days
hours
minutes
seconds
November 3rd 2020
Time 08:30 - 14:45
Live digital event
Online
Free admission
November 3rd 2020, 08:30 - 14:45
Live digital event
Free admission
Cyber security and cyber-defense are topics that everybody knows something about, but not everyone are experts. It is even more important to secure your data and your company now than ever before. The threats are out there waiting for its time to shine – but don’t worry – there are several possibilities to avoid getting attacked and in worst case scenario loose money, data and confidential knowledge. By attending this Strategic IT Security conference, you get the opportunity to listen to and learn from leading experts due to cyber security. No one wants to gamble with cyber security and confidential knowledge, and it is therefore essential for the IT department to gain the right tools and knowledge about how you can defend yourself from getting attacked by criminals. There are a lot of questions to ask about what, how, where etc. when you want to start protecting your data, and this conference will be giving you the answer to your questions. Furthermore, this conference will be your opportunity to obtain all the inputs from experts that can help both you and your customer’s data.
As a participant at the digital conference Strategic cyber-defense 2020, you can live stream presentations from experts and leading suppliers, ask questions and participate in the digital breakout session - all moderated by Computerworld's skilled editor Lars Jacobsen.
Strategic IT Security 2020 is being hosted by Computerworld Denmark together with the film and video production company Make Sense Film, who are experts in professional digital conference.The strategies and experiences of how you can avoid the consequences of crashes and hacker attacks
Connect, network and knowledge-sharing with the leading experts and companies that might help you find your security solution
Is it worth the time and the money to invest in cyber security? The easiest answer is YES
Insights into how other companies defend themselves from getting attacked
Graham Cluley
Security analyst
grahamcluley.com
Tim Hoefsloot
Regional Director Benelux & Nordics
Thycotic
Marley Hasselbach
Senior Commercial Manager
Darktrace
David Shepherd
Vice President, Sales Engineering
Ivanti
Nick Jones
Senior Security Consultant, Cloud Security Lead
F-Secure
Sebastian Molinder
Sales Engineer
Veritas
Magnus Carling
CISO
Stena AB
Christian Rutrecht
Director, System Engineering
Fortinet
Frank Yue
Principal Application Experience Architect and technology evangelist
Kemp
Mikael Wikström
Senior Technical Advisor - Nordics
SailPoint
Teemu Ylhäisi
CISO
OP Financial Group
Jakob Schjoldager, redaktør, Computerworld
Graham Cluley, Security analyst, grahamcluley.com
Computer security veteran Graham Cluley describes the biggest threats facing business today, and how cybercriminals are exploiting the Coronavirus crisis, taking advantage of the disruption to steal information from organizations, compromise networks, scam the unwary, and even endangering lives.
Tim Hoefsloot, Regional Director Benelux & Nordics, Thycotic
Privileged Access Cloud Security: Insider Tips and Best Practices
As the adoption of cloud applications and services accelerates, organizations across the globe must understand and manage the challenges posed by privileged access from remote employees, third parties, and contractors. With 77% of cloud breaches due to compromised credentials, making sure your users get easy and secure access to the cloud should be a top priority.
Join Thycotic as they explain a practical approach to help you define and implement privileged access cloud security best practices.
What will I learn?
Marley Hasselbach, Senior Commercial Manager, Darktrace
The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of global or even regional crises, and while sections of the economy are slowly re-opening, cyber-attackers are ramping up their campaigns.
As businesses look set to rely on cloud and SaaS tools for the long term, our digital environments are going to be more dynamic than ever. Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is introduced also brings unforeseen risk. Static, legacy approaches have become redundant, both unintelligent and ill-equipped to adapt.
Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience. Darktrace is the world leader in cyber AI technology, and leverages unsupervised machine learning to seamlessly adapt and integrate into changing environments, and to detect and respond to attacks in the earliest moments.
In the face of an uncertain present and future, Cyber AI enables businesses to continue communicating, operating, and innovating.
David Shepherd, Vice President, Sales Engineering, Ivanti
When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially.
Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment.
Gain some quick tips on how to execute continuous vulnerability management effectively so you can protect your organization before a threat actor hits.
Thomas B. Zuliani, Director, Information Security & Data Privacy, Pandora
Deliver IT in a secure & efficient way, to obtain satisfied customers. I see IT completely embedded into the business processes, adding value to the end product.
Nick Jones, Senior Security Consultant, Cloud Security Lead, F-Secure
There have been several high-profile cloud breaches over the past few years, with one incident leading to an $80 million dollar fine for the organization involved. The cloud presents its own unique security benefits and challenges, which requires a fresh look at the defensive security posture of an organization.
This presentation will outline the key attack vectors currently being exploited by attackers targeting cloud accounts, and explain the key security controls that participants can use defend themselves.
Sebastian Molinder, Sales Engineer, Veritas
The importance of having control over one's data has increased significantly, but this is unfortunately also reflected in the complexity, as the amount of data grows rapidly each year.
Since your data can be located across local and cloud platforms, the complexity of managing and relating to data has become opaque. The requirement to be compliant with the GDPR, CIS20 or ISO27001 can quickly become unmanageable when we look down at the points that deal with data.
Veritas will review how to get the full overview of your data and how to classify it.
Jakob Schjoldager, redaktør, Computerworld
Magnus Carling, CISO, Stena AB
Hear how Stena AS has defined their IT security strategy. What are their main IT security issues and how they protect them selves against the cyber threats?
Christian Rutrecht, Director, System Engineering, Fortinet
Since I started in the industry I have always wondered how Security is prioritized and why we struggle to solve security problems that we have known for 10+ years or more. A lot of Security Certifications like CISSP, SANS, ISO etc. explains in theoretical terms how risks should be prioritized and calculated, but fail - in my view - to make it digestible to the organizations non-security folks. For this I have experimented with what I call the “Broken leg” theory to help companies prioritize and optimize control trough a Security Fabric approach.
During the presentation we introduce the “broken leg” approach, how it might assist in your Security strategy and how to gain the upper hand with a Security Fabric approach.
Frank Yue, Principal Application Experience Architect and technology evangelist, Kemp
Load balancers provide network and application security benefits in addition to the agility and elasticity that we expect. They are network firewalls, authentication enhancers, and web application firewalls protecting application content. Inherently, load balancers improve the security profile of any network and application.
We look at how your IT security improves with load balancers supporting your applications. Learn how the load balancer’s reverse proxy technology is designed to protect the application infrastructure. Understand why load balancers are a fundamental component to more advanced and content-aware security functions.
Mikael Wikström, Senior Technical Advisor - Nordics, SailPoint
Alexander Honnold who is the ultimate in Zero Trust, Free Solo shows how companies can embrace the principles across all the users, apps, data and environments.
With the collapse of the security perimeter and the principle of trust no one, in this session you will understand how companies can go Free Zero Trust Solo….
Teemu Ylhäisi, CISO, OP Financial Group
Jakob Schjoldager, redaktør, Computerworld
Do you want to be a partner at Strategic IT Security 2020? See more info here
You can live stream all sessions, ask questions and participate in the digital breakout session – all moderated by Computerworlds chief editor.
Get Insights into experts’ outlook on the cloud future
Get insight into the strategic cloud choices leading Nordic CIOs have made
Get Insight into how leading suppliers and analysts view the market and existing products