10times
logo
4.0/5

1 ratings

4th Edition Conference

IT Security Insights

13 Oct 2020Add To Calendar
7A Odenplan, Stockholm, Sweden

About Followers 43 Reviews Exhibitors 3 Photos 70 Speakers 61 Travel Deals

"Protecting Your Data Through Innovation"
Welcome to the 4th Edition of the IT Security Insights Conference. This edition will provide insights into the biggest challenges faced by organisations on the Swedish market. The main themes of the event comprise: cloud security, cybersecurity for critical infrastructures, IoT security, the new protective security Act in Sweden, legal compliance and identity governance, patch management, information security training initiatives and latest cybercrimes.

Highlights

  • 8 PLENUM PRESENTATIONS
  • 1 PANEL DEBATE SESSION
  • 6 BREAKOUT SESSIONS
  • 9 ROUND TABLE DISCUSSION SESSIONS

Timings

7:30 AM - 6:30 PM General Hours

Entry Fees

Paid Ticket Check Official Website

Participants

200
Delegates

20 Exhibitors Estimated Count

Category & Type

Conference
Security & Defense
IT & Technology

Editions

13 Oct 2020 Interested
25 Apr 2019 3rd Edition
08 Nov 2018 2nd Edition
View More

Frequency Annual

Official Links

WebsiteContacts


Report Error
Claim this event

Organizer

Logo Send Stall Book Request

ItSec Insights Sweden

Newly listed 1 Upcoming Events
+ Add me as user

User Community [ Users who have shown interest for this Event ]

Goingabdo. abdo

abdo. abdo

Hr Head at Ghhhjj

Lebanon, United States
GoingUgbechie Juliet Ekene

Ugbechie Juliet Ekene

Executive Director at First Julix Contracting Ltd

Lagos, Nigeria
GoingZahid Hasan

Zahid Hasan

Infra Analyst at AVANADE

Stockholm, Sweden
GoingFolorunso segun samuel

Folorunso segun samuel

2/clergy at Camfc ministry

Abuja, Nigeria
William Bulteel

William Bulteel

Head of research at BCMC Global

Londonderry, United Kingdom
Potoroaca Mihai

Potoroaca Mihai

Stockholm, Sweden
Robert Kitunzi

Robert Kitunzi

Event Project Manager at MatchCorp International AB

Stockholm, Sweden

Write a Review

Add Your Review
User Rating

4.0/5

1 Ratings
5
4
1
3
2
1

User Reviews

Speakers (past edition)

Speaker
Dimitrios Stergiou

Dimitrios Stergiou

CISO | Speaker | Technology enthusiast | Father | Husband... Stockholm, Sweden
Speaker
Ulf Berglund

Ulf Berglund

Works at 1150526 Stockholm, Sweden
Speaker
Richard Oehme

Richard Oehme

Director Cyber Security & Critical Infrastructure Protection at PwC... Stockholm, Sweden
Speaker
Elin van Beesel

Elin van Beesel

Senior Manager, GDPR Specialist på FCG AB Stockholm, Sweden
Speaker
Martin Schaefer

Martin Schaefer

"something with IT" United States
Speaker
Janne Haldesten

Janne Haldesten

Co-Founder and Principal Specialist at Sectyne United States
Speaker

Works at 1150526 Stockholm, Sweden

Schedule & Agenda

Filter By
Tue, 31 Mar 07:30 AM - 08:10 AM Registration
Registration Starts
Conference kicks-off with an early morning breakfast served to all participants
Tue, 31 Mar 08:10 AM - 08:30 AM Opening Ceremony
Chairman Opening Remarks, Länsförsäkringar AB
#LOKE
Tue, 31 Mar 08:30 AM - 09:00 AM Keynote
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats?, ISACA Sweden Chapter
#LOKE

Critical infrastructure requires different aspects for risk management to be considered and enforce different priorities when designing the infrastructure due to potential impact from failures, but still the basics of cyber security remain the same. In this session we will touch some of the concerns in relations to sectors of critical infrastructure addressing following questions;

  • What specific risks are necessary to manage?
  • How can providers of infrastructure products assist?
  • Is it feasible to use cloud services?

