Stockholmsmässan November 3rd
2015, Stockholm,Sweden
8th
annual information security forum
Nordic IT Security
#nordicitsec
Limited tickets available for FREE:
www.nordicitsecurity.com/register-today/
70+ Exhibitors 25+ Speakers 600+ Minutes of networking
www.nordicitsecurity.com
Partners 2015
Riga, Latvia
DataSecuritySolutions
Platinum Partners
Gold Partners
Silver Partners
Partners
Media Partners
Tagline Font:
Myriad Pro RegularBold
12pt
EDITOR’S NOTE
Cybersecurity is experiencing enormous growth, as an industry and as a theme in the
daily lives of people and businesses using technology.And because our technology
keeps changing at an astounding rate, threats are evolving fast too – with cybercrimi-
nals finding new and creative ways to exploit users and technology all the time.To
combat the threat in 2015, information security professionals must understand the
trends.
2014 has been a year of what seems like a never-ending stream of cyberthreats and
data breaches, affecting banks, retailers, gaming networks, governments and more.
We’ve seen more evidence that manufacturers of Internet of Things (IoT) devices
have failed to implement basic security standards. Internet of Things attacks move
from proof-of-concept to mainstream risks.Furthermore mobile payment systems were
the talk of 2014 after Apple stormed ahead with Apple Pay.
The patchwork nature of regulation around the world is likely to become an increas-
ing burden on organizations.The law moves slowly compared to the technology and
security fields,but massive regulatory changes that have been a long time coming are
very nearly here.
This year’s Nordic IT Security will take place on November 3rd,
2015 in Stockholm
and will gather senior IT security professionals from across the Nordics and industry
verticals to cover key areas of concerns for organizations from both public and private
sector. Over the course of one day, you will experience recent case studies, insightful
demos, dedicated roundtables, in-depth workshops, technological lightning talks, and
plenty of networking opportunities to give you greater insight on strategic implemen-
tations of the latest technology showcased in the Exhibition Hall.
I look forward to meeting you in Stockholm.
Heidi Scheiffele
Content Director
Nordic IT Security 2015
CONTENT
2	 Editor’s Note
3	 Advisory Board
4	 Participants Profile
5	 What our delegates say
6	 Features
7	 Sharktank
8	 Conference at a Glance
9-17	 Program
18	 Location
19	 Seeking a Partnership
ADVISORY BOARD 2015
Anne-Marie Eklund Löwinder,Head of Security,.SE
Anne-Marie is Head of Security at .SE. She has been ranked as one of Sweden’s foremost experts on IT security
by the magazine Computer Sweden.She is a member of the board of CENTR, of IRI (The Swedish Law and
Informatics Research Institute), the foundation for Development of Telematiques (TU-stiftelsen) and SNUS
(the Swedish Network Users’Society).She is furthermore a member of the information security council of the
Swedish Civil Contingencies Agency (MSB) and is one of the handful of individuals assigned as Trusted Com-
munity Representative and participates in the DNSSEC key generation for the internet root zone as Crypto
Officer, appointed by ICANN (the internet Corporation for Assigned Names and Numbers). She is also a
member of the swedish Digitalization Commissions expert group. Ms. Eklund Löwinder was also a member of
the very first groups that helped the Swedish Standards Institute (SIS) and Swedac to develop what now is known
as the ISO 27000-standard for information security management.
Paolo Balboni,Founding Partner of ICTLegal Consulting & Scientific Director of the Euro-
pean PrivacyAssociation
Paolo Balboni (Ph.D.) is a top tier European ICT, Privacy & Data Protection lawyer and serves as Data Pro-
tection Officer (DPO) for multinational companies. Dr. Balboni is a Founding Partner of ICTLegal Consulting
(ICTLC),a law firm with offices around the world. He provides legal counsel across Europe to multinational
companiesspecializinginthefieldsofPersonalDataProtection,DataSecurity,InformationandCommunicationTech-
nology(ICT),andIntellectual PropertyLaw. Dr. Balboni has considerable experience in Information Technolo-
gies including Cloud Computing, Big Data,Analytics, and the Internet of Things, Healthcare, Insurance,
Banking,Anti-Money Laundering (AML) and Counter-Terrorist Financing (CFT). Dr. Balboni is the Scientific
Director of the European Privacy Association based in Brussels, the Cloud Computing Sector Director and
Responsible for Foreign Affairs at the Italian Institute for Privacy based in Rome.
DavidJacoby,Senior Security Researcher,Kaspersky Lab
David is a security evangelist who is currently working as Senior Security Researcher for Kaspersky Lab.
He is responsible for not only research but also technical PR activities in the Nordic and Benelux region
where his tasks often include vulnerability research and management, penetration tests, security research
and public speaking engagements. His day to day job is about improving awareness of the current and
future threats and vulnerabilities to which Internet users are exposed and fight cybercrime. David has
about 15 years of experience working in the IT security field.This have given him the opportunity to work in
many interesting fields such as: Vulnerability and Threat Management, Customer Experience, Penetration
Testing, Development and Fighting Cybercrime.
Karen Lawrence Öqvist,CEO,DigitalTrace
Privacy Advocate & Expert - Cannot be Controlled - Cannot be Manipulated - Let the Voice of the Citizen be
heard!”is her personal tagline. Karen cares passionately about the right to personal privacy and the right
of ownership of our digital identities, Personal Identifying Information (PII), and our digital footprint. She
is an author, speaker and entrepreneur, with an MSc Information Security (Royal Holloway University of
London) and an MBA (Henley, Reading University).With over 20 years experience in information security,
her career has taken her from UK to: Cern in Geneva, Novell in Zurich, Stockholm, and Hewlett-Packard.
She is today CEO of Dgtlb Information Security AB and President of Digital TRACE in Sweden and Norway.
Mika Kataikko,Director,Cyber Security
Mika Kataikko is director for Cyber Security both in the Jyväskylä Regional Development Company Jykes
Ltd. and in the national Cyber Security business development program driven by the Finnish Funding
Agency for Innovation (Tekes). Mika has a long and diverse backgroundintheTelecom,ICTandSecuritybusi-
nesses,inthepositionsfromsupervisoryroletoproductandproductarealifecyclemanagement,including also
quality and security related management and development responsibilities.His versatile job history gives him a
wide experience and viewpoint in the different areas of businesses and business making, especially in the
areas of ICT and Cyber Security.
Ulf Berglund,M.Sc,CISM,President,Cloud SecurityAlliance Sweden
Ulf Berglund is the president of the Swedish chapter of CSA, Cloud Security Alliance, a worldwide
organization. He is also co-author of the book Guide to the Cloud.
Ulf has a long experience from leading
positions in the field of information security. He has a background as an officer, his last active years he
was principal officer, IT security and information security expert at the Military Intelligence and Security
Service (MUST). He has held positions as CTO, senior consultant and senior consultant for companies
such Pointsec, Ernst & Young and Technology Nexus. Ulf’s consultant and the experience derived from
companies like Scania, Swedish Match, the Stockholm Stock Exchange (OMX), the Swedish Central Bank,
Apoteket AB (pharmacy) and Hennes&Mauritz AB. He has his own company, U&I Security Group AB.
PerThorsheim,SecurityAdviser,God PraksisAS
PerThorsheimworksasanindependentsecurityadviser,basedinBergen,Norway.Heisthefounderandmain
organizerofPasswordsCon.org,the worlds first and only conference about passwords.He has a personal
project on convincing the world to implement RFC3207 STARTTLS support for opportunistic email
encryption. Per was a finalist for the annual Rosing IT security award in 2012, and was awarded the Com-
manding General of the Norwegian Armed Forces Cyber Defence Coin in spring 2014 for his contributions
to information security. He also claims to know your next password. He currently holds the CISA and CISM
certifications from ISACA, and CISSP-ISSAP from (ISC)2.
43%were partners
showcasing their tools,
solutions and products
to support our
delegates
PARTICIPANTS PROFILE 2014
57%were end users
looking for new ideas,
processes, and
solutions
260+
Participants
attended our 7th
Edition
Job Titles
(ISC)2Sweden
.SE
24SolutionsAB
2makeITAB
AbsoluteSoftware
Accumulate
AcronisInternational
AdvanzeConsulting
Advenica
AirWatch
Altemark
Amentor
Andritz
AP4
Arbetsförmedlingen
ArborNetworksUKLtd.
ArcticInnovationGroup
ArxanTechnologiesInc.
