Head of Security at .SE. She has been ranked as one of Sweden’s foremost experts on IT security by the magazine Computer Sweden. She is a member of the board of CENTR, of IRI (The Swedish Law and Informatics Research Institute), the foundation for Development of Telematiques (TU-stiftelsen) and SNUS (the Swedish Network Users’ Society). She is furthermore a member of the information security council of the Swedish Civil Contingencies Agency (MSB) and is one of the handful of individuals assigned as Trusted Com-munity Representative and participates in the DNSSEC key generation for the internet root zone as Crypto Officer, appointed by ICANN (the internet Corporation for Assigned Names and Numbers). She is also a member of the swedish Digitalization Commissions expert group. Ms. Eklund Löwinder was also a member of the very first groups that helped the Swedish Standards Institute (SIS) and Swedac to develop what now is known as the ISO 27000-standard for information security management.

Paolo Balboni, Founding Partner of ICT Legal Consulting & Scientific Director of the Euro-pean Privacy Association Paolo Balboni (Ph.D.) is a top tier European ICT, Privacy & Data Protection lawyer and serves as Data Pro-tection Officer (DPO) for multinational companies. Dr. Balboni is a Founding Partner of ICT Legal Consulting (ICTLC), a law firm with offices around the world. He provides legal counsel across Europe to multinational companies specializing in the fields of Personal Data Protection, Data Security, Information and Communication Tech-nology (ICT), and Intellectual Property Law. Dr. Balboni has considerable experience in Information Technolo-gies including Cloud Computing, Big Data, Analytics, and the Internet of Things, Healthcare, Insurance, Banking, Anti-Money Laundering (AML) and Counter-Terrorist Financing (CFT). Dr. Balboni is the Scientific Director of the European Privacy Association based in Brussels, the Cloud Computing Sector Director and Responsible for Foreign Affairs at the Italian Institute for Privacy based in Rome.

David Jacoby, Senior Security Researcher, Kaspersky LabDavid is a security evangelist who is currently working as Senior Security Researcher for Kaspersky Lab. He is responsible for not only research but also technical PR activities in the Nordic and Benelux region where his tasks often include vulnerability research and management, penetration tests, security research and public speaking engagements. His day to day job is about improving awareness of the current and future threats and vulnerabilities to which Internet users are exposed and fight cybercrime. David has about 15 years of experience working in the IT security field. This have given him the opportunity to work in many interesting fields such as: Vulnerability and Threat Management, Customer Experience, Penetration Testing, Development and Fighting Cybercrime.

Karen Lawrence Öqvist, CEO, Digital TracePrivacy Advocate & Expert - Cannot be Controlled - Cannot be Manipulated - Let the Voice of the Citizen be heard!” is her personal tagline. Karen cares passionately about the right to personal privacy and the right of ownership of our digital identities, Personal Identifying Information (PII), and our digital footprint. She is an author, speaker and entrepreneur, with an MSc Information Security (Royal Holloway University of London) and an MBA (Henley, Reading University). With over 20 years experience in information security, her career has taken her from UK to: Cern in Geneva, Novell in Zurich, Stockholm, and Hewlett-Packard. She is today CEO of Dgtlb Information Security AB and President of Digital TRACE in Sweden and Norway.

Mika Kataikko, Director, Cyber SecurityMika Kataikko is director for Cyber Security both in the Jyväskylä Regional Development Company Jykes Ltd. and in the national Cyber Security business development program driven by the Finnish Funding Agency for Innovation (Tekes). Mika has a long and diverse background in the Telecom, ICT and Security busi-nesses, in the positions from supervisory role to product and product area life cycle management, including also quality and security related management and development responsibilities. His versatile job history gives him a wide experience and viewpoint in the different areas of businesses and business making, especially in the areas of ICT and Cyber Security.

