Strike back or stay on defense?

17 MAJ. MÜNCHENBRYGGERIET. STOCKHOLM

Anmäl dig till Early Bird-pris ››

Next Generation Threats Stockholm 17 maj 2017

Hoten blir allt fler och omfattande, tekniken mer avancerad och utbudet av nya lösningar ökar, men vem kan man lita på?
Är ett aktivt försvar alltid det bästa för verksamheten eller är det mer tidskrävande och kostsamt för vad det egentligen ger?
När traditionella säkerhetslösningar inte håller måttet längre handlar det om att tänka om och tänka nytt – hela tiden.

En strategi för att spåra cyberinkräktare, och även slå tillbaka mot dem, är inte alltför långsökt. Det handlar om att skapa mer proaktiva skydd och om att utnyttja nya säkerhetsstrategier i kombination med de redan beprövade. På Next Generation Threats i Stockholm den 17 maj tittar vi närmare på effektiva arbetssätt och lösningar för att bemästra morgondagens hot.

Årets program belyser:

  • Ansvar och medvetenhet inom it-säkerhet

  • Cybercrime – strategiska samarbeten för att kunna slå tillbaka

  • GDPR – det innebär de nya reglerna för dig och så förbereder du organisationen

  • Threat modeling & Resilience – metoder för ett aktivt försvar

  • Machine learning & AI

  • Så bygger du ett starkt moln och säkra IoT-lösningar

Just nu 1 000 kr rabatt på biljetten!

Möt några av talarna som kommer till Stockholm i maj

Klicka på respektive talare för att läsa mer. Listan uppdateras löpande med nya namn.

Inspiration och kunskap i världsklass

Dagen bjuder på en uppskattad mix av ledande it-säkerhetsexperter som delar med sig av sina erfarenheter och tips på hur du skyddar dig mot morgondagens allt aggressivare hot. Under våra uppskattade Green Room Talks lyfts aktuella ämnen där diskussionerna mellan talarna tas till en helt ny nivå. Här har du chansen att själv delta och få svar på just dina frågor från en sittande expertpanel direkt på plats.

08.00

Registreringen öppnar

Se till att befinna dig på plats i god tid innan programmet på scen drar igång och starta dagen med en rykande färsk kopp kaffe.

08.00

Frukostseminarium 2: Hur ska man förbereda sin organisation inför nya dataskyddsreglerna?

Under ett intressant frukostseminarium får du en översikt på den nya dataskyddsförordningen som träder i kraft 2018 och vad dessa regler innebär för krav på tekniska och organisatoriska förändringar vid hantering av information. Caroline kommer även att dela med sig av sina tips på hur man som organisation bäst kan förbereda sig inför införande av de nya reglerna och förslag på vilka åtgärder man redan nu bör planera och vidta för att minska risken att bryta mot reglerna.

Caroline Sundberg, Advokat - Specialist IT-rätt, Delphi

Observera: Kräver separat (kostnadsfri) föranmälan. Mer information kommer närmare eventet.

08.55

Next Generation Threats drar igång!

Dagens moderator Marcus Murray välkomnar och öppnar dagen.

09.00

Opening Keynote: Kim Zetter

Kim Zetter is an award-winning investigative journalist and book author who has been covering computer security and the hacking underground since 1999, first for PC World magazine and more recently for WIRED, where she wrote about security, cybercrime, surveillance and civil liberties for more than a decade. She has broken numerous stories over the years and has three times been voted one of the top 10 security reporters in the US by her journalism peers and security industry professionals. She's considered one of the world's experts on Stuxnet, a virus/worm used to sabotage Iran's nuclear program, and has published a book on the topic - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.

Kim Zetter, Journalist & Author 

09.45

Cyber security's biggest weakness: the human element

Cyber security is understood to be about people, process and technology. Yet, for too long, we have failed to address the human elements of this problematic subject to the same extent as the technological ones. The true core of cyber security is about protecting information that we create, share and store in ever-advancing ways from threats that are growing exponentially in the digital age. When we look at the threats, and how they become reality, it is apparent that cyber security is fundamentally about people as much as it is about technology. In this engaging and interactive presentation, Jessica will explore why the human element is the biggest problem facing cyber security and what we can do to communicate cyber security messages more effectively and encourage positive behavioural change. In unpicking the inherently human nature of cyber security, this session will help you empower people to become your first line of defence, not your weakest link.

Dr Jessica Barker, Leading expert on cyber security

GREEN ROOM TALK

Individual, organisational, governmental or global- whose responsibility is the future of protection?