AscomNetworkTesting
ASSAABLOYAB
Avepoint
BackBox
BGTGAB
Blocket
BomgarCorporation
BorderlightAB
BuypassAS
CapricodeOy
CarspectAB
CDONGroup
CGI
CGISverigeAB
CloudSecurityAlliance
ConsistorWebTech
CSIS
Cybercom
DanderydsSjukhus
DanderydsSjukhusAB
DeVisscherConsulting
DeltacoAB
DgtlbInformationSecurityAB
DIGILE
DirectisRelations
EgoSecureGmbH
Ekonomistyrningsverket
EnterCard
EntrustInc.
Ercom
Ericsson
EricssonAB
ErikThunAB
ExclusiveNetworks
Eyasys
FinancialARTSolutions
FinansiellID-TeknikBIDAB
FootBalanceSystemLtd
Försäkringskassan
Gentekniknämnden
Giesecke&Devrient
GodPraksisAS
Google
GoyadaAB
H&M
Hammarskiöld&Co
HI3GAccessAB
Hi3GDanmarkApS
HMSIndustrialNetworksAB
HP
Håbokommun
IBM
ICAAB
ICTLegalConsulting
IISP
IneraAB
InfrasecswedenAB
ITTotal
iZettleAB
Jordbruksverket
JyväskyläRegionalDevelopment
CompanyJykesLtd.
KallmyraSystem&ProduktionAB
KarolinskaInstitute
KasperskyLab
KBZ
KI
KikusemaAB
Knivstakommun
KPMG
KrisberedskapsförbundetPOSOM
KSMConsultoria
KTH
LandstingetBlekinge
LandstingetiJönköpingsLän
LaninetSolutions
Lantmännen
Lequa
MarginalenBank
McAfeeN.A.AB
Migrationsverket
MobiTV
Myndighetenförsamhällsskydd
ochberedskap(MSB)
Nackademin
Nasdaq
Naturvårdsverket
NBCAB
Nearshorebusinesssolutions
NetEntertainment
NetEntertainmentNEAB
NIUIFMO
Nokia
Nordea
NordeaBank
NorskTippingAS
NorwegianHullClub
NRDCS/Infobalt
OpenInvest
OpenInvestOYLtd
OP-PohjolaGroup
PandaSecuritySwedenAB
PBR
PeabSupportAB
PedabSweden
Pensionsmyndigheten
PowerbitSecurityAB
Projectplace
Qualys
QualysTechnologies
RadpointAB
Riksdagsförvaltningen
Riksgalden
Riksrevisjonen
RoplanAB
SafeNet
Samhall
SCB
SchneiderElectric
SEB
SecMakerAB
SecureMailbox
SecurEnvoy
SICSSwedishICT
SICSSwedishICT–SecurityLab
Skandiabanken
Skatteverket
SL
SLU
SMSPasscode
SMSPASSCODEA/S
Socialstyrelsen
SoftronicAB
SolarflareCommunications
SopranoDesign
SparNordBankA/S
SSAB
StaySecureSwedenAB
StockholmCountyPolice
StockholmsLänsLandsting
Stokab
StorebrandASA
SuperMicroComputer,Inc.
SveaEkonomiAB
SwedbankAB
SweDeltacoAB
SwedishArmedForces
SwedishCustomsLawEnforcement
SwedishGeneTechnologyAdvisoryBoard
SwedishNationalPoliceBoard
TeleTrusT–ITSecurityAssociationGermany
TeliaSonera
Trace
Trafikverket
TriOptima
Trusteq
TSSolutions
Tullverket
U&ISecuritygrp
Uppsalakommun
UppsalaUniversitet
WapackLabs
Watchguard
VattenfallAB
VattenfallEldistributionAB
Veriscan
Verizon
VirtualManagementAB
Vodafone
Yrkesförmedlingen
ÅF
ÅlandsbankenAbp
Örebrolänslandsting
Participating Organizations
CIO
CISO
CTO
Head of Information Security
Head of IT
Director Cyber Security
Head of IT Infrastructure
Senior Compliance Manager
Enterprise Architect
“The Nordic IT Security 2014 was a good sanity check for verifying that we are on the right track and
dealing with the relevant issues in regards to information security”
- Information Security Architect, EnterCard
“Very useful, rich in content and good opportunity for networking”
- Managing Director, InfoSecure Nordics
“A different, but exciting way to learn from others experiences”
- IT Security Manager, Försvarsmakten
“This conference is getting better every year! A good mix of vendors and industry specialists”
- Chief Trust Officer, Projectplace
“The concept is good: presentations and round table discussions.Preselected subjects is a good way to
focus on certain topics,and meet people sharing the similar interests”
- Product Manager, Ericsson
“Det var bra föredrag och nyttiga diskussioner kring säkerhetsfrågor”
- IT Security Manager, Swedish Court of Patent Appeals
WHAT OUR DELEGATES SAY
BEFORE THE CONFERENCE
NordicITSecuritySocial
The Nordic ITSecurity Forum has a long history and an extended network of ITsecurity experts.Meeting once a year to dis-
cuss and honor these relationships seemed a bit rare to us,our partners and delegates.Join our informal SocialAfter Works,
exclusively for the Nordic ITSecurity community and bring friends,your peers and people that are interested in ITSecurity.
6th
of May
Sheraton Hotel, Stockholm
Sweden, 17:00-19:00
1-to-1Meetings
To ensure the best possible networking onsite,take advantage of the online meeting system before
the conference so that you can schedule private meetings with the peers that you want to meet.
Keynote
Visionary keynote sessions will open and close the conference,
giving the audience an inspirational look into the future of ITSe-
curity,and what they can expect to change in the coming years.
Tracks
Adiversity of key topics within ITSecurity will be discussed
in several dedicated tracks.Each track has several focus ses-
sions,so that participants can go deeper into each topic.
Expo
Visit the on-floor exhibition where the leading vendors,new-
comers and experts showcase technologies and services.
Networking
Extend your network,do business,generate leads,meet
peers and have a cup of coffee with the ones you’ve always
wanted to chat with in networking dedicated breaks and
meeting hubs.
AT THE CONFERENCE
27th
ofAugust
Location TBA, Stockholm
Sweden, 17:00-19:00
8th
of October
Location TBA, Stockholm
Sweden, 17:00-19:00
Sharktank
Our ITSecurity SharkTank gives you the opportunity to brand
and present your breakthrough thoughts to exclusively selected
investors and distributors who are interested in reviewing and
investing.
SHARK TANK
Whocanjoin?
Start-uppers
Innovators
Thought Leaders
Established non-Scandinavian vendors who
are seeking partnerships in the Nordics
EvaluationCriteria
Investment profile - What is the amount of investment &
type of partnership you are looking for?
Market potential - Describe the viability & selling potential
Investment profile - What is the investment,review or type
of partnership you are looking for?
Background and history within ITSecurity - How much
experience do you have,what’s your or your companies
profile?
Pitch requirements -The applicant will present only
trustworthy industryrelevant information and will not solely
rely on speculations and forecasts.The information is 	
transmitted in a clear,concise and attractive way for the
sharks and will be presented on the 3rd of November in a
separate track in front of the sharks within a 15 minutes
presentation.
Howitworks
Apply online under:
www.nordicitsecurity.com and fill out our application form
Copperberg will review the applications and select the
ones that meet the evaluation criteria
Receive your registration by email and prepare your 15
min.pitch
Send us your presentation until 15th
of October!
Pitch the Sharks on 3rd
of November 2015 at Nordic IT
Security in a separate track in front of the sharks
Free to Attend
15-min Pitches
2-4 pm
Apply until 15th
of October
Sharktank
Our ITSecurity SharkTank gives you the opportunity to brand
and present your breakthrough thoughts to exclusively selected
investors and distributors who are interested in reviewing and
investing.
CONFERENCE AT A GLANCE
16.00 - 16.45 Thought Leaders: Key Speaker Sessions
16.45 Closing of Conference
17.00 After Work Networking & Drinks
18.00 Closing of Expo
8.15 Registration
8.45 - 9.45 Thought Leaders: Key Speaker Sessions
9.45 - 10.45 Mindleader Speaking Sessions
Track 1:
Cybersecurity I
Track 2:
Mobile & Cloud Security I
Track 3:
Data Protection I
Track 4:
Trends & Innovation I
10.45 - 11.30 Expo & Networking
11.30 - 12.45 Mindleader Speaking Sessions & Expert Panel
Track 1:
Cybersecurity II
Track 2:
Mobile & Cloud Security II
Track 3:
Data Protection II
Track 4:
Trends & Innovation II
12.45 - 14.00 Expo & Networking & Lunch-Break
14.00 - 16.00
Track 1:
Shark Tank
Track 2:
Masterclasses
“Welcome to Sweden”
Track 3:
Identity & Access
Management
Track 4:
Compliance & Governance
n
n
n
n
n
n
n
n
n
n
n
n
Exhibition
opens
PROGRAM
9.15
Thought Leader Session
Breaking the ground: Cloud of Clouds
In the future digital age, no business will be successful unless it makes the most of the cloud. How to connect eas-
ily and securely to the applications and the data you need, independently of where they are hosted. How the cloud
of clouds-vision builds on a roadmap for future service delivery and is underpinned by a wide range of services and
industry sector solutions.All about the next-generation of federated cloud IT!