Ulf Berglund, M.Sc, CISM, President, Cloud Security Alliance SwedenUlf Berglund is the president of the Swedish chapter of CSA, Cloud Security Alliance, a worldwide organization. He is also co-author of the book Guide to the Cloud. Ulf has a long experience from leading positions in the field of information security. He has a background as an officer, his last active years he was principal officer, IT security and information security expert at the Military Intelligence and Security Service (MUST). He has held positions as CTO, senior consultant and senior consultant for companies such Pointsec, Ernst & Young and Technology Nexus. Ulf’s consultant and the experience derived from companies like Scania, Swedish Match, the Stockholm Stock Exchange (OMX), the Swedish Central Bank, Apoteket AB (pharmacy) and Hennes&Mauritz AB. He has his own company, U&I Security Group AB.

Per Thorsheim, Security Adviser, God Praksis ASPer Thorsheim works as an independent security adviser, based in Bergen, Norway. He is the founder and main organizer of PasswordsCon.org, the worlds first and only conference about passwords. He has a personal project on convincing the world to implement RFC3207 STARTTLS support for opportunistic email encryption. Per was a finalist for the annual Rosing IT security award in 2012, and was awarded the Com-manding General of the Norwegian Armed Forces Cyber Defence Coin in spring 2014 for his contributions to information security. He also claims to know your next password. He currently holds the CISA and CISM certifications from ISACA, and CISSP-ISSAP from (ISC)2.

Page 4: Nordic IT Security Forum 2015 Agenda

43% were partners

showcasing their tools, solutions and products

to support our delegates

PARTICIPANTS PROFILE 2014

57%were end users

looking for new ideas, processes, and

solutions

260+

Participants attended our 7th

Edition

Job Titles

(ISC)2 Sweden.SE24 Solutions AB2makeIT ABAbsolute SoftwareAccumulateAcronis InternationalAdvanze ConsultingAdvenicaAirWatchAltemarkAmentorAndritzAP4ArbetsförmedlingenArbor Networks UK Ltd.Arctic Innovation GroupArxan Technologies Inc.Ascom Network TestingASSA ABLOY ABAvepointBackBoxBGTG ABBlocketBomgar CorporationBorderlight ABBuypass ASCapricode OyCarspect ABCDON GroupCGICGI Sverige ABCloud Security AllianceConsistor WebTechCSISCybercomDanderyds SjukhusDanderyds Sjukhus ABDe Visscher ConsultingDeltaco ABDgtlb Information Security ABDIGILEDirectis RelationsEgoSecure GmbHEkonomistyrningsverketEnterCardEntrust Inc.ErcomEricssonEricsson ABErik Thun ABExclusive NetworksEyasysFinancial ART SolutionsFinansiell ID-Teknik BID ABFootBalance System LtdFörsäkringskassanGentekniknämndenGiesecke & DevrientGod Praksis ASGoogleGoyada ABH&MHammarskiöld&CoHI3G Access AB

Hi3G Danmark ApSHMS Industrial Networks ABHPHåbo kommunIBMICA ABICT Legal ConsultingIISPInera ABInfrasec sweden ABIT TotaliZettle ABJordbruksverketJyväskylä Regional Development Company Jykes Ltd.Kallmyra System & Produktion ABKarolinska InstituteKaspersky LabKBZKIKikusema ABKnivsta kommunKPMGKrisberedskapsförbundet POSOMKSM ConsultoriaKTHLandstinget BlekingeLandstinget i Jönköpings LänLaninet SolutionsLantmännenLequaMarginalen BankMcAfee N.A. ABMigrationsverketMobiTVMyndigheten för samhällsskydd och beredskap (MSB)NackademinNasdaqNaturvårdsverketNBC ABNearshore business solutionsNet EntertainmentNet Entertainment NE ABNIU IFMONokiaNordeaNordea BankNorsk Tipping ASNorwegian Hull ClubNRD CS / InfobaltOpen InvestOpen Invest OY LtdOP-Pohjola GroupPanda Security Sweden ABPBRPeab Support ABPedab SwedenPensionsmyndighetenPowerbit Security ABProjectplaceQualysQualys TechnologiesRadpoint ABRiksdagsförvaltningen