Tue, 31 Mar 09:00 AM - 09:30 AM Keynote
Swedish National Security in a global business perspective, Telia Company AB
#LOKE

This presentation will explore how the "New Swedish National Security Protection Act" is putting a lot of demands on those who are engaged in “Security sensitive activities”

Key takeaways:

  • How does the protection Act apply to a multinational and global business?
  • For whom is the Swedish National Security important?
  • Who is responsible for Swedish National Security?
  • Who will pay for the needed investments?

Tue, 31 Mar 09:30 AM - 09:55 AM Keynote
How to allow change and stay secure: A case study of the Swedish Police Authority
#LOKE

In this keynote Johanna talks about the challenges facing the Swedish Police authority. Due to the nature of police work modern tools, high availability and mobility is needed without compromising information security and confidentiality. By combining information security and technical testing and surveillance the police authority allows modernization with a high degree of control.
Key takeaways:

  • How do you stay on top of IT-security in a complex environment and a rapid development pace?

Tue, 31 Mar 09:55 AM - 10:20 AM Keynote
1500+ Cyber Investigations Later: Trends To Beware, Kroll, INc
#LOKE
Tue, 31 Mar 10:20 AM - 10:40 AM Break
Coffee Break & Networking In The Expo Area
#LOKE LOUNGE
Tue, 31 Mar 10:40 AM - 11:10 AM Workshop
Breakout Session (Vacant)
#TOR2
Tue, 31 Mar 10:40 AM - 11:10 AM Workshop
Breakout Session TBA
#TOR1
Tue, 31 Mar 10:40 AM - 11:10 AM Workshop
Automated Penetration Testing: The Latest Advance in Security Validation, Pcysys
#EMBLA 2

In this session Pcysys will discuss the value Automated Penetration Testing brings by enabling continuous risk validation and raising and maintaining your cyber resilience to the highest level. Get a glimpse of how this unique technology will provide you with prioritized cost-effective remediation and improve your network's cyber security posture.

  • Why is manual penetration not enough?
  • How does Automated Penetration testing work?
  • How can Automated Penetration testing reduce cost, increase security resilience and provide contextualized remediation suggestions?
  • How can automated penetration testing enable you to continuously validate your risk and challenge all of your security investments?


Tue, 31 Mar 11:10 AM - 11:40 PM Workshop
Breakout Session TBA
#TOR2
Tue, 31 Mar 11:10 AM - 11:40 AM Workshop
Device Visibility and Control: Build and Deploy Network Segmentation at Scale, Forescout Technologies, Inc.
#EMBLA 2

The mass expansion and proliferation of IT, IoT and OT devices poses new questions to network security: Legacy and vulnerable devices, non-compliant and misconfigured endpoints, and IoT and OT devices must all be identified. Without a complete picture of connected devices across network domains, the ability to act quickly to mitigate risks is all but lost.The increased inter-connectivity across the campus, data center, cloud and operational technology, drives a further growth in complexity in today’s networks and associated security risks

Key Takeaways:

  • Please join Forescout Technologies, Inc. in this session to learn how to build and deploy network segmentation at scale.

Tue, 31 Mar 11:10 AM - 11:40 AM Workshop
Risk Exchanges: The Key to Vendor Risk Management Efficiency
#TOR1

Your vendors often handle your most sensitive data. This presents new challenges as third-party risk, security, privacy, legal and IT teams struggle to vet and manage the vendors they rely on most.
Key takeaways:

  • OneTrust will discuss emerging vendor management trends and breakdown how risk exchanges are key to more efficient business operations

Tue, 31 Mar 11:40 AM - 12:10 PM Keynote
It’s time to rethink your model: Sassy new ideas, Zscaler, Inc
#LOKE

The future of network security is in the cloud! - There have been several major shifts in computing technology, networking, mobility and cloud. Each has caused us to rethink the ways in which we do business. In this presentation, James will provide some insights into how we got here, what the future may hold, and what you can do today to better enable your digital business.

Tue, 31 Mar 12:10 PM - 01:00 PM Lunch
Lunch Break - One-to-One Meetings
#LOKE LOUNGE
Tue, 31 Mar 01:00 PM - 02:20 PM Roundtable
Cyber Security for critical infrastructure: How to prepare and respond to cyber threats?, ISACA Sweden Chapter
#LOKE

In this round table session John will use the ENISA definition of security measures for operators of essential services (OES) to discuss what best practice and baseline security measures to be applied and relate it to our joint experience from working with cyber security.