Today's IT threats are of the most serious we've seen in history. Companies, organizations, governments and of course individuals must constantly guard against the global lurking threats. Along with the increased complexity in data networks, the stakes are high and the human error a great risk. Entering a dragged out and costly blame game about responsibility is common. But really- what comes first? Do we need to ask governments to stretch the laws to allow a grey area in terms of hacker's expertise? Is it up to companies and organisations to lend a helping hand to contribute and take responsibility? What role does the authorities play in terms of the over-all IT security? Bottom line is techniques needs to be up to date with new technology- but whose responsibility is this?

Kim Zetter, Dr Jessica Barker, Ian Amit & TBA

10.35

Kaffepaus

Vi fyller på energinivån med en god förmiddagsfika i utställningsområdet och passar på att nätverka!

11.05

The authorities' perspective on how to globally fight cyber crime 

TBA

11.35

Hacking international law and governments interest groups

The practice of information security and "cyber" has been long regarded as another domain when considering international diplomacy and politics. NATO has officially recognized the cyber domain in relation to article 5, and nation states have been practicing the extension of their political activities through espionage and intelligence in that domain for years. In this session, we will discuss how the practice of hacking has shifted the balance of power and added complexity to the practice of diplomacy and international law, while creating more opportunities for interest groups to affect government practices and regulation.

Ian Amit, Senior Manager of Security Engineering, Amazon

GREEN ROOM TALK

Cybercrime - The hacker's role vs. Authorities & Governments

A hacker's love of programming is not just a commitment to culture but requires a great skill when it comes to codes and computers. But is the motivation to solve problems and developing new technical knowledge enough when Governments usually have the last word? Surely we've heard of bug bounty programs to enhance the importance of a streamlined collaboration in between them two. But what happens with the collaboration when the threats comes from outside and authorities close their doors to a hackers collaboration? Technology and innovation goes with the speed of light, how come building up a solid collaboration takes longer? Does a role always need to mean economic incentives, or can a collaboration be motivated in more ways than one?

Kim Zetter, Dr Jessica Barker, Ian Amit & TBA

12.25

Keynote Partner: SecureLink
How to securely embrace the cloud - A use case of how SecureLink has embraced the cloud

An insatiable appetite for compute and storage resources, combined with cloud-first development initiatives to support your business, is driving a data centre transformation that incorporates the public cloud as a means of more rapidly addressing your growing data center demands.

From a security perspective, the responsibility for protecting your public cloud is shared between both the provider and the user – you. It is up to you to ensure satisfaction with the steps a provider has taken to protect the public cloud environment. It is also up to you to make sure you take the necessary steps to protect your applications and data in the public cloud.

Marcus Bengtsson, CTO, SecureLink Sweden

12.40

Lunch

Passa på att nätverka med branschkollegor och partners över en god lunch i utställningsområdet med stans bästa utsikt över Stockholm.

13.40

Parallella kunskapsspår

Efter lunch får du ta del av de hetaste lösningarna inom it-säkerhet i två parallella spår. Passen är 20 minuter långa med en 5 minuters bensträckare mellan varje spår så att du hinner gå emellan. Spåren lanseras inom kort.

Är du intresserad av att synas här? Kontakta oss för mer information.

13.40 - 14.00

TBA

13.40 - 14.00

TBA

14.05 - 14.25

Mimecast

14.05 - 14.25

Gemalto

14.50

Kaffepaus

Vi fyller på energinivån med en god eftermiddagsfika i utställningsområdet och passar på att nätverka!

15.20

Threat Modeling in Minutes

Threat modeling is an important aspect of securing any system whether software or network, but what investment is appropriate? Many businesses may need to consider nation-state attacks and other high-powered threats, but for other organizations the threats are much more docile.  The weeks or months of time and resources spent on creating sophisticated threat models and factoring in every detail may not be justified for every environment. The more sensible approach for many businesses out there is a lightweight application of the same methodology. As an industry, we've made threat modeling and analysis much more complicated than it really needs to be.  Window Snyder, co-author of Threat Modeling, will describe a practical approach to make an investment in threat modeling that fits your business needs.

Window Snyder, Chief Security Officer, Fastly

15.50

Resilience: an alternative to Active Defense

Building in resilience to infrastructure is a compelling alternative to Active Defense. Resilience is the property of materials that are elastic instead of brittle. Under stress, resilient materials stretch and revert to their original shape instead of shattering. This is the model for how we should design and build our cyber infrastructure, but our approach to security thus far has been oriented towards brittleness instead. For example, classical approaches to software security have focused on hardening software against implementation vulnerabilities rather than repelling their exploitation through rapid detection and response to artifacts of attacks. There are many reasons why the hardening approach benefits the attacker compared to the approach of repelling exploitation. In this talk, Dino will describe why and how an defensive approach based primarily around resilience and repelling exploitation shifts the advantage from attackers to defenders.