RiksgaldenRiksrevisjonenRoplan ABSafeNetSamhallSCBSchneider ElectricSEBSecMaker ABSecure MailboxSecurEnvoySICS Swedish ICTSICS Swedish ICT – Security LabSkandiabankenSkatteverketSLSLUSMS PasscodeSMS PASSCODE A/SSocialstyrelsenSoftronic ABSolarflare CommunicationsSoprano DesignSpar Nord Bank A/SSSABStay Secure Sweden ABStockholm County PoliceStockholms Läns LandstingStokabStorebrand ASASuper Micro Computer, Inc.Svea Ekonomi ABSwedbank ABSweDeltaco ABSwedish Armed ForcesSwedish Customs Law EnforcementSwedish Gene Technology Advisory BoardSwedish National Police BoardTeleTrusT – IT Security Association GermanyTeliaSoneraTraceTrafikverketTriOptimaTrusteqTS SolutionsTullverketU&I Security grpUppsala kommunUppsala UniversitetWapack LabsWatchguardVattenfall ABVattenfall Eldistribution ABVeriscanVerizonVirtual Management ABVodafoneYrkesförmedlingenÅFÅlandsbanken AbpÖrebro läns landsting

Participating Organizations

CIO

CISO

CTO

Head of Information Security

Head of IT

Director Cyber Security

Head of IT Infrastructure

Senior Compliance Manager

Enterprise Architect

Page 5: Nordic IT Security Forum 2015 Agenda

“The Nordic IT Security 2014 was a good sanity check for verifying that we are on the right track and dealing with the relevant issues in regards to information security”

- Information Security Architect, EnterCard

“Very useful, rich in content and good opportunity for networking”

- Managing Director, InfoSecure Nordics

“A different, but exciting way to learn from others experiences”

- IT Security Manager, Försvarsmakten

“This conference is getting better every year! A good mix of vendors and industry specialists”

- Chief Trust Officer, Projectplace

“The concept is good: presentations and round table discussions. Preselected subjects is a good way to focus on certain topics, and meet people sharing the similar interests”

- Product Manager, Ericsson

“Det var bra föredrag och nyttiga diskussioner kring säkerhetsfrågor”

- IT Security Manager, Swedish Court of Patent Appeals

WHAT OUR DELEGATES SAY

Page 6: Nordic IT Security Forum 2015 Agenda

BEFORE THE CONFERENCE

Nordic IT Security SocialThe Nordic IT Security Forum has a long history and an extended network of IT security experts. Meeting once a year to dis-cuss and honor these relationships seemed a bit rare to us, our partners and delegates. Join our informal Social After Works, exclusively for the Nordic IT Security community and bring friends, your peers and people that are interested in IT Security.

6th of May Sheraton Hotel, Stockholm Sweden, 17:00-19:00

1-to-1 MeetingsTo ensure the best possible networking onsite, take advantage of the online meeting system before the conference so that you can schedule private meetings with the peers that you want to meet.

Keynote Visionary keynote sessions will open and close the conference, giving the audience an inspirational look into the future of IT Se-curity, and what they can expect to change in the coming years.

TracksA diversity of key topics within IT Security will be discussed in several dedicated tracks. Each track has several focus ses-sions, so that participants can go deeper into each topic.

ExpoVisit the on-floor exhibition where the leading vendors, new-comers and experts showcase technologies and services.

Networking Extend your network, do business, generate leads, meet peers and have a cup of coffee with the ones you’ve always wanted to chat with in networking dedicated breaks and meeting hubs.

AT THE CONFERENCE

27th of August Location TBA, Stockholm Sweden, 17:00-19:00

8th of October Location TBA, Stockholm Sweden, 17:00-19:00

Shark tankOur IT Security Shark Tank gives you the opportunity to brand and present your breakthrough thoughts to exclusively selected investors and distributors who are interested in reviewing and investing.

Page 7: Nordic IT Security Forum 2015 Agenda

SHARK TANK

Who can join? Start-uppers

Innovators

Thought Leaders

Established non-Scandinavian vendors who are seeking partnerships in the Nordics

Evaluation Criteria Investment profile - What is the amount of investment & type of partnership you are looking for?

Market potential - Describe the viability & selling potential

Investment profile - What is the investment, review or type of partnership you are looking for?

Background and history within IT Security - How much experience do you have, what’s your or your companies profile?

