Falcon Invoice Discounting: Unlock Your Business Potential
Agenda Security Helsinki 29okt2009
1. Security 2009
RISK
CONTROL
SECURITY
SECURING BUSINESS & IT
Stockholm • Helsinki • Oslo
CONFERENCE PROGRAM
Hilton Kalastajatorppa, Helsinki – October 29th
Br
NE you
in
TW r
g
NEW FOR 2009
OR bus
KI in
NG es
Security 2009 focuses on moving security from cost centre to enabler
ZO sca
NE rd
• Business continuity and 24/7 security – the show must go on!
• Security Awareness – Securing data with remote users and portable devices
s
• Protecting your organisation against cybercrime and hackers
Security 2009 is all about best practice and networking opportunities
This years speakers include:
®
Goldpartner Silverpartner Partners
®
Organiserad av:
www.eurosecforum.com
2. SECURITY 2009
Hilton Kalastajatorppa • Helsinki • October 29th
08.30 Registration and breakfast 11.25 A real life crisis and a real life recovery
09.00 Security 2009 welcome those in attendance and declare the In May 2009 Finavia had an information security incident with
conference open. one of our outsourced services. The incident made the Finnish
national news. Since it's been in the news already, there's no rea-
09.05 Challenges in the Financial sector – threats and son not to give a presentation on it. Here you will learn about the
possibilities specific incident in depth and also examples to illustrate vendor-
related risks, the importance of risk management in projects and
CISO’s current challenges in the Financial Sector are many. New outsourcing from a "lessons learned" point of view.
business evolutions introduce new challenges within the security
area. Almost all transactions are online, computers are networked Topi Ylinen, Finavia
and data shared – as are the threats! In this presentation you
will get to know your enemy and learn who you are against– and 11.55 - 12.55 Lunch
why.
Erkki Räsänen, CISO, OP Pohjola Group 12.55 - 13.55
NETWORKING ZONE
09.35 Protect Data and Services with End Point security
as the strategic asset Delegates are invited to participate in these informal sessions to share their thoughts
When User mobility, device variety and multiple connectivity is a and experiences with peers and benchmark against similar challenges and projects.
threat to your companies assets – what do you do? Gain insight The networking zone is an excellent opportunity to make new contacts, leverage on
to the challenge of weak and expensive or affordable best-of- experience and drive the discussion on security.
class security. Understand why End Point security is a simple and
easy solution to your security challenges. 12.55 Table A, Table B, table C and table D
Peter Lönnqvist, Sales Manager, Data Security - Nordic, Check
Point Software Technologies
10.05 The Distributed Enterprise - a new era of
A B C D
connectivity and security
The traditional enterprise model based on headquarters and Table A:
satellite branches is over. Today’s enterprise footprint extends
far beyond the corporate headquarters to globally distributed Identity and Access Management
locations. Remote and flexible working means all work centers • Evaluating IAM requirements
are now business-critical and require consistent, secure and • Leveraging IAM to simplify user management improve organisational efficiency
high-performance IT-networking services. In this presentation, • Evaluating access control and best practices for implementation
you’ll learn all about securing The Distributed Enterprise.
Trevor Dearing, Head of Enterprise Marketing, EMEA Juniper Table B:
Information Security
10.05 - 10.35 Getting to know everyone morning break • Best practices for managing Information Security
• Regulatory compliance requirements
10.35 Identity and Access Management. What, why and • Governance, risk and compliance
how?
Table C:
Identity and Access Management, the puzzle word which is some
sort of myth to organizations and especially for management Mobile Security – erasing the network perimeter
who are responsible for it. This presentation contains the set • Mitigating the cost and complexity of securing a mobile workforce
of industry best practices, practical experiences and principles • Managing the threat of confidential data loss
how Identity and Access management can be implemented in a • How will future threats evolve with the growth of mobile working?
complex, multiplatform and heterogeneous IT system landscape.
Get examples what organizations need to consider when imple- Table D:
menting or improving Identity and Access Management systems
and processes related to those. Also get ideas how to organize,
Securing a virtual world
streamline processes and considerations whether to centralize or
• How real are the security threats to virtualization?
decentralize user administration.
• What are the main security considerations and requirements for a virtualized
Tuomas Kivinen, IT Security Specialist, Nordea environment and how do they compare with physical server security?
• Adapting existing security products to virtualized Systems
10.55 Application Security - Do you have control of all
applications running through your network?
At a time where services move into the cloud and more and more
applications are running through the webbrowser, how do you
maintain control and security? What applications should we allow
inside our network and how should we protect them? Is it safe to
outsource certain information and applications to the cloud? Can
we trust that this information is safe and free of malicious code?
Fortinet will present how to regain control over your business
®
critical applications running in your network.
Matias Cuba, Regional Director Northern Europe, Fortinet
www.eurosecforum.com
3. SECURITY 2009
Hilton Kalastajatorppa • Helsinki • October 29th
13.25 Table E, Table F, Table G and table H 13.55 - 14.30 Afternoon break
14.30 Social media – a new generation forming trust and
evaluating security
E F G H They are here to stay. If you cannot fight it – befriend it. Social
media is teaching and shaping generation how to decide who,
what and when to get involved and interact with a system, a per-
son – another party. Listen to how the bases of trust formation and
security evaluation are currently changing and learn what users
Table E: seem to be up to in the social media.
