Elegant%20Abstract%20Background_edited.p

AGENDA 2022

MARCH 23rd

Starting 9AM CET - Stockholm, Oslo, Copenhagen Time

Starting 10AM EET - Helsinki Time

9.00 (CET)

WELCOME

ASSUME BREACH

9.05

Safety and security in cyberspace

Philipp Amann, Head of Strategy, European Cybercrime Center (EC3), Europol (AT)

  • Key trends and threats: findings from the Internet Organised Crime Threat Assessment (IOCTA)

  • Operational examples and real-life cases of European Cybercrime Centre - EC3 work

  • Public/private partnerships: Value of collaboration to tackle the end goal together

9.25

Resilient Cyber Security operations in an evolving Threat landscape

Benjamin Särkkä, Director of Cyber Security, Loihde Trust (FI)

  • Security as a business enabler

  • Evolution of Threat landscape

 

9.45

An Integrated IT & Security Approach for Proactive Risk Management

Chris Cassell, Principal Solutions Engineer, OneTrust (UK)

  • Security applications and monitoring systems hold key GRC program insights, but how can security teams tap into these insights to help inform better business decisions?

  • The key role that security integrations can play in reporting risk insights and updates to leadership

  • Common market trends and best practices to synergize your broader security tech stack with your risk management program

10.00

FIRESIDE CHAT: How to implement a sustainable change in industrial cybersecurity

Henry Haverinen, Senior Cyber Security Leader, Insta (FI)

Markku Tyynelä, Automation's Security Manager, Valmet (FI)

  • Managing cybersecurity in an industrial context requires a change initiative

  • The change needs to be implemented gradually in phases.

  • Engaging and training people and raising cybersecurity awareness are key parts of this change

10.15

Networking Break

DIGITAL CYBER DEFENSE INSTRUMENTS

 

10.30

Business aligned security strategy

Erik Blomberg, CISO, Head of Security & Risk, Handelsbanken (SE)

  • Security risk management

  • Threat intelligence communication perspective on security strategy

 

10.45

Cyber Supply Chain Risk Management

Christine Bejerasco, Chief Technology Officer, WithSecure (FI)

  • How to improve your supply chain resilience

  • Traditional supply chain risk management only deals with a supplier’s ability to deliver a product on time and within budget. But organizations face new security, privacy, and compliance threats when working with third parties

  • Attacks, which often use ransomware, can impact thousands of organizations by targeting a single company. They can shock global supply chains with minimum effort.​​

11.05

Alert! Responding to a breach

Henning Gaalaas, International Sales Director, Sorasec (NO)

  • Why use time and money to prepare for a cyber security incident

  • How to stay cool, calm, and collected – and make intelligent decisions even during a breach

  • Know the steps you can take in the planning phase, during attack and in the post-production phase

11.20

Identity Governance and Administration (IGA) Maturity Snapshot

Kalle Niemi, Identity and Access Management (IAM) consultant, Intragen (FI)

  • The maturity of Nordic organisations with regard to IGA

  • What are the most common challenges organisations are facing regarding IGA?

  • Most common drivers for IGA development

 

11.35

CASE: The strategy and vision of the ESA Cyber Security

Jean-Luc Trullemans, ESA Security Advisor, European Space Agency (IT)

  • The ever growing reliance on space services makes space assets (and provided data) key targets for any adversary because of their critical importance in finance, security and in our daily lives 

  • Space environment is not only 3C (Contested, Congested and Competitive), it is now in addition 4D (Diverse, Disruptive, Disordered and Dangerous)

  • Within this context it is one of ESA’s responsibility, to ensure secure and controlled development and operational environments to build up and operate space systems which are secure, safe and protected

 

11.55

Lunch Break

 

BUSINESS SECURITY CULTURE

 

12.15

Think like a hacker

Greg van der Gaast, World leading Security, Cyber & Information expert (UK)

  • Understanding how cybercriminals operate has never been more essential for businesses and governments looking to defend themselves

  • Cybersecurity leadership & Establish holistic approach to security

  • An individual CISO or security team is not enough to keep the system safe – security is a priority for all in organisations

12.35

Ensuring “wartime” business continuity

Kimmo Vesajoki, Country Manager, Finland & Baltics, Trend Micro (FI)

  • We live in a constant state of war when it comes to cyberattacks like ransomware and cyber-risks like 0-day vulnerabilities

  • The goal of cybersecurity is to ensure business continuity even through disruptive events

  • How to define your Security strategy for agility and resilience in uncertain times

12.50

Changing the Game: Practical Steps to Improving Your Cybersecurity

Michael Daniel, President & CEO, Cyber Threat Alliance (US)

  • Effective cybersecurity involves more than just technical tools

  • You have to change how you think about and manage cybersecurity

  • You can’t have perfect security, but you can dramatically improve it

13.10

Phishing Decoded: Understanding & preventing modern phishing attacks

Joshua Crumbaugh, CTO, PhishFirewall (US)

  • How to protect your business from phishing scams and how to future-proof your organization against ever evolving phishing threats

  • Exploring the future of phishing attacks

  • Addressing the insider threat - Human error and people as the weakest aspect of cybersecurity

 

13.30

Preparing your team for the perfect storm

Dr. Bryson Payne, Director of the Center for Cyber Operations Education, University of North Georgia (US)

  • Business Continuity and Disaster Recovery (BCDR) resilience in multiple-cyber-event scenarios

  • Counterintelligence training for teams in withstanding social engineering and related attacks

13.45

THANK YOU - END OF THE DAY

Did the agenda peak your interest?

Join us at Cyber Security Executive 2022 by the click of a button.