Hoten blir allt fler och omfattande, tekniken mer avancerad och utbudet av nya lösningar ökar, men vem kan man lita på?
Årets program belyser:
-
Ansvar och medvetenhet inom it-säkerhet
-
Cybercrime – strategiska samarbeten för att kunna slå tillbaka
-
GDPR – det innebär de nya reglerna för dig och så förbereder du organisationen
-
Threat modeling & Resilience – metoder för ett aktivt försvar
-
Machine learning & AI
-
Så bygger du ett starkt moln och säkra IoT-lösningar
Next Generation Threats Stockholm 2018
Reservera din plats till nästa år så håller vi dig uppdaterad med senaste information!
Talare
Klicka på respektive talare för att läsa mer.

Kim Zetter
Award-winning Journalist & Author
Kim Zetter is an award-winning investigative journalist and book author who has been covering computer security and the hacking underground since 1999, first for PC World magazine and more recently for WIRED, where she wrote about security, cybercrime, surveillance and civil liberties for more than a decade. She has broken numerous stories over the years and has three times been voted one of the top 10 security reporters in the US by her journalism peers and security industry professionals. She’s considered one of the world’s experts on Stuxnet, a virus/worm used to sabotage Iran’s nuclear program, and has published a book on the topic – Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.

Dr. Juan Branco
Legal adviser to Wikileaks
Dr. Juan Branco is a legal adviser to Wikileaks and Julian Assange. After being one of the coordinators of the Wikileaks defense team, leaded by Baltasar Garzon, he has been in charge of the UN and French demarches, and now works as an established lawyer in France. Holder of a doctorate in International Law, Juan Branco had previously worked in the immediate office of the French Foreign Affairs Minister, as a special assistant to the Prosecutor of the International Criminal Court and as a Senior Research Fellow at the Max Planck Society in International Criminal Law.

Brandon Edwards
Chief Scientist, Capsule8
Brandon was previously VP of Threat Labs at BAE Systems, through its successful aquisition of SilverSky. There, he led the development of their cloud-based, zero-day prevention product.
Brandon has also served as hacker-in-residence at NYU Tandon School of Engineering and held senior security soles at Tipping Point and McAfee.

Dr. Jessica Barker
Leading expert on cyber security
Dr Jessica Barker is a cyber security consultant, advising on the steps
institutions and individuals can take to keep their information safe in
the Internet age. Jessica works with a wide range of organisations in
the public and private sectors helping them to use information more
prudently.
Jessica concentrates on the human side of cyber security. She is
engaged by corporations and governments across the defence, health,
financial and retail sectors to advise on how they can keep their
information safe while getting the most out of it. Her particular
specialisms include governance, strategy and policy, risk and
resilience, and learning and development.
Jessica’s work involves leading and delivering information security
audits, from which she develops roadmaps which take organisations
on a journey of improved cyber security maturity. These roadmaps
cover all elements of information security: technology, people and
process.
Specialising in awareness-raising communications, Jessica also
designs bespoke, engaging and interactive learning and development
packages and undertakes research projects, in particular analysing
consumer attitudes and behaviours with regards to on-line security.
Recognised as a global thought-leader in her field, Jessica regularly
delivers thought-provoking and engaging presentations to
organisations as well as contributing to academic conferences. Known
for her ability to engage everyone from senior executives to ethical
hackers and creative workers, she brings energy, enthusiasm and fun
to cyber security.
In her spare time, Jessica is passionate about encouraging young
people to become more engaged with cyber security. She is keen to
make cyber security a more engaging and accessible subject to all,
and as such makes regular media appearances, most recently on Sky
News, The One Show, BBC1, Cybercrimes with Ben Hammersley and
BBC Radio’s Today programme.
Jessica has an undergraduate degree in Social and Political Studies
from the University of Sheffield and a Masters and PhD from the
University of Liverpool’s Department of Civic Design.

