Strategic IT Security 2020









November 3rd 2020

Time 08:30 - 14:45

Live digital event


Free admission

November 3rd 2020, 08:30 - 14:45

Live digital event

Free admission

About Strategic IT Security 2020 Conference

Strategic IT Security 2020 – Nordic Digital conference

Cyber security and cyber-defense are topics that everybody knows something about, but not everyone are experts. It is even more important to secure your data and your company now than ever before. The threats are out there waiting for its time to shine – but don’t worry – there are several possibilities to avoid getting attacked and in worst case scenario loose money, data and confidential knowledge. By attending this Strategic IT Security conference, you get the opportunity to listen to and learn from leading experts due to cyber security. No one wants to gamble with cyber security and confidential knowledge, and it is therefore essential for the IT department to gain the right tools and knowledge about how you can defend yourself from getting attacked by criminals. There are a lot of questions to ask about what, how, where etc. when you want to start protecting your data, and this conference will be giving you the answer to your questions. Furthermore, this conference will be your opportunity to obtain all the inputs from experts that can help both you and your customer’s data.

This Strategic IT Security 2020 is an interactive digital conference

As a participant at the digital conference Strategic cyber-defense 2020, you can live stream presentations from experts and leading suppliers, ask questions and participate in the digital breakout session - all moderated by Computerworld's skilled editor Lars Jacobsen.

Strategic IT Security 2020 is being hosted by Computerworld Denmark together with the film and video production company Make Sense Film, who are experts in professional digital conference.

Strategic IT Security 2020 will focus on the never-ending story about security and cyber-defense, and how you can defend your business and your customer’s data and information. Together with several leading experts and digital executives from all over the Nordic countries, this conference seeks to give you the best input to focus even more on cyber security in the future.

The strategies and experiences of how you can avoid the consequences of crashes and hacker attacks

Connect, network and knowledge-sharing with the leading experts and companies that might help you find your security solution

Is it worth the time and the money to invest in cyber security? The easiest answer is YES

Insights into how other companies defend themselves from getting attacked

Meet the speakers Strategic IT Security 2020

Graham Cluley

Security analyst

Tim Hoefsloot

Regional Director Benelux & Nordics


Marley Hasselbach

Senior Commercial Manager


David Shepherd

Vice President, Sales Engineering


Nick Jones

Senior Security Consultant, Cloud Security Lead


Sebastian Molinder

Sales Engineer


Magnus Carling


Stena AB

Christian Rutrecht

Director, System Engineering


Frank Yue

Principal Application Experience Architect and technology evangelist


Mikael Wikström

Senior Technical Advisor - Nordics


Teemu Ylhäisi


OP Financial Group



The digital doors open - login and check audio and video

program-billede program-billede


Jakob Schjoldager, redaktør, Computerworld

program-billede program-billede

Business as usual: How cybercrime is booming during the pandemic

Graham Cluley, Security analyst,

Computer security veteran Graham Cluley describes the biggest threats facing business today, and how cybercriminals are exploiting the Coronavirus crisis, taking advantage of the disruption to steal information from organizations, compromise networks, scam the unwary, and even endangering lives.

program-billede program-billede

PAM For the Cloud and In the Cloud

Tim Hoefsloot, Regional Director Benelux & Nordics, Thycotic

Privileged Access Cloud Security: Insider Tips and Best Practices

As the adoption of cloud applications and services accelerates, organizations across the globe must understand and manage the challenges posed by privileged access from remote employees, third parties, and contractors. With 77% of cloud breaches due to compromised credentials, making sure your users get easy and secure access to the cloud should be a top priority.

Join Thycotic as they explain a practical approach to help you define and implement privileged access cloud security best practices.

What will I learn?

  • Key privileged access security challenges facing your cloud users
  • Best practices for securing cloud privileged access
  • Proven approach to implementing secure privileged access for remote workers and third parties

program-billede program-billede

Securing the future of work with cyber AI

Marley Hasselbach, Senior Commercial Manager, Darktrace

The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of global or even regional crises, and while sections of the economy are slowly re-opening, cyber-attackers are ramping up their campaigns.

As businesses look set to rely on cloud and SaaS tools for the long term, our digital environments are going to be more dynamic than ever. Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is introduced also brings unforeseen risk. Static, legacy approaches have become redundant, both unintelligent and ill-equipped to adapt.

Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience. Darktrace is the world leader in cyber AI technology, and leverages unsupervised machine learning to seamlessly adapt and integrate into changing environments, and to detect and respond to attacks in the earliest moments.