Pitch requirements - The applicant will present only trustworthy industryrelevant information and will not solely rely on speculations and forecasts. The information is transmitted in a clear, concise and attractive way for the sharks and will be presented on the 3rd of November in a separate track in front of the sharks within a 15 minutes presentation.

How it worksApply online under:www.nordicitsecurity.com and fill out our application form

Copperberg will review the applications and select the ones that meet the evaluation criteria

Receive your registration by email and prepare your 15 min. pitch

Send us your presentation until 15th of October!

Pitch the Sharks on 3rd of November 2015 at Nordic IT Security in a separate track in front of the sharks

Free to Attend

15-min Pitches

2-4 pmApply until 15th of October

Shark tankOur IT Security Shark Tank gives you the opportunity to brand and present your breakthrough thoughts to exclusively selected investors and distributors who are interested in reviewing and investing.

Page 8: Nordic IT Security Forum 2015 Agenda

CONFERENCE AT A GLANCE

16.00 - 16.45 Thought Leaders: Key Speaker Sessions

16.45 Closing of Conference

17.00 After Work Networking & Drinks

18.00 Closing of Expo

8.15 Registration

8.45 - 9.45 Thought Leaders: Key Speaker Sessions

9.45 - 10.45 Mindleader Speaking Sessions

Track 1:Cybersecurity I

Track 2:Mobile & Cloud Security I

Track 3:Data Protection I

Track 4:Trends & Innovation I

10.45 - 11.30 Expo & Networking

11.30 - 12.45 Mindleader Speaking Sessions & Expert Panel

Track 1:Cybersecurity II

Track 2:Mobile & Cloud Security II

Track 3:Data Protection II

Track 4:Trends & Innovation II

12.45 - 14.00 Expo & Networking & Lunch-Break

14.00 - 16.00

Track 1: Shark Tank

Track 2: Masterclasses

“Welcome to Sweden”

Track 3: Identity & Access

Management

Track 4: Compliance & Governance

n

n

n

n

n

n

n

n

n

n

n

n

Exhibition opens

Page 9: Nordic IT Security Forum 2015 Agenda

PROGRAM

9.15

Thought Leader Session

Breaking the ground: Cloud of Clouds

In the future digital age, no business will be successful unless it makes the most of the cloud. How to connect eas-ily and securely to the applications and the data you need, independently of where they are hosted. How the cloud of clouds-vision builds on a roadmap for future service delivery and is underpinned by a wide range of services and industry sector solutions. All about the next-generation of federated cloud IT!

8.15

Registration

8.45

Though Leader Session

Cyber Fraud Impact on Utilities, Financial Services the Insurance Industry

BT Group

Speaker TBA

About BT Group

BT is one of the world’s leading communications services companies, serving the needs of customers in the UK and in more than 170 countries worldwide. Their main activities are the provision of fixed-line services, broadband, mobile and TV products and services as well as networked IT services.

In the UK they are a leading communications services provider, selling products and services to consumers, small and medium sized enterprises and the public sector.

BT Group also sell wholesale products and services to communications providers in the UK and around the world. Globally, they supply managed networked IT services to multinational corporations, domestic businesses and national and local government organisations.

8.40

Opening

Tuesday, 3rd of November

Page 10: Nordic IT Security Forum 2015 Agenda

PROGRAM

n Cyber Security n Mobile & Cloud Security

Cyber security has the greatest impact on our under- standing on security in coming years

The distinction between physical and digital is blurring, what implications this means to security?

What are the main five strategic trends which you should follow in cyber security?

Hear from the Best Security Company 2014, awarded by SC Magazine

How to lower the cost of compliance by delivering critical security intelligence on demand

How to automate the full spectrum of auditing, compliance and protection for IT systems and web applications

About Jarno

Jarno Limnéll works as a professor of cyber security in Aalto University in Finland and also as a VP (cyber security) in Insta Group Plc. Prof Limnéll has a long exprience on security issues and he holds a doctor´s degree in Military science.