8.15 	
Registration
8.45 	
Though Leader Session
Cyber Fraud Impact on Utilities,Financial Services the Insurance Industry
BT Group
Speaker TBA
About BTGroup
BT is one of the world’s leading communications services companies, serving the needs of customers in the UK and
in more than 170 countries worldwide.Their main activities are the provision of fixed-line services, broadband, mobile
and TV products and services as well as networked IT services.
In the UK they are a leading communications services provider, selling products and services to consumers, small and
medium sized enterprises and the public sector.
BT Group also sell wholesale products and services to communications providers in the UK and around the world.
Globally, they supply managed networked IT services to multinational corporations, domestic businesses and national
and local government organisations.
8.40 	
Opening
Tuesday,3rd
ofNovember
PROGRAM
n CyberSecurity n Mobile&CloudSecurity
Cyber security has the greatest impact on our under-		
standing on security in coming years
The distinction between physical and digital is blurring, 	
what implications this means to security?
What are the main five strategic trends which you 		
should follow in cyber security?
Hear from the Best Security Company 2014, awarded 		
by SC Magazine
How to lower the cost of compliance by delivering
	 critical security intelligence on demand
How to automate the full spectrum of auditing,
compliance and protection for IT systems and web
applications
AboutJarno
Jarno Limnéll works as a professor of cyber security in Aalto
University in Finland and also as a VP (cyber security) in Insta
Group Plc. Prof Limnéll has a long exprience on security issues
and he holds a doctor´s degree in Military science.
About Qualys
Qualys, Inc. is a provider of cloud security, compliance and
related services for small and medium-sized businesses and
large corporations based in Redwood Shores, California
Prof. Jarno Limnell, INSTA, VP Cyber Security & Business
development and Aalto University
Qualys,SpeakerTBA
The future trends of cyber security Cloud is the platform of opportunity for
business transformation
9.45
Caught between a Tsunami and a
Knife-Fight
Cloud computing and its impact on IT
Security pros
About Arbor Networks
Arbor Networks is a software company which sellsnetwork
security and network monitoring software, used – according to
the company’s claims – by over 90% of all Internet service pro-
viders.The company’s products are used to protect networks
from denial-of-service attacks, botnets, computer worms, and
efforts to disable network routers.
Will future enterprise computing will be treated as a utility?
Why security staff need to help business executives understand
why configuration management is worth doing
What to do to not lose control over your IT infrastructure
What’s the incident response in the new era of targeted 	
attacks?
How to address emerging DDoS attacks and advances threats
What’s the solution? ...Layered protection backed by global
threat intelligence
Arbor Networks, Speaker TBA
In discussions around cloud computing, security is often
highest on the list of concerns. But what about its impact on IT
Security pros?
10.15
PROGRAM
n DataProtection n Trends&Innovation
Data is the holy grail of the 21st century. However, gone are the
days when consumers took a back seat in protecting their data
online.
However, as humans starts leaving a digital footprint, what are
governments and the EU doing in terms of data protection, and
how can enterprises ensure that they protect 3rd
party data?
Billions of products will be connected by 2020.While the
potential it offers to enterprises and customers alike is huge,
so are the threats and risks of smart products entering into
contact with each other.A Reddit user posted a story about a
boss’s computer that was infected with malware after plugging
an infected e-cigarette into the USB port to recharge.What are
the solutions?
The holy grail of the 21st
century How the Internet of Things and Smart Services
will Change Society
IAM & IoT are not necessarily enough.Why we are going 	
more and more towards applying these technologies 		
in the area of other businesses
Why the Industrial Internet, Critical Infrastructure and 		
Finance gain more attention
9.45
Orchestrate all security controls Gamification in IT Security - Boost
awareness in IT security training
About Tufin
Tufin is a network security company specializing in the
management of next generation and network layer firewalls,
routers, network switches, load balancers and other network
security devices; IoT, Software defined data center, Hybrid
Cloud Services
About David
David is a security evangelist who is currently working as
Senior Security Researcher for Kaspersky Lab. He is respon-
sible for not only research but also technical PR activities in
the Nordic and Benelux region where his tasks often include
vulnerability research and management, penetration tests, se-
curity research and public speaking engagements. David has
about 15 years of experience working in the IT security field.
One of the most efficient methods to strengthen network
security is to orchestrate all security controls throughout
the entire network.
How to ensure that both perimeters and the internal security
controls (on physical and cloud platforms) are orchestrated to
maximize security
How to prevent intrusion and how to effectively contain vulner-
abilities when detected
Tufin,SpeakerTBA
What can we learn from common gamification in the real?
Listen to successful case studies and best practices
How to implement the principles of gaming to a business
problem?
DavidJacoby,Senior Security Researcher,Kaspersky Lab
10.15
About Palo Alto
Palo Alto is leading a new era in cybersecurity by protecting
thousands of enterprise, government, and service provider net-
works from cyber threats.They are the fastest growing security
company in the market.Their security platform natively brings
together all key network security functions, including advanced
threat protection, firewall, IDS/IPS, and URL filtering. Because
these functions are natively built into the platform and share
important information across the respective disciplines, Palo
Alto ensure better security than legacy firewalls, UTMs, or point
threat detection products.
With the persistent nature of today’s attacks, applications can
easily be compromised when security is not considered in each
phase of the development lifecycle.
Palo Alto, Speaker TBA
What applications are being hacked – and How
Why perimeters and firewalls are no longer enough
Why every app needs to be self-aware and self-protecting
Rikard Kullenberg,
Regional Sales Manager,Arxan
Tagline Font:
Myriad Pro RegularBold
12pt
PROGRAM
Defend - Detect - React
n CyberSecurity
n Mobile&CloudSecurity
How to plan your cyber-security strategy
How t stay current on privacy concerns and technologies like
IPS?
How to enter the net level of actionable threat intelligence?
Staying ahead of the ever-changing cyber-
security threat landscape
11.30
10.45
Expo Visit & 1-2-1 Meetings
Expert Panel
Expert Panel
12.00
12.45
Expo Visit & 1-2-1 Meetings
When your content is user generated and your product empow-
ers people in their daily lives, how can you protect them against
fraud, cams and criminal activities?
Understanding who is behind them—their motives and
methods—can provide a more nuanced understanding of
cybersecurity trends.
Beyond any geopolitical tensions, socio-economic trends influ-
ence the path of cyber activity—particularly that of criminals.
Criminality thrives in environments with large IT-literate popu-
lations and relatively lax law enforcement around cybercrimes.
Examples include Russia, Brazil, India and South Africa.
PROGRAM
Protecting your users (from themselves) White Collar Crime,Artificial Intelligence and
Seeker Bots:The Profile of the Modern Fraudster
n DataProtection n Trends&Innovation
11.30
10.45
Expo Visit & 1-2-1 Meetings
Expert Panel Expert Panel
12.00
12.45
Expo Visit & 1-2-1 Meetings
PROGRAM
Welcome to Sweden: Distributors mapping the Scandinavian IT
Security market: Vol. 1
n SharkTank n MasterclassRoom:Enteringthe	
ScandinavianMarket
Start-uppers, Innovators,Thought Leaders and stablished
non-Scandinavian vendors who are seeking partnership in the
Nordics, brand and present their breakthrough thoughts 10
minute pitches to exclusively selected investors and distribu-
tors who are interested in reviewing and investing.
14.00 - 16.00 14.00
Welcome to Sweden: Distributors mapping the Scandinavian IT
Security market: Vol. 2
14.00
PROGRAM
About Bomgar
Control, monitor and manage privileged access to critical
systems by insiders and vendors. Gain visibility and define how
users connect, without hindering productivity.
Learn how to enable efficient and scalable IA processes using
Enterprise GRC and ERM processes. Leverage latest tools in a
“Governance as a Service”implementation. Enable Audit effec-
tiveness to present in real time Audit Committee Dashboards
eliminating Excel and any form of reporting redundancy. Enable
global Collaboration in real time with Governance Chatter with
Internal Audit co-sourced partners as well as External Audit
partners.This is the Audit process of the future.
