SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Security 2009
                                                                                             RISK
                                                                                            CONTROL
                                                                                           SECURITY




                                                 SECURING BUSINESS & IT

                                     Stockholm •        Helsinki • Oslo
                                                 CONFERENCE PROGRAM
                          Hilton Kalastajatorppa, Helsinki – October 29th




                                                                                     Br

                                                                                         NE you
                                                                                          in

                                                                                           TW r
                                                                                             g
   NEW FOR 2009




                                                                                               OR bus
                                                                                                 KI in
                                                                                                   NG es
Security 2009 focuses on moving security from cost centre to enabler




                                                                                                     ZO sca
                                                                                                       NE rd
• Business continuity and 24/7 security – the show must go on!
• Security Awareness – Securing data with remote users and portable devices




                                                                                                            s
• Protecting your organisation against cybercrime and hackers
Security 2009 is all about best practice and networking opportunities



      This years speakers include:




                                ®




                              Goldpartner                 Silverpartner       Partners

                                             ®




                                                                                          Organiserad av:

                                        www.eurosecforum.com
SECURITY 2009
                                 Hilton Kalastajatorppa • Helsinki • October 29th

08.30 Registration and breakfast                                                                       11.25 A real life crisis and a real life recovery
09.00 Security 2009 welcome those in attendance and declare the                                        In May 2009 Finavia had an information security incident with
      conference open.                                                                                 one of our outsourced services. The incident made the Finnish
                                                                                                       national news. Since it's been in the news already, there's no rea-
               09.05 Challenges in the Financial sector – threats and                                  son not to give a presentation on it. Here you will learn about the
               possibilities                                                                           specific incident in depth and also examples to illustrate vendor-
                                                                                                       related risks, the importance of risk management in projects and
               CISO’s current challenges in the Financial Sector are many. New                         outsourcing from a "lessons learned" point of view.
               business evolutions introduce new challenges within the security
               area. Almost all transactions are online, computers are networked                       Topi Ylinen, Finavia
               and data shared – as are the threats! In this presentation you
               will get to know your enemy and learn who you are against– and        11.55 - 12.55 Lunch
               why.
               Erkki Räsänen, CISO, OP Pohjola Group                                 12.55 - 13.55
                                                                                     NETWORKING ZONE
               09.35 Protect Data and Services with End Point security
               as the strategic asset                                               Delegates are invited to participate in these informal sessions to share their thoughts
               When User mobility, device variety and multiple connectivity is a    and experiences with peers and benchmark against similar challenges and projects.
               threat to your companies assets – what do you do? Gain insight       The networking zone is an excellent opportunity to make new contacts, leverage on
               to the challenge of weak and expensive or affordable best-of-        experience and drive the discussion on security.
               class security. Understand why End Point security is a simple and
               easy solution to your security challenges.                            12.55 Table A, Table B, table C and table D

               Peter Lönnqvist, Sales Manager, Data Security - Nordic, Check
               Point Software Technologies



               10.05 The Distributed Enterprise - a new era of
                                                                                            A                     B                     C                     D
               connectivity and security
               The traditional enterprise model based on headquarters and            Table A:
               satellite branches is over. Today’s enterprise footprint extends
               far beyond the corporate headquarters to globally distributed         Identity and Access Management
               locations. Remote and flexible working means all work centers         • Evaluating IAM requirements
               are now business-critical and require consistent, secure and          • Leveraging IAM to simplify user management improve organisational efficiency
               high-performance IT-networking services. In this presentation,        • Evaluating access control and best practices for implementation
               you’ll learn all about securing The Distributed Enterprise.
               Trevor Dearing, Head of Enterprise Marketing, EMEA Juniper            Table B:
                                                                                     Information Security
10.05 - 10.35 Getting to know everyone morning break                                 • Best practices for managing Information Security
                                                                                     • Regulatory compliance requirements
               10.35 Identity and Access Management. What, why and                   • Governance, risk and compliance
               how?
                                                                                     Table C:
               Identity and Access Management, the puzzle word which is some
               sort of myth to organizations and especially for management           Mobile Security – erasing the network perimeter
               who are responsible for it. This presentation contains the set        • Mitigating the cost and complexity of securing a mobile workforce
               of industry best practices, practical experiences and principles      • Managing the threat of confidential data loss
               how Identity and Access management can be implemented in a            • How will future threats evolve with the growth of mobile working?
               complex, multiplatform and heterogeneous IT system landscape.
               Get examples what organizations need to consider when imple-          Table D:
               menting or improving Identity and Access Management systems
               and processes related to those. Also get ideas how to organize,
                                                                                     Securing a virtual world
               streamline processes and considerations whether to centralize or
                                                                                     • How real are the security threats to virtualization?
               decentralize user administration.
                                                                                     • What are the main security considerations and requirements for a virtualized
               Tuomas Kivinen, IT Security Specialist, Nordea                          environment and how do they compare with physical server security?
                                                                                     • Adapting existing security products to virtualized Systems
               10.55 Application Security - Do you have control of all
               applications running through your network?
               At a time where services move into the cloud and more and more
               applications are running through the webbrowser, how do you
               maintain control and security? What applications should we allow
               inside our network and how should we protect them? Is it safe to
               outsource certain information and applications to the cloud? Can
               we trust that this information is safe and free of malicious code?
               Fortinet will present how to regain control over your business
           ®