About Qualys

Qualys, Inc. is a provider of cloud security, compliance and related services for small and medium-sized businesses and large corporations based in Redwood Shores, California

Prof. Jarno Limnell, INSTA, VP Cyber Security & Business development and Aalto University

Qualys, Speaker TBA

The future trends of cyber security Cloud is the platform of opportunity for business transformation

9.45

Caught between a Tsunami and a Knife-Fight

Cloud computing and its impact on IT Security pros

About Arbor Networks

Arbor Networks is a software company which sellsnetwork security and network monitoring software, used – according to the company’s claims – by over 90% of all Internet service pro-viders.The company’s products are used to protect networks from denial-of-service attacks, botnets, computer worms, and efforts to disable network routers.

Will future enterprise computing will be treated as a utility?

Why security staff need to help business executives understand why configuration management is worth doing

What to do to not lose control over your IT infrastructure

What’s the incident response in the new era of targeted attacks?

How to address emerging DDoS attacks and advances threats

What’s the solution? ...Layered protection backed by global threat intelligence

Arbor Networks, Speaker TBA

In discussions around cloud computing, security is often highest on the list of concerns. But what about its impact on IT Security pros?

10.15

Page 11: Nordic IT Security Forum 2015 Agenda

PROGRAM

n Data Protection n Trends & Innovation

Data is the holy grail of the 21st century. However, gone are the days when consumers took a back seat in protecting their data online.

However, as humans starts leaving a digital footprint, what are governments and the EU doing in terms of data protection, and how can enterprises ensure that they protect 3rd party data?

Billions of products will be connected by 2020. While the potential it offers to enterprises and customers alike is huge, so are the threats and risks of smart products entering into contact with each other. A Reddit user posted a story about a boss’s computer that was infected with malware after plugging an infected e-cigarette into the USB port to recharge. What are the solutions?

The holy grail of the 21st century How the Internet of Things and Smart Services will Change Society

IAM & IoT are not necessarily enough. Why we are going more and more towards applying these technologies in the area of other businesses

Why the Industrial Internet, Critical Infrastructure and Finance gain more attention

9.45

Orchestrate all security controls Gamification in IT Security - Boost awareness in IT security training

About Tufin

Tufin is a network security company specializing in the management of next generation and network layer firewalls, routers, network switches, load balancers and other network security devices; IoT, Software defined data center, Hybrid Cloud Services

About David

David is a security evangelist who is currently working as Senior Security Researcher for Kaspersky Lab. He is respon-sible for not only research but also technical PR activities in the Nordic and Benelux region where his tasks often include vulnerability research and management, penetration tests, se-curity research and public speaking engagements. David has about 15 years of experience working in the IT security field.

One of the most efficient methods to strengthen network security is to orchestrate all security controls throughout the entire network.

How to ensure that both perimeters and the internal security controls (on physical and cloud platforms) are orchestrated to maximize security

How to prevent intrusion and how to effectively contain vulner-abilities when detected

Tufin, Speaker TBA

What can we learn from common gamification in the real?

Listen to successful case studies and best practices

How to implement the principles of gaming to a business problem?

David Jacoby, Senior Security Researcher, Kaspersky Lab

10.15

Page 12: Nordic IT Security Forum 2015 Agenda

About Palo Alto

Palo Alto is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider net-works from cyber threats. They are the fastest growing security company in the market. Their security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. Because these functions are natively built into the platform and share important information across the respective disciplines, Palo Alto ensure better security than legacy firewalls, UTMs, or point threat detection products.

With the persistent nature of today’s attacks, applications can easily be compromised when security is not considered in each phase of the development lifecycle.

Palo Alto, Speaker TBA

What applications are being hacked – and How

Why perimeters and firewalls are no longer enough

Why every app needs to be self-aware and self-protecting

Rikard Kullenberg, Regional Sales Manager, Arxan

Tagline Font: Myriad Pro RegularBold 12pt

PROGRAM

Defend - Detect - React

n Cyber Securityn Mobile & Cloud Security

How to plan your cyber-security strategy

How t stay current on privacy concerns and technologies like IPS?

How to enter the net level of actionable threat intelligence?

Staying ahead of the ever-changing cyber- security threat landscape

11.30

10.45

Expo Visit & 1-2-1 Meetings

Expert PanelExpert Panel

12.00

12.45

Expo Visit & 1-2-1 Meetings

Page 13: Nordic IT Security Forum 2015 Agenda

When your content is user generated and your product empow-ers people in their daily lives, how can you protect them against fraud, cams and criminal activities?