Stretch & Break established IAM
Changes brought on by cloud computing, mobile endpoint
adoption and and external identity providers stretch and break
established IAM architectures and and challenge security lead-
ers to deliver successful IAM programs.
Implementing“Any Time,Any Device,Any
Where”
What are the major trends for IAM moving forward toward
2020?
How IAM functionality and delivery models must change to be
ready
How identify standards must evolve to support the change
Bomgar,SpeakerTBA
14.00
n Identity&AccessManagement n Governance&Compliance
14.00
About SafeNet
SafeNet, Inc. is an information security company based in
Belcamp, Maryland, United States. It is notably one of the
largest suppliers of encryption technology to the United States
Government. SafeNet and Gemalto join forces, becoming the
world’s leading provider of data, transaction, and identity pro-
tection solutions for enterprises, governments, and financial
institutions.Authentication, Encryption, Software Monetization.
Building an Enterprise Risk Management (ERM) program can
be challenging. For organizations struggling to gain organiza-
tional buy-in, the investment required in purpose-built tech-
nology to enable self-assessment, association with corporate
objectives, risk aggregation, adjusted risk weightings, and
centralized reporting can be daunting. Even with conceptual
agreement from management to tackle ERM, if an organiza-
tion’s size prohibits a large investment, balancing the cost of
“doing it right”with the potential rewards can be challenging
in the early stages-particularly when the organization is still
trying to figure out what“right”looks like.
Beyond Passwords: Something You Have,
Something You Know, Something You Are
For years, passwords have provided a sense of security online,
but today the question is whether a password alone is enough.
Advances in biometrics and security tokens can offer an ad-
ditional layer of security and are already being embraced by
many industries.
Budget Friendly,Yet Effective ERM
SafeNet,Inc.,SpeakerTBA
14.00 14.00
PROGRAM
n SharkTank n MasterclassRoom:Enteringthe	
ScandinavianMarket
14.00 - 16.00 15.00
Welcome to Sweden: Distributors mapping the Scandinavian IT
Security market: Vol. 3
Start-uppers, Innovators,Thought Leaders and stablished
non-Scandinavian vendors who are seeking partnership in the
Nordics, brand and present their breakthrough thoughts 10
minute pitches to exclusively selected investors and distribu-
tors who are interested in reviewing and investing.
16.00 - 18.00
Expo Visit & 1-2-1 Meetings
PROGRAM
About Ping Identity
Ping Identity delivers single sign-on and identity management
with their SAML SSO.We provide increasing IT security and
provide secure mobile access.
Ping Identity,SpeakerTBA How can organizations realize the obvious financial benefits of
the cloud while ensuring information culled from public cloud
sources is secure and trustworthy?
The answer is governance. Learn how governance practices and
principles apply in today’s cloud and hybrid cloud/on -premises
data environments.
n Identity&AccessManagement n Governance&Compliance
15.00 15.00
Chatter about the cloud is everywhere.You can’t turn on your
TV, look at your smart phone, open a magazine, or browse
web sites without being inundated with messages about the
cloud. Proponents tell you the cloud will save you time, give
you a place to store data, a way to manage hard drive space on
your phone, and much, much more. Detractors will scare you
with stories of hackers gaining access to personal photos and
bank account numbers. In the realm of business information
technology, the conflicting stories are much the same: will the
cloud will save you money on your balance sheet, or the cloud
will expose your sensitive data to unwanted prying eyes?
The Case For Next Generation IAM
What’s the three big trends driving industry changes?
What is the future state of smart devices?
Hear about a paradigm shift and the next generation IAM.
Information Governance and the Cloud
16.00
Thought Leader Session:
Paying with Apples - Secure?
Attackers increase focus on mobile payment systems. Mobile payment systems were the talk of 2014 after Apple stormed ahead
with Apple Pay.As consumer adoption of mobile devices approaches 100 percent, mobile identity can become more useful than
passwords, physical identifications, or any other mechanism to verify identity.
New approaches around mobile identity technologies are enabling more companies in the payments chain to effectively par-
ticipate in stopping fraud.While the merchant was typically on the sidelines hoping others would protect their transactions and
prevent fraud, they can now proactively take actions of their own.With the ubiquity of mobile phones, there is little barrier to
consumer adoption, and simple API integrations mean rapid deployment.
16.45 Closing
17.00 After Work Networking & Drinks
18.00 Closing of Expo
LOCATION
Stockholmsmässan
Stockholm, Sweden
Venue
We chose the Nordics largest meeting place for our this years IT Security Forum! Stockholmsmässan is located
approximately ten kilometers south of Stockholm City.
How to get there:
By Public Transportation
There are 8-14 commuter train departures every hour from Stockholm Central Station to Älvsjö Station,which is only a
200-meter walk from Stockholmsmässan’s Main entrance.The journey takes just ten minutes.
The commuter train fromArlandaAirport also stops at Älvsjö station.The train departs two times an hour and the journey
takes 47 minutes.The train departs from Sky City,between terminals 4 and 5.
By car
Take the E4/E20 and follow the signs for Mässan/Älvsjö.
Adress:
Mässvägen 1,Älvsjö
www.stockholmsmassan.se
Limited tickets available for FREE:
www.nordicitsecurity.com/register-today/
As a partner manager with the Nordic ITSecurity Forum,Anastasia has been developing and
managing sponsorship programs for this leading Scandinavian ITSecurity Forum with great
sucess.With her dedication and creativity,she ensures the best business value to the partners
and unforgettable events for the audience.
“Annual Nordic ITSecurity Forum has been marked as Scandinavia’s leadership forum and it
represents a blend of top-tier strategic discussion with over 300 minutes of structured com-
mercial networking for C level decision makers from private and public sectors. Book your
participation,influence the content and benefit from extended marketing campaign.”
Anastasia Lodhi
Partner Manager
+46 (0) 723 273 999
anastasia.lodhi@copperberg.com
Introducing Anastasia Lodhi
I look forward to working with you!
PARTNERSHIP
Nordic IT Security Forum 2015 Agenda

More Related Content

PDF
Nordic IT Security 2014 agenda
PDF
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
PPTX
2015 Data Security Solutions @SFK - Working and living in digital work of future
PPTX
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
PPTX
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
PDF
Top Secret - The Secure Internet Starts Here
PPTX
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
PDF
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Nordic IT Security 2014 agenda
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Top Secret - The Secure Internet Starts Here
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht

What's hot (16)

PPTX
Cyber Safe Southwark
PPTX
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
PPTX
CCIS short presentation - English version
PDF
SMi Group's 6th annual European Smart Grid Cyber Security 2016
PDF
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
PDF
CCIS Brochure English (Nov 2014)
PPTX
Privacy by design
PDF
Top firewall companies 2020 converted
PPTX
Towards Privacy by Design. Key issues to unlock science.
PDF
Mapping and building an education body of knowledge
PDF
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
PDF
EuroCACS 2016 There are giants in the sky
PDF
Highlights FINAL HIGH_RES
PDF
Introduction to drive lock
PDF
ITrust Company Overview EN
PDF
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Cyber Safe Southwark
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
CCIS short presentation - English version
SMi Group's 6th annual European Smart Grid Cyber Security 2016
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
CCIS Brochure English (Nov 2014)
Privacy by design
Top firewall companies 2020 converted
Towards Privacy by Design. Key issues to unlock science.
Mapping and building an education body of knowledge
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
EuroCACS 2016 There are giants in the sky
Highlights FINAL HIGH_RES
Introduction to drive lock
ITrust Company Overview EN
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Ad

Similar to Nordic IT Security Forum 2015 Agenda (20)

PDF
40 under 40 in Cybersecurity 2024 by Top Cyber News MAGAZINE
PDF
Most Inspiring European Professionals in Information & Data Security to Watch...
PPTX
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
PDF
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
PDF
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
PDF
Kaspersky - Apresentação Corporativa
DOCX
Ethnosit.net
PDF
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
PDF
OS17 Brochure
PPTX
Data Portability & Application Portability - Cloud Security Expo 2017
PDF
Security update-1-2012
PDF
World’s Visionary Leaders Making an Impact in Tech, 2024
PDF
Cybersecurity Threats - NI Business Continuity Forum
PDF
The CypherWire - Encryption doesn't have to be cryptic
PDF
Cyber Defence East Africa Summit 2015 invitation
PDF
The 10 Most Experts Cyber Security Leaders Making Waves in Industry, 2024.pdf
PDF
Preparing for GDPR - CRO Insight Journal
PDF
Most Trusted Cyber Security Companies May 2024.pdf
PDF
European Cyber Security Perspectives 2016
40 under 40 in Cybersecurity 2024 by Top Cyber News MAGAZINE
Most Inspiring European Professionals in Information & Data Security to Watch...
