Tack för i år!
Den 22 september samlades över 450 säkerhetspersoner på Rival i Stockholm för att under en heldag nätverka, inspireras och få ny kunskap från ledande it-säkerhetsexperter. Årets huvudtema var identitet och bjöd på en uppskattad mix av anonymitetens för- och nackdelar i en digital värld. Talarnas presentationer hittar du nedan.
Stort tack till dig som deltog! Vi hoppas att det var givande och att dagen bjöd på nya intressanta möten med branschkollegor. Vi lovar att göra allt vi kan för att göra Next Generation Threats 2016 ännu bättre. Din åsikt är viktig – har du förslag på hur vi kan förbättra oss till nästa år får du gärna maila oss på event@techworld.se
Vi ses nästa år!

Next Generation Threats
Next Generation Threats är inte ditt gamla vanliga it-säkerhetsevent. Här är det inga talare som försöker skrämma dig, säger åt dig att köpa deras produkter och sedan bara drar. Next Generation Threats är ett heldagsevent fyllt av avslöjanden och detaljer som ger dig både ny kunskap och en chans att delta i diskussionen med talarna som finns med under hela dagen. Här är chansen för dig att bli bättre på ditt jobb, få kunskaper om hur du skyddar din it-infrastruktur bättre och att träffa kollegor som står inför samma utmaningar som du.
Anmäl ditt intresse till NGT 2016 redan nu så kontaktar dig först av alla så fort vi har öppnat registreringen och lanserat programmet
Tack till årets talare

Bruce Schneier
IT Security Expert, Author, CTO, Resilient Systems
Bruce Schneier is an internationally renowned security technologist, called a ”security guru” by The Economist. He is the author of 12 books — including Liars and Outliers: Enabling the Trust Society Needs to Thrive — as well as hundreds of articles, essays, and academic papers. His influential newsletter ”Crypto-Gram” and his blog ”Schneier on Security” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press.
Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation’s Open Technology Institute, a board member of the Electronic Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief Technology Officer at Resilient Systems, Inc.

Charlotta Öhlén
Consulting Director, neXus
Charlotta Öhlén, Consulting Director and responsible for all deliveries at Technology neXus, has over a decade’s experience from the IT-security business in leading positions.
She has been responsible for managing large, international IT projects implementing security requirements and security functions primary based on Identity and Access management and Card Management Systems across most sectors such as defense and governmental agencies, public transportation, health care, retail, bank and finance. In the role as an Operations Manager she has build up operations centers for Cloud and Managed Services and also introduced ITIL and best practises. At neXus she is responsible for all deliveries including consulting services in the Nordic region.

Marcus Murray
Cyber Security Manager, TrueSec
Marcus Murray, Cyber Security Manager i Truesec Expert Team, är en av världens främsta IT-säkerhetsexperter med fokus på Microsofts plattformar och en av få MVP:er inom Enterprise Security. Han bygger idag militära övningsplattformar för cyberkrig och skapar säkra inloggningar för svenska och utländska bankkunder.
Marcus är även en av världens främsta föreläsare och LabCenter-instruktör inom IT-säkerhet med fokus på cyberwarfare, cybercrime, penetrationstester och implementering av säkerhetsåtgärder. Mellan 2005 och 2015 har han flertalet gånger blivit framröstad som Top Speaker på bland annat Microsoft TechEd och RSA Europe.

Joanna Rutkowska
Founder of Invisible Things Lab & Qubes OS Project
Joanna Rutkowska is a founder of Invisible Things Lab and the Qubes OS project, which she has been leading since its inception in 2010. Prior to that she has been focusing on system-level offensive security research. Together with her team at ITL, she has presented numerous attacks on virtualization systems and Intel security technologies, including the famous series of exploits against the Intel Trusted Execution Technology (TXT), the still-only-one software attack demonstrating Intel VT-d escape, and also supervised her team with the pioneering research on breaking into the Intel vPro BIOS and AMT/MT technology.
She is also known for writing Blue Pill, the first hardware virtualization-based rootkit, introducing Evil Maid attack, and for her prior work on kernel-mode malware for Windows and Linux in the first half of the 2000s.