               critical applications running in your network.
               Matias Cuba, Regional Director Northern Europe, Fortinet




                                                          www.eurosecforum.com
SECURITY 2009
                                     Hilton Kalastajatorppa • Helsinki • October 29th

13.25 Table E, Table F, Table G and table H                                      13.55 - 14.30 Afternoon break

                                                                                                  14.30 Social media – a new generation forming trust and
                                                                                                  evaluating security

       E                     F                    G                        H                      They are here to stay. If you cannot fight it – befriend it. Social
                                                                                                  media is teaching and shaping generation how to decide who,
                                                                                                  what and when to get involved and interact with a system, a per-
                                                                                                  son – another party. Listen to how the bases of trust formation and
                                                                                                  security evaluation are currently changing and learn what users
Table E:                                                                                          seem to be up to in the social media.
Educating users –                                                                                 Kristiina Karvonen, Future Internet Research Programme Manager,
                                                                                                  HIIT
Security policy and control
• The balance between users’ needs and IT department security concerns
                                                                                                  15.00 Information Security
• Using compliance to maintain security awareness across the organisation
• Web 2.0 - security vulnerabilities with social networking and collaboration                     Mika has been head of enterprise risk and management services at
                                                                                                  KPMG Oy and vice president, operational risk specialist at Nordea
Table F:                                                                                          Bank. Today he is head of operational risk and information at Aktia
                                                                                                  Plc. Listen to experiences from a broad number of evaluated risk
Digital Forensics                                                                                 scenarios and walk away with first hand advice.
•   Security testing - threat protection and intrusion prevention
•   The legal and technical issues of fraud and corporate investigations                          Mika Linna, Head of Operational Risk & Information Security,
•   The challenges in tracing cyber attacks                                                       Aktia
•   Data recovery techniques
                                                                                                  15.25 Using IT Security Process Automation to
Table G:                                                                                          Operationalize IT Security
                                                                                                  The only way to meet the complexity of threats to data, to
Securing the datacentre
                                                                                                  reduce the risk of insider attack, and to drive down costs at the
• Managing physical access with RFID technology, smart cards and biometrics
                                                                                                  same time, is to integrate and automate security and compli-
• Defining data centre policy: Visitor guidelines, unsecured computers, mobile
                                                                                                  ance solutions. Automation of day-to-day tasks will allow you to
  device
                                                                                                  operationalise your IT Security and introduce greater efficiency to
• Key security considerations for outsourcing data centre operations
                                                                                                  your organization. This session will give you the practical steps to
                                                                                                  building automated security event management. You will learn how
Table H:                                                                                          to reduce your compliance costs and more closely align security
                                                                                                  operations with your business goals, assess configurations against
Business continuity and incident recovery
• Rapid recovery from incidents with minimum disruption                                           industry best-practices, regulatory requirements and organizational
• Scalable recovery planning                                                                      policies and much more.
• Continuous data protection, secure storage, data backup and remote storage                      Gunnar Eld, Sales Engineer, NetIQ, a business unit of Attachmate

                                                                                 15.45
                                                                                 PANEL DEBATE
                                                                                 What do industries have in common and what sets them apart. Listen and learn
                                                                                 when benchmarking between financial and non financial industries. Ask questions
                                                                                 and participate in the debate!




                                                                                                  16.20 Incident recovery after a cyber attack
                                                                                                  With the European threats coming closer, hostile situation are
                                                                                                  being managed and crisis avoided or in worst case scenario –
                                                                                                  handled. One thing is to be able to handle the technical side of
                                                                                                  recovery but how to really handle the continuity and social side of
                                                                                                  continuity within the working society? Listen to real life situations
                                                                                                  and how they were managed; learn from incident recovery and
                                                                                                  business continuity for real.