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
'Unsustainably Sustainable' by Dr Carl Ungerer and Vanessa Liell at Mumbrella...
Kaspersky - Apresentação Corporativa
Ethnosit.net
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
OS17 Brochure
Data Portability & Application Portability - Cloud Security Expo 2017
Security update-1-2012
World’s Visionary Leaders Making an Impact in Tech, 2024
Cybersecurity Threats - NI Business Continuity Forum
The CypherWire - Encryption doesn't have to be cryptic
Cyber Defence East Africa Summit 2015 invitation
The 10 Most Experts Cyber Security Leaders Making Waves in Industry, 2024.pdf
Preparing for GDPR - CRO Insight Journal
Most Trusted Cyber Security Companies May 2024.pdf
European Cyber Security Perspectives 2016
Ad

More from Copperberg (20)

PDF
Field Service Forum 2016
PDF
TOP5 facts about Mobile Payments
PDF
Meet Nordic IT Security Advisory board, David Jacoby
PDF
I-Gaming Forum 2015 Post Event Report
PDF
The wonderous quest of Prince Wonderful
PDF
Enterprise Digital Transformation Survey report 2015
PDF
Orphan Drugs Summit 2015
PDF
National Lottery Forum 2015 agenda
PDF
Manufacturing Pricing Excellence 2015 agenda
PDF
Field Service Forum 2015 agenda
PDF
European Decision Support Days 2015 agenda
PDF
"Electric Vehicles 2020" conference agenda
PDF
I-Gaming Forum 2015 agenda
PDF
Aftermarket Business Platform 2014 Post Event Report
PDF
Spare Parts Business Platform 2015
PDF
Tomas Wennerstein, Syncron presenation at Spare Parts 2013
PDF
Johan Östlin, Syncron presentation at Spare Parts 2013
PDF
Giacomo Squintani, PTC presenation at Spare Parts 2013
PDF
Axel Bühler, Nordex presenatation at Spare Parts 2013
PDF
Joel Marusiak, Neovia Logistics presenatation at Spare Parts 2013
Field Service Forum 2016
TOP5 facts about Mobile Payments
Meet Nordic IT Security Advisory board, David Jacoby
I-Gaming Forum 2015 Post Event Report
The wonderous quest of Prince Wonderful
Enterprise Digital Transformation Survey report 2015
Orphan Drugs Summit 2015
National Lottery Forum 2015 agenda
Manufacturing Pricing Excellence 2015 agenda
Field Service Forum 2015 agenda
European Decision Support Days 2015 agenda
"Electric Vehicles 2020" conference agenda
I-Gaming Forum 2015 agenda
Aftermarket Business Platform 2014 Post Event Report
Spare Parts Business Platform 2015
Tomas Wennerstein, Syncron presenation at Spare Parts 2013
Johan Östlin, Syncron presentation at Spare Parts 2013
Giacomo Squintani, PTC presenation at Spare Parts 2013
Axel Bühler, Nordex presenatation at Spare Parts 2013
Joel Marusiak, Neovia Logistics presenatation at Spare Parts 2013

Recently uploaded (20)

PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PPTX
Unit 1 aayurveda and nutrition presentation
PPTX
Diploma pharmaceutics notes..helps diploma students
PDF
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
PPTX
Neurological complocations of systemic disease
PPTX
IT infrastructure and emerging technologies
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PPT
hemostasis and its significance, physiology
PDF
FYJC - Chemistry textbook - standard 11.
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
African Communication Research: A review
PDF
Compact First Student's Book Cambridge Official
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PDF
Health aspects of bilberry: A review on its general benefits
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
Review of Related Literature & Studies.pdf
PDF
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
PPTX
Thinking Routines and Learning Engagements.pptx
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
Theoretical for class.pptxgshdhddhdhdhgd
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
Unit 1 aayurveda and nutrition presentation
Diploma pharmaceutics notes..helps diploma students
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
Neurological complocations of systemic disease
IT infrastructure and emerging technologies
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
hemostasis and its significance, physiology
FYJC - Chemistry textbook - standard 11.
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
African Communication Research: A review
Compact First Student's Book Cambridge Official
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
Health aspects of bilberry: A review on its general benefits
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Review of Related Literature & Studies.pdf
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
Thinking Routines and Learning Engagements.pptx
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf

Nordic IT Security Forum 2015 Agenda

  • 1. Stockholmsmässan November 3rd 2015, Stockholm,Sweden 8th annual information security forum Nordic IT Security #nordicitsec Limited tickets available for FREE: www.nordicitsecurity.com/register-today/ 70+ Exhibitors 25+ Speakers 600+ Minutes of networking www.nordicitsecurity.com Partners 2015 Riga, Latvia DataSecuritySolutions Platinum Partners Gold Partners Silver Partners Partners Media Partners Tagline Font: Myriad Pro RegularBold 12pt
  • 2. EDITOR’S NOTE Cybersecurity is experiencing enormous growth, as an industry and as a theme in the daily lives of people and businesses using technology.And because our technology keeps changing at an astounding rate, threats are evolving fast too – with cybercrimi- nals finding new and creative ways to exploit users and technology all the time.To combat the threat in 2015, information security professionals must understand the trends. 2014 has been a year of what seems like a never-ending stream of cyberthreats and data breaches, affecting banks, retailers, gaming networks, governments and more. We’ve seen more evidence that manufacturers of Internet of Things (IoT) devices have failed to implement basic security standards. Internet of Things attacks move from proof-of-concept to mainstream risks.Furthermore mobile payment systems were the talk of 2014 after Apple stormed ahead with Apple Pay. The patchwork nature of regulation around the world is likely to become an increas- ing burden on organizations.The law moves slowly compared to the technology and security fields,but massive regulatory changes that have been a long time coming are very nearly here. This year’s Nordic IT Security will take place on November 3rd, 2015 in Stockholm and will gather senior IT security professionals from across the Nordics and industry verticals to cover key areas of concerns for organizations from both public and private sector. Over the course of one day, you will experience recent case studies, insightful demos, dedicated roundtables, in-depth workshops, technological lightning talks, and plenty of networking opportunities to give you greater insight on strategic implemen- tations of the latest technology showcased in the Exhibition Hall. I look forward to meeting you in Stockholm. Heidi Scheiffele Content Director Nordic IT Security 2015 CONTENT 2 Editor’s Note 3 Advisory Board 4 Participants Profile 5 What our delegates say 6 Features 7 Sharktank 8 Conference at a Glance 9-17 Program 18 Location 19 Seeking a Partnership
  • 3. ADVISORY BOARD 2015 Anne-Marie Eklund Löwinder,Head of Security,.SE Anne-Marie is Head of Security at .SE. She has been ranked as one of Sweden’s foremost experts on IT security by the magazine Computer Sweden.She is a member of the board of CENTR, of IRI (The Swedish Law and Informatics Research Institute), the foundation for Development of Telematiques (TU-stiftelsen) and SNUS (the Swedish Network Users’Society).She is furthermore a member of the information security council of the Swedish Civil Contingencies Agency (MSB) and is one of the handful of individuals assigned as Trusted Com- munity Representative and participates in the DNSSEC key generation for the internet root zone as Crypto Officer, appointed by ICANN (the internet Corporation for Assigned Names and Numbers). She is also a member of the swedish Digitalization Commissions expert group. Ms. Eklund Löwinder was also a member of the very first groups that helped the Swedish Standards Institute (SIS) and Swedac to develop what now is known as the ISO 27000-standard for information security management. Paolo Balboni,Founding Partner of ICTLegal Consulting & Scientific Director of the Euro- pean PrivacyAssociation Paolo Balboni (Ph.D.) is a top tier European ICT, Privacy & Data Protection lawyer and serves as Data Pro- tection Officer (DPO) for multinational companies. Dr. Balboni is a Founding Partner of ICTLegal Consulting (ICTLC),a law firm with offices around the world. He provides legal counsel across Europe to multinational companiesspecializinginthefieldsofPersonalDataProtection,DataSecurity,InformationandCommunicationTech- nology(ICT),andIntellectual PropertyLaw. Dr. Balboni has considerable experience in Information Technolo- gies including Cloud Computing, Big Data,Analytics, and the Internet of Things, Healthcare, Insurance, Banking,Anti-Money Laundering (AML) and Counter-Terrorist Financing (CFT). Dr. Balboni is the Scientific Director of the European Privacy Association based in Brussels, the Cloud Computing Sector Director and Responsible for Foreign Affairs at the Italian Institute for Privacy based in Rome. DavidJacoby,Senior Security Researcher,Kaspersky Lab David is a security evangelist who is currently working as Senior Security Researcher for Kaspersky Lab. He is responsible for not only research but also technical PR activities in the Nordic and Benelux region where his tasks often include vulnerability research and management, penetration tests, security research and public speaking engagements. His day to day job is about improving awareness of the current and future threats and vulnerabilities to which Internet users are exposed and fight cybercrime. David has about 15 years of experience working in the IT security field.This have given him the opportunity to work in many interesting fields such as: Vulnerability and Threat Management, Customer Experience, Penetration Testing, Development and Fighting Cybercrime. Karen Lawrence Öqvist,CEO,DigitalTrace Privacy Advocate & Expert - Cannot be Controlled - Cannot be Manipulated - Let the Voice of the Citizen be heard!”is her personal tagline. Karen cares passionately about the right to personal privacy and the right of ownership of our digital identities, Personal Identifying Information (PII), and our digital footprint. She is an author, speaker and entrepreneur, with an MSc Information Security (Royal Holloway University of London) and an MBA (Henley, Reading University).With over 20 years experience in information security, her career has taken her from UK to: Cern in Geneva, Novell in Zurich, Stockholm, and Hewlett-Packard. She is today CEO of Dgtlb Information Security AB and President of Digital TRACE in Sweden and Norway. Mika Kataikko,Director,Cyber Security Mika Kataikko is director for Cyber Security both in the Jyväskylä Regional Development Company Jykes Ltd. and in the national Cyber Security business development program driven by the Finnish Funding Agency for Innovation (Tekes). Mika has a long and diverse backgroundintheTelecom,ICTandSecuritybusi- nesses,inthepositionsfromsupervisoryroletoproductandproductarealifecyclemanagement,including also quality and security related management and development responsibilities.His versatile job history gives him a wide experience and viewpoint in the different areas of businesses and business making, especially in the areas of ICT and Cyber Security. Ulf Berglund,M.Sc,CISM,President,Cloud SecurityAlliance Sweden Ulf Berglund is the president of the Swedish chapter of CSA, Cloud Security Alliance, a worldwide organization. He is also co-author of the book Guide to the Cloud.