Jan Wünsche
Information Assurance Strategist, MUST
Jan Wünsche is an information assurance strategist at the Military Intelligence and Security Staff of the Swedish Armed Forces. He has been involved in protecting sensitive military and government information for almost ten years. Jan has held positions at the Swedish Armed Forces Headquarters, the Swedish Parliament, and the Swedish military contingent in Afghanistan. He has been a key player in reforming rules and processes for audit and approval of systems that handle classified information.
Wünsche has been a member of a number of EU and NATO working groups. He is an appreciated speaker at military and government events and courses, where he as presented subjects as diverse as regulatory requirements and compromising emanations.
.

James Tucker
Security Engineer, Intel Security EMEA
James works at Intel Security as a Technical Presales Engineer. Focused on Intel Security’s Network Security Portfolio in Sweden and the Nordics, he primarily works with Network Security Platform (IPS), Web Gateway, Email Gateway, Next Generation Firewall, and Advanced Threat Defense (Sandboxing). On a daily basis, James’ role includes presenting solutions to customers, designing, planning and implementing proof of concepts and assisting customers with deployment.

Albert Kinney
Director, Cybersecurity Capabilities U.S. Public Sector, HP Enterprise Services
Albert Kinney is the Director, Cybersecurity Capabilities U.S. Public Sector at HP Enterprise Services. In this capacity, Mr. Kinney is responsible for development, marketing, and delivery of Identity Management, Software Assurance, and Cyber Situational Awareness services across federal, state and local and selected international markets. Mr. Kinney has held a number of leadership and management positions including executive functions in government, military and commercial enterprise organizations.
A retired Naval Officer, Mr. Kinney has more than 25 years of experience with leadership, aviation, intelligence, research and cybersecurity mission areas encompassing operational disciplines ranging from anti-submarine warfare to signals intelligence and Cyber Warfare. Mr. Kinney has developed technology, workforce, policies and mission equity frameworks serving each of these warfare disciplines.
Within the defense industry, Mr. Kinney developed a portfolio of Cyber Test and Evaluation business at the Johns Hopkins University Applied Physics Laboratory. As Principal Scientist with the Northrop Grumman Cyberspace Solutions Center, Mr. Kinney led a portfolio of efforts focused on various aspects of Cyber Warfare command and control including visualization, data aggregation, and automated response methodologies. Joining the HP team in 2010, Mr. Kinney now serves as a key leader responsible for industry awareness, client interaction, and oversight of HPES business, marketing, and investment strategies supporting broader development of HP’s cybersecurity services and capabilities.
Mr. Kinney holds a Command and Staff Diploma from the Naval War College along with science and engineering degrees from the U.S. Naval Academy and the Naval Postgraduate School. He remains active in the academic community as a member of the University of Maryland Baltimore County (UMBC) Cybersecurity Advisory Board and as an adjunct professor within the Johns Hopkins University Whiting School of Engineering. His recent academic projects include designing a Masters program in Cybersecurity Strategy and Policy for UMBC







