Keynotes: Theater 4 Tuesday 3rd May 3rd-4th May 2016 | Øksnehallen, Copenhagen KEYNOTES 10.00 Bruce Wynn, Independent Cyber Consultant, Security Consultant for City of London Police Cyber Risks - PDFs, Passwords and Passion Fruit – Problems, Precautions, Protection AND Prevention 10.45 In a unique style (involving extensive audience participation), and with a selection of live and vivid demonstrations of the risks that attacks from ‘the bad guys’ pose to our personal way of life, Bruce will show you what simple precautions we can all take to mitigate the dangers, and how those precautions can defeat a large number of the risks we all face! He does nothing sophisticated or difficult, but his aim in the session is to: • Open Your Eyes • Focus Your Mind • Stimulate Your Imagination • Scare you Half to Death • (Resuscitate You!) Jacqueline Johnson, Head of IT Security, Nordea 11.00 Ny persondatalov: Udfordringer, begrænsninger og muligheder 11.45 The General Data Protection Regulation blev vedtaget af EU-Kommissionen i december 2015 og vil påvirke alle virksomheder, der opererer i EU. Der er en udbredt mangel på viden i forhold til, hvilke begrænsninger det i praksis indebærer, når man benytter persondata til profilering af kunder. Overtrædelse af loven kan medføre bøder på op til 4 procent af en virksomheds årlige omsætning. Jacqeline Johnsons indlæg belyser lovens hovedpunkter, sætter fokus på nøgleudfordringerne og giver nogle praktiske tip om, hvor man begynder rejsen til compliance fra en teknisk, administrativ og procesmæssig tilgang. Hun vil også illustrere ’Safe harbour’-princippet, som er en konsekvens af lovgivningen. Theo Dimitrakos, Chief Security Research Professional, British Telecom 12.00 Securing the Cloud of Clouds: Trust and security challenges and solutions in multi-cloud open service ecosys12.45 tems The biggest challenge hindering cloud adoption today is consistently enforcing and managing security policies across many multi-tenant clouds from different providers. In this talk we review security, assurance and governance aspects underpinning a response to this challenge and present organisational and technological innovations that enable a multi-provider trusted Cloud ecosystem. We will also present one exemplar composite solution: a novel service and security management solution that empowers Cloud consumers to streamline the assembly of high assurance cloud services and to protect their systems, applications and data in the Cloud, whilst improving the control and visibility of their Cloud security operations. Rik Ferguson, Special Advisor to Europol EC3 and Project Leader with the ICSPA 13.00 People in glass networks shouldn’t throw stones 13.45 Emerging threats, sure…But what about the ones staring you in the face? Before you start spending precious budgets and exploring disruptive technologies to combat advanced attackers and new threats, you still have a lot of work to do. The basics are still not being addressed effectively enough. Out of date infrastructure, flawed or non-existent patch regimes and the machine that no one is allowed to touch are just some of the real-world issues that must be addressed as an unavoidable first step on your journey to effective security. 14.00 14.45 15.00 15.45 Jesus Luna, Director of Research, Cloud Security Alliance (Europe) Trusting The Cloud Under A Sky of Uncertainty Despite the apparent advantages of the cloud, many customers still perceive a lack of transparency and trust with respect to its usage. But, which are the enablers of a trusted cloud strategy? Do we need cloud certification schemes and SLAs to gain trust and ensure cloud security? During this talk we will overview the main pillars that are being advocated by the cloud security community in order to deploy end-to-end trustworthy cloud ecosystems for cloud computing namely transparency, accountability and security assurance mechanisms. Furthermore, we will briefly discuss future challenges associated with the automation of the cloud security life cycle. Henning Mortensen, Chefkonsulent, DI Digital Persondataforordningen – sådan overholder du reglerne I præsentationen gennemgås de nye regler for behandling af personoplysninger overordnet. Herefter gennemgås redskaber, som DI har udviklet, og som kan bidrage til, at virksomhederne kan komme i compliance med reglerne. Program: Theater 1 Tuesday 3rd May 3rd-4th May 2016 | Øksnehallen, Copenhagen 9.45 10.15 Jesper Mikkelsen, Cyber Defense Specialist, Trend Micro 10.30 GAME OVER!! 11.00 205 days from breach to detection?!!?? Why is that? And can we do something about it? The answer is… yes, come and see how Trend Micro can help identify unknown attacks, malicious behaviour and abnormal activity. Remidiate and prevent further spread of an infection. From breach detection to breach prevention. 