Educating users – Kristiina Karvonen, Future Internet Research Programme Manager,
HIIT
Security policy and control
• The balance between users’ needs and IT department security concerns
15.00 Information Security
• Using compliance to maintain security awareness across the organisation
• Web 2.0 - security vulnerabilities with social networking and collaboration Mika has been head of enterprise risk and management services at
KPMG Oy and vice president, operational risk specialist at Nordea
Table F: Bank. Today he is head of operational risk and information at Aktia
Plc. Listen to experiences from a broad number of evaluated risk
Digital Forensics scenarios and walk away with first hand advice.
• Security testing - threat protection and intrusion prevention
• The legal and technical issues of fraud and corporate investigations Mika Linna, Head of Operational Risk & Information Security,
• The challenges in tracing cyber attacks Aktia
• Data recovery techniques
15.25 Using IT Security Process Automation to
Table G: Operationalize IT Security
The only way to meet the complexity of threats to data, to
Securing the datacentre
reduce the risk of insider attack, and to drive down costs at the
• Managing physical access with RFID technology, smart cards and biometrics
same time, is to integrate and automate security and compli-
• Defining data centre policy: Visitor guidelines, unsecured computers, mobile
ance solutions. Automation of day-to-day tasks will allow you to
device
operationalise your IT Security and introduce greater efficiency to
• Key security considerations for outsourcing data centre operations
your organization. This session will give you the practical steps to
building automated security event management. You will learn how
Table H: to reduce your compliance costs and more closely align security
operations with your business goals, assess configurations against
Business continuity and incident recovery
• Rapid recovery from incidents with minimum disruption industry best-practices, regulatory requirements and organizational
• Scalable recovery planning policies and much more.
• Continuous data protection, secure storage, data backup and remote storage Gunnar Eld, Sales Engineer, NetIQ, a business unit of Attachmate
15.45
PANEL DEBATE
What do industries have in common and what sets them apart. Listen and learn
when benchmarking between financial and non financial industries. Ask questions
and participate in the debate!
16.20 Incident recovery after a cyber attack
With the European threats coming closer, hostile situation are
being managed and crisis avoided or in worst case scenario –
handled. One thing is to be able to handle the technical side of
recovery but how to really handle the continuity and social side of
continuity within the working society? Listen to real life situations
and how they were managed; learn from incident recovery and
business continuity for real.
Tommi Nyström, Director, OTSO palvelut Oy
16.55 Getting the final business cards mingle with drinks
www.eurosecforum.com
www.eurosecforum.com
4. Sender:
Eurosec Forum
C/O Midfield Media
Gamla Brog. 23b
111 20 Stockholm
Sweden
New for 2009
Hilton Kalastajatorppa Helsinki – October 29th More Networking Options
Round Table Clinics
Exciting Panel Debates
Who Will Attend Oslo • Helsinki • Stockholm
Security 2009
Researched and designed for:
IT Manager CISO
IT Security Manager CTO
Network Manager Data Security Administrator
Infrastructure Manager IT Communications Manager
IT Architect Security Manager
CSO Data Security Analyst
Personnel Manager Information Technology Specialist
Risk Manager IT Security Engineer – CISSP, CISA etc.
Facility Manager
IT Administrator
Technical Support Manager
Systems Manager Securing Business & IT
Operations Manager
Midfield Media is a leading provider of events and executive forums for the IT, financial and telecommunications markets. Midfield Media has
built up a reputation of reliability and success in delivering outstanding and high-impact events for IT and business executives. We provide
the key insights into the opportunities and challenges facing businesses today with the latest on future trends and market developments. It
is our mission to help you achieve your objectives and generate results with our commitment to providing excellent forums for networking,
contact building and lead generation. www.midfieldmedia.com
SPEAKING AND EXHIBITION OPPORTUNITIES
Sponsorship opportunities that include speaking and exhibition options are
limited.
5 easy ways to register
To find out more about how your company can be a part of the most
important security event of the year, contact:
Adam Spritzman, Project Manager
Phone: +46 8 676 01 70
www.midfieldmedia.com
Adam.spritzman@midfieldmedia.com
CONTACT INFO
Anna Näsmark, program manager
Phone: +46 8 676 01 80
info@midfieldmedia.com
anna.nasmark@midfieldmedia.com
Yes! I am an end-user and pay only Euro 690, excl. tax. Fax: +46-8-441 07 93
Yes! I am a vendor and pay Euro 1.190, excl. tax.
Phone: +46-8 -65 00 270
Yes! I want the Finanasforum newsletter
Mail to: Eurosec Forum
Yes! I want to attend the free “Demo” theater! C/O Midfield Media
Gamla Brogatan 23b,
Yes! Contact me, I am interested in Sponsorship- and exhibitioninfo!
111 20 Stockholm, Sweden
Cancellation & Substitution policy
You may substitute a delegate at any time. For cancellations received in writing more than 5 business days prior to the event, a €120 (+VAT)
administrative fee will be charged and a credit memo for the remaining amount will be issued. Credit memos may be used at any Midfield Media
conference within one year of issuance.