Tack för i år!
Den 23 september samlades ~200 säkerhetspersoner på Biopalatset för att under en heldag nätverka, inspireras och få ny kunskap från ledande it-säkerhetsexperter. Årets huvudtema var identitet och bjöd på en uppskattad mix av anonymitetens för- och nackdelar i en digital värld. Talarnas presentationer hittar du nedan.
Stort tack till dig som deltog! Vi hoppas att det var givande och att dagen bjöd på nya intressanta möten med branschkollegor. Vi lovar att göra allt vi kan för att göra Next Generation Threats 2016 ännu bättre. Din åsikt är viktig – har du förslag på hur vi kan förbättra oss till nästa år får du gärna maila oss på event@techworld.se
Vi ses nästa år!

Next Generation Threats
Next Generation Threats är inte ditt gamla vanliga it-säkerhetsevent. Här är det inga talare som försöker skrämma dig, säger åt dig att köpa deras produkter och sedan bara drar. Next Generation Threats är ett heldagsevent fyllt av avslöjanden och detaljer som ger dig både ny kunskap och en chans att delta i diskussionen med talarna som finns med under hela dagen. Här är chansen för dig att bli bättre på ditt jobb, få kunskaper om hur du skyddar din it-infrastruktur bättre och att träffa kollegor som står inför samma utmaningar som du.
Anmäl ditt intresse till NGT 2016 redan nu så kontaktar dig först av alla så fort vi har öppnat registreringen och lanserat programmet
Tack till våra talare

Bruce Schneier
IT Security Expert, Author, CTO, Resilient Systems
Bruce Schneier is an internationally renowned security technologist, called a ”security guru” by The Economist. He is the author of 12 books — including Liars and Outliers: Enabling the Trust Society Needs to Thrive — as well as hundreds of articles, essays, and academic papers. His influential newsletter ”Crypto-Gram” and his blog ”Schneier on Security” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press.
Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation’s Open Technology Institute, a board member of the Electronic Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief Technology Officer at Resilient Systems, Inc.

Marcus Murray
Cyber Security Manager, TrueSec
Marcus Murray, Cyber Security Manager i Truesec Expert Team, är en av världens främsta IT-säkerhetsexperter med fokus på Microsofts plattformar och en av få MVP:er inom Enterprise Security. Han bygger idag militära övningsplattformar för cyberkrig och skapar säkra inloggningar för svenska och utländska bankkunder.
Marcus är även en av världens främsta föreläsare och LabCenter-instruktör inom IT-säkerhet med fokus på cyberwarfare, cybercrime, penetrationstester och implementering av säkerhetsåtgärder. Mellan 2005 och 2015 har han flertalet gånger blivit framröstad som Top Speaker på bland annat Microsoft TechEd och RSA Europe.

Joanna Rutkowska
Founder of Invisible Things Lab & Qubes OS Project
Joanna Rutkowska is a founder of Invisible Things Lab and the Qubes OS project, which she has been leading since its inception in 2010. Prior to that she has been focusing on system-level offensive security research. Together with her team at ITL, she has presented numerous attacks on virtualization systems and Intel security technologies, including the famous series of exploits against the Intel Trusted Execution Technology (TXT), the still-only-one software attack demonstrating Intel VT-d escape, and also supervised her team with the pioneering research on breaking into the Intel vPro BIOS and AMT/MT technology.
She is also known for writing Blue Pill, the first hardware virtualization-based rootkit, introducing Evil Maid attack, and for her prior work on kernel-mode malware for Windows and Linux in the first half of the 2000s.

Jan Wünsche
Information Assurance Strategist, MUST
Jan Wünsche is an information assurance strategist at the Military Intelligence and Security Staff of the Swedish Armed Forces. He has been involved in protecting sensitive military and government information for almost ten years. Jan has held positions at the Swedish Armed Forces Headquarters, the Swedish Parliament, and the Swedish military contingent in Afghanistan. He has been a key player in reforming rules and processes for audit and approval of systems that handle classified information.
Wünsche has been a member of a number of EU and NATO working groups. He is an appreciated speaker at military and government events and courses, where he as presented subjects as diverse as regulatory requirements and compromising emanations.
.

Hanna Lidzell
Service Delivery Manager, Sentor MSS
Hanna Lidzell works in managed security services, and is involved in the delivery of security solutions for everything from small business to large scale industrial companies. In her line of work Hanna observes the common pitfalls of most security departments as well as the successful security initiatives taken by small IT-departments.
When Hanna isn’t working she arranges the IT-security conference SEC-T.