11.15 11.45 Henrik Akerstrand, Account Executive Nordics, Infinigate 12.00 Understanding User Behavior Analytics: How Outsiders Become Insiders 12.30 Today’s attackers employ a variety of deception tactics allowing them to impersonate legitimate users and bypass existing IT security defenses. Web applications are often compromised in order to host malware or be turned into a phishing site. Users who visit these sites then become infected or have their credentials stolen, giving attackers access to your network. Once inside, attackers become insiders. They use stealthy techniques to stay undetected for months. In this session we will examine: • Common tactics used by attackers to target users and assets • How attackers impersonate legitimate users • Best practices for preventing, detecting and containing these threats 12.45 13.15 13.30 14.00 Henrik Limkilde, Concept Manager, Security, Axcess Hackere på ledelsesgangen Hvordan binder man identifikation, rettigheder, malware-beskyttelse og funktionalitet sammen i et datacenter uden at gå på kompromis med fleksibilitet og sikkerhed? It-sikkerhed er kommet på agendaen på ledelsesgangen, men fokuserer desværre kun på nord- og sydgående trafik over firewallen og glemmer derved den øst- og vestvendte trafik, som også findes i et moderne datacenter. Virtuelle maskiner kommunikerer i ubeskyttede og sammenhængende net, hvor hackere benytter bagdøren eller lukkes ind af medarbejderne. Axcess/Atea viser, hvordan SDN, malware-beskyttelse, ISE og funktionsadskillelse håndteres i et moderne datacenter, og hvordan malware kommer ind bag firewallen og bliver fanget, isoleret og sat i karantæne. Jakob Juel Olsson, Salgsdirektør, Netteam Netteam Security Customer Case Bogdan Botezatu, Senior E-Threat Analyst KEYNOTE 14.15 Cybercrime as a Service Drives Next-Gen Antimalware Products 14.45 First account of do-it-yourself malware creation tools dates back in the early 90s with Mister Spock’s Virus Generator Tool. But modern malware generation toolkits have turned from prank tools into money making machines that are responsible for the creation of more than 14 million pieces of malware a month. 15.00 15.30 15.45 16.15 Florian Vojtech, Sales Engineer Security Consultant - Barracuda Networks, SEC Datacom Goodbye Cyber Threats - Advanced threat protection and user awareness for physical, virtual and public cloud networks Barracuda’s NextGen Firewalls are purpose-built to optimize network traffic flows in hybrid environments – adding intelligence that improves your network while securing it. Unlike traditional port-based firewalls, our firewalls are application-aware, enabling you to regulate application usage and prioritize network traffic. We offer two series of firewalls (X and F series), each delivering advanced next-generation firewall performance and protection, yet for distinctly different environments. The X-Series is designed for small to mid-market organizations requiring rapid implementation, while the F-Series is ideal for large managed service providers and highly distributed enterprises. Program: Theater 2 Tuesday 3rd May 3rd-4th May 2016 | Øksnehallen, Copenhagen 9.30 10.00 10.15 10.45 11.00 11.30 11.45 12.15 12.30 13.00 13.15 13.45 Martin Lee, Technical Lead, Security Research, Talos Outreach EMEA, Cisco Dissecting Angler with Applied Analytics and Threat Intelligence We have great pleasure of welcoming Talos, Cisco’s security research and threat intelligence team on stage. Talos is the group within Cisco that investigates the threats and vulnerabilities that affect the Internet. One example is the Angler exploit kit which is a major tool for criminals to distribute malware, such as ransomware, to profit from cyber crime. In this presentation you will learn how the Talos team are able to analyse the data and intelligence available to block and disrupt the operation of this criminal enterprise. This session will offer you an insight to how Cisco prevents and combats threats by using intelligence and data sources available in order to secure Internet users. Kim Elgaard, Solution Specialist, Arrow ECS Hackers 5 phases to create a breach, and how to protect against it A walkthrough of the 5 phases of a breach. What are the mechanisms a hacker uses to gain access to a system, and