IDC Security Conference 360 degree Security for Real Commercial Impact

In-Person Event | Copenhagen | September 29, 2022

Overview

There are three main themes that businesses are looking at with care and attention: Trust, Resiliency and Data sovereignty.

  • Trust has become a key aspect for businesses to measure and part of this involved security and privacy. The role of the CISO has evolved to becoming the Guardian of a Company's Trust metric.
  • Resiliency is a vital component for being able to withstand disruption, which comes from all directions (pandemic, supply shortage, inflation, extreme weather, massive scale cyber attacks).
  • Data sovereignty is important especially here in Europe with local and EU regulations, and there is an evolving discussion around digital sovereignty.

These three themes impact vendor security portfolio and approaches having a material impact on the commercial and structural evolution of platforms, products, and services - with for example Security-as-a-Service.

360-degree security has become a necessity with multi-layered approached offering the best protection. In terms of specific aeras, IDC identifies Identity, Managed Security Services, OT/IT convergence, Security-as-a-Service, Zero Trust, and Cloud security as key pillars underpinning a comprehensive strategy.

There is also growing attention to measuring and reducing risk and creating trustworthiness measurements for supply chains partners and third parties. We expect new European legislation around third-party security and risk auditing.

Join & be inspired! 

Join IDC's IT Security conference to deep dive into these areas with a broad section of industry thought leadership sharing and networking opportunities.

The conference will be held in Copenhagen on the 29th of September 2022, bringing together security leaders to:

  • Share experiences
  • Learn new techniques
  • Upgrade their strategies to exploit the latest innovative and advanced security techniques 
  • Mindset change to help raise levels of resilience and digital trust

Agenda

Time Event & Speakers
8:30

Registration & breakfast

9:00

Welcome by IDC

Camilla Hove Toft

Conference Director
9:05

IDC keynote: 360 degree Security for Real Commercial Impact

Joel Stradling

Research Director, European Security, IDC

IDC’s keynote will provide insights into the top trends in IT Security and share findings from our latest research.

Three main areas are currently demanding businesses attention: Resilience, Trust, and Data Sovereignty. These impact business strategy, in turn driving security vendors to develop their portfolios portfolio and delivery models, with material impact on the commercial and structural evolution of platforms, products, and services – such as with Security-as-a-Service.

We see that 360-degree security has become a necessity with a multi-layered approach offering the best protection. IDC identifies Detection and Response, Identity, Managed Security Services, IT/OT convergence, Security-as-a-Service, Zero Trust, and Cloud security as key pillars underpinning a comprehensive strategy. Finally, there is growing attention to managing risk and implementing trust frameworks for supply chain partners and third parties.

 

9:30

Detecting and stopping breaches – tooling and techniques to address skills shortages

Mikkel Planck

Senior Cybersecurity Specialist, CrowdStrike

Every senior manager will recognize the struggles of hiring the right people, in a job market where security professionals are a resource in high demand, and supply is severely constrained. With employees increasingly working from home and abroad, the ability to respond to adversaries becomes even more complicated and time critical. Tooling, automation and services are key to getting ahead of attackers and stop breaches, and in this session we discuss how technologies help to address skills shortages in a proactive manner.

9:50

Hvorfor bliver vores sikkerhedsproblemer værre? Hvad kan der gøres...

Niels Zimmer Poulsen

Head of Security Engineering, Check Point Software Technologies

Med Cyber-trusler, der eksisterer inden for og uden for sikkerhedsperimeteren, er det blevet afgørende at anvende en Zero Trust-sikkerhedstilgang for at holde forretningsdata beskyttet, hvor som helst. Vores praktiske, holistiske tilgang til Zero Trust-implementering giver dig mulighed for at undgå kompleksiteter og risici med en enkelt konsolideret Zero Trust-sikkerhedsarkitektur

10:10

Udfordringer med at bruge cloud-løsninger

Henning Mortensen

CISO/CPO og Formand for Rådet for Digital Sikkerhed, Brødrene A & O Johansen A/S

Efter Schrems II-dommer og anbefalingerne fra de europæiske datatilsyn er det blevet meget vanskeligt at bruge cloud-løsninger til at behandle personoplysninger. I dette indlæg vil Henning gennemgå udfordringerne og nogle af de aktuelle compliance-udfordringer vi står overfor. Desuden vil nogle af de mulige løsningsscenarier vi kan se frem imod blive gennemgået.

10:30

Coffee break & networking

11:00

Præsentationer (Parallel Sessions)

Session #1.1

11:00 - 11:20

How does operationalizing Cyber Threat Intelligence help your organization fight cyber threats by anticipation?

Fabien Dombard

Security Industry Advisor, SEKOIA.IO

Session #2.1

11:00 - 11:20

Debunking Common Myths About XDR

António Vasconcelos

Technology Strategist, SentinelOne
Session #1.1
11:00 - 11:20

How does operationalizing Cyber Threat Intelligence help your organization fight cyber threats by anticipation?

Session #2.1
11:00 - 11:20

Debunking Common Myths About XDR

11:25

Presentations (Parallel Sessions)

Session #1.2

11:25 - 11:45

What DevSecOps can learn from Elon Musk

Natasha Oriwoh

Solution Architect, Sonatype

Session #2.2

11:25 - 11:45

Presentation by Nutanix

Ari Thor Gudmannsson

Specialist Architect - Networking & Security - EMEA, Nutanix
Session #1.2
11:25 - 11:45

What DevSecOps can learn from Elon Musk

Session #2.2
11:25 - 11:45

Presentation by Nutanix

11:50

Præsentationer (Parallel Sessions)

Session #1.3

11:50 - 12:10

Transform your business with Internet-native architecture

Niklas Jörding

Zero Trust & SASE Lead, Cloudflare

Session #2.3

11:50 - 12:10

Safer with Google technology and expertise

Patrik Bylund

Product Sales Manager, Google Cloud
Session #1.3
11:50 - 12:10

Transform your business with Internet-native architecture

Session #2.3
11:50 - 12:10

Safer with Google technology and expertise

12:10

Lunch & networking

13:10

An everchanging Cyber Threat Landscape worsens – do we understand and mitigate the highest impacts?

Henrik Løth Thiesen

Global Director Information Security & Risk Management, Vestas

Safeguarding is a well-known approach to effective security measures. But is this approach sufficient enough to stand alone or do we need to do something extra to mitigate the highest impacts as well? 

Having worked with various approaches to security, as well as across various sectors, Henrik Løth Thiesen will utilize on his experiences from international organizations approaches to combat the cyber battles going on.

13:30

Introduction to Fireside Chat Session

13:35

Fireside chat: Intelligent network monitoring and visibility truly matters

Roman Cupka

Senior Principal Consultant, Progress Software

Joel Stradling

Research Director, European Security, IDC

Nowdays network, application and security departments are struggling with massive network communication, hidden threats and missconfigurations which allows various vectors resulting in cyber security incidents. Many times it is happening because of lack of single pane of view, right information sharing and automate workflow between these departments in daily operation.

 

Network anomaly detection and response automation, deep network traffic analysis and data collection helps to get better insight into "what’s really going on" in our environment and provide faster MTTR in case of operational and security issues.  It is also fundamental part of NIST Incident Handling procedures and helps to fullfil regulations and legislation requirements like NIS(D) in Europe. 

 

We will discuss why network visibility really matters, how it use in daily cross-departments operation and get the most of it and why we should not forget it when building a resilient security architecture.

13:50

Fireside chat: AI based cyber resilience – deployment with Zero Trust

Simon Wikberg

Principal Sales Engineer - Nordics & Benelux, BlackBerry

Jan Horsager

Research Director, IDC

Zero Trust is a verification framework that impacts the whole organization from endpoints to users whereby the balance between technology and people is vital to protect information and remain resilient. Prevention against continuous malware attacks is critical, as is the augmentation of security operations with tools that ensure visibility across the entire estate while deploying prevention-first to safeguard business continuity. We discuss new controls which overcome the ITSEC resource challenges and prove effective in the real world at scale. How can AI and ML be applied to ensure organizational cyber resilience via Zero Trust? How can MDR services be leveraged for further empowerment? We explore a sustainable cyber-future of continuous and integrated protection from malware via Zero Trust in and out of the cloud using AI’s predictive advantage to prevent attacks before they happen.

14:05

Coffee break & networking

14:35

Fireside chat: Challenge the Rules of Security - Transform the threat surface to proactive control

Pritam Pabla

Head of Chrome Customer Engineers EMEA, Google

Jan Horsager

Research Director, IDC

With the dramatic increase in distributed workforces and the growing adoption of cloud applications, companies face unprecedented levels of IP, data, and identity sprawl beyond the enterprise firewall. Every endpoint is an entry into your business, cybercriminals have more ways to break in than ever before, and human error on the inside is a constant risk. Historically, endpoint security has been a zero-sum game—with the odds inevitably stacked against IT. But rather than protect devices, what if you could just control the security of them?

In this presentation, see how Chrome OS and Chrome browser are secure by design—embedding security into every workflow to provide proactive protection for users, devices, applications, and data, wherever work happens. This is cloud-first security control in the hands of the modern businesses that will thrive moving forward.

 

14:50

Fireside chat: How to balance endpoint protection and productivity through zero trust?

Penny Topping

North West Europe CyberSecurity Sales Manager, HP

Joel Stradling

Research Director, European Security, IDC
15:05

Fireside chat - summary & take-aways

15:10

Regulatory update and impact from new legislation [DAN]

Peter Lind Nielsen

Managing associate, Bech-Bruun

Nu er EU’s NIS2-direktiv (Netværks- og Informationssikkerhed) lige på trapperne, og selvom der er knap to år, før det skal være implementeret i Danmark, venter der forud for mange en stor compliance opgave.

NIS2 vil i modsætning til NIS1 omfatte langt flere typer af virksomheder og aktiviteter og med bl.a. fokus på leverandørkæden så vil selv virksomheder der ikke selv bliver omfattet formentlig skulle forholde sig kravene. 

Med hvad betyder NIS2 egentlig, hvem er omfattet, hvilke systemer og enheder er omfattet, hvad er kravene, og ikke mindst hvad kan man allerede nu tage fat på?

15:35

Summary & Conclusion

Joel Stradling

Research Director, European Security, IDC

Camilla Hove Toft

Conference Director
15:45

Networking & EXPO

16:15

Thank you for today!

Partners

Diamond Partner
In-Person
Diamond Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person

Become a Partner

Location

Contact Us

Camilla Hove Toft

Conference Director

Peer Jensen

Senior Sales Director, IDC Northern Europe Region, IDC Nordic

About IDC

58 Years | 1300 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,300 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.