The targeted sectors for this session include; Energy (Electricity, Oil & Gas), Transport (Air, Rail, Water, Road), Financial & Banking, Healthcare, Drinking Water Supply & Distribution, Digital Infrastructures.


Tue, 31 Mar 01:00 PM - 02:20 PM Roundtable
Major Breach Response Mistakes and How To Avoid Them
#LOKE
Tue, 31 Mar 01:00 PM - 02:20 PM Roundtable
Cloud requirements and opportunities - how can technology, law and business meet?, Sig Security
#LOKE

  • "Everything should be outsourced to the cloud!"- But is there information that cannot be outsourced? If so, which one?- How can one handle a separation between the two types of information?
  • Our confidence in the cloud suppliers- Can we have confidence in that security requirements are met? How?- What role does the Cloud Act and Patriot Act play for our trust in suppliers affected by these requirements?
  • Conflicts of interest between new business opportunities and regulatory changes- How should legislation or other regulation be modified so that new business opportunities, e.g. based on cloud services or other new technology, can be utilized?- Is it eg appropriate to specify requirements and conditions in law, or should they be given in regulations or other directions from the regulator or supervision authorities?
  • About 95% of personal data incidents reported to the Swedish Data Inspection Board (‘Datainspektionen’) are closed, and as a private individual you can never receive relevant compensation in a possible dispute.- Can we, as individuals or companies, trust GDPR to work?- Or is GDPR and ‘Datainspektionen’ just window dressing?

Tue, 31 Mar 01:00 PM - 02:20 PM Roundtable
Penetration testing: Godsend or necessary evil?, Trustly
#LOKE

The expansion of regulatory frameworks in multiple domains (e.g. PSD2, NIS, GDPR) had led to increased focus in how organizations manage their Information Security and how they verify that the deploy effective controls. One of the verifications methods suggested is the execution of a penetration test on regular (or well-defined) intervals. But, do these mandatory penetration tests add value to the target organization? Or is it just to check one more box in a long compliance checklist? 

  • What are your experience with penetration testing?
  • How can one select the most appropriate vendor for the activity?
  • What do you (as a customer of the test) want to see more of (

Tue, 31 Mar 01:00 PM - 02:20 PM Roundtable
TIBER EU, the European framework for Threat Intelligence-based Ethical Red Teaming, CSA Sweden Chapter
#LOKE

The TIBER-EU has been developed by the European Central Bank. The purpose is to establish a common framework for testing, and improving, resilience against sophisticated cyber attacks. The TIBER-EU framework has been designed for companies and organizations that are part of the core financial infrastructure, whether national or European. However, it can also be used for all types or sizes of companies and organizations in the financial and even in other sectors.
Takeaways:

  • Advantages and disadvantages of TIBER EU?
  • What obstacles need to be crossed to implement TIBER EU?
  • How can / should we prepare for the introduction of the TIBER EU framework?
  • How will TIBER EU affect your organization and your daily work?  

Tue, 31 Mar 01:00 PM - 02:20 PM Roundtable
Information Security Awareness & Training Initiatives, Secana AB
#LOKE

In this round table session, Secana will explore information security awareness and cyber hygiene as a mean to improve cyber security within organizations and, by extension, in society at large. The session will entail discussions on best practices to improve information security awareness within organisations in various sectors and at various levels, including training initiatives and exercises.

Key takeaways:

  • What does it mean to have sufficient information security awareness/cyber hygiene in an organisation?
  • What role does information security awareness play in the enhancement of societal cybersecurity and resilience?
  • What measures have been proven effective to improve information security awareness in organisations?
  • How can training initiatives and exercises improve information security awareness and skills within an organisation?

Tue, 31 Mar 01:00 PM - 02:20 PM Roundtable
“When can we achieve sufficient efficiency? With infinite ways of breaching security how do we implement countermeasures to be secure enough?”, Systembolaget
#LOKE

It is hard to keep track of our it-environment as new initiatives are taken, transformation to cloud and mobility is constantly moving. This session is a discussion about how we manage to take control over a complex situation and how we decide what countermeasures are needed to obtain adequate security.

Key takeaways:

  • How do we keep track of all attack vectors in our it-environment?
  • Guidelines, standards, ways-of-working.
  • How do we avoid overlapping, cluttering and gaps in our protection?
  • Who has the IT-security map – for real?
  • How do we define enough?

