A record number of participants was joining Next Generation Threats 2014!
~ 300 IT professionals visited us for a full day of discussions about IT security together
with some of the world’s leading IT security experts.
We want to thank you who participated.
We hope you had a good time and gained new knowledge and lots of inspiration!
Your opinion is important. Give us your feedback on how we can improve for next year,
by sending an email to event@techworld.se
See you next year!
Not your regular IT security event
Espionage, Surveillance and the art of protecting your VIP:s
Next Generation Threats is not your regular IT security event. It’s not speakers on stage scaring you, telling you to buy their products and then leave. It’s a full day of discussions, revelations and delicate details that will not only give you new knowledge, but a chance to participate and get answers to your questions. It’s a chance for you to get better at your job, to protect your IT infrastructure better and meet colleagues with the same challenges you have.
Thanks to our amazing speakers

Moxie Marlinspike
"END TO END ENCRYPTION FOR EVERYONE"
Moxie Marlinspike, Computer Security Researcher, is a member of Open Whisper Systems and one of the worlds leading encryption expert. He is focused on advancing the state of the art for secure protocols while simultaneously making them more accessible to users.
END TO END ENCRYPTION FOR EVERYONE
Where we are from and where we are going: the effort to enable end to end encryption for everyone.

Runa A. Sandvik
"PRIVACY SNAKEOIL: SECRET SYSTEMS, TECHNOBABBLE AND UNBREAKABLE THINGS"
Runa A. Sandvik, Privacy and Security Researcher, working on projects related to information security, surveillance and free speech. She is a Forbes contributor, a technical advisor to both the Freedom of the Press Foundation and the TrueCrypt Audit project, and has been involved with The Tor Project for the past five years.
PRIVACY SNAKEOIL: SECRET SYSTEMS, TECHNOBABBLE AND UNBREAKABLE THINGS
The privacy tools required to make surveillance more difficult are freely available and growing in popularity. There are tools with military grade encryption, tools with patent-pending security features, tools that allow you to be anonymous online and tools that allow you to opt out of global data surveillance programs like PRISM, XKeyscore and Tempora.
But how do you tell a tool that will help from a tool that will only make matters worse?

Morgan Marquis-Boire
"HACKED BY A YOUTUBE CAT - REVEALING NETWORK INJECTION APPLIANCES"

Robin Blokker
"VIP SECURITY, DIGITAL ATTACKS AND DEFENSES"
Robin Blokker is an information security professional at Sweden’s National Defence Radio Establishment (FRA), where he works for the security of critical government agencies and the nation’s infrastructure. His primary expertise is conducting security assessments and penetration tests. Although he is a technician at heart he occasionally flirts with management and has known to be involved in both policy and awareness issues. His areas of interest are application security and Internet-based threats, with a particular fondness for client-side attacks. Robin is active in the local security community, where he practices social engineering and psychological warfare.
VIP SECURITY, DIGITAL ATTACKS AND DEFENSES
Who are our VIPs? What importance do they have to our adversaries? How do you go about attacking them and what should you do to mitigate such attacks.

Marion Marschalek
"HOW WOULD YOU FIND WHAT YOU CAN'T SEE?"
Marion Marschalek works as a Malware Researcher at Cyphort Inc. Santa Clara, California. Her main fields of research involve reverse engineering of malicious binaries and exploration of artificial intelligence. Besides that she teaches basics of malware analysis at University of Applied Sciences St. Pölten. Marion has spoken at international conferences such as Defcon Las Vegas and RSA Conference San Francisco. In March last year she won the Female Reverse Engineering Challenge 2013, organized by RE professional Halvar Flake.
HOW WOULD YOU FIND WHAT YOU CAN’T SEE?
Threat detection has not evolved significantly for almost 20 years, but the threats have revolutionized over and over. Learn why plain file scanning was outdated long ago. See what an analyst is searching for on a compromised Windows platform and how future protections should look like!

Christopher Soghoian
"BLINDING THE SURVEILLANCE STATE"
Christopher Soghoian is a leading expert on privacy, surveillance, and information security. Soghoian worked for the U.S. Federal Trade Commission as the first-ever in-house technical advisor to the Division of Privacy and Identity Protection. He is currently the Principal Technologist with the Speech, Privacy, and Technology Project at the American Civil Liberties Union (ACLU).
BLINDING THE SURVEILLANCE STATE
We live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them to learn intimate, private details about our lives. The privacy enhancing technologies required to make bulk surveillance impossible and targeted surveillance more difficult already exist. We just need to start using them.
Contact
Anna Nilsson
Event Director
+46-8-453 61 11
anna.nilsson@idg.se
Viktor Sandberg
Marketing Manager
+46-8-453 60 73
viktor.sandberg@idg.se
Thanks to our partner


Intel Security
McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation, empowers businesses, the public sector, and home users to safely experience the benefits of the Internet.
The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence network, McAfee is relentlessly focused on keeping its customers safe.