Lucas Lundgren
Grey-hat hacker & IoT Security Specialist
Lucas has a vast experience in IT security, with the ”bad luck” (or tendency) to annoy companies by reporting vulnerabilities in their products. He defines himself as a grey-hat hacker where the line between white-hat and black-hat sometimes have to be blurred in order to make things happen.
Lucas, like many other modern day hackers, spent his childhood breaking things just to fix them. Even back when he was twelve he has reported numerous vulnerabilities in various products. Thirty years after his work has been recognized by Apple, Microsoft and also authorities and governments.
Having worked with penetration testing professionally for over 18 years, Lucas has held IT Security positions within companies such as Sony Ericsson and IOActive to mention a few.
He has also been part of Corelan Team before moving on to FortConsult (Part of NCC Group)
Lucas has been breaking everything from OS vendors and financial systems, ICS, and he has spent a considerable amount of time inside ”impenetrable fortresses”.
Lucas is primarily focusing on penetration testing as well as fuzzing and exploit development, no matter the platform or medium. His passion for Technology led him down the path of IoT which he loves. But it’s a love-hate relationship where his prior knowledge of security and vulnerabilities makes him question his sanity when he is buying products, since he is mentally forced to take a ”closer look”.
When not breaking things, he teaches classes on penetration testing, and have a small dream that he one day can teach a class on developing 0days and not so common attack methods.
Defcon, Sec-T, OWASP, 4SICS, Dansk IT, and RSA are some of the conferences Lucas has been speaking at.

Window Snyder
Chief Security Officer, Fastly
Window Snyder is a security industry veteran and Chief Security Officer at Fastly. She previously spent five years at Apple working on security and privacy strategy and features for OS X and iOS. Earlier roles include Chief Security Something-or-Other at Mozilla responsible for security engineering, communication, and strategy and a founding team member at Matasano, a security services and product company based in New York City, acquired by NCC Group in 2012.
As a senior security strategist at Microsoft in the Security Engineering and Communications organization, she managed the relationships between security consulting companies and the Microsoft product teams and the outreach strategy for security vendors and security researchers. Previously she was responsible for security sign-off for Windows XP SP2 and Windows Server 2003.
Ms. Snyder was Director of Security Architecture at @stake. She developed application security analysis methodologies and led the Application Security Center of Excellence. She was a software engineer for 5 years focused primarily on security applications, most recently at Axent Technologies, now Symantec.
Ms. Snyder is co-author of Threat Modeling, a manual for security architecture analysis in software.
Specialties: security, threat modeling, community outreach, strategy, communications.

Ian Amit
Senior Manager of Security Engineering, Amazon
Ian Amit, Senior Manager of Security Engineering at Amazon, has over a decade of experience in hands-on and strategic roles, working across a diversity of security fields: business, industry, marketing, technical and research. Previously, Ian served as Vice President at ZeroFOX, Director of Services at IOActive, and his career also includes time at Security-Art, Aladdin, Finjan and Datavantage. He is a frequent speaker and keynote at conferences such as BlackHat, DefCon, RSA, BSides, and InfoSecurity. He founded the Tel-Aviv DefCon chapter (DC9723) and also was a founding member of the Penetration Testing Execution Standard (PTES).

Caroline Sundberg
Advokat - Specialist IT-rätt, Delphi
Caroline är advokat verksam hos advokatfirman Delphi och specialiserad inom IT-rätt . Hon har i över 10 år arbetat med legala frågor rörande integritetsskydd och dataskydd (såsom PuL och senaste tiden den nya Dataskyddsförordningen). Hon har arbetat i flera större såväl som mindre projekt för att hjälpa organisationer att förbereda sig inför ikraftträdande av den nya förordningen. I sin verksamhet biträder hon även klienter med andra legala frågor kopplat till teknik och IT såsom kommersiella avtal och immaterialrättsliga frågor med denna inriktning. Hon har även stor erfarenhet att skriva och förhandla avtal avseende bl.a. IT-projekt, IT-tjänster, molntjänster, personuppgifter, outsourcing andra komplexa tjänster inom teknikområdet.

Marcus Bengtsson
CTO, SecureLink Sweden
Marcus Bengtsson is the CTO at Coresec Systems. His primary responsibility is to make sure that Coresec Systems solutions are addressing our customers challenges within Cybersecurity and Datacenter networking.
Throughout his career, Marcus has been focused on delivering business value to the customer using the right technology for their particular needs. Including closing strategic projects, finding new markets/solutions and on a high-level address the business value that the underlying technology can give the customer.
Specialties: Engage together with clients to help them identify their needs and present a technical solution that will safely enable their business for the future.