In the face of an uncertain present and future, Cyber AI enables businesses to continue communicating, operating, and innovating.

program-billede program-billede

Continuous Vulnerability Management: Achieving a 14 Day SLA on Vulnerability Remediation

David Shepherd, Vice President, Sales Engineering, Ivanti

When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially.

Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment.

Gain some quick tips on how to execute continuous vulnerability management effectively so you can protect your organization before a threat actor hits.



program-billede program-billede

How to approach the task as a new CISO

Thomas B. Zuliani, Director, Information Security & Data Privacy, Pandora

Deliver IT in a secure & efficient way, to obtain satisfied customers. I see IT completely embedded into the business processes, adding value to the end product.

program-billede program-billede

How breaches happen in the cloud

Nick Jones, Senior Security Consultant, Cloud Security Lead, F-Secure

There have been several high-profile cloud breaches over the past few years, with one incident leading to an $80 million dollar fine for the organization involved. The cloud presents its own unique security benefits and challenges, which requires a fresh look at the defensive security posture of an organization.

This presentation will outline the key attack vectors currently being exploited by attackers targeting cloud accounts, and explain the key security controls that participants can use defend themselves.

program-billede program-billede

Dark data assessment

Sebastian Molinder, Sales Engineer, Veritas

The importance of having control over one's data has increased significantly, but this is unfortunately also reflected in the complexity, as the amount of data grows rapidly each year.

Since your data can be located across local and cloud platforms, the complexity of managing and relating to data has become opaque. The requirement to be compliant with the GDPR, CIS20 or ISO27001 can quickly become unmanageable when we look down at the points that deal with data.

Veritas will review how to get the full overview of your data and how to classify it.



program-billede program-billede

Welcome back

Jakob Schjoldager, redaktør, Computerworld

program-billede program-billede

Case: Stena AB

Magnus Carling, CISO, Stena AB

Hear how Stena AS has defined their IT security strategy. What are their main IT security issues and how they protect them selves against the cyber threats?

program-billede program-billede

Good is the Enemy of Great Security

Christian Rutrecht, Director, System Engineering, Fortinet

Since I started in the industry I have always wondered how Security is prioritized and why we struggle to solve security problems that we have known for 10+ years or more. A lot of Security Certifications like CISSP, SANS, ISO etc. explains in theoretical terms how risks should be prioritized and calculated, but fail - in my view - to make it digestible to the organizations non-security folks. For this I have experimented with what I call the “Broken leg” theory to help companies prioritize and optimize control trough a Security Fabric approach.

During the presentation we introduce the “broken leg” approach, how it might assist in your Security strategy and how to gain the upper hand with a Security Fabric approach.

program-billede program-billede

Security by proxy: Enhancing application security through load balancers

Frank Yue, Principal Application Experience Architect and technology evangelist, Kemp

Load balancers provide network and application security benefits in addition to the agility and elasticity that we expect. They are network firewalls, authentication enhancers, and web application firewalls protecting application content. Inherently, load balancers improve the security profile of any network and application.

We look at how your IT security improves with load balancers supporting your applications. Learn how the load balancer’s reverse proxy technology is designed to protect the application infrastructure. Understand why load balancers are a fundamental component to more advanced and content-aware security functions.

program-billede program-billede

Free solo and zero trust

Mikael Wikström, Senior Technical Advisor - Nordics, SailPoint

Alexander Honnold who is the ultimate in Zero Trust, Free Solo shows how companies can embrace the principles across all the users, apps, data and environments.

With the collapse of the security perimeter and the principle of trust no one, in this session you will understand how companies can go Free Zero Trust Solo….

program-billede program-billede

Creating impact with cyber security culture transformation

Teemu Ylhäisi, CISO, OP Financial Group

program-billede program-billede

Ending the day

Jakob Schjoldager, redaktør, Computerworld


Meet our partners at Strategic IT Security 2020


Meet our partners at Strategic IT Security 2020


Production partner:

Do you want to be a partner at Strategic IT Security 2020? See more info here

Why attend?

You can live stream all sessions, ask questions and participate in the digital breakout session – all moderated by Computerworlds chief editor.

Get Insights into experts’ outlook on the cloud future

Get insight into the strategic cloud choices leading Nordic CIOs have made

Get Insight into how leading suppliers and analysts view the market and existing products


Tilmeldingen er lukket!