how can Arrow ECS help you to protect yourself against them. Andrew Kemshall, Co-Founter & CTO, SecurEnvoy Embracing the Future of Authentication This presentation starts with a discussion on leveraging existing data stores for easy deployment and then gives an overview of the different options for utilizing a mobile phone as your token. It will also discuss new security techniques such as utilizing split seed records. Finally this presentation will show new ground breaking ways of authenticating users via push, NFC and Touch ID. Peter Johansson, Regional Manager Nordics, SEC Datacom How WatchGuard strives for Simplicity, Top UTM performance and Threat visibility and why it matters to you Learn how WatchGuard delivers a complete portfolio of Unified Threat Management (UTM) and Next-Generation Firewall (NGFW) appliances and services delivering the highest performance network security at every price point, while easy to manage with Visually-stunning data mining tools for identifying, isolating, and stopping network threats before they become a problem. David Half, Chief Strategy Officer, SMS Passcode 14.00 Cloud Services – Productivity Booster or Security Risk? 14.30 Most likely a bit of both! At no point in time have User Authentication and Cloud Application Control been more important than it is today. The use of “unauthorized” applications to process corporate data is exploding and more often than not organizations are blind to the implications of shadow IT in their infrastructure. CensorNet and SMS PASSCODE join forces to fulfill an ambitious security vision, offering a holistic approach to Cloud Security. Join this session to see: • How easy it is to control your cloud applications • How multi-factor authentication plays an important role in cloud adoption • How to cast light on your shadow IT 14.45 15.15 15.30 16.00 Program: Theater 3 Tuesday 3rd May 9.45 10.15 3rd-4th May 2016 | Øksnehallen, Copenhagen Lars Neupart, Direktør KEYNOTE EUs persondatabeskyttelse - hvor svært kan det være? Indrømmmet, det er en kompleks ny persondataforordning, som vi lige har fået teksten til. Den skal erstatte den nuværende danske persondatalov. Denne præsentation undersøger hvordan de mange nye krav til virksomheders behandling og beskyttelse af persondata kan gribes pragmatisk an, og om de processer, der snart skal fungere i virksomhederne, med fordel kan planlægges sammen med de allerede ret udbredte ISO 27001-processer som mange offentlige og private virksomheder allerede har indført som et led I deres arbejde med informationssikkerhed. 10.30 11.00 11.15 11.45 12.00 12.30 12.45 13.15 13.30 14.00 Jesper B. Hansen, Senior Informationssikkerhedskonsulent, Siscon 14.15 EU-forordningen – ”blot” en ny del af informationssikkerhed 14.45 Ingen grund til panik – endnu! EU-forordningen er blot endnu et ”krav” til det eksisterende informationssikkerhedsarbejde i din virksomhed (og lidt til). Kravene bør implementeres som en overbygning på det informationssikkerhedsfundament, der forventelig allerede findes i din virksomhed. Siscons oplæg giver viden om hvordan op-/udbygningen af dit eksisterende informationssikkerhedsarbejde, gør det enklere at efterleve og opfylde EU-forordningens krav, på en struktureret og overskuelig måde. Med dig efter indlægget får du, en pragmatisk tilgang til de opgaver EU-forordningen lægger op til. Du guides igennem en ”todo-liste”, således at du har viden om, hvilke opgaver du fremadrettet skal have på din agenda. 15.00 15.30 15.45 16.15 Keynotes: Theater 4 Wednesday 4th May 3rd-4th May 2016 | Øksnehallen, Copenhagen KEYNOTES 10.00 Thomas Grane, CIO / IT Direktør, Matas Hvordan beskytter man Danmarks største kundeklub mod hacking? 10.45 Hør hvilke tanker der ligger bag sikkerheden omkring Clubmatas og om hvordan White hat Hackere kan hjælpe dig på vej, når man skal beskytte 1.6 mio. danske kvinders data. Thomas Grane fortæller bl.a. også om vigtigheden af at designe den rigtige infrastruktur og om at holde fast i sine politikker og design principper, uden at det hele bliver et spørgsmål om kun at investere dyrt i store sikkerhedsløsninger. 