Stockholm

March 16, 2023

Click on the Fast Link buttons to learn more

Agenda

07:45

Registration

08:00

Hundreds of millions of people work in Chrome every day, and Chrome gives enterprises the controls and protections that keep corporate data safe. When paired with BeyondCorp Enterprise, businesses can secure hybrid and remote workforces and enforce context-aware access controls across managed and unmanaged devices. Google’s approach to secure enterprise browsing protects organizations for internal and external threats. By applying data loss prevention, extension controls, phishing and malware protections and more right within the browser, and giving security teams the reporting and visibility they need, Google is raising the bar on browser security.

Oliver Madden

Browser Specialist EMEA
Google Chrome Enterpris

08:05

Seated Working Roundtable Breakfast powered by Google

08:55

  • The FBI’s most recent takedown targeted some of the world’s top DDoS for hire services, and required partnerships with organizations throughout the world.
  • Learn how DDoS is likely to affect your organization, what common attacker motivations are, and tips for defense.Learn how DDoS is likely to affect your organization, what common attacker motivations are, and tips for defense.
  • DDoS is a subset of the cyber criminal ecosystem. Learn about the criminal organizations promoting these services, what they cost, and where they are sold.

Elliott Peterson

Federal Bureau of Investigation (FBI)

08:55

Having a successful security posture is more easily said than done. It takes a well-designed strategy for a host of multi-faceted parameters to come together to truly bring security to an organization.

Security Culture, being the ideas, customs, and social behaviors of an organization that influence security, is a powerful tool to help nurture and sustain that which keeps your organization safe.

In this session, we’ll be hearing from industry expert Jelle Wieringa about how you can use security culture to your advantage. Based on statistics from academic research, combined with real-world experience, you’ll hear everything you need to know to better understand what it can bring you and your organization.

In this session you will learn:

  • What defines a Security Culture;
  • How can you measure and better understand your existing security culture;
  • What are proven and practical ways to grow your security culture?

Jelle Wieringa

Security Awareness Advocate
KnowBe4

09:20

  • The zero-trust strategy dispenses with the conventional notion that businesses should trust everyone or everything that is connected to a network or protected by a firewall
  • System and network administrators should regulate access to business networks or systems based on individual users’ roles, which are defined by their job title, level of authority, and responsibility within the business
  • Human and device identification – digital identities both for humans and devices (aplications)

Teresia Wilstedt

CISO,
MedMera Bank

Anders Wockatz

CISO,
The municipality of Dals-Ed

Tomi Dahlberg

Senior Advisor Cyber Security
Valtiokonttori (State Treasury of Finland)

Thomas Evertsson

Head of IT Northern Europe
DNB Bank

Chris Dearden

Senior Sales Engineer
Delinea

09:55

Turning Level 1 Analysts into Threat Hunters

Staffan Olsen

Senior Sales Engineer
ExtraHop

10:30

As organizations have accelerated their move to the cloud, a common problem is the shortage of trained professionals with cloud security expertise. Recent research found that 84% of organizations rank themselves at the lowest level of cloud security maturity, and more than 80% of those organizations also admitted to not having a dedicated cloud security team/team lead*.

At this session, we’ll explain how to determine the cloud security maturity level of your organization and how to leverage Cloud-Native Application Protection Platform (CNAPP) to advance the maturity level.

You will learn how to:

  • Automate complex cloud security operations through meaningful visualization and step- by-step guidance.
  • Take an identity-first approach to dramatically reduce your cloud attack surface and enforce least privilege at scale.
  • Leverage Ermetic to empower stakeholders across the organization to drive accurate risk prioritization and remediation across multicloud environments.

Arick Goomanovsky

CBO & Co-Founder
Ermetic

10:55

  • What are the biggest global trends that will impact the IT and cybersec landscape (sustainability, net zero targets – people keeping laptops/phones longer – quantum computing)
  • Where does the greatest danger come from?
  • How adversely this situation has affected the industry
  • Which markets can be the target group
  • How to overcome and handle things within these situations

Thea Sogenbits

CISO,
Estonian Tax and Customs

Elpidoforos Arapantonis

Senior IT security manager
Volvo Autonomous Solutions

Anders Jared

CISO
Bravida

Lars-Gunnar Marklund

IT Security & Risk manager
Boliden Group

Fredrik Forslund

VP & GM of International Business
Blancco

11:30

Modern cloud native technologies enable you to build, deploy, and scale rapidly. But this increased complexity exposes your application to new risks and vulnerabilities. Each layer of your cloud native application – spanning your code, third party dependencies, containers, and clusters – exposes you to new security concerns. Learn how you can protect your application through clear remediation actions and best practices for each attack scenario.

Mathias Conradt

SNYK

11:55

5 Lesser-Known Open Source Security Facts

Rhys Arkins

VP of Product Management
Mend

12:00

Seated Lunch & 1-1 meetings powered by Mend

13:00

Information security are more than just protecting the business assets with help of technology. It’s even a fair deal of developing procedures, processes and employees. During this talk Tobias will guide us into why information security culture is important, but also what we need do to to get the whole organization to participate in protecting the information.

Tobias Ander

CISO
Örebro Kommun

13:25

  • Historically, shifting left has been seen as a silver bullet to reduce risk
  • Modern DevSecOps should have a strong focus on production environments
  • Fast resolution times should be prioritized over shifting left to add business value

Rickard Carlsson

Rickard Carlsson, CEO & Co-founder
Detectify