                                                                                                  Tommi Nyström, Director, OTSO palvelut Oy

                                                                                 16.55 Getting the final business cards mingle with drinks




                                                             www.eurosecforum.com
                                                             www.eurosecforum.com
Sender:
                                                                                                                       Eurosec Forum
                                                                                                                       C/O Midfield Media
                                                                                                                       Gamla Brog. 23b
                                                                                                                       111 20 Stockholm
                                                                                                                       Sweden




                                                                                                   New for 2009
                                  Hilton Kalastajatorppa Helsinki – October 29th                   More Networking Options
                                                                                                   Round Table Clinics
                                                                                                   Exciting Panel Debates




      Who Will Attend                                                        Oslo •   Helsinki • Stockholm


                                                                             Security 2009
      Researched and designed for:
      IT Manager               CISO
      IT Security Manager      CTO
      Network Manager          Data Security Administrator
      Infrastructure Manager   IT Communications Manager
      IT Architect             Security Manager
      CSO                      Data Security Analyst
      Personnel Manager        Information Technology Specialist
      Risk Manager             IT Security Engineer – CISSP, CISA etc.
      Facility Manager
      IT Administrator
                               Technical Support Manager
                               Systems Manager                                Securing Business & IT
      Operations Manager




Midfield Media is a leading provider of events and executive forums for the IT, financial and telecommunications markets. Midfield Media has
built up a reputation of reliability and success in delivering outstanding and high-impact events for IT and business executives. We provide
the key insights into the opportunities and challenges facing businesses today with the latest on future trends and market developments. It
is our mission to help you achieve your objectives and generate results with our commitment to providing excellent forums for networking,
contact building and lead generation. www.midfieldmedia.com




SPEAKING AND EXHIBITION OPPORTUNITIES
Sponsorship opportunities that include speaking and exhibition options are
limited.
                                                                                          5 easy ways to register
To find out more about how your company can be a part of the most
important security event of the year, contact:
Adam Spritzman, Project Manager
Phone: +46 8 676 01 70
                                                                                            www.midfieldmedia.com
Adam.spritzman@midfieldmedia.com

CONTACT INFO
Anna Näsmark, program manager
Phone: +46 8 676 01 80
                                                                                            info@midfieldmedia.com
anna.nasmark@midfieldmedia.com

   Yes! I am an end-user and pay only Euro 690, excl. tax.                                   Fax: +46-8-441 07 93
   Yes! I am a vendor and pay Euro 1.190, excl. tax.

                                                                                            Phone: +46-8 -65 00 270
   Yes! I want the Finanasforum newsletter
                                                                                                   Mail to: Eurosec Forum
   Yes! I want to attend the free “Demo” theater!                                                  C/O Midfield Media
                                                                                                   Gamla Brogatan 23b,
   Yes! Contact me, I am interested in Sponsorship- and exhibitioninfo!
                                                                                                   111 20 Stockholm, Sweden

Cancellation & Substitution policy
You may substitute a delegate at any time. For cancellations received in writing more than 5 business days prior to the event, a €120 (+VAT)
administrative fee will be charged and a credit memo for the remaining amount will be issued. Credit memos may be used at any Midfield Media
conference within one year of issuance.

Contenu connexe

Similaire à Agenda Security Helsinki 29okt2009

telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
Fakher Oueslati
 
Lanlogic network-security-upgrade-case-study
Lanlogic network-security-upgrade-case-studyLanlogic network-security-upgrade-case-study
Lanlogic network-security-upgrade-case-study
ZAG Technical Services
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 
About Acumin
About AcuminAbout Acumin
About Acumin
disolda
 

Similaire à Agenda Security Helsinki 29okt2009 (20)

telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Speaker - InfoSecWorld 2017
Speaker - InfoSecWorld 2017Speaker - InfoSecWorld 2017
Speaker - InfoSecWorld 2017
 
Doodles on cloud, security and big data
Doodles on cloud, security and big dataDoodles on cloud, security and big data
Doodles on cloud, security and big data
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Heden, verleden en toekomst van video conferencing
Heden, verleden en toekomst van video conferencingHeden, verleden en toekomst van video conferencing
Heden, verleden en toekomst van video conferencing
 
