top of page
Elegant%20Abstract%20Background_edited.p

AGENDA

Agenda

12:00

Ilmoittautuminen & Street food lounas

12:30

Ohjelma alkaa

13:15

Verkostoitumistauko

13:45

Ohjelma jatkuu

14:15

Verkostoitumista

15:00

Tapahtuma päättyy

09.00 - 10.25

Assume Breach. Trends to expect 2021.

How much of your cyber security is really under your control?

 

 

09.25 KEYNOTE

How to stay calm and make intelligent decisions during breach

Merle Maigre, Senior Expert on Cyber Security, e-Governance Academy I Estonia

  • Cyber threat picture in recent years and what to expect from the future

  • Cross-sector cooperation in response mechanisms

  • Red team exercises and tabletop exercises

 

 

09.25 FIRESIDE CHAT

Hybrid Operations in the Cyber domain

Catharina Candolin, Cyber Security Expert, OP Financial Group Plc

  • Cyber operations, delusive information mixing the traditional boundaries by purpose

  • Cybersecurity and cyber defence equally important in securing critical infrastructure. Private sector and public sector cannot be separated

  • What is your company role in the larger perspective?

09.45 Becoming a victim of an opportunistic cyber attack

Erkka Koivunen, CISO, F-Secure

  • Cyber security on leadership team’s agenda

  • How to be prepared for the worst-case scenario?

  • What is the right level of preparedness and who decides that level?

 

10.05 Putting operations back into SOC

Kari Salmela, Group CIO, CSO, Viria

  • How do you combine people, processes, and technology to continuously monitor and improve an organization's security posture

  • A centralized hub to monitor, detect, investigate, and respond to cyber threats around the clock 

  • A more holistic approach to security situational awareness

 

 

10.40 - 12.00

Resilient and secure third party connections & remote working

 

10.40 KEYNOTE

Hackers! Do We Shoot or Do We Hug?

Edwin van Andel, Ethical Hacker, CEO of Zero Copter alias @Yafsec

  • The way hackers think and work, and how they can be used instead of fared by companies

  • How bug bounties and Responsible Disclosure processes can work, and how they sometimes do not

  • Opening the door to a safer online world – from a hacker point-of-view of course

 

 

11.00 Security Implications of Cloud Adoption and Remote Work

Kimmo Vesajoki | Country Manager, Finland & Baltics, TrendMIcro

  • Dynamic secure access, identity-centric risk insights

  • Visibility to cloud applications – how to secure the WFH era?

11.20 How to Choose the Right Security Partner

Henning Gaalaas | Director, Security Division, Pedab Group

  • Considerations and best practices for choosing the best security partner for your company; how to ensure the perfect match

  • Top questions to raise to a potential security service provider

  • Learnings from past successes and failures

11.40 ZTNA – designed for the future of work

Richard Meeus | Security Technology and Strategy Director for EMEA, Akamai Technologies

  • Zero Trust Network Access is the enabler for smart application access

  • Allows users to work anywhere and access applications everywhere

  • ZTNA – designed for the future of work

12.15 - 13.30

Combining Cyber Security, Business Continuity and Enterprise Solutions  

 

 

12.15 KEYNOTE

Cyber Security in the COVID19 era

Keren Elazari, Cyber Security Analyst, Author, TED Speaker, Friendly Hacker

  • Learning Innovation Lessons from Hackers

 

 

12.35 Assume breach and practise it

Tatu Monto, Business Director, INSTA digital

  • Why conduct cyber exercise activities?

  • Simulated cyber exercises  - what have we learned with our customers

  • Best Practises

 

12.50 Cyber in the Boardroom

Samu Harrinvirta, Regional Director | IAM Consultant, Intragen

  • Top 5 cyber questions that boards should be asking

  • Cyber as business enabler – Especially in digitalization and business transformations

  • Board reporting and risks. Cybersecurity is never just a technology problem, it’s a people, processes and knowledge problem.

13.10 Going From Strategy to Execution in Your Identity Transformation

John Lehtinen, Reuters

  • The adoption of standard-based protocols, automation and self-service 

  • Converting traditional legacy service delivery models into iterative product-management processes that business needs also during the process

  • Automate service delivery of new IAM services for customer satisfaction and cost reasons 

13.30 END of DAY

Did the agenda peak your interest?

Join us at HR Executive Nordic 2022 by the click of a button. 

bottom of page