11.00 11.45 Per Thorsheim, Security Advisor, God Praksis AS 12.00 Lessons learned from the hacking of Ashley Madison 12.45 Ashley Madison, the dating site promoting adultery in their slogan “Life is short. Have an affair.” got hacked in July 2015. Mil- lions of customers’ most intimate details were released in August 2015 by the hackers, after the service owners refused to close down business. As the biggest public breach of sensitive personal information ever, there are many lessons to be learned in terms of data protection, hacktivism, crisis management, media handling, and pitfalls that must be avoided. Marit Hansen, Privacy Commissioner, Data Protection Authority Schleswig-Holstein 13.00 Privacy and Data Protection for Big Data - why Confidentiality, Integrity, and Availability are not sufficient 13.45 Big Data is promising solutions for business, administration, and society. But how can it be reconciled with the requirements of privacy and data protection? The established protection goals from information security – confidentiality, integrity, and availability – do not provide appropriate guidance for developers, operators, and users. Remedy may be achieved by shifting the perspective and employing additional privacy protection goals: unlinkability, transparency, and intervenability. This method can serve as foundation for Data Protection Assessments that are demanded by the upcoming European General Data Protection Regulation to minimize risks for people’s privacy and to ensure compliance for companies. 14.00 14.45 Jan Camenisch, Principle Research Staff Member, IBM Research Authentication without Identification: How to Protect On-Line Identity Today, authentication on electronic media is typically done by identification followed by authorization. We users are forced to constantly identify ourselves, leaving a trail of personal information. Methods for user authentication are typically weak. Both put our security and privacy at risk. In this talk we present authentication mechanisms that let service provider authorize users by requesting only the necessary amount of the user. We show how easy it is to use these advanced privacy-protecting authentication mechanisms and how they make it easier for service providers to protect user data. Finally, we will discuss a number of use cases. Program: Theater 1 Wednesday 4th May 9.45 10.15 3rd-4th May 2016 | Øksnehallen, Copenhagen Keld Norman, IT Security Specialist KEYNOTE Fra gymnasieelev til cyberkriminel hacker på kun 30 minutter Se, hvor nemt det er at blive cyberkriminel – En gennemgang af hvordan de cyberkriminelle arbejder, hvor de kommunikerer, og hvilke værktøjer de benytter. Jesper Mikkelsen, Cyber Defense Specialist, Trend Micro 10.30 GAME OVER!! 11.00 205 days from breach to detection?!!?? Why is that? And can we do something about it? The answer is… yes, come and see how Trend Micro can help identify unknown attacks, malicious behaviour and abnormal activity. Remidiate and prevent further spread of an infection. From breach detection to breach prevention. 11.15 11.45 Henrik Akerstrand, Account Executive Nordics, Rapid7 12.00 Understanding User Behavior Analytics: How Outsiders Become Insiders 12.30 Today’s attackers employ a variety of deception tactics allowing them to impersonate legitimate users and bypass existing IT security defenses. Web applications are often compromised in order to host malware or be turned into a phishing site. Users who visit these sites then become infected or have their credentials stolen, giving attackers access to your network. Once inside, attackers become insiders. They use stealthy techniques to stay undetected for months. In this session we will examine: • Common tactics used by attackers to target users and assets • How attackers impersonate legitimate users • Best practices for preventing, detecting and containing these threats 12.45 13.15 Henrik Limkilde, Concept Manager, Security, Axcess Hackere på ledelsesgangen Hvordan binder man identifikation, rettigheder, malware-beskyttelse og funktionalitet sammen i et datacenter uden at gå på kompromis med fleksibilitet og sikkerhed? It-sikkerhed er kommet på agendaen på ledelsesgangen, men fokuserer desværre kun på nord- og sydgående trafik over firewallen og glemmer derved den øst- og vestvendte trafik, som også findes i et moderne datacenter. Virtuelle maskiner kommunikerer i ubeskyttede og sammenhængende net, hvor hackere benytter bagdøren eller lukkes ind af medarbejderne. Axcess/Atea viser, hvordan SDN, malware-beskyttelse, ISE og funktionsadskillelse håndteres i et moderne datacenter, og hvordan malware kommer ind bag firewallen og bliver fanget, isoleret og sat i karantæne. Jakob Juel Olsson, Salgsdirektør, Netteam 13.30 Netteam Security Customer Case 14.00 14.15 14.45 15.00 15.30 15.45 16.15 Ola Björling, Sr. Channel Manager, MobileIron Securing the modern enterprise I will give you a brief overview of the trends that we are seeing in the market, especially related to the mobile