Agenda | Cyber Security Executive | Helsinki

CYBER SECURITY EXECUTIVE

PARTNERSHIPS

Tuija Taivainen
+358 40 530 1351
tuija.taivainen@bignordic.com

VENUE: KATTILAHALLI,

Sörnäisten rantatie 22,

00101 Helsinki​, Finland

LIPUT

Yasmin Kallava

+358 504 707 702

yasmin.kallava@bignordic.com

INTERNATIONAL PARTICIPANTS & ACCREDITATION

customercare@bignordic.com

Business Insight Group

Kalevankatu 31, 00100 Helsinki
www.bignordic.com

Subscribe our newsletter and we'll inform you about upcoming B2B conferences most suitable for your profession and interests.
 

All new subscribers will receive a 20% discount voucher that can be used for participation tickets!

AGENDA

Cybersecurity Is First and Foremost a ‘Who’ Problem

Cyber security in modern business competitiveness

Cyber Security's programme is set to provide executives the keys for a better strategy where cyber security isn't just the necessary evil but the basis for a well functioning business.

AGENDA 13.11.2019

 

 

8:15

CEO Secret Brief

By invitation only

 

8:30

Registration & Breakfast

 

9:00

Moderator

CYBERSECURITY IS A VITAL ISSUE  

 

9:05

OPENING KEYNOTE  

Responding to a Cyber Incident is an Organization-Wide Exercise

Erno Doorenspleet, X-Force Command C-TOC Executive, IBM Nordics

 

9:30

KEYNOTE Overview of Key Risks in the Extended Enterprise and Managing Third Party Challenges

Mike Maddison, Partner at EY, Cyber Security Services leader for EY EMEIA Advisory UK 

  • Overview of key risks in the extended enterprise and managing third party challenges

  • Considerations in security technologies such as cloud and OT

  • Recent case studies and examples

 

9:55

C-Suite Executives Shouldn’t Leave Cybersecurity to CIOs and CISOs

Jarno Limnell, CEO, Tosibox

  • What “modern security era” means and why traditional information security fails in an agile environment

  • How to develop a cybersecurity strategy at the board level and how cybersecurity is a competitive advantage

  • Does our cybersecurity strategy align with our threat profile?

 

10:15

Break the Bottleneck: Speed Up Your Vendor Onboarding Process

Jacob Eborn, Sales Manager, OneTrust EMEA

  • Review the drivers and challenges organizations face when onboarding vendors 

  • Understand the benefits of a proactive onboarding process across functional teams a part of third-party risk management

  • Takeaway a step-by-step guide to vet and validate potential vendors while not slowing down business needs 

  • Identify priorities before, during, and after the third-party vendor risk management lifecycle

 

 

10:35 BREAK & BUSINESS MINGLE

 

11:15

Business Benefits of Offensive Security Services

Marcus Söderblom, Cyber Security Consultant, Viria Security

  • From defensive to offensive

  • What is offensive security?

  • Business benefits of offensive security

 

11:30

Trust in Digital Environment

Markku Korkiakoski, Director of Cyber Security, Netox

  • The line between physical and digital worlds is blurring

  • C-levels  business process visibility in cyber security

  • Increasing targeted cyberattacks

11:45

KEYNOTE Using AI/ML to Enhance Security With AWS

Orlando Scott-Cowley, Principal Technical Evangelist, Amazon Web Services

  • Why AI/ML can provide better haystack trawling, more robust anomaly detection and data

  • Classification in security applications

  • Real-life case studies and examples

12:15 LUNCH

 

IDENTIFY YOUR WEAK SPOTS AND UNDERSTAND YOUR ENVIRONMENT

 

13:25

KEYNOTE  Why Identity Theft and Fraud Should Be Your Company’s Biggest Concern

PA Prabert, Deputy CEO, mySafety Group

  • Identity theft and digital frauds are an evolving multibillion crime industry

  • New results from the survey about ID thefts directed towards companies and individuals 

  • The reason why we as professionals (and normal people) still get fooled

 

13:50

The Need for Strong Identification 

Paavo Toivanen, Sales Executive, Signicat

  • When to use weak or strong identification?

  • Meaning of strong identification

  • Identification methods

 

14:00

Company´s Functional Ability in Cyber Attacks

Ari Rantala, Head of Cyber Security Operations, Cyber Defence Business Unit, OptimeSys

  • Improving cyber resilience

  • Shorter leadtimes from attack to reactions

  • Identified and hardened high-value assets

14:20

Q&A Session: Security Trends and Talent Your Company Needs to Embrace in 2020

PA Prabert, Deputy CEO, mySafety Group

Tero Mellin, Head of Cyber Security, OP Financial Group

  • How to hire the best cybersecurity talent

  • Ideas for filling the cybersecurity skills gap

  • Smart investments with limited budgets

 

14:40 BREAK & BUSINESS MINGLE

15:10

Employee Awareness and Embedded Behavior

Samu Harrinvirta, Regional Director, Consultant, Intragen

  • How to start a security awareness training program

  • The effectiveness and ROI of security awareness training

  • Security awareness yearly clock example from real life

15:20

KEYNOTE The Mobile Security Challenge: How Cyber Criminals are Adapting in the Digital Area

Marielle Hagblad, Mobile Security Expert, Lookout

  • Zero-trust security: from idea to real applications

  • Going threat hunting – getting your security strategy right

  • Stay Focused and Ahead of Potential Security Stumbling Blocks

15:40

KEYNOTE The NATO Cyber Agenda

Kenneth Geers, Fellow, Atlantic Council / NATO Cyber Centre / DSI Berlin

  • History, policy, programs, and industry engagement

16:10 COCKTAILS & MINGLE

  • White Facebook Icon
  • White Twitter Icon
  • White LinkedIn Icon
  • White Instagram Icon
  • White Vimeo Icon
CYBER SECURITY