Hybrid Threats, Cyberwarfare
WHAT’S NEXT?

Tim Brown

CISO
Solarwinds

Nicolas M. Chaillan

First U.S. Air Force and
Space Force CSO

15th Annual Agenda

12th of May, 2022

8:00

The Power Breakfast &
The Chairman’s address

8:30

Keynote
Becoming Secure by Design

9:00 – 12:00

Expert Panel

Cyber risk and operational resilience

Cyber warfare involves the actions by a nation-state or international organisation to attack and attempt to damage another nation´s computers or information networks. The Next Threat to National Security are cyberwars.
Cyberattacks have the potential to be just as devastating as bombs.
In the wake of wartimes, no one is safe.

  • The arsenal of Cyber Weapons
  • How big are resources of political-related attacks?
  • Hybrid warfare and recent cyber attacks
  • How can we protect us against digital bullets?

Expert Panel

Insider threats in the Fintech industry!

  • Why are Fintech organisations more prone to insider threats?
  • To address this growing problem, banks must identify the greatest sources of risk, what are the mitigation tactics?

Expert Panel

The rise of BYOD!

With advanced technology and the discern costs of providing their workforce BYOD become an attractive choice for employers, of course with secured devices. Employees are happy to keep track of one device for managing their personal and work items in one place.

  • Can you shed some light on Top BYOD Risks?
  • How are you dealing with BYOD at your organisation?
  • What does the future hold for BYOD?

Expert Panel

Ransomware in different industries!

More than 50% ransomware is targeting three industries, banking, retail and utilities, however every other industry is suffering equally when it comes to the impact of ransomware.

  • Who will pay the cost?
  • What type of regulatory frameworks does the industry need?
  • How can we draw the line of liability?
  • Are there societal aspects that we need to consider?

Expert Panel

The Insider Threat: The known attacking from the unknown

  • How does insider threats work? If these are not identified in good time, what will be the consequences?
  • There are many motivators for insider threats e.g: sabotage, fraud, espionage, reputation damage or professional gain, what do you think is the greatest motivator for the e-commerce industry?
  • What is your take on the different types of threats for example Compromised users, Malicious users or Careless users?

Expert Panel

What are the consequences of SQL injection?

  • What is the best defense from your perspective?
  • What can SQL Injection do?
  • Add, modify and delete data, corrupting the database, and making the application unusable, what does that to an organisation?

12:00

The Networking Lunch

13:00

Keynote

Technology itself is insufficient!

  • Importance of human firewall
  • What is the last resort when it comes to cybersecurity?
  • How layers of security start and end with people?

13:30 – 17:00

Expert Panel

Rise of social engineering - why you must be vigilante.

What Does a Social Engineering Attack Look Like?

Security is all about knowing who and what to trust. Cyber criminals are increasingly using social engineering techniques to exploit the weakest link in the security chain: people. Phishing attacks are a subset of social engineering strategy that imitate a trusted source and concoct a seemingly logical scenario for handing over login credentials or other sensitive personal data. What makes you a target?

  • Not all hacks are performed by keyboard
  • Sophistication of Spear phishing
  • Prevention of Social Engineering Attacks

Expert Panel

Vulnerabilities of IoT

The Internet of Things (IoT) is a reference to the billions of connected devices. Security vulnerabilities in Internet of Things devices (IoT) could allow cyber criminals to knock devices offline or take control of them remotely, in attacks that could be exploited to gain wider access to affected networks.

  • Exploring the attacking surface of IoT
  • Attacking devices communication channels
  • Lack of monitoring and management of devices

Expert Panel

Biggest challenges of cloud security in 2022

Cloud security, also known as cloud computing, is the set of controls, policies, technologies, procedures, and services that deliver hosted services over the Internet and protect cloud data and infrastructure. If there is no adequate and appropriate security protection, cloud services could deter the potential advantages. Therefore, it is necessary to understand all the risks and security threats related to the cloud.

  • How safe are home offices?
  • Identity, authentication and access management
  • Internal threats due to human error

Expert Panel

The Hidden Cyber Risks of Electric Vehicles

Electric vehicles are on pace to outsell cars that run on gas soon, making it easy to imagine a future where electric cars are ubiquitous. But, there are a number of risk considerations about these kinds of vehicles.

  • Command and control server vulnerabilities
  • Charging stations risks
  • Unauthorised Electric Cars mechanics

Expert Panel

Cyberwars: How to dodge the Digital Bullet

Cyber warfare involves the actions by a nation-state or international organisation to attack and attempt to damage another nation´s computers or information networks. The Next Threat to National Security are cyberwars.
Cyberattacks have the potential to be just as devastating as bombs.
In the wake of wartimes, no one is safe.

  • The arsenal of Cyber Weapons
  • How big are resources of political-related attacks?
  • Hybrid warfare and recent cyber attacks
  • How can we protect us against digital bullets?

Expert Panel

We have intruders! How do we protect ourselves?

Manufacturing industry is the highest user of IoT hence the prime target for attackers!
IoT technology continues to evolve, however it is not possible to completely secure IoT devices. Since IoT devices are not built to detect and mitigate potential cyberthreats, they could pose a serious risk to organisations unless they aren’t adequately secured.

  • What are the common IoT attacks?
  • What do you know about eavesdropping attacks or sniffing attacks?
  • As we do not have any silver bullet for IoT attacks, could you please share best practices?

17:00

One for the road

17:30

GADGETS, GADGETS, GADGETS Lottery

18:00

By invitation Only Dinner

Previous Agenda’s

Sum of All Fears
Edition

27th of January 2022

The C-Suite
Edition

15th of September 2021

Financial Institutions

Edition

15-16th of April 2021

15th Annual
The Only Dedicated Nordic Cyber Security Event
Capped at 500 – STAY SECURE: