Strategic IT Security 2021

Focus on cyber threats, trends, and tools


00

days

:
00

hours

:
00

minutes

:
00

seconds

April 22nd 2021

Time 09:00 - 14:30

Live digital event

Online

Free admission

April 22nd 2021, 09:00 - 14:30

Live digital event

Free admission

About Strategic IT Security 2021 Conference

Strategic IT Security 2021 – Nordic Digital Conference

IT-security has become a strategic discipline, that combines management, behavior, process, and technology.

Strategic IT Security 2021 is about the IT-security landscape right now, and an in-depth overview of the latest trends, solutions, and tools in the fields of cyber security and cyber defense.

Join us as we focus on risk assessments, the current threat landscape, and the technological solutions that, combined, can increase safety.

At Strategic IT Security 2021 leading experts and vendors will provide input on where to focus your efforts for maximum gain, how you plan your IT security efforts strategically, and what to do when hackers hit your business?

By attending this Strategic IT Security 2021 conference, you get the opportunity to listen to and learn from leading experts.

This is what ”Strategic IT Security 2021” is all about.

Strategic IT Security 2021 is an interactive digital conference

As a participant in the digital conference Strategic IT Security 2021, you can live stream presentations from experts and leading suppliers, ask questions and participate in the digital breakout sessions - all moderated by Computerworld's skilled editors.

Strategic IT Security 2021 will focus on the never-ending story about security and cyber-defense, and how you can defend your business and your customer’s data and information. Together with several leading experts and digital executives from all over the Nordic countries, this conference seeks to give you the best input to focus even more on cyber security in the future.

The strategies and experiences of how you can avoid the consequences of crashes and hacker attacks

Connect, network and knowledge-sharing with the leading experts and companies that might help you find your security solution

Is it worth the time and the money to invest in cyber security? The easiest answer is YES

Insights into how other companies defend themselves from getting attacked

Meet the speakers Strategic IT Security 2021

Keynotes:

Mikko Hyppönen

Mikko Hyppönen

Chief Research Officer

WithSecure

Peter Kruse

Peter Kruse

CISO

Clever

Christian Dinesen

Christian Dinesen

Information Security Architect

Carlsberg Group

Speakers:

Jakob Schjoldager

Jakob Schjoldager

redaktør

Computerworld

Elise Stark-Johansen

Elise Stark-Johansen

Account Manager

Darktrace

Thomas Svensson

Thomas Svensson

Senior Product Engineer

Thycotic

Ronald Pool

Ronald Pool

Cyber Security Specialist

Crowdstrike

Thomas Grønne

Thomas Grønne

Direktør for sikkerhed

Conscia

Christian Rutrecht

Christian Rutrecht

Director, System Engineering

Fortinet

Niamh Muldoon

Niamh Muldoon

Senior Director of Trust and Security

OneLogin

Yuval Moss

Yuval Moss

VP Identity Security

Cyberark

Søren Elnegaard Petersen

Søren Elnegaard Petersen

Engaged CSO and co-owner

Arbit Cyber Defense Systems

George Chereches

George Chereches

Passionate Sales Engineer

OPSWAT

Programme

Program punkt Program punkt

Welcome

Jakob Schjoldager, redaktør, Computerworld

09:00
Program punkt Program punkt

Securing our future

Mikko Hyppönen, Chief Research Officer, WithSecure

Security landscape never stands still. We see new kinds of threats from new kinds of attackers all the time. As the enemy changes, we security people need to change as well. Our job is to protect the security and privacy of our users. Our duty is to do it in a fair and open way. And our responsibility is to keep our promises for our users, regardless of the attackers' action.

09:05
Program punkt Program punkt

Changing cyber landscapes: The battle of algorithms

Elise Stark-Johansen, Account Manager, Darktrace

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:
- Paradigm shifts in the cyber landscape
- Advancements in offensive AI attack techniques
- The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
- Real-world examples of emerging threats that were stopped with Cyber AI

09:30
Program punkt Program punkt

The kitchen table admin – how to securely meet the new operational and privileged access challenges, without impacting productivity

Thomas Svensson, Senior Product Engineer, Thycotic

Remote workers have their own unique set of challenges under normal circumstances, throw into the mix many trusts are having to re-draw the perimeter defense line while ensuring safe access and application control against the backdrop of a huge spike in the volume of threats and security incidents. Join this session to find out about some powerful, smarter ways to control administrative privileges and reduce your attack surface, without slowing anyone down!

09:50
Program punkt Program punkt

Embracing a challenging year to position for future success

Ronald Pool, Cyber Security Specialist, Crowdstrike

While many organisations struggled in the last year, some were actually in the lucky position to thrive during the pandemic. We have especially seen sales & stock prices of companies, who facilitated work from home, reach all-time highs. But in the long run, it is not just those companies, that will profit from the challenges that 2020/21 brought. For quite a number of companies this sped up their digital transformation massively, allowing them to be more agile, have less cost for pysical offices, optimize workflows and ultimately have a competitive edge over other companies, that excpect to go back to 'the old ways'. However, fast digital transformation is not per se a flawless transformation, and some new risks may have been introduced. Risks that could change this competitive edge into a digital nightmare.
In this session we will take a look at some common mistakes that we have seen in this quick shift to work from home, and the implications on an organization's cyber security, when moving to work from home in haste.

10:10
10:30

Break

Program punkt Program punkt

Your IT Security landscape - Origin, destination and travel guide

Thomas Grønne, Direktør for sikkerhed, Conscia

Do you have an overview of your IT security landscape? What does it look like currently, and what does the preferred destination look like?

In this session you will hear:
- how to access your current security landscape
- which route to take to move you forward
- how to avoid tourist traps that offer no real value
- what your end destination could look like

The road map is called CIS20
You will get inside knowledge of the CIS20 framework, and how to use it as a travel guide.

You will hear specific customer cases from others, who have travelled the road towards a safer, more understandable security setup. And you will also learn how big vendors, like Cisco Networks, fit into your travel plans, e.g. showing you how to swim in ICE-filled waters like a viking.

10:45
Program punkt Program punkt

The never-ending story of phishing, what can we do about it?

Christian Rutrecht, Director, System Engineering, Fortinet

Since the early days of mail correspondence as a primary platform for communication Spam and Phishing has been a daily threat for the companies and its employees to combat. The first phishing attack originated around 1995 and just like in other aspects of cybercrime and malicious activity, the threat actors phishing activity has exponentially exploded and has become an ever-evolving way to compromise companies and organizations.

During the presentation we go over some of the new methods that the malicious actors use for phishing & malware delivery, including technics that is used for avoiding detection. To be able to combat these threats better in the feature and keep adapting, it is not just about technology, but processes and more importantly the integration of the two.

Learn more about how the Fortinet Security Fabric can support the organizations processes and policies, to technically enforce mitigation, remediation strategy and reporting.

11:05
Program punkt Program punkt

To trust, or not to trust the cloud; That is your compliance and risk question

Niamh Muldoon, Senior Director of Trust and Security, OneLogin

Many organisations struggle with digital transformation and cloud computing, particularly when implementing a framework to meet their compliance requirements. In this session, we will discuss a framework and operational approach to support you in moving your business forward, delivering quality services, balancing cost and risk.

11:25
11:45

Break

13:00

Welcome back

Program punkt Program punkt

Cyber threats and trends

Peter Kruse, CISO, Clever

13:05
Program punkt Program punkt

Why a zero trust mindset drives an identity centric security strategy

Yuval Moss, VP Identity Security, Cyberark

As Organizations continue to adopt and embrace new technology platforms, it also brings with it the requirement to reassess how these new environments are secured.

During this session we run through the Tactics, Techniques and Procedures used in recent breaches and highlight the commonality across them; identity compromise and privilege elevation.

We will share recommendations on how to protect against Credential Theft, Lateral Movement and Privileged Escalation across Hybrid and Cloud environments.

13:25
Program punkt Program punkt

Your security perimeter will be breached – We protect the ‘crown jewels’

Søren Elnegaard Petersen, Engaged CSO and co-owner, Arbit Cyber Defense Systems & George Chereches, Passionate Sales Engineer, OPSWAT

With today’s standard cyber security measures, businesses are being compromised and Government agencies shut down. Therefore, we cannot continue to rely on a single network with everything connected nor a single protection technology.

The presentation will take you on a brief tour of 3 technologies used to protect critical and high security networks, assets and data within intelligence services, police, governments and armed forces.

@Arbit we do things differently and we believe that we can do more. Do more to keep businesses, citizens and governments safe - and together with OPSWAT we would very much like to inspire you to protect your ‘crown jewels’.

13:45
Program punkt Program punkt

5 things that an IT security specialist should have on the check list

Christian Dinesen, Information Security Architect, Carlsberg Group

Christian Dinesen is an experienced IT security specialist and he will introduce your to which 5 things are absolutely necessary to master in order to successfully protect your company from outside threats.

14:05
Program punkt Program punkt

Wrap up

Jakob Schjoldager, redaktør, Computerworld

14:25

Meet our partners at Strategic IT Security 2021

Partners

Meet our partners at Strategic IT Security 2021

Partners

Production partner:

Do you want to be a partner at Strategic IT Security 2021? See more info here

Why attend?

You can live stream all sessions, ask questions and participate in the digital breakout session – all moderated by Computerworlds chief editor.

Get Insights into experts’ outlook on the cloud future

Get insight into the strategic cloud choices leading Nordic CIOs have made

Get Insight into how leading suppliers and analysts view the market and existing products

billede

Tilmeldingen er lukket!