THANK YOU FOR MAKING THIS
THE BEST
SECURITY EVENT IN THE NORDICS.
SEE YOU NEXT YEAR
Stockholm Waterfront Congress Center
May 23, 2024
"ATTACK ON HOLM CITY "
WAS PART OF 2023 CONFERENCE
Read More
In just one day, you’ll learn what you need to stay ahead of tomorrow’s cybercrime.
What is
Nordic IT Security?
Nordic IT Security cyber security forum has been around for 15 years now, acting as a steering wheel for navigation through the Nordic’s “cybersecurity watch-out” scheme, with its notable speakers and partners. Conference provides a platform for seasoned industry professionals to come together and discuss topics covering cutting-edge technology, designed to secure all the aspects of the 21st century’s online global community.
Our research has shown that a great majority of businesses and companies across all industries are likely experiencing the same or similar pain points, so let’s all come together on May 25th in Stockholm and discuss the root causes of these pain points and find solutions.
THE BEST 2023 Aftermovie - Nordic IT Security
Recommended Solution Providers
at THE BEST Cybersecurity Conference 2024
On a mission to help organizations of all sizes and industries rapidly identify and remove...Read more
SoSafe empowers organizations to build a security culture and mitigate risk with its...Read more
GitGuardian is the code security platform for the DevOps generation that offers automated...Read more
Cribl makes open observability a reality, giving customers the freedom and flexibility...Read more
Exterro empowers organizations to manage their Legal Governance, Risk and Compliance (Legal GRC) requirements proactively and defensibly.
How it was in May 2023?
You speak we just copy paste
Dana Toren
Director, Head of National Incident Management CenterIsrael National Cyber Directorate
Isabella Södergren
DELEGATE
Organizer
Zero trust is more than the latest tech marketing buzzword; it’s a practical approach to securing container environments. This model emerged as the application/service perimeter began to disappear as we evolved from physical devices to VMs, microservices and finally, distributed workloads in the cloud and at the edge. This evolution has forced improvements in the security model – from a reactive model that uses deny lists and firewalls to protect the known perimeter to proactive, zero trust models. With zero trust, we’re minimising the attack surface by using an “allow” list that blocks unapproved network connections and processes, so that teams can stop attacks before they start and stop zero-day threats by their suspicious behaviour activities.
Even the best firewalls, filters, backups, and VPNs can't prevent a cyber attack. In addition to well-developed technology and infrastructure, the awareness of all employees is very important. We claim that we need more than just awareness but a cybersecurity culture in order to really change behaviour of all stakeholders. First of all, cybersecurity culture needs an assessment of organisational, technical and human competences. In order to form a cybersecurity culture, various awareness campaigns go hand in hand with capacity and competence building, i.e. cybersecurity training as well as anchoring it in all management and business processes. We will present how this journey can and should be planned, which steps to take first and best practices in establishing a cybersecurity culture.
Swantje Westpfahl
Director," Institute for Security and Safety GmbH at the UAS Mannheim"Cybersecurity makes headlines more frequently in the past years. How are our daily lives affected by cybersecurity incidents? Which are the industries which need to be concerned the most and which are their challenges?
• Does the evolving threat landscape affect the infrastructure architecture?
• Which are the key industries that need to be in the spotlight?
• What is the perception of society when it comes to cybersecurity?
Emma Nilsson
DELEGATE
System developer with interest in cyber security and AI
Cyber Threats show no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all bolstering the Attack Chain, creating new planes of privileges for attackers to exploit
In this session you will learn how you can break the attack chain and establish a solid foundation for security project success, including:
• Common attack chain entry points
• Practical steps you can take to block entry
• How PAM ensures project success
Raed Figueroa
DELEGATE
Senior IT Analyst
How does Europe's prominent food delivery platform maintain cloud efficiency and Security as it grows its network of customers, merchants, and couriers? Learn in this session Key Takeaways:
• How to assess and report on your maturity joUnderstand the impact of growth on your cloud security program
• How to crawl, walk, and run in a modern cloud security program
Elin Ryrfeldt
CISO, Axfood
Sofie Sundåker
DELEGATE
CISO
Rohan Karat
Paul Newton
DELEGATE
Owner
Modern cloud native technologies enable you to build, deploy, and scale rapidly. But this increased complexity exposes your application to new risks and vulnerabilities. Each layer of your cloud native application – spanning your code, third party dependencies, containers, and clusters – exposes you to new security concerns. Learn how you can protect your application through clear remediation actions and best practices, and how Developers are key in the transition to DevSecOps.
Elpidoforos Arapantonis
Senior IT Security OfficerVolvo Autonomous Solutions
Jari Rasinen
DELEGATE
Product Security Manager
M. Shahmee Amir
CEO/CTOYounite