Olle Segerdahl
Principal Security Consultant, F-Secure
Olle is a veteran within the IT security industry, having worked both with ”breaking” security as well as ”building” security solutions for over 18 years. He most recently spent 7 years at the Swedish Military Security and Intelligence Directorate (MUST) securing classified systems and verifying the security of cryptographic products.
Before joining F-Secure as a principle security consultant and working with major brands to improve their security efforts, he co-founded a start-up that built software whitelisting solutions used by industrial robots and medical equipment for radiosurgery operations.
Olle is also a regular speaker at information security conferences. He is also co-founder of one of them, the SEC-T hacker conference in Stockholm.

Jörgen Jansson
Senior Sales Engineer, Gemalto
Med nästan 20 års erfarenhet inom säkerhet arbetar Jörgen Jansson sedan 9 år som Senior Sales Engineer hos Gemalto med fokus på säkerhetslösningar för information (kryptering, signering, validering av användare, …). Tidigare har han arbetat med säkerhetslösningar (process och drift) inom kraft och oljeindustrin samt som IT -säkerhetskonsult och IT-säkerhetsarkitek

Joseph Abou-Haidar
Sales Engineer, Bitdefender
Joseph Abou-Haidar is working for BitDefender as Sales Engineer, mainly Endpoint Security has been the main focus until today.
Joseph has many years of experience in IT security, and after starting his career in IT security, he has been following the evolution of malicious code and how we should approach that kind of threat.
As more organizations over the past years are moving to virtual infrastructures, Joseph has been researching the threat landscape in virtual environments and what kind of strategy we will use to address the issues we encounter.

Dan Sloshberg
Director Product Marketing, Mimecast
Dan is an experienced marketeer with strong commercial acumen and ability to work and influence at all levels. He has a successful track record with large global, medium and start-up organisations.

Mikkel Børve
Manager Nordics, AlgoSec
Mikkel is responsible for AlgoSec in the Nordics having worked many years in IT Security and a total of more than 20 years in the Nordics IT Sector, with companies such as Check Point, Amadeus, Telenor & Unwire. Mikkel is strongly committed to deliver measurable value to the customers and even inspire for the future of the very complex IT Security Management – which is part of the speech at the event.

Marcus Murray
Moderator
Marcus är en av världens främsta experter på Cyber Security och är VP of Cyber Security på Truesec. Han leder ett elitteam av säkerhetsexperter som opererar över hela världen. De genomför allt ifrån intrångsutredningar av statsfinansierade cyberangrepp, sårbarhetsforskning, och avancerade intrångssimuleringar (red-ream) till att hjälpa företag, organisationer och statliga myndigheter att öka sin förmåga att förebygga och detektera cyberangrepp.
Marcus arbetar även med cyberkrigsföring och försvar, samt föreläser ofta om Cyberhot, statsfinansierade angrepp, cyberbrottslighet och hur man implementerar säkerhetsfunktioner som fungerar i praktiken.
Marcus anlitas ofta som keynote-speaker och har flera år blivit utvald till främsta föreläsare på konferenser som RSA US, RSA Europe, Ignite, TechED North America, TechED Europe, och ITForum Europe

Alexandra Heymowska
Spårmoderator
Alexandra Heymowska is Editor in Chief at CIO Sweden and has organized and moderated conferences, events and clubs for IDG Sweden for more than ten years.