Understanding who is behind them—their motives and methods—can provide a more nuanced understanding of cybersecurity trends.

Beyond any geopolitical tensions, socio-economic trends influ-ence the path of cyber activity—particularly that of criminals. Criminality thrives in environments with large IT-literate popu-lations and relatively lax law enforcement around cybercrimes. Examples include Russia, Brazil, India and South Africa.

PROGRAM

Protecting your users (from themselves) White Collar Crime, Artificial Intelligence and Seeker Bots: The Profile of the Modern Fraudster

n Data Protection n Trends & Innovation

11.30

10.45

Expo Visit & 1-2-1 Meetings

Expert Panel Expert Panel

12.00

12.45

Expo Visit & 1-2-1 Meetings

Page 14: Nordic IT Security Forum 2015 Agenda

PROGRAM

Welcome to Sweden: Distributors mapping the Scandinavian IT Security market: Vol. 1

n Shark Tank n Masterclass Room: Entering the Scandinavian Market

Start-uppers, Innovators, Thought Leaders and stablished non-Scandinavian vendors who are seeking partnership in the Nordics, brand and present their breakthrough thoughts 10 minute pitches to exclusively selected investors and distribu-tors who are interested in reviewing and investing.

14.00 - 16.00 14.00

Welcome to Sweden: Distributors mapping the Scandinavian IT Security market: Vol. 2

14.00

Page 15: Nordic IT Security Forum 2015 Agenda

PROGRAM

About Bomgar

Control, monitor and manage privileged access to critical systems by insiders and vendors. Gain visibility and define how users connect, without hindering productivity.

Learn how to enable efficient and scalable IA processes using Enterprise GRC and ERM processes. Leverage latest tools in a “Governance as a Service” implementation. Enable Audit effec-tiveness to present in real time Audit Committee Dashboards eliminating Excel and any form of reporting redundancy. Enable global Collaboration in real time with Governance Chatter with Internal Audit co-sourced partners as well as External Audit partners. This is the Audit process of the future.

Stretch & Break established IAM

Changes brought on by cloud computing, mobile endpoint adoption and and external identity providers stretch and break established IAM architectures and and challenge security lead-ers to deliver successful IAM programs.

Implementing “Any Time, Any Device, Any Where”

What are the major trends for IAM moving forward toward 2020?

How IAM functionality and delivery models must change to be ready

How identify standards must evolve to support the change

Bomgar, Speaker TBA

14.00

n Identity & Access Management n Governance & Compliance

14.00

About SafeNet

SafeNet, Inc. is an information security company based in Belcamp, Maryland, United States. It is notably one of the largest suppliers of encryption technology to the United States Government. SafeNet and Gemalto join forces, becoming the world’s leading provider of data, transaction, and identity pro-tection solutions for enterprises, governments, and financial institutions. Authentication, Encryption, Software Monetization.

Building an Enterprise Risk Management (ERM) program can be challenging. For organizations struggling to gain organiza-tional buy-in, the investment required in purpose-built tech-nology to enable self-assessment, association with corporate objectives, risk aggregation, adjusted risk weightings, and centralized reporting can be daunting. Even with conceptual agreement from management to tackle ERM, if an organiza-tion’s size prohibits a large investment, balancing the cost of “doing it right” with the potential rewards can be challenging in the early stages-particularly when the organization is still trying to figure out what “right” looks like.

Beyond Passwords: Something You Have, Something You Know, Something You Are

For years, passwords have provided a sense of security online, but today the question is whether a password alone is enough. Advances in biometrics and security tokens can offer an ad-ditional layer of security and are already being embraced by many industries.

Budget Friendly, Yet Effective ERM

SafeNet, Inc., Speaker TBA

14.00 14.00

Page 16: Nordic IT Security Forum 2015 Agenda

PROGRAM

n Shark Tank n Masterclass Room: Entering the Scandinavian Market

14.00 - 16.00 15.00

Welcome to Sweden: Distributors mapping the Scandinavian IT Security market: Vol. 3

Start-uppers, Innovators, Thought Leaders and stablished non-Scandinavian vendors who are seeking partnership in the Nordics, brand and present their breakthrough thoughts 10 minute pitches to exclusively selected investors and distribu-tors who are interested in reviewing and investing.

