IDC Security Conference 360 degree Security for Real Commercial Impact

In-Person Event | Stockholm | September 27, 2022

Overview

There are three main themes that businesses are looking at with care and attention: Trust, Resiliency and Data sovereignty.

  • Trust has become a key aspect for businesses to measure and part of this involved security and privacy. The role of the CISO has evolved to becoming the Guardian of a Company's Trust metric.
  • Resiliency is a vital component for being able to withstand disruption, which comes from all directions (pandemic, supply shortage, inflation, extreme weather, massive scale cyber attacks).
  • Data sovereignty is important especially here in Europe with local and EU regulations, and there is an evolving discussion around digital sovereignty.

These three themes impact vendor security portfolio and approaches having a material impact on the commercial and structural evolution of platforms, products, and services - with for example Security-as-a-Service.

360-degree security has become a necessity with multi-layered approached offering the best protection. In terms of specific aeras, IDC identifies Identity, Managed Security Services, OT/IT convergence, Security-as-a-Service, Zero Trust, and Cloud security as key pillars underpinning a comprehensive strategy.

There is also growing attention to measuring and reducing risk and creating trustworthiness measurements for supply chains partners and third parties. We expect new European legislation around third-party security and risk auditing.

Join & be inspired! 

Join IDC's IT Security conference to deep dive into these areas with a broad section of industry thought leadership sharing and networking opportunities.

The conference will be held in Stockholm the 27th of September 2022, bringing together security leaders to:

  • Share experiences
  • Learn new techniques
  • Upgrade their strategies to exploit the latest innovative and advanced security techniques 
  • Mindset change to help raise levels of resilience and digital trust

Agenda

Time Event & Speakers
8:30

Registration & breakfast

9:00

Welcome by IDC

Thomas Karlsson

Conference Director, Events
9:05

IDC keynote: 360 degree Security for Real Commercial Impact

Joel Stradling

Research Director, European Security, IDC

IDC’s keynote will provide insights into the top trends in IT Security and share findings from our latest research.

Three main areas are currently demanding businesses attention: Resilience, Trust, and Data Sovereignty. These impact business strategy, in turn driving security vendors to develop their portfolios portfolio and delivery models, with material impact on the commercial and structural evolution of platforms, products, and services – such as with Security-as-a-Service.

We see that 360-degree security has become a necessity with a multi-layered approach offering the best protection. IDC identifies Detection and Response, Identity, Managed Security Services, IT/OT convergence, Security-as-a-Service, Zero Trust, and Cloud security as key pillars underpinning a comprehensive strategy. Finally, there is growing attention to managing risk and implementing trust frameworks for supply chain partners and third parties.

 

 

9:30

Detecting and stopping breaches – tooling and techniques to address skills shortages

Mikkel Planck

Senior Cybersecurity Specialist, CrowdStrike

Every senior manager will recognize the struggles of hiring the right people, in a job market where security professionals are a resource in high demand, and supply is severely constrained. With employees increasingly working from home and abroad, the ability to respond to adversaries becomes even more complicated and time critical. Tooling, automation and services are key to getting ahead of attackers and stop breaches, and in this session we discuss how technologies help to address skills shortages in a proactive manner.

9:50

Thriving in an insecure world!

Kristof Goossens

Solutions Architect, GitLab

The world we live in is ever-changing. And we need to adapt, fast! 92% of companies say they will need to adapt their current business models to remain viable if they digitize at the current speed. 

In this session, we will talk about Value Streams, with security and compliance embedded in the daily activities, as automated as possible. We will discuss why we need them and show real-world examples of what happens if we don't.

Join this presentation and you will learn:

What are Value Streams?

How can we secure Value Streams?

How can we make sure we remain compliant?

 

10:10

How Old math can solve new problems - 5 ways to improve your Security Ecosystem

Joris van der Linde

Cyber Security Expert, Infoblox

In this presentation I will show you how you can shift left your security layer by learning a new style: detecting and blocking threats at the earliest stage of the attack chain, and how threat intelligence can make your security insightful.

I will explain how to translate threat intelligence into actual security enhancements which will lead to more tangible follow up to ensure your SecOps workload will be reduced.

The old math will solve new problems by using what’s on your network already.

 

10:30

Coffee break & networking

11:00

Presentations (Parallel Sessions)

Session #1.1

11:00 - 11:20

Modern cybersecurity beyond boring

Andreas Schneider

Field CISO EMEA, Lacework

Session #2.1

11:00 - 11:20

Containers, Castles, and Security - A World of Zero Trust

Gerald Pfeifer

CTO, SUSE
Session #1.1
11:00 - 11:20

Modern cybersecurity beyond boring

Session #2.1
11:00 - 11:20

Containers, Castles, and Security - A World of Zero Trust

11:25

Presentations (Parallel Sessions)

Session #1.2

11:25 - 11:45

Case: Why Getinge Chose M-Files for Secure Document Control

Peter Arvidsson

Director IT Quality Management and Compliance at Getinge

Session #2.2

11:25 - 11:45

Limitless XDR: Why it matters for Ransomware Prevention

David Thejl-Clayton

Senior Solutions Architect, Elastic
Session #1.2
11:25 - 11:45

Case: Why Getinge Chose M-Files for Secure Document Control

Session #2.2
11:25 - 11:45

Limitless XDR: Why it matters for Ransomware Prevention

11:50

Presentations (Parallel Sessions)

Session #1.3

11:50 - 12:10

Debunking Common Myths About XDR

António Vasconcelos

Technology Strategist, SentinelOne

Session #2.3

11:50 - 12:10

A practical guide to start working with developer security

Tim Leroy

Senior Solutions Engineer, Snyk
Session #1.3
11:50 - 12:10

Debunking Common Myths About XDR

Session #2.3
11:50 - 12:10

A practical guide to start working with developer security

12:10

Lunch & networking

13:10

Introduction to Fireside Chat Session

13:15

Fireside chat: Moving Beyond Traditional App/API Security Tools

Jay Coley

Manager Global Security Strategy, Fastly

Joel Stradling

Research Director, European Security, IDC

To achieve a 360 degree security strategy, we need to look beyond traditional App/API security tools. 

Organizations are highly dependent on apps and APIs – these are the glue that keeps a business up and running and this level of importance and dependency demands robust security. 

These different environments can mean you’re also surrounded by a multitude of tools that are essentially doing the same thing with different levels of control and management. This slow tooling creep will eventually impact development efforts as there will be too much to manage and tune in fast paced CI/CD environments.

13:30

Fireside chat: AI based cyber resilience – deployment with Zero Trust

Simon Wikberg

Principal Sales Engineer - Nordics & Benelux, BlackBerry

Jan Horsager

Research Director, IDC

Zero Trust is a verification framework that impacts the whole organization from endpoints to users whereby the balance between technology and people is vital to protect information and remain resilient. Prevention against continuous malware attacks is critical, as is the augmentation of security operations with tools that ensure visibility across the entire estate while deploying prevention-first to safeguard business continuity. We discuss new controls which overcome the ITSEC resource challenges and prove effective in the real world at scale. How can AI and ML be applied to ensure organizational cyber resilience via Zero Trust? How can MDR services be leveraged for further empowerment? We explore a sustainable cyber-future of continuous and integrated protection from malware via Zero Trust in and out of the cloud using AI’s predictive advantage to prevent attacks before they happen.

13:45

Zero Trust Made Simple

Tony Fergusson

CISO EMEA, Zscaler

How do you adopt Zero Trust in its simplest form? A Zero Trust architecture should be seen as an enabler to reduce cost and complexity. There are different approaches to Zero Trust, but the key principle should be reducing the attack surface and ensuring you protect what really matters. Join us to learn how to reduce security risk and reduce complexity by leveraging a software defined architecture to protect what really matters.

14:05

Coffee break & networking

14:35

Best practices start with personal password behavior

Jonas Hedquist

Sr Partner Manager, Commaxx

With the Cyber Security Awareness Month quickly approaching in October, organizations have an opportunity to create high levels of awareness in their user base on the importance of password hygiene, phishing and common sense security risk mitigation.

This presentation will provide insights on how to protect the IT assets of an organization by focusing on personal password behavior. Common behavior will be explored and some proposed simple solutions will be recommended.

 

14:55

Styrning av informationssäkerhet i en agil organisation

Peter Granlund

CISO, If P&C and Sampo Group

När omvärlden allt mer gör att verksamheter arbetar agilt och besluten decentraliseras, hur ska en CISO då adressera informationssäkerhet samtidigt som interna och externa krav ökar?

15:20

Reflektioner kring EU:s kommande tekniklagstiftning och affärspåverkan [SWE]

Sofia Edvardsen

VD/Grundare, Affärsjurist, Sharp Cookie Advisors AB

Lyssna till vår gästföreläsare Sofia Edvardsen, en tankeledare inom teknikreglering, för att lära dig mer om kommande tekniklagstiftning och vad den betyder för ditt företag!

→ EU:s nya AI-lag

→ Det nya NIS 2 cybersäkerhetsdirektivet

→ Hur marknadsledarna anpassar sin verksamhet för att möta kommande standarder

→ Användningsfall från ledande marknadsaktörer och hur CIO:er kan använda dem i sitt eget företag.

→ Frågor och svar

 

15:45

Summering och avslutning

Joel Stradling

Research Director, European Security, IDC

Thomas Karlsson

Conference Director, Events
15:55

Networking & EXPO

16:25

Thank you for today!

Partners

Diamond Partner
In-Person
Diamond Partner
In-Person
Diamond Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person

General Information

Location

Materials

To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Camilla Hove Toft via email, at chovetoft@idc.com.

Contact Us

Camilla Hove Toft

Conference Director

Peer Jensen

Senior Sales Director, IDC Northern Europe Region, IDC Nordic

About IDC

58 Years | 1300 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,300 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.