Juan Gonzalez
Consulting Engineer - Threat Prevention, Palo Alto Networks
Mer info inom kort.
Agenda
08.00
Registreringen öppnar
Välkommen till Next Generation Threats Göteborg.
Se till att befinna dig på plats i god innan programmet drar igång och njut av en kopp rykande gott kaffe.
09.00
Dagen inleds
Magnus Aschan, tidigare chefredaktör på TechWorld med många år
av bevakning av branschen i bagaget, inleder dagen.
Moderator: Magnus Aschan
09.20
Keynote: Bruce Schneier ”The Future of Incident Response”
Protection and detection can only take you so far, and breaches are inevitable. As a result, response incident response has stepped into the spotlight. This session will examine the economic and psychological forces within the computer security field and describe the future of incident response (IR) and thus, the industry. It will discuss how response technology, unlike detective and preventative controls, must augment people rather than replace them. Understanding the implications of this reality requires a systems theory approach to IR. This session borrows one from the US Air Force: OODA loops. By leveraging the cycle of observe, orient, decide, and act, this session demonstrates how we can optimize IR efforts, and deliver valuable insight into what is arguably the most crucial discipline to maintaining IT security in the coming decade.
Bruce Schneier, CTO, Resilient Systems
Green room talks: How the view on identity has changed
10.30
Kaffepaus
Passa på att kolla in vilka bekanta och nya ansikten som också är här.
11.00
”Trust as the no. 1 enemy of security: the client systems study”
We are forced to trust a lot of things: the files we receive or websites we visit, that they are not going to exploit bugs in our (trusted) apps, the (trusted) software we use has no backdoors built in or added by 3rd parties. Also that the (trusted) OS components are secure and can protect our data, that the underlying (trusted) firmware and hardware is not subverting security mechanisms implemented by our (trusted) Operating System.
The more trust we are forced into, the less secure our digital lives are, of course. Trust is the #1 enemy of security. Is there anything we can do about it? What’s the smallest reasonable amount of trust we need in case of a typical client (desktop) system today? Can trust be distributed?
Joanna Rutkowska, Founder of Invisible Things Lab & Qubes OS Project
Green room talks: To be or not be anonymous
12.00
Partnerpass: ”Preventing Threats and Forensic Analysis”
Efficient Threat Prevention, compartmentalization and Forensics are unavoidable means to keep your business running
The threat landscape evolves fast. Known threat identification technologies, like signature based identification, are not enough anymore. Expanded sandboxing are required to meet todays threats. When outbreaks occur (they will) – it’s good to have a highly secure but still efficient network. To investigate – We need capable tools at hand in order to monitor, analyze and prevent threats and keep the business running.
Jan Johansen, SE Manager Nordics, CheckPoint presented by Cygate
12.15
Partnerpass: ”Palo Alto Networks Approach to Threat Intelligence”
Security practitioners receive an overwhelming volume of security data and alerts daily from a variety of tools, vendor feeds and devices deployed across their organization. This vast pool of information with little to no context or actionable next steps makes it difficult to identify the unique, targeted attacks facing their organization, often resulting in missed opportunities to prevent the attack before damage can be done. In this introductory session we will talk about how the Palo Alto Networks AutoFocus threat intelligence service enables security teams to significantly close the gap on the time it takes to identify and prevent advanced, targeted cyber attacks.
Juan Gonzales, Palo Alto, presented by Coresec
12.30
Lunch
Halvvägs in i programmet äter vi en mingellunch och rensar hjärnan för det som komma skall.
13.30
”Defending information in a complex reality”
Länkar till MSB undersökning 1 och 2
IT-services in modern organizations are growing more and more complex and distributed. Today we face geographically distributed systems of systems that can span continents and where the parts can be owned and managed by many different organizations. Jan Wünsche will explore the impact this has on security and what some of the consequences may be. How will attackers try to take advantage of the new landscape? What are the similarities and differences between the impact on civilian and military organizations?
Jan Wünsche, Information Assurance Strategist, MUST
Green room talks: Next generation cyber threats
14.15
Kaffepaus
Nu laddar vi med godsaker för att ta oss an dagens sista pass.
14.45
”APT, cybercrime and cyber warfare exposed”
In This Live Session Marcus Murray will perform a live demonstration of the tools and techniques used by cybercriminals and cyber warriors today. He will demonstrate how they penetrate your network and how they make their attacks undetectable from conventional antivirus and evade IDS solutions.
Finally he will show you how they expand their initial foothold to complete domain compromise and finally how they obtain their goal and exfiltrate your data.
Marcus Murray, Cyber Security Manager, TrueSec
Green room talks: How do we identify us in our digital life?
15.45
Phishing – Exciting horror stories and the very boring antidote
Hanna Lidzell, Service Delivery Manager, Sentor
16.25
Dagen avrundas
Vi sammanfattar dagens insikter och utsikter kring vår tids identitetskris.
Moderator: Magnus Aschan
Anmäl ditt intresse till NGT 2016 redan nu så kontaktar dig först av alla så fort vi har öppnat registreringen och lanserat programmet
Kontakt
Tveka inte att kontakta oss
om du har några frågor!
event@techworld.se
Anna Nilsson
Event Director
+46-8-453 61 11
anna.nilsson@idg.se
Viktor Sandberg
Marknadsansvarig
+46-8-453 60 73
viktor.sandberg@idg.se