Agenda
08.00
Registreringen öppnar
Välkommen till Next Generation Threats Stockholm.
Se till att befinna dig på plats i god innan programmet drar igång och njut av en kopp rykande gott kaffe.
09.00
Dagen inleds
Magnus Aschan, tidigare chefredaktör på TechWorld med många år
av bevakning av branschen i bagaget, inleder dagen.
Moderator: Magnus Aschan
09.20
Keynote: Bruce Schneier ”The Future of Incident Response”
Protection and detection can only take you so far, and breaches are inevitable. As a result, response incident response has stepped into the spotlight. This session will examine the economic and psychological forces within the computer security field and describe the future of incident response (IR) and thus, the industry. It will discuss how response technology, unlike detective and preventative controls, must augment people rather than replace them. Understanding the implications of this reality requires a systems theory approach to IR. This session borrows one from the US Air Force: OODA loops. By leveraging the cycle of observe orient, decide, and act, this session demonstrates how we can optimize IR efforts, and deliver valuable insight into what is arguably the most crucial discipline to maintaining IT security in the coming decade.
Bruce Schneier, CTO, Resilient Systems
Green room talks: How the view on identity has changed
10.30
Kaffepaus
Passa på att kolla in vilka bekanta och nya ansikten som också är här.
11.00
”Trust as the no. 1 enemy of security: the client systems study”
We are forced to trust a lot of things: the files we receive or websites we
visit, that they are not going to exploit bugs in our (trusted) apps, the (trusted) software we use has no backdoors built in or added by 3rd parties. Also that the (trusted) OS components are secure and can protect our data, that the underlying (trusted) firmware and hardware is not subverting security mechanisms implemented by our (trusted) Operating System.
The more trust we are forced into, the less secure our digital lives are, of course. Trust is the #1 enemy of security. Is there anything we can do about it? What’s the smallest reasonable amount of trust we need in case of a typical client (desktop) system today? Can trust be distributed?
Joanna Rutkowska, Founder of Invisible Things Lab & Qubes OS Project
Green room talks: To be or not be anonymous
12.00
Partnerpass: ”Is it possible to have too much privacy?”
Cryptography is essential for keeping your data out of the wrong hands, and invaluable for your privacy. Is it possible to have too much privacy? At what point does an overabundance of privacy reduce your data security? Who can you trust?
James Tucker, Security Engineer, Intel Security EMEA
12.15
Partnerpass: ”Strong becomes weak: How the new cyber threats impact large companies and organizations”
The list of high-profile data breaches in recent time can be made very long. It has demonstrated the importance of knowledge about data security on board level. The question is no longer if companies will be breach, but rather when your company will be breached. A well implemented strategy is often the key to minimizing the damage when a data breach occurs.
Albert Kinney, Director of Cyber Security Capabilities, US Public Sector at HP Enterprise Services.
Previously worked at the US Navy with cyber warfare as an area of expertise
12.40
Lunch
Halvvägs in i programmet äter vi en mingellunch och rensar hjärnan för det som komma skall.
13.40
”Defending information in a complex reality”
Länkar till MSB undersökning 1 och 2
IT-services in modern organizations are growing more and more complex and distributed. Today we face geographically distributed systems of systems that can span continents and where the parts can be owned and managed by many different organizations. Jan Wünsche will explore the impact this has on security and what some of the consequences may be. How will attackers try to take advantage of the new landscape? What are the similarities and differences between the impact on civilian and military organizations?
Jan Wünsche, Information Assurance Strategist, MUST
Green room talks: Next generation cyber threats
14.25
Kaffepaus
Nu laddar vi med godsaker för att ta oss an dagens sista pass.
14.55
“APT, cybercrime and cyber warfare exposed”
In This Live Session Marcus Murray will perform a live demonstration of the tools and techniques used by cybercriminals and cyber warriors today. He will demonstrate how they penetrate your network and how they make their attacks undetectable from conventional antivirus and evade IDS solutions.
Finally he will show you how they expand their initial foothold to complete domain compromise and finally how they obtain their goal and exfiltrate your data.
Marcus Murray, Cyber Security Manager, TrueSec
Green room talks: How do we identify us in our digital life?
15.55
KEYNOTE: CHARLOTTA ÖHLÉN ”IDENTITY CRISIS – SAY WHAT?”
Charlotta will elaborate on the new threats that comes from everything and everyone getting connected as well as focus on unknown possibilities and share experiences from real life customer scenarios.
Charlotta Öhlén, Consulting Director, neXus
16.35
Dagen avrundas
Vi sammanfattar dagens insikter och utsikter kring vår tids identitetskris.
Moderator: Magnus Aschan
Anmäl ditt intresse till NGT 2016 redan nu så kontaktar dig först av alla så fort vi har öppnat registreringen och lanserat programmet
Kontakt
Tveka inte att kontakta oss
om du har några frågor!
event@techworld.se
Anna Nilsson
Event Director
+46-8-453 61 11
anna.nilsson@idg.se
Viktor Sandberg
Marknadsansvarig
+46-8-453 60 73
viktor.sandberg@idg.se