Ulf has a long experience from leading positions in the field of information security. He has a background as an officer, his last active years he was principal officer, IT security and information security expert at the Military Intelligence and Security Service (MUST). He has held positions as CTO, senior consultant and senior consultant for companies such Pointsec, Ernst & Young and Technology Nexus. Ulf’s consultant and the experience derived from companies like Scania, Swedish Match, the Stockholm Stock Exchange (OMX), the Swedish Central Bank, Apoteket AB (pharmacy) and Hennes&Mauritz AB. He has his own company, U&I Security Group AB. PerThorsheim,SecurityAdviser,God PraksisAS PerThorsheimworksasanindependentsecurityadviser,basedinBergen,Norway.Heisthefounderandmain organizerofPasswordsCon.org,the worlds first and only conference about passwords.He has a personal project on convincing the world to implement RFC3207 STARTTLS support for opportunistic email encryption. Per was a finalist for the annual Rosing IT security award in 2012, and was awarded the Com- manding General of the Norwegian Armed Forces Cyber Defence Coin in spring 2014 for his contributions to information security. He also claims to know your next password. He currently holds the CISA and CISM certifications from ISACA, and CISSP-ISSAP from (ISC)2.
  • 4. 43%were partners showcasing their tools, solutions and products to support our delegates PARTICIPANTS PROFILE 2014 57%were end users looking for new ideas, processes, and solutions 260+ Participants attended our 7th Edition Job Titles (ISC)2Sweden .SE 24SolutionsAB 2makeITAB AbsoluteSoftware Accumulate AcronisInternational AdvanzeConsulting Advenica AirWatch Altemark Amentor Andritz AP4 Arbetsförmedlingen ArborNetworksUKLtd. ArcticInnovationGroup ArxanTechnologiesInc. AscomNetworkTesting ASSAABLOYAB Avepoint BackBox BGTGAB Blocket BomgarCorporation BorderlightAB BuypassAS CapricodeOy CarspectAB CDONGroup CGI CGISverigeAB CloudSecurityAlliance ConsistorWebTech CSIS Cybercom DanderydsSjukhus DanderydsSjukhusAB DeVisscherConsulting DeltacoAB DgtlbInformationSecurityAB DIGILE DirectisRelations EgoSecureGmbH Ekonomistyrningsverket EnterCard EntrustInc. Ercom Ericsson EricssonAB ErikThunAB ExclusiveNetworks Eyasys FinancialARTSolutions FinansiellID-TeknikBIDAB FootBalanceSystemLtd Försäkringskassan Gentekniknämnden Giesecke&Devrient GodPraksisAS Google GoyadaAB H&M Hammarskiöld&Co HI3GAccessAB Hi3GDanmarkApS HMSIndustrialNetworksAB HP Håbokommun IBM ICAAB ICTLegalConsulting IISP IneraAB InfrasecswedenAB ITTotal iZettleAB Jordbruksverket JyväskyläRegionalDevelopment CompanyJykesLtd. KallmyraSystem&ProduktionAB KarolinskaInstitute KasperskyLab KBZ KI KikusemaAB Knivstakommun KPMG KrisberedskapsförbundetPOSOM KSMConsultoria KTH LandstingetBlekinge LandstingetiJönköpingsLän LaninetSolutions Lantmännen Lequa MarginalenBank McAfeeN.A.AB Migrationsverket MobiTV Myndighetenförsamhällsskydd ochberedskap(MSB) Nackademin Nasdaq Naturvårdsverket NBCAB Nearshorebusinesssolutions NetEntertainment NetEntertainmentNEAB NIUIFMO Nokia Nordea NordeaBank NorskTippingAS NorwegianHullClub NRDCS/Infobalt OpenInvest OpenInvestOYLtd OP-PohjolaGroup PandaSecuritySwedenAB PBR PeabSupportAB PedabSweden Pensionsmyndigheten PowerbitSecurityAB Projectplace Qualys QualysTechnologies RadpointAB Riksdagsförvaltningen Riksgalden Riksrevisjonen RoplanAB SafeNet Samhall SCB SchneiderElectric SEB SecMakerAB SecureMailbox SecurEnvoy SICSSwedishICT SICSSwedishICT–SecurityLab Skandiabanken Skatteverket SL SLU SMSPasscode SMSPASSCODEA/S Socialstyrelsen SoftronicAB SolarflareCommunications SopranoDesign SparNordBankA/S SSAB StaySecureSwedenAB StockholmCountyPolice StockholmsLänsLandsting Stokab StorebrandASA SuperMicroComputer,Inc. SveaEkonomiAB SwedbankAB SweDeltacoAB SwedishArmedForces SwedishCustomsLawEnforcement SwedishGeneTechnologyAdvisoryBoard SwedishNationalPoliceBoard TeleTrusT–ITSecurityAssociationGermany TeliaSonera Trace Trafikverket TriOptima Trusteq TSSolutions Tullverket U&ISecuritygrp Uppsalakommun UppsalaUniversitet WapackLabs Watchguard VattenfallAB VattenfallEldistributionAB Veriscan Verizon VirtualManagementAB Vodafone Yrkesförmedlingen ÅF ÅlandsbankenAbp Örebrolänslandsting Participating Organizations CIO CISO CTO Head of Information Security Head of IT Director Cyber Security Head of IT Infrastructure Senior Compliance Manager Enterprise Architect
  • 5. “The Nordic IT Security 2014 was a good sanity check for verifying that we are on the right track and dealing with the relevant issues in regards to information security” - Information Security Architect, EnterCard “Very useful, rich in content and good opportunity for networking” - Managing Director, InfoSecure Nordics “A different, but exciting way to learn from others experiences” - IT Security Manager, Försvarsmakten “This conference is getting better every year! A good mix of vendors and industry specialists” - Chief Trust Officer, Projectplace “The concept is good: presentations and round table discussions.Preselected subjects is a good way to focus on certain topics,and meet people sharing the similar interests” - Product Manager, Ericsson “Det var bra föredrag och nyttiga diskussioner kring säkerhetsfrågor” - IT Security Manager, Swedish Court of Patent Appeals WHAT OUR DELEGATES SAY
  • 6. BEFORE THE CONFERENCE NordicITSecuritySocial The Nordic ITSecurity Forum has a long history and an extended network of ITsecurity experts.Meeting once a year to dis- cuss and honor these relationships seemed a bit rare to us,our partners and delegates.Join our informal SocialAfter Works, exclusively for the Nordic ITSecurity community and bring friends,your peers and people that are interested in ITSecurity. 6th of May Sheraton Hotel, Stockholm Sweden, 17:00-19:00 1-to-1Meetings To ensure the best possible networking onsite,take advantage of the online meeting system before the conference so that you can schedule private meetings with the peers that you want to meet. Keynote Visionary keynote sessions will open and close the conference, giving the audience an inspirational look into the future of ITSe- curity,and what they can expect to change in the coming years. Tracks Adiversity of key topics within ITSecurity will be discussed in several dedicated tracks.Each track has several focus ses- sions,so that participants can go deeper into each topic. Expo Visit the on-floor exhibition where the leading vendors,new- comers and experts showcase technologies and services. Networking Extend your network,do business,generate leads,meet peers and have a cup of coffee with the ones you’ve always wanted to chat with in networking dedicated breaks and meeting hubs. AT THE CONFERENCE 27th ofAugust Location TBA, Stockholm Sweden, 17:00-19:00 8th of October Location TBA, Stockholm Sweden, 17:00-19:00 Sharktank Our ITSecurity SharkTank gives you the opportunity to brand and present your breakthrough thoughts to exclusively selected investors and distributors who are interested in reviewing and investing.