Tue, 31 Mar 01:10 PM - 02:20 PM Roundtable
Security and Compliance, Veriscan Security AB
#LOKE

Many regulations and contractual requirements are addressing information and cyber security requirements. The session has ISO 27000 series as a possible base.

Key Takeaways:

  • What are the expectations and solutions for an effective approach?
  • 3-Compliance – Yes or No – Is that the question?
  • What is expected from the security organization?
  • How will compliance affect the strategic business development?
  • How does compliance regulations affect the view on security risk management and security control sets?

Tue, 31 Mar 02:20 PM - 02:40 PM Break
Coffee Break & Networking In The Expo Area
#LOKE LOUNGE
Tue, 31 Mar 02:40 PM - 03:00 PM Keynote
“Tax by design – the Swedish model goes tech”, Swedish Tax Agency
#LOKE

The Swedish tax agency does not think that just smoothing och tuning it's old processes is enough to maintain trust from it's own customers. If we want people and businesses to keep paying tax voluntarily, we need to step up and offer them the possibility to handle tax in their own preferred environment, integrated in real time transactions. To pull this through, we need completely new technical solutions and business models. This offers many serious challenges, not the least from an it-security perspective.

Key takeaways:

  • Everyone is talking API´s, and so are we. But why has it been so hard for us to walk the talk?
  • Why is the API strategy so crucial for our transformation?
  • Securing data and the integrity of the customer in house is hard enough; How will we manage security if we share your data to others?

Tue, 31 Mar 03:00 PM - 03:45 PM Session
New Technologies and the changing Cyber Security Landscape
#LOKE

Today's increased cyber attacks and breaches have prompted us to act fast and with precision thanks to the new emerging technologies. With Ai, Machine Learning, Blockchain, Big Data, IoT and Cloud, it's safe to say we are facing a paradigm shift.

Key takeaways:

  • What are biggest challenges in terms of the new landscape?
  • Do we have sufficient skilled security workforce to drive current and future projects? Or do we need the same people in the near future as we have now?

Tue, 31 Mar 03:45 PM - 04:10 PM Keynote
Navigating the landscape of global regulatory developments for Data Protection and Privacy; Finding a path in a global company
#LOKE

More than a year on from GDPR, one could assume we all know what is needed and are implementing it all flawlessly? Are we really? Or has GDPR triggered a global evolution on data privacy regulatory reform? And do we know how to handle it? Or Who to handle it? Or who is best to handle it? These are all questions that all of us in the privacy space have encountered at least once, and we have come up with some solutions, some workable ways, in the companies we work in and the teams we drive.  The session is set up to be a knowledge sharing session, to provide some insights into how I believe a workable solution can be found, and lessons we have learnt along the way.

Key takeaways:

  • Implementing GDPR; what are the common challenges and how to overcome them
  • How does one keep track of all the global requirements?

  • Navigating agendas for Privacy; Legal, Security Compliance – working towards seamless implementation and workable synergies


Tue, 31 Mar 04:10 PM - 04:40 PM Keynote
Privilege Access Management Applied to Industrial IT-OT Processes
#LOKE

 A photograph of the current challenges in adapting Cybersecurity policies and discipline across the continuum of IT and OT. Existing risks and vulnerabilities in extending the perimeter of Cybersecurity protection across operating environments in critical infrastructures, factories, and office environments with an explosion of IOT devices and gateways. The cultural challenges of understanding what are the differences between the well standardised world of IT and the heterogenous world of operations and industrial controls. The session presents several use cases and examples from several segments. It highlights the practical challenges from companies in automotive, transport, energy and public sector who are implementing projects at the global level and are faced with significant change management processes

Ket Takeaways:

  • What IT-OT security approaches have been tried and failed . Which have worked and Why?
  • What are the key principles underlying a positive outcome?
  • What are the overall benefits in mitigating what is in essence the reputation risk of large and complex organisations?
  • What can we expect from future developments?

Tue, 31 Mar 04:40 PM - 04:50 PM Closing Ceremony
Chairman Closing Remarks
#LOKE LOUNGE
Tue, 31 Mar 04:50 PM - 06:30 PM Networking
Netwoking Cocktail Reception Starts
#LOKE LOUNGE
59.342406 18.051745

Venue Map & Directions

map of 7A Odenplan

7A Odenplan

Norrtullsgatan 6 113 22 Stockholm
Sweden

Get Directions Floor Plan

Featured Hotels in Stockholm

More Hotels