16.00 - 18.00

Expo Visit & 1-2-1 Meetings

Page 17: Nordic IT Security Forum 2015 Agenda

PROGRAM

About Ping Identity

Ping Identity delivers single sign-on and identity management with their SAML SSO. We provide increasing IT security and provide secure mobile access.

Ping Identity, Speaker TBA How can organizations realize the obvious financial benefits of the cloud while ensuring information culled from public cloud sources is secure and trustworthy?

The answer is governance. Learn how governance practices and principles apply in today’s cloud and hybrid cloud/on -premises data environments.

n Identity & Access Management n Governance & Compliance

15.00 15.00

Chatter about the cloud is everywhere. You can’t turn on your TV, look at your smart phone, open a magazine, or browse web sites without being inundated with messages about the cloud. Proponents tell you the cloud will save you time, give you a place to store data, a way to manage hard drive space on your phone, and much, much more. Detractors will scare you with stories of hackers gaining access to personal photos and bank account numbers. In the realm of business information technology, the conflicting stories are much the same: will the cloud will save you money on your balance sheet, or the cloud will expose your sensitive data to unwanted prying eyes?

The Case For Next Generation IAM

What’s the three big trends driving industry changes?

What is the future state of smart devices?

Hear about a paradigm shift and the next generation IAM.

Information Governance and the Cloud

16.00

Thought Leader Session:

Paying with Apples - Secure?Attackers increase focus on mobile payment systems. Mobile payment systems were the talk of 2014 after Apple stormed ahead with Apple Pay. As consumer adoption of mobile devices approaches 100 percent, mobile identity can become more useful than passwords, physical identifications, or any other mechanism to verify identity.

New approaches around mobile identity technologies are enabling more companies in the payments chain to effectively par-ticipate in stopping fraud. While the merchant was typically on the sidelines hoping others would protect their transactions and prevent fraud, they can now proactively take actions of their own. With the ubiquity of mobile phones, there is little barrier to consumer adoption, and simple API integrations mean rapid deployment.

16.45 Closing

17.00 After Work Networking & Drinks

18.00 Closing of Expo

Page 18: Nordic IT Security Forum 2015 Agenda

LOCATION

StockholmsmässanStockholm, Sweden

VenueWe chose the Nordics largest meeting place for our this years IT Security Forum! Stockholmsmässan is located approximately ten kilometers south of Stockholm City.

How to get there:

By Public Transportation

There are 8-14 commuter train departures every hour from Stockholm Central Station to Älvsjö Station, which is only a 200-meter walk from Stockholmsmässan’s Main entrance. The journey takes just ten minutes.

The commuter train from Arlanda Airport also stops at Älvsjö station. The train departs two times an hour and the journey takes 47 minutes. The train departs from Sky City, between terminals 4 and 5.

By car

Take the E4/E20 and follow the signs for Mässan/Älvsjö.

Adress: Mässvägen 1, Älvsjö

www.stockholmsmassan.se

Introducing Anastasia Lodhi

Limited tickets available for FREE: www.nordicitsecurity.com/register-today/

Page 19: Nordic IT Security Forum 2015 Agenda

As a partner manager with the Nordic IT Security Forum, Anastasia has been developing and managing sponsorship programs for this leading Scandinavian IT Security Forum with great sucess. With her dedication and creativity, she ensures the best business value to the partners and unforgettable events for the audience.

“Annual Nordic IT Security Forum has been marked as Scandinavia’s leadership forum and it represents a blend of top-tier strategic discussion with over 300 minutes of structured com-mercial networking for C level decision makers from private and public sectors. Book your participation, influence the content and benefit from extended marketing campaign.”

Anastasia Lodhi

Partner Manager

+46 (0) 723 273 999

[email protected]

Introducing Anastasia Lodhi

I look forward to working with you!

PARTNERSHIP

Page 20: Nordic IT Security Forum 2015 Agenda