Dino Dai Zovi, Co-founder / CTO, Capsule8

GREEN ROOM TALK

Strategies to battle current threats: Striking back is active defense?

As threats are becoming more extensive, we encounter more advanced technology and the range of new solutions is increasing, who can we trust? Is an active defense always the best for the business, or can it be more time-consuming to maintain and be more expensive in terms of what it actually offers?

When traditional security solutions just don't meet the needs of a company or an organisation - how do we prioritize our strategy of defence? Where should we keep our focus in this fast-paced world of IT-security? When is a strike necessary and what is important when creating an active defence?

Dr Jessica Barker, Window Snyder, Dino Dai Zovi & Lucas Lundgren

16.40

Hacking 5 IoT devices in 30 minutes

Lucas has the "bad luck" (or tendency) to annoy companies by reporting vulnerabilities in their products. He defines himself as a grey-hat hacker where the line between white-hat and black-hat sometimes have to be blurred in order to make things happen.

Lucas, like many other modern day hackers, spent his childhood breaking things just to fix them.  Even back when he was twelve he has reported numerous vulnerabilities in various products. Thirty years after his work has been recognized by Apple, Microsoft and also authorities and governments.

Lucas is primarily focusing on penetration testing as well as fuzzing and exploit development, no matter the platform or medium and his passion for Technology led him down the path of IoT which he loves. But it's a love-hate relationship where his prior knowledge of security and vulnerabilities makes him question his sanity when he is buying products, since he is mentally forced to take a "closer look".

Lucas Lundgren, Grey-hat hacker

17.10

Moderator Marcus Murray summerar och avslutar dagen

Vilka är de viktigaste lärdomarna från årets talare och vad tar vi med oss tillbaka till kontoret?

17.10

AW-mingel

Avsluta dagen på topp med en AW. Mingla och nätverka med branschkollegor i utställningsområdet med något gott att dricka och äta samtidigt som du har stans bästa utsikt över Stockholm.

Det här får du:

  • En heldag fylld av detaljer, inspiration och konkreta tips på hur du rustar ditt företag mot morgondagens it-säkerhetshot

  • Träffa världsledande it-säkerhetsexperter och möjlighet att få svar på just dina frågor

  • Nätverka med hundratals deltagare som står inför liknande utmaningar som du

  • Mat, dryck, frukt och AW – vi håller din energinivå på topp under hela dagen

  • Tillgång till presentationer och redaktionell dokumentation från dagen

Proffs på tech sedan 1978

Next Generation Threats arrangeras för sjätte året i rad av TechWorld, IDG, vars oberoende redaktion har bevakat it-säkerhet sedan 1978. Dagen samlar hundratals besökare från branschen och bjuder på en stor dos inspiration och kunskap kring aktuella hot, avslöjanden och detaljer kring dagens it-säkerhetsläge. Samt konkreta tips på arbetssätt och lösningar som ökar er säkerhet.

Några av de hundratals företag som deltagit tidigare

Plats: Münchenbryggeriet

Next Generation Threats arrangeras den 17 maj på Münchenbryggeriet i Stockholm. Ett ikoniskt gammalt bryggeri beläget längst med Söder Mälarstrand i centrala Stockholm. Du hittar lokalen här.

Anmäl fler och spara upp till 15% i grupprabatt

Partners

SecureLink

Mimecast

Mimecast (NASDAQ: MIME) makes business email and data safer for 19,900 customers and millions of employees worldwide. Founded in 2003, the Company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management in a single, fully-integrated subscription service. Mimecast reduces email risk and the complexity and cost of managing the array of point solutions traditionally used to protect email and its data. For customers that have migrated to cloud services like Microsoft Office 365, Mimecast mitigates single vendor exposure by strengthening security coverage, combating downtime and improving archiving.

Mimecast Email Security protects against malware, spam, advanced phishing and other emerging attacks, while preventing data leaks. Mimecast Mailbox Continuity enables employees to continue using email during planned and unplanned outages. Mimecast Enterprise Information Archiving unifies email, file and instant messaging data to support e-discovery and give employees fast access to their personal archive via PC, Mac and mobile apps.

ELITS

Gemalto

Detectify

Arrow

Intresserad av att bli partner? Klicka här för mer information.

Kontakta oss

Emmy Jonsson
Programansvarig
+46 762 577 147

Viktor Sandberg
Marknadsansvarig
+46 8 453 60 73

Rebecca Klüger
Projektledare
+46 735 256 098

Daniel Binett
Försäljningschef
+46 8 453 61 42