Inspiration och kunskap i världsklass
Dagen bjuder på en uppskattad mix av ledande it-säkerhetsexperter som delar med sig av sina erfarenheter och tips på hur du skyddar dig mot morgondagens allt aggressivare hot. Under våra uppskattade Green Room Talks lyfts aktuella ämnen där diskussionerna mellan talarna tas till en helt ny nivå. Här har du chansen att själv delta och få svar på just dina frågor från en sittande expertpanel direkt på plats.
08.00
Registreringen öppnar
Se till att befinna dig på plats i god tid innan programmet på scen drar igång och starta dagen med en rykande färsk kopp kaffe.
08.00
Frukostseminarium: Hur ska man förbereda sin organisation inför den nya dataskyddsförordningen?
Under ett intressant frukostseminarium får du en översikt på den nya dataskyddsförordningen (GDPR) som träder i kraft 2018 och vad dessa regler innebär för krav på tekniska och organisatoriska förändringar vid hantering av information. Caroline kommer även att dela med sig av sina tips på hur man som organisation bäst kan förbereda sig inför införande av de nya reglerna och förslag på vilka åtgärder man redan nu bör planera och vidta för att minska risken att bryta mot reglerna.
Caroline Sundberg, Advokat - Specialist IT-rätt, Delphi
Observera: Kräver separat (kostnadsfri) föranmälan.
08.55
Next Generation Threats drar igång!
Dagens moderator Marcus Murray ger en kort insikt i hotbilden mot Sverige och sårbarheterna i det svenska samhället.
09.00
Opening Keynote: Next Generation Threats according to Kim Zetter
When Stuxnet was discovered in 2010, it was considered a landmark moment in computer hacking - a virus that leapt from the digital world to the analog world to cause physical destruction of machinery. Last year another landmark was surpassed when the Democratic National Committee was hacked and its emails were exposed in an effort to influence the U.S. presidential election.
Hackers are nothing if not innovative, and we can expect more landmarks to be surpassed in the near future. Kim has been covering hackers and computer security since 1999 and has seen a lot of changes in that time. She'll speak to us about Stuxnet's remarkable technical achievement as well as other noteworthy hacks she has covered for WIRED and other publications and will give us a look at the next generation of threats we're likely to see.
Kim Zetter, Journalist & Author
09.45
Cyber security's biggest weakness: the human element
Cyber security is understood to be about people, process and technology. Yet, for too long, we have failed to address the human elements of this problematic subject to the same extent as the technological ones. The true core of cyber security is about protecting information that we create, share and store in ever-advancing ways from threats that are growing exponentially in the digital age.
When we look at the threats, and how they become reality, it is apparent that cyber security is fundamentally about people as much as it is about technology. In this engaging and interactive presentation, Jessica will explore why the human element is the biggest problem facing cyber security and what we can do to communicate cyber security messages more effectively and encourage positive behavioural change. In unpicking the inherently human nature of cyber security, this session will help you empower people to become your first line of defence, not your weakest link.
Dr Jessica Barker, Leading expert on cyber security
GREEN ROOM TALK
Individual, organisational, governmental or global- whose responsibility is the future of protection?
Today's IT threats are of the most serious we've seen in history. Companies, organizations, governments and of course individuals must constantly guard against the global lurking threats. Along with the increased complexity in data networks, the stakes are high and the human error a great risk. Entering a dragged out and costly blame game about responsibility is common. But really- what comes first? Do we need to ask governments to stretch the laws to allow a grey area in terms of hacker's expertise? Is it up to companies and organisations to lend a helping hand to contribute and take responsibility? What role does the authorities play in terms of the over-all IT security? Bottom line is techniques needs to be up to date with new technology- but whose responsibility is this?
Kim Zetter, Dr Jessica Barker, Juan Branco & Ian Amit
10.35
Kaffepaus
Vi fyller på energinivån med en god förmiddagsfika i utställningsområdet och passar på att nätverka!
11.05
Who surveils the surveillant - When the State becomes a threat
The world changed when big data became one of the main vectors of value creation, and a precious social control tool. Hierarchies of power, of wealth and of social recognition are being completly disrupted by this revolution. New powers are arising, and States find themselves struggling to maintain their position, often abusing it. This is a natural tendency. From his experience within Wikileaks, working to defend those who decided to reveal the secrets of corporations and States, Juan Branco will try to reflect on the evolution of these issues, and on the difficulty to create new lines that protect the citizens, the deplorables of this new world.
Juan Branco, Legal Adviser, Wikileaks
11.35
Hacking international law and governments interest groups
The practice of information security and "cyber" has been long regarded as another domain when considering international diplomacy and politics. NATO has officially recognized the cyber domain in relation to article 5, and nation states have been practicing the extension of their political activities through espionage and intelligence in that domain for years. In this session, we will discuss how the practice of hacking has shifted the balance of power and added complexity to the practice of diplomacy and international law, while creating more opportunities for interest groups to affect government practices and regulation.