devices. With mobile devices, the enterprise information travels outside the corporate network and can be accessed from anywhere in the world. The modern operating systems and the new mobile user requirements have fundamentally recast the enterprise security model. MobileIron provides the security foundation for enterprises to manage their mobile operating systems and thus help them transform their businesses with mobile technologies. Program: Theater 2 Wednesday 4th May 3rd-4th May 2016 | Øksnehallen, Copenhagen 9.30 10.00 10.15 10.45 Martin Lee, Technical Lead, Security Research, Talos Outreach EMEA, Cisco 11.00 Dissecting Angler with Applied Analytics and Threat Intelligence 11.30 We have great pleasure of welcoming Talos, Cisco’s security research and threat intelligence team on stage. Talos is the group within Cisco that investigates the threats and vulnerabilities that affect the Internet. One example is the Angler exploit kit which is a major tool for criminals to distribute malware, such as ransomware, to profit from cyber crime. In this presentation you will learn how the Talos team are able to analyse the data and intelligence available to block and disrupt the operation of this criminal enterprise. This session will offer you an insight to how Cisco prevents and combats threats by using intelligence and data sources available in order to secure Internet users. 11.45 12.15 12.30 13.00 13.15 13.45 Kim Elgaard, Solution Specialist, Arrow ECS Hackers 5 phases to create a breach, and how to protect against it A walkthrough of the 5 phases of a breach. What are the mechanisms a hacker uses to gain access to a system, and how can Arrow ECS help you to protect yourself against them. Andrew Kemshall, Co-Founter & CTO, Infinigate Embracing the Future of Authentication This presentation starts with a discussion on leveraging existing data stores for easy deployment and then gives an overview of the different options for utilizing a mobile phone as your token. It will also discuss new security techniques such as utilizing split seed records. Finally this presentation will show new ground breaking ways of authenticating users via push, NFC and Touch ID. Magnus Jansson, EMEA Security Engineer, Data Security, Check Point Protect your device with the next generation of mobile security Today’s cybercriminals are particularly sneaky. They will trick you into installing a malicious app or connect to a rogue Wi-Fi network and are able to see where you have been and who you plan to meet. They work long and hard at finding new ways to steal sensitive data from the devices we use and trust the most: our smartphones and tablets. These data-rich devices are quickly replacing laptops and PCs as our primary screens at work too, making it more important than ever to defend them against new, advanced mobile threats. But how do you stay one step ahead of sophisticated cyber thieves without stumbling over security or the end-user experience? David Half, Chief Strategy Officer, SMS Passcode 14.00 Cloud Services – Productivity Booster or Security Risk? 14.30 Most likely a bit of both! At no point in time have User Authentication and Cloud Application Control been more important than it is today. The use of “unauthorized” applications to process corporate data is exploding and more often than not organizations are blind to the implications of shadow IT in their infrastructure. CensorNet and SMS PASSCODE join forces to fulfill an ambitious security vision, offering a holistic approach to Cloud Security. Join this session to see: • How easy it is to control your cloud applications • How multi-factor authentication plays an important role in cloud adoption • How to cast light on your shadow IT 14.45 15.15 15.30 16.00 Program: Theater 3 Wednesday 4th May 3rd-4th May 2016 | Øksnehallen, Copenhagen 9.45 10.15 10.30 11.00 11.15 11.45 Anders Svensson, Senior Systems Engineer, RSA 12.00 Be the Hunter – Not the hunted 12.30 Been breached or suspect a breach? Come and see how the unique combination of network, log, netflow and endpoint data you will help you detect, investigate, and rapidly respond to advanced threats before they damage your business. 12.45 13.15 Michael Sjøberg & Tomas Hellum - Managing partners, LinkGRC 13.30 Aktiv kriseledelse i praksis 14.00 I takt med stigende krav til ledelsen omkring håndtering af fx cybersikkerhedsrelateret hændelser skal kriseledelsen i Danmark styrkes. Vi vil demonstrere et praktisk forløb i en simuleret avanceret krise. 14.15 14.45 15.00 15.30 15.45 16.15
© Copyright 2024