Tack för i år!

Den 22 september samlades över 450 säkerhetspersoner på Rival i Stockholm för att under en heldag nätverka, inspireras och få ny kunskap från ledande it-säkerhetsexperter. Årets huvudtema var identitet och bjöd på en uppskattad mix av anonymitetens för- och nackdelar i en digital värld. Talarnas presentationer hittar du nedan.

Stort tack till dig som deltog! Vi hoppas att det var givande och att dagen bjöd på nya intressanta möten med branschkollegor. Vi lovar att göra allt vi kan för att göra Next Generation Threats 2016 ännu bättre. Din åsikt är viktig – har du förslag på hur vi kan förbättra oss till nästa år får du gärna maila oss på event@techworld.se

Vi ses nästa år!

Next Generation Threats

Next Generation Threats är inte ditt gamla vanliga it-säkerhetsevent. Här är det inga talare som försöker skrämma dig, säger åt dig att köpa deras produkter och sedan bara drar. Next Generation Threats är ett heldagsevent fyllt av avslöjanden och detaljer som ger dig både ny kunskap och en chans att delta i diskussionen med talarna som finns med under hela dagen. Här är chansen för dig att bli bättre på ditt jobb, få kunskaper om hur du skyddar din it-infrastruktur bättre och att träffa kollegor som står inför samma utmaningar som du.

Anmäl ditt intresse till NGT 2016 redan nu så kontaktar dig först av alla så fort vi har öppnat registreringen och lanserat programmet

  • Du förbinder dig inte till någonting i detta läge och din e-postadress kommer inte att föras vidare till någon extern part.
  • This field is for validation purposes and should be left unchanged.

Tack till årets talare

Agenda

08.00

Registreringen öppnar

Välkommen till Next Generation Threats Stockholm.
Se till att befinna dig på plats i god innan programmet drar igång och njut av en kopp rykande gott kaffe.

09.00

Dagen inleds

Magnus Aschan, tidigare chefredaktör på TechWorld med många år
av bevakning av branschen i bagaget, inleder dagen.

Moderator: Magnus Aschan

09.20

Keynote: Bruce Schneier ”The Future of Incident Response”

Protection and detection can only take you so far, and breaches are inevitable. As a result, response incident response has stepped into the spotlight. This session will examine the economic and psychological forces within the computer security field and describe the future of incident response (IR) and thus, the industry. It will discuss how response technology, unlike detective and preventative controls, must augment people rather than replace them. Understanding the implications of this reality requires a systems theory approach to IR. This session borrows one from the US Air Force: OODA loops. By leveraging the cycle of observe orient, decide, and act, this session demonstrates how we can optimize IR efforts, and deliver valuable insight into what is arguably the most crucial discipline to maintaining IT security in the coming decade.

Bruce Schneier, CTO, Resilient Systems

Green room talks: How the view on identity has changed

10.30

Kaffepaus

Passa på att kolla in vilka bekanta och nya ansikten som också är här.

11.00

”Trust as the no. 1 enemy of security: the client systems study”

We are forced to trust a lot of things: the files we receive or websites we
visit, that they are not going to exploit bugs in our (trusted) apps, the (trusted) software we use has no backdoors built in or added by 3rd parties. Also that the (trusted) OS components are secure and can protect our data, that the underlying (trusted) firmware and hardware is not subverting security mechanisms implemented by our (trusted) Operating System.

The more trust we are forced into, the less secure our digital lives are, of course. Trust is the #1 enemy of security. Is there anything we can do about it? What’s the smallest reasonable amount of trust we need in case of a typical client (desktop) system today? Can trust be distributed?

Joanna Rutkowska, Founder of Invisible Things Lab & Qubes OS Project

Green room talks: To be or not be anonymous

12.00

Partnerpass: ”Is it possible to have too much privacy?”

Cryptography is essential for keeping your data out of the wrong hands, and invaluable for your privacy. Is it possible to have too much privacy? At what point does an overabundance of privacy reduce your data security?  Who can you trust?

James Tucker, Security Engineer, Intel Security EMEA

12.15

Partnerpass: ”Strong becomes weak: How the new cyber threats impact large companies and organizations”

The list of high-profile data breaches in recent time can be made very long. It has demonstrated the importance of knowledge about data security on board level. The question is no longer if companies will be breach, but rather when your company will be breached. A well implemented strategy is often the key to minimizing the damage when a data breach occurs.

Albert Kinney, Director of Cyber Security Capabilities, US Public Sector at HP Enterprise Services.
Previously worked at the US Navy with cyber warfare as an area of expertise

12.40

Lunch

Halvvägs in i programmet äter vi en mingellunch och rensar hjärnan för det som komma skall.

13.40

”Defending information in a complex reality”
Länkar till MSB undersökning 1 och 2

IT-services in modern organizations are growing more and more complex and distributed. Today we face geographically distributed systems of systems that can span continents and where the parts can be owned and managed by many different organizations. Jan Wünsche will explore the impact this has on security and what some of the consequences may be. How will attackers try to take advantage of the new landscape? What are the similarities and differences between the impact on civilian and military organizations?

Jan Wünsche, Information Assurance Strategist, MUST

Green room talks: Next generation cyber threats

14.25

Kaffepaus

Nu laddar vi med godsaker för att ta oss an dagens sista pass.

14.55

“APT, cybercrime and cyber warfare exposed”

In This Live Session Marcus Murray will perform a live demonstration of the tools and techniques used by cybercriminals and cyber warriors today. He will demonstrate how they penetrate your network and how they make their attacks undetectable from conventional antivirus and evade IDS solutions.
Finally he will show you how they expand their initial foothold to complete domain compromise and finally how they obtain their goal and exfiltrate your data.

Marcus Murray, Cyber Security Manager, TrueSec

Green room talks: How do we identify us in our digital life?

15.55

KEYNOTE: CHARLOTTA ÖHLÉN ”IDENTITY CRISIS – SAY WHAT?”

Charlotta will elaborate on the new threats that comes from everything and everyone getting connected as well as focus on unknown possibilities and share experiences from real life customer scenarios.

Charlotta Öhlén, Consulting Director, neXus

16.35

Dagen avrundas

Vi sammanfattar dagens insikter och utsikter kring vår tids identitetskris.

Moderator: Magnus Aschan

Anmäl ditt intresse till NGT 2016 redan nu så kontaktar dig först av alla så fort vi har öppnat registreringen och lanserat programmet

  • Du förbinder dig inte till någonting i detta läge och din e-postadress kommer inte att föras vidare till någon extern part.
  • This field is for validation purposes and should be left unchanged.

Tack till våra partners

Intel Security

McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation, empowers businesses, the public sector, and home users to safely experience the benefits of the Internet.

The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe.

Combitech

RSA

HP

Kontakt

Tveka inte att kontakta oss
om du har några frågor!

event@techworld.se

 Anna Nilsson
Event Director
+46-8-453 61 11
anna.nilsson@idg.se

Viktor Sandberg
Marknadsansvarig
+46-8-453 60 73
viktor.sandberg@idg.se