Ian Amit, Senior Manager of Security Engineering, Amazon
GREEN ROOM TALK
Cybercrime - The hacker's role vs. Authorities & Governments
A hacker's love of programming is not just a commitment to culture but requires a great skill when it comes to codes and computers. But is the motivation to solve problems and developing new technical knowledge enough when Governments usually have the last word? Surely we've heard of bug bounty programs to enhance the importance of a streamlined collaboration in between them two. But what happens with the collaboration when the threats comes from outside and authorities close their doors to a hackers collaboration? Technology and innovation goes with the speed of light, how come building up a solid collaboration takes longer? Does a role always need to mean economic incentives, or can a collaboration be motivated in more ways than one?
Kim Zetter, Dr Jessica Barker, Juan Branco & Ian Amit
12.25
Keynote Partner: SecureLink
How to securely embrace the cloud - A use case of how SecureLink has embraced the cloud
An insatiable appetite for compute and storage resources, combined with cloud-first development initiatives to support your business, is driving a data centre transformation that incorporates the public cloud as a means of more rapidly addressing your growing data center demands.
From a security perspective, the responsibility for protecting your public cloud is shared between both the provider and the user – you. It is up to you to ensure satisfaction with the steps a provider has taken to protect the public cloud environment. It is also up to you to make sure you take the necessary steps to protect your applications and data in the public cloud.
Marcus Bengtsson, CTO, SecureLink Sweden
12.40
Lunch
Passa på att nätverka med branschkollegor och partners över en god lunch i utställningsområdet med stans bästa utsikt över Stockholm.
Efter lunch får du ta del av de hetaste lösningarna inom it-säkerhet i två parallella kunskapsspår. Passen är 20 minuter långa med en 5 minuters paus mellan varje spår så att du kan välja fritt.
13.40
Plats: Mälarsalen
How to avoid security being an obstacle in development and operations
Whether you deliver IoT, apps or services, or whether you're a product owner, CISO or IT-strategist: Being on the same page in your company is a must to be able to work together to deliver safe products in a continuous development flow. This requires an update in the organizational and technical toolbox to create continuous safety and understanding of priorities and requirements. Olle Segerdahl & Christoffer Jerkeby from F-secure will tell you how security does not need be an obstacle in development projects and share insights from his own projects and experiences.
Olle Segerdahl, Principal Security Consultant, F-Secure
Plats: Nobelterassen
Cure virtual machine blindness: How hypervisor can find attacks that agents can't see
With targeted attacks increasingly operating at the deeper levels, endpoint agents are both ineffective and vulnerable. No wonder it takes enterprises an average of 5 months to detect a data breach. Hypervisor-based introspection could challenge the traditional approach to targeted attacks, by working directly with raw memory – providing an unprecedented level of insight into APTs. Learn how the hypervisor offers a unique perspective into the targeted attacks that your endpoint security solution fails to detect – and why it should inspire a new category of security solutions.
Joseph Abou-Haidar, Sales Engineer, Bitdefender
14.05
Plats: Mälarsalen
Cybersecurity is no longer enough - Why you need a cyber resilience strategy
Learn more about the growing sophistication and scale of cyberattacks. What’s behind the rise in ransomware, impersonation / CEO fraud and other targeted attacks. Mimecast will tell you why these types of attacks have become more successful and why traditional defenses are no longer sufficient. You'll learn key considerations for building a cyber resilience strategy; going beyond protection to deliver continuity of service and support recovery.
Dan Sloshberg, Director Product Marketing, Mimecast
Plats: Nobelterassen
GDPR - The necessary measures to secure information
The new Data Protection Regulation (GDPR) comes into force soon and many organizations realize that they will need to broaden their approach to working with IT security.
GDPR requires proactivity. Assuming that at some point you will lose information, the strategy becomes a bit different in comparison with traditional IT security, that focuses on preventing the loss of information.
Jörgen will give a summary of how the reasoning goes, by giving examples from organizations that have made some of their work to implement the necessary systems to secure their information. What do you must start doing today and what can wait?
Concrete conclusions about securing GDPR relevant information and how to use cloud services, even for sensitive information will be presented.
Jörgen Jansson, Senior Sales Engineer, Gemalto
14.30
Plats: Mälarsalen
Security Fabric: A must for future Cyber Security
As we are all aware, the changing landscape of cyber security, is far from slowing down - it's actually speeding up. The cyber criminals are one step ahead while security solutions are changing and maturing quite considerably. A “fit for purpose” requirement is therefore far more applicable with these mature technologies. Take a combination of a requirement for solution elements to communicate, and a requirement for mature technologies; this then leads straight into a security fabric.
Many organisations now are taking the view that a vendor that not only integrates but owns the development path of these technologies is substantially stronger than stand alone vendors with limited technology. Join us to hear how Fortinets security fabric fits perfectly into their current and future Cyber Security plans.