  • 7. SHARK TANK Whocanjoin? Start-uppers Innovators Thought Leaders Established non-Scandinavian vendors who are seeking partnerships in the Nordics EvaluationCriteria Investment profile - What is the amount of investment & type of partnership you are looking for? Market potential - Describe the viability & selling potential Investment profile - What is the investment,review or type of partnership you are looking for? Background and history within ITSecurity - How much experience do you have,what’s your or your companies profile? Pitch requirements -The applicant will present only trustworthy industryrelevant information and will not solely rely on speculations and forecasts.The information is transmitted in a clear,concise and attractive way for the sharks and will be presented on the 3rd of November in a separate track in front of the sharks within a 15 minutes presentation. Howitworks Apply online under: www.nordicitsecurity.com and fill out our application form Copperberg will review the applications and select the ones that meet the evaluation criteria Receive your registration by email and prepare your 15 min.pitch Send us your presentation until 15th of October! Pitch the Sharks on 3rd of November 2015 at Nordic IT Security in a separate track in front of the sharks Free to Attend 15-min Pitches 2-4 pm Apply until 15th of October Sharktank Our ITSecurity SharkTank gives you the opportunity to brand and present your breakthrough thoughts to exclusively selected investors and distributors who are interested in reviewing and investing.
  • 8. CONFERENCE AT A GLANCE 16.00 - 16.45 Thought Leaders: Key Speaker Sessions 16.45 Closing of Conference 17.00 After Work Networking & Drinks 18.00 Closing of Expo 8.15 Registration 8.45 - 9.45 Thought Leaders: Key Speaker Sessions 9.45 - 10.45 Mindleader Speaking Sessions Track 1: Cybersecurity I Track 2: Mobile & Cloud Security I Track 3: Data Protection I Track 4: Trends & Innovation I 10.45 - 11.30 Expo & Networking 11.30 - 12.45 Mindleader Speaking Sessions & Expert Panel Track 1: Cybersecurity II Track 2: Mobile & Cloud Security II Track 3: Data Protection II Track 4: Trends & Innovation II 12.45 - 14.00 Expo & Networking & Lunch-Break 14.00 - 16.00 Track 1: Shark Tank Track 2: Masterclasses “Welcome to Sweden” Track 3: Identity & Access Management Track 4: Compliance & Governance n n n n n n n n n n n n Exhibition opens
  • 9. PROGRAM 9.15 Thought Leader Session Breaking the ground: Cloud of Clouds In the future digital age, no business will be successful unless it makes the most of the cloud. How to connect eas- ily and securely to the applications and the data you need, independently of where they are hosted. How the cloud of clouds-vision builds on a roadmap for future service delivery and is underpinned by a wide range of services and industry sector solutions.All about the next-generation of federated cloud IT! 8.15 Registration 8.45 Though Leader Session Cyber Fraud Impact on Utilities,Financial Services the Insurance Industry BT Group Speaker TBA About BTGroup BT is one of the world’s leading communications services companies, serving the needs of customers in the UK and in more than 170 countries worldwide.Their main activities are the provision of fixed-line services, broadband, mobile and TV products and services as well as networked IT services. In the UK they are a leading communications services provider, selling products and services to consumers, small and medium sized enterprises and the public sector. BT Group also sell wholesale products and services to communications providers in the UK and around the world. Globally, they supply managed networked IT services to multinational corporations, domestic businesses and national and local government organisations. 8.40 Opening Tuesday,3rd ofNovember
  • 10. PROGRAM n CyberSecurity n Mobile&CloudSecurity Cyber security has the greatest impact on our under- standing on security in coming years The distinction between physical and digital is blurring, what implications this means to security? What are the main five strategic trends which you should follow in cyber security? Hear from the Best Security Company 2014, awarded by SC Magazine How to lower the cost of compliance by delivering critical security intelligence on demand How to automate the full spectrum of auditing, compliance and protection for IT systems and web applications AboutJarno Jarno Limnéll works as a professor of cyber security in Aalto University in Finland and also as a VP (cyber security) in Insta Group Plc. Prof Limnéll has a long exprience on security issues and he holds a doctor´s degree in Military science. About Qualys Qualys, Inc. is a provider of cloud security, compliance and related services for small and medium-sized businesses and large corporations based in Redwood Shores, California Prof. Jarno Limnell, INSTA, VP Cyber Security & Business development and Aalto University Qualys,SpeakerTBA The future trends of cyber security Cloud is the platform of opportunity for business transformation 9.45 Caught between a Tsunami and a Knife-Fight Cloud computing and its impact on IT Security pros About Arbor Networks Arbor Networks is a software company which sellsnetwork security and network monitoring software, used – according to the company’s claims – by over 90% of all Internet service pro- viders.The company’s products are used to protect networks from denial-of-service attacks, botnets, computer worms, and efforts to disable network routers. Will future enterprise computing will be treated as a utility? Why security staff need to help business executives understand why configuration management is worth doing What to do to not lose control over your IT infrastructure What’s the incident response in the new era of targeted attacks? How to address emerging DDoS attacks and advances threats What’s the solution? ...Layered protection backed by global threat intelligence Arbor Networks, Speaker TBA In discussions around cloud computing, security is often highest on the list of concerns. But what about its impact on IT Security pros? 10.15
  • 11. PROGRAM n DataProtection n Trends&Innovation Data is the holy grail of the 21st century. However, gone are the days when consumers took a back seat in protecting their data online. However, as humans starts leaving a digital footprint, what are governments and the EU doing in terms of data protection, and how can enterprises ensure that they protect 3rd party data? Billions of products will be connected by 2020.While the potential it offers to enterprises and customers alike is huge, so are the threats and risks of smart products entering into contact with each other.A Reddit user posted a story about a boss’s computer that was infected with malware after plugging an infected e-cigarette into the USB port to recharge.What are the solutions? The holy grail of the 21st century How the Internet of Things and Smart Services will Change Society IAM & IoT are not necessarily enough.Why we are going more and more towards applying these technologies in the area of other businesses Why the Industrial Internet, Critical Infrastructure and Finance gain more attention 9.45 Orchestrate all security controls Gamification in IT Security - Boost awareness in IT security training About Tufin Tufin is a network security company specializing in the management of next generation and network layer firewalls, routers, network switches, load balancers and other network security devices; IoT, Software defined data center, Hybrid Cloud Services About David David is a security evangelist who is currently working as Senior Security Researcher for Kaspersky Lab. He is respon- sible for not only research but also technical PR activities in the Nordic and Benelux region where his tasks often include vulnerability research and management, penetration tests, se- curity research and public speaking engagements. David has about 15 years of experience working in the IT security field. One of the most efficient methods to strengthen network security is to orchestrate all security controls throughout the entire network. How to ensure that both perimeters and the internal security controls (on physical and cloud platforms) are orchestrated to maximize security How to prevent intrusion and how to effectively contain vulner- abilities when detected Tufin,SpeakerTBA What can we learn from common gamification in the real? Listen to successful case studies and best practices How to implement the principles of gaming to a business problem? DavidJacoby,Senior Security Researcher,Kaspersky Lab 10.15
  • 12. About Palo Alto Palo Alto is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider net- works from cyber threats.They are the fastest growing security company in the market.Their security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. Because these functions are natively built into the platform and share important information across the respective disciplines, Palo Alto ensure better security than legacy firewalls, UTMs, or point threat detection products. With the persistent nature of today’s attacks, applications can easily be compromised when security is not considered in each phase of the development lifecycle. Palo Alto, Speaker TBA What applications are being hacked – and How Why perimeters and firewalls are no longer enough Why every app needs to be self-aware and self-protecting Rikard Kullenberg, Regional Sales Manager,Arxan Tagline Font: Myriad Pro RegularBold 12pt PROGRAM Defend - Detect - React n CyberSecurity n Mobile&CloudSecurity How to plan your cyber-security strategy How t stay current on privacy concerns and technologies like IPS? How to enter the net level of actionable threat intelligence? Staying ahead of the ever-changing cyber- security threat landscape 11.30 10.45 Expo Visit & 1-2-1 Meetings Expert Panel Expert Panel 12.00 12.45 Expo Visit & 1-2-1 Meetings
  • 13. When your content is user generated and your product empow- ers people in their daily lives, how can you protect them against fraud, cams and criminal activities? Understanding who is behind them—their motives and methods—can provide a more nuanced understanding of cybersecurity trends. Beyond any geopolitical tensions, socio-economic trends influ- ence the path of cyber activity—particularly that of criminals. Criminality thrives in environments with large IT-literate popu- lations and relatively lax law enforcement around cybercrimes. Examples include Russia, Brazil, India and South Africa. PROGRAM Protecting your users (from themselves) White Collar Crime,Artificial Intelligence and Seeker Bots:The Profile of the Modern Fraudster n DataProtection n Trends&Innovation 11.30 10.45 Expo Visit & 1-2-1 Meetings Expert Panel Expert Panel 12.00 12.45 Expo Visit & 1-2-1 Meetings
  • 14. PROGRAM Welcome to Sweden: Distributors mapping the Scandinavian IT Security market: Vol. 1 n SharkTank n MasterclassRoom:Enteringthe ScandinavianMarket Start-uppers, Innovators,Thought Leaders and stablished non-Scandinavian vendors who are seeking partnership in the Nordics, brand and present their breakthrough thoughts 10 minute pitches to exclusively selected investors and distribu- tors who are interested in reviewing and investing. 14.00 - 16.00 14.00 Welcome to Sweden: Distributors mapping the Scandinavian IT Security market: Vol. 2 14.00
  • 15. PROGRAM About Bomgar Control, monitor and manage privileged access to critical systems by insiders and vendors. Gain visibility and define how users connect, without hindering productivity. Learn how to enable efficient and scalable IA processes using Enterprise GRC and ERM processes. Leverage latest tools in a “Governance as a Service”implementation. Enable Audit effec- tiveness to present in real time Audit Committee Dashboards eliminating Excel and any form of reporting redundancy. Enable global Collaboration in real time with Governance Chatter with Internal Audit co-sourced partners as well as External Audit partners.This is the Audit process of the future. Stretch & Break established IAM Changes brought on by cloud computing, mobile endpoint adoption and and external identity providers stretch and break established IAM architectures and and challenge security lead- ers to deliver successful IAM programs. Implementing“Any Time,Any Device,Any Where” What are the major trends for IAM moving forward toward 2020? How IAM functionality and delivery models must change to be ready How identify standards must evolve to support the change Bomgar,SpeakerTBA 14.00 n Identity&AccessManagement n Governance&Compliance 14.00 About SafeNet SafeNet, Inc. is an information security company based in Belcamp, Maryland, United States. It is notably one of the largest suppliers of encryption technology to the United States Government. SafeNet and Gemalto join forces, becoming the world’s leading provider of data, transaction, and identity pro- tection solutions for enterprises, governments, and financial institutions.Authentication, Encryption, Software Monetization. Building an Enterprise Risk Management (ERM) program can be challenging. For organizations struggling to gain organiza- tional buy-in, the investment required in purpose-built tech- nology to enable self-assessment, association with corporate objectives, risk aggregation, adjusted risk weightings, and centralized reporting can be daunting. Even with conceptual agreement from management to tackle ERM, if an organiza- tion’s size prohibits a large investment, balancing the cost of “doing it right”with the potential rewards can be challenging in the early stages-particularly when the organization is still trying to figure out what“right”looks like. Beyond Passwords: Something You Have, Something You Know, Something You Are For years, passwords have provided a sense of security online, but today the question is whether a password alone is enough. Advances in biometrics and security tokens can offer an ad- ditional layer of security and are already being embraced by many industries. Budget Friendly,Yet Effective ERM SafeNet,Inc.,SpeakerTBA 14.00 14.00
  • 16. PROGRAM n SharkTank n MasterclassRoom:Enteringthe ScandinavianMarket 14.00 - 16.00 15.00 Welcome to Sweden: Distributors mapping the Scandinavian IT Security market: Vol. 3 Start-uppers, Innovators,Thought Leaders and stablished non-Scandinavian vendors who are seeking partnership in the Nordics, brand and present their breakthrough thoughts 10 minute pitches to exclusively selected investors and distribu- tors who are interested in reviewing and investing. 16.00 - 18.00 Expo Visit & 1-2-1 Meetings
  • 17. PROGRAM About Ping Identity Ping Identity delivers single sign-on and identity management with their SAML SSO.We provide increasing IT security and provide secure mobile access. Ping Identity,SpeakerTBA How can organizations realize the obvious financial benefits of the cloud while ensuring information culled from public cloud sources is secure and trustworthy? The answer is governance. Learn how governance practices and principles apply in today’s cloud and hybrid cloud/on -premises data environments. n Identity&AccessManagement n Governance&Compliance 15.00 15.00 Chatter about the cloud is everywhere.You can’t turn on your TV, look at your smart phone, open a magazine, or browse web sites without being inundated with messages about the cloud. Proponents tell you the cloud will save you time, give you a place to store data, a way to manage hard drive space on your phone, and much, much more. Detractors will scare you with stories of hackers gaining access to personal photos and bank account numbers. In the realm of business information technology, the conflicting stories are much the same: will the cloud will save you money on your balance sheet, or the cloud will expose your sensitive data to unwanted prying eyes? The Case For Next Generation IAM What’s the three big trends driving industry changes? What is the future state of smart devices? Hear about a paradigm shift and the next generation IAM. Information Governance and the Cloud 16.00 Thought Leader Session: Paying with Apples - Secure? Attackers increase focus on mobile payment systems. Mobile payment systems were the talk of 2014 after Apple stormed ahead with Apple Pay.As consumer adoption of mobile devices approaches 100 percent, mobile identity can become more useful than passwords, physical identifications, or any other mechanism to verify identity. New approaches around mobile identity technologies are enabling more companies in the payments chain to effectively par- ticipate in stopping fraud.While the merchant was typically on the sidelines hoping others would protect their transactions and prevent fraud, they can now proactively take actions of their own.With the ubiquity of mobile phones, there is little barrier to consumer adoption, and simple API integrations mean rapid deployment. 16.45 Closing 17.00 After Work Networking & Drinks 18.00 Closing of Expo
  • 18. LOCATION Stockholmsmässan Stockholm, Sweden Venue We chose the Nordics largest meeting place for our this years IT Security Forum! Stockholmsmässan is located approximately ten kilometers south of Stockholm City. How to get there: By Public Transportation There are 8-14 commuter train departures every hour from Stockholm Central Station to Älvsjö Station,which is only a 200-meter walk from Stockholmsmässan’s Main entrance.The journey takes just ten minutes. The commuter train fromArlandaAirport also stops at Älvsjö station.The train departs two times an hour and the journey takes 47 minutes.The train departs from Sky City,between terminals 4 and 5. By car Take the E4/E20 and follow the signs for Mässan/Älvsjö. Adress: Mässvägen 1,Älvsjö www.stockholmsmassan.se Limited tickets available for FREE: www.nordicitsecurity.com/register-today/
  • 19. As a partner manager with the Nordic ITSecurity Forum,Anastasia has been developing and managing sponsorship programs for this leading Scandinavian ITSecurity Forum with great sucess.With her dedication and creativity,she ensures the best business value to the partners and unforgettable events for the audience. “Annual Nordic ITSecurity Forum has been marked as Scandinavia’s leadership forum and it represents a blend of top-tier strategic discussion with over 300 minutes of structured com- mercial networking for C level decision makers from private and public sectors. Book your participation,influence the content and benefit from extended marketing campaign.” Anastasia Lodhi Partner Manager +46 (0) 723 273 999 [email protected] Introducing Anastasia Lodhi I look forward to working with you! PARTNERSHIP