Lanlogic network-security-upgrade-case-study
Lanlogic network-security-upgrade-case-studyLanlogic network-security-upgrade-case-study
Lanlogic network-security-upgrade-case-study
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
The Akamai Security Portfolio
The Akamai Security PortfolioThe Akamai Security Portfolio
The Akamai Security Portfolio
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
 
9th Asian Insurance CEO Summit Mar09pdf
9th Asian Insurance CEO Summit Mar09pdf9th Asian Insurance CEO Summit Mar09pdf
9th Asian Insurance CEO Summit Mar09pdf
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
About Acumin
About AcuminAbout Acumin
About Acumin
 
About Acumin
About AcuminAbout Acumin
About Acumin
 
About Acumin
About AcuminAbout Acumin
About Acumin
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
 

Plus de Anna Näsmark

Bakomrubrikerna 1 2 Juni 2010
Bakomrubrikerna 1 2 Juni 2010Bakomrubrikerna 1 2 Juni 2010
Bakomrubrikerna 1 2 Juni 2010
Anna Näsmark
 
Efinanceforum Agenda 6maj 2010
Efinanceforum Agenda 6maj 2010Efinanceforum Agenda 6maj 2010
Efinanceforum Agenda 6maj 2010
Anna Näsmark
 
Säkerhetsdagen 3 Dec 2008 Agenda
Säkerhetsdagen 3 Dec 2008 AgendaSäkerhetsdagen 3 Dec 2008 Agenda
Säkerhetsdagen 3 Dec 2008 Agenda
Anna Näsmark
 
Smart Com 26 Maj 2009 Agenda
Smart Com 26 Maj 2009 AgendaSmart Com 26 Maj 2009 Agenda
Smart Com 26 Maj 2009 Agenda
Anna Näsmark
 
Mobilitet Tradlosa System 16 Oktober 2008 Finalagenda
Mobilitet Tradlosa System 16 Oktober 2008 FinalagendaMobilitet Tradlosa System 16 Oktober 2008 Finalagenda
Mobilitet Tradlosa System 16 Oktober 2008 Finalagenda
Anna Näsmark
 
Erp Compact5maj2009 Finalagenda
Erp Compact5maj2009 FinalagendaErp Compact5maj2009 Finalagenda
Erp Compact5maj2009 Finalagenda
Anna Näsmark
 

Plus de Anna Näsmark (12)

Bakomrubrikerna 1 2 Juni 2010
Bakomrubrikerna 1 2 Juni 2010Bakomrubrikerna 1 2 Juni 2010
Bakomrubrikerna 1 2 Juni 2010
 
Efinanceforum Agenda 6maj 2010
Efinanceforum Agenda 6maj 2010Efinanceforum Agenda 6maj 2010
Efinanceforum Agenda 6maj 2010
 
E Faktura Copenhagen 11 March Agenda
E Faktura Copenhagen 11 March AgendaE Faktura Copenhagen 11 March Agenda
E Faktura Copenhagen 11 March Agenda
 
Agenda Efinanceforum Stockholm 6maj 2010
Agenda Efinanceforum Stockholm 6maj 2010Agenda Efinanceforum Stockholm 6maj 2010
Agenda Efinanceforum Stockholm 6maj 2010
 
Säkerhetsdagen 3 Dec 2008 Agenda
Säkerhetsdagen 3 Dec 2008 AgendaSäkerhetsdagen 3 Dec 2008 Agenda
Säkerhetsdagen 3 Dec 2008 Agenda
 
Smart Com 26 Maj 2009 Agenda
Smart Com 26 Maj 2009 AgendaSmart Com 26 Maj 2009 Agenda
Smart Com 26 Maj 2009 Agenda
 
Mobilitet Tradlosa System 16 Oktober 2008 Finalagenda
Mobilitet Tradlosa System 16 Oktober 2008 FinalagendaMobilitet Tradlosa System 16 Oktober 2008 Finalagenda
Mobilitet Tradlosa System 16 Oktober 2008 Finalagenda
 
Erp Compact5maj2009 Finalagenda
Erp Compact5maj2009 FinalagendaErp Compact5maj2009 Finalagenda
Erp Compact5maj2009 Finalagenda
 
E Faktura Stockholm5nov2009agenda
E Faktura Stockholm5nov2009agendaE Faktura Stockholm5nov2009agenda
E Faktura Stockholm5nov2009agenda
 
E Faktura 27 Nov 2008 Grand Hotel Finalagenda
E Faktura 27 Nov 2008 Grand Hotel FinalagendaE Faktura 27 Nov 2008 Grand Hotel Finalagenda
E Faktura 27 Nov 2