Nils Von Greyerz, Systems Engineer, Fortinet
Plats: Nobelterassen
Security Policy Management - in the Age of Cloud and SDN
Managing an ever-growing security policy to effectively keep out the bad guys and at the same time enable critical business applications is quickly becoming a near-impossible feat for most organizations. This is clearly demonstrated in several recently publicized network related outages, as well as Gartner’s findings that 95% of firewall breaches are the result of misconfiguration. To make things even more challenging, public cloud and software-defined networks are set to completely transform networking and security, mandating companies to embrace automation to remain relevant and manage security at the speed of business.
This session will examine the current and future trends of security policy management. It will offer practical information to help companies successfully make the transformation to a simplified, automated, and orchestrated approach to managing security across on-premise, software-defined and cloud environments for improved security and business agility.
Mikkel Børve, Manager Nordics, AlgoSec
14.50
Kaffepaus
Vi fyller på energinivån med en god eftermiddagsfika i utställningsområdet och passar på att nätverka!
15.20
Threat Modeling in Minutes
Threat modeling is an important aspect of securing any system whether software or network, but what investment is appropriate? Many businesses may need to consider nation-state attacks and other high-powered threats, but for other organizations the threats are much more docile. The weeks or months of time and resources spent on creating sophisticated threat models and factoring in every detail may not be justified for every environment.
The more sensible approach for many businesses out there is a lightweight application of the same methodology. As an industry, we've made threat modeling and analysis much more complicated than it really needs to be. Window Snyder, co-author of Threat Modeling, will describe a practical approach to make an investment in threat modeling that fits your business needs.
Window Snyder, Chief Security Officer, Fastly
15.50
Resilience: an alternative to Active Defense
Building up resilience to attack is a compelling alternative to Active Defense.
Resilience is the property of materials that are elastic instead of brittle, with the capacity to recover from difficulties without irrevocable damage. This is the model for how we should design our cyber infrastructure, and in how we should plan to respond to attacks, but our approach to security thus far has been oriented towards brittleness instead.
Software will always have vulnerabilities, users will click malicious links, and users will forfeit their credentials to phishing campaigns, arduously clicking through security alert dialog boxes intended to caution their behavior. There will always be more zeroday in the frameworks, libraries, operating systems, and firmware we all use. Here we seek to explore and inspire ideas on asymmetry and resilience, to shift the advantage away from attackers to defenders.
Brandon Edwards, Chief Scientist, Capsule8
GREEN ROOM TALK
Strategies to battle current threats: Striking back is active defense?
As threats are becoming more extensive, we encounter more advanced technology and the range of new solutions is increasing, who can we trust? Is an active defense always the best for the business, or can it be more time-consuming to maintain and be more expensive in terms of what it actually offers?
When traditional security solutions just don't meet the needs of a company or an organisation - how do we prioritize our strategy of defence? Where should we keep our focus in this fast-paced world of IT-security? When is a strike necessary and what is important when creating an active defence?
Dr Jessica Barker, Window Snyder, Brandon Edwards & Lucas Lundgren
16.40
Hacking 5 IoT devices in 30 minutes
Lucas has the "bad luck" (or tendency) to annoy companies by reporting vulnerabilities in their products. He defines himself as a grey-hat hacker where the line between white-hat and black-hat sometimes have to be blurred in order to make things happen.
Lucas, like many other modern day hackers, spent his childhood breaking things just to fix them. Even back when he was twelve he has reported numerous vulnerabilities in various products. Thirty years after his work has been recognized by Apple, Microsoft and also authorities and governments.
Lucas is primarily focusing on penetration testing as well as fuzzing and exploit development, no matter the platform or medium and his passion for Technology led him down the path of IoT which he loves. But it's a love-hate relationship where his prior knowledge of security and vulnerabilities makes him question his sanity when he is buying products, since he is mentally forced to take a "closer look".
Lucas Lundgren, Grey-hat hacker
17.10
Moderator Marcus Murray summerar och avslutar dagen
Vilka är de viktigaste lärdomarna från årets talare och vad tar vi med oss tillbaka till kontoret?
17.15
AW-mingel
Avsluta dagen på topp med en AW. Mingla och nätverka med branschkollegor i utställningsområdet med något gott att dricka och äta samtidigt som du har stans bästa utsikt över Stockholm.
Det här får du:
-
En heldag fylld av detaljer, inspiration och konkreta tips på hur du rustar ditt företag mot morgondagens it-säkerhetshot
-
Träffa världsledande it-säkerhetsexperter och möjlighet att få svar på just dina frågor
-
Nätverka med hundratals deltagare som står inför liknande utmaningar som du
-
Ett program helt utformat på engelska – allt för att ge dig maximala diskussioner på scen
-
Mat, dryck, frukt och AW – vi håller din energinivå på topp under hela dagen
-
Tillgång till presentationer och redaktionell dokumentation från dagen

Proffs på tech sedan 2007
Next Generation Threats Stockholm arrangeras för sjätte året i rad av TechWorld, IDG, vars oberoende redaktion har bevakat it-säkerhet sedan 2007. Dagen samlar hundratals besökare från branschen och bjuder på en stor dos inspiration och kunskap kring aktuella hot, avslöjanden och detaljer kring dagens it-säkerhetsläge. Samt konkreta tips på arbetssätt och lösningar som ökar er säkerhet.
Här är 20 företag som deltog på plats

-
"Sveriges bästa och mest meningsfulla IT-säkerhetsevent 2016" Magnus Näriäinen, Nsec
"Intressanta föredrag med mer öppenhet och ärlighet..." Stefan Sidén, Försäkringskassan IT
-
"Bra energiboost och bra inblick i trender på området." Claes Metelius, FOI
"Tankeväckande diskussion om morgondagens säkerhetshot." Beatrice Nilsson, MittMedia
-
"En intensiv säkerhetsdag som efterlämnade sig en känsla av att ingen går säker..." Göran Forsman, CGI
"En otroligt intressant dag och samling av talare som med sina olika infallsvinklar och kunskapsgolv gav mycket nytt att tänka på och nya sätt att se på saker." Alf Håkansson, FoxT Sweden
-
"Ett underhållande och tänkvärt IT säkerhets-event som på ett mycket bra sätt speglar svårigheterna som finns i dagens "uppkopplade" värld." Johan Helin, Assaabloy
"En komprimerad koll på trender och farhågor inom området IT Security."
Stellan Bränström, Ericsson -
"Ett snabbt och effektivt sätt att skaffa sig en inblick i state-of-the-art cybersäkerhet!" Anders Englund, Attentec
"IT-Osäkerhet vs. IT-Säkerhet!" Robert Valsjö, Försvarsmakten
-
"Mycket uppfriskande och bra debatter varvat med aktuella ämnen och trender." Marcus Torstensson, Sonid Konsult
"NGThreats var såväl upplyftande som ett uppvaknande, när de inspirerande talarna delade med sig av sina erfarenheter och visioner." Fredrik Krusvik, C.A.G
-
"Ruggigt nyttigt!" Magnus Snäll, NLL
"Spännande, intressant och mycket aktuella ämnen med bra spännvid och engagerade talare." Martin Andersson, Alecta
-
"Science fiction är inte längre fiction utan next generation threats." Stefan Lindberg, Svea Ekonomi
"Relevant innehåll, proffsigt genomförande." Lauri Lubi, Softronic
Plats: Münchenbryggeriet
Next Generation Threats arrangeras den 17 maj på Münchenbryggeriet i Stockholm. Ett ikoniskt gammalt bryggeri beläget längst med Söder Mälarstrand i centrala Stockholm. Du hittar lokalen här.
Partners:
Mimecast
Mimecast (NASDAQ: MIME) makes business email and data safer for 19,900 customers and millions of employees worldwide. Founded in 2003, the Company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management in a single, fully-integrated subscription service. Mimecast reduces email risk and the complexity and cost of managing the array of point solutions traditionally used to protect email and its data. For customers that have migrated to cloud services like Microsoft Office 365, Mimecast mitigates single vendor exposure by strengthening security coverage, combating downtime and improving archiving.
Mimecast Email Security protects against malware, spam, advanced phishing and other emerging attacks, while preventing data leaks. Mimecast Mailbox Continuity enables employees to continue using email during planned and unplanned outages. Mimecast Enterprise Information Archiving unifies email, file and instant messaging data to support e-discovery and give employees fast access to their personal archive via PC, Mac and mobile apps.