IT-säkerhet

Elevating Security for Digital Trust & Risk Management​

DIGITAL FORUM | Sweden | September 29, 2020

Overview

 

The security industry has passed an inflection point. Whether organizations realize it or not, this inflection point has put security at the heart of everything. Security operational excellence is table stakes, a prerequisite for every organization to function securely, efficiently, and effectively. Risk management goes hand in hand with that, quantifying security measures in the context of the business to demonstrate the business value of security.

IDC views the achievement of lasting "digital trust" as the apex — the realization of full alignment between security and business, providing a fundamental basis of trust that connects the organization, employees, partners, and customers.

IDC’s Security Roadshow 2020 will provide a review of industry trends and guidance to security professionals and the key factors to consider in their strategic planning when allocating resources as part of shrinking the organization's attack surface, reducing security and privacy risk, and developing efficiencies in security technology.

Join IDC's leading European security research team to explore how security is now a strategic business imperative and how technology solutions are ensuring security while enabling support for organizations' digital transformation programs.

 

General Information

 

Hopin.to

 

September 29, 2020

 

10:00 - 13:00

 

Key Topics

 

Security Operational Excellence

Enterprises need to integrate for effectiveness, automate for efficiency, build "security by design" into company culture, and outsource to specialists who can fill in any gaps around scale and capability.

 

Risk Management

Risk bridges the gap between security and business through quantification and context. A risk-driven security strategy will have greater impact and justify security investment.

 

Security Governance

New technologies arriving on the wave of digital transformation (DX) bring uncertainty from the control perspective. Setting a governance model that links business objectives and security goals is key to sustaining business performance.

 

Digital Trust

Trust is the outcome of full alignment between security and business throughout the organization. Trust applies to governance, transactions, and supply ecosystems, creating a positive cycle of enhancing corporate and industry security practices.

 

Building Resilience

Every day that an organization has systems compromised or suffers downtime can cost millions of dollars. Building resilience into the infrastructure is crucial for maintaining operations despite attacks or outages, and thus minimizing risk.

 

AI, ML, and Security Automation

Complexity of threats and alert volumes are major challenges for security teams. Harnessing ML and AI for security automation empowers analysts to provide security value to the business while building security seamlessly into enterprise processes.

IDC European Digital Forums Platform

The IDC European Digital Industry Forums will be run on an all-in-one live online events platform where attendees can learn, interact, and connect with people from anywhere in the world.

 

Reception

We will welcome you at our Digital Reception area where we will showcase the event schedule and our partners. We will guide you for a great time & a lot of exiting digital touch points.

 

Stage

You will get inspired by the professional stories shared by industry pioneers and IDC analysts. Our keynotes experts will answer questions, propose provoking online polls, take part in the chat and comment on what is happening. Everything is done live.

 

Sessions

Learn about proven best practices through real-life case studies in moderated digital breakout sessions. This intimate experience is an opportunity to gain a clearer understanding of current organizations challenges.

 

Networking

Meet with peers to discuss common challenges and share concrete experiences thanks to our Networking feature using your webcam for up to 3 minutes.

 

Expo

Visit interactive booths leveraging digital content allowing you to explore key trends or discover more about innovative products.

Agenda

Time Event & Speakers
10:00

Attendee login

10:30

Welcome by IDC

10:35

IDC Keynote: Elevating Security for Digital Trust and Risk Management

Mark Child
Research Manager, European Security, IDC CEMA
10:45

Continuous Vulnerability Management: Striving for a 14-Day SLA

Peter Hensdal
Territory Manager, Ivanti

  • When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially. 
  • Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment. 
  • Learn some quick tips on how to execute continuous vulnerability management effectively.

 

10:55

Cyber AI: An Immune System Approach

William Personne
Account Director, Darktrace

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. This session will give you an overview of Darktrace’s world-leading Cyber AI Platform and uncover how a unified approach to threat detection and response enables the Darktrace Immune System to neutralise advanced threats that other tools miss. 

11:05

Immune yourself from ransomware attacks

Robin Melin
Data Protection Specialist, Dell Technologies

Ransomware är ett stort hot. Även om stora summor investeras i anti-virus, brandväggar och forensics så kan katastrofen bevisligen inträffa. I den har sessionen presenterar Dell hur deras kunder skyddar sitt data från de värsta mardrömsscenarierna.

11:15

Break with Meetings and Networking

11:30

Why Cyber Security Consolidation Matters (A survey of IT Security Stakeholders)

Mats Ekdahl
Security Engineer Manager Sweden, Check Point
11:40

Universal Privilege Management: Secure Every Privilege, Every Time

Christopher Hills
Deputy Chief Technology Officer, BeyondTrust

Virtually every cybersecurity breach today involves the exploitation of privileged access. Privileges are initially exploited to infiltrate an IT environment; once compromised by threat actors, privileges are further leveraged to move laterally, access assets, install malware, and inflict damage. 

 

Enterprises of all sizes have experienced a privilege explosion, driven by trends like cloud computing, DevOps, and edge computing, and the proliferation of non-human identities and accounts.  As a result, privileged access is pervasive across the modern IT environment, yet it is often inadequately managed and monitored. Many organizations assume that password management will solve the privilege problem—but it’s only a partial solution. 

 

In this 7 minute session, learn about Universal Privilege Management, and how it is used to secure every user, session, and asset across your IT environment. Chris will over: 

·         Why relying on password management alone leaves dangerous gaps in protection 

·         Disrupting the cyberattack chain with privileged access security controls 

·         Keys to a frictionless PAM solution that is invisible to end users 

11:50

Säkerhet i molnet - apropå Schrems II domen

Sofia Edvardsen
VD/Grundare, Affärsjurist, Sharp Cookie Advisors AB
12:00

Break with Meetings and Networking

12:15

Roundtable discussions (Parallel Sessions)

Roundtable 1

12:15 - 12:30

Enabling the Autonomous SOC

Rouzbeh Nikberg
Regional Sales Manager - Cortex, Palo Alto Networks
Mark Child
Research Manager, European Security, IDC CEMA

Roundtable 2

12:15 - 12:30

Rebooting the SOC Roundtable

Richard Cassidy
Senior Director, Security Strategy, Exabeam

Roundtable 3

12:15 - 12:30

Self-service or outsource your security.. achieving operational resilience together or independently

Ronald Pool
Cyber Security Specialist, CrowdStrike

Roundtable 4

12:15 - 12:30

Working From Home – New or Next Normal?

Jan Hornqvist
Regional Sales Director Nordics & Baltics, Pulse Secure
12:30

Final Remarks

Thomas Karlsson
Conference Director, Events
12:35

Networking and meetings

Why Attend

 

Get a head start on the market with insights from our leading analysts

 

Get inspired by visionary speakers with locally based cases

 

Maximize your time with insights and solutions to grow your business thanks to 1-2-1 match-made agreements with leading suppliers

 

Be surprised by unique network opportunities with other IT leaders

Partners

Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Association Partner

Materials

To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Thomas Karlsson via email, at tkarlsson@idc.com.

Contact Us

Thomas Karlsson

Conference Director, Events

+46704218834

Peter Borgqvist

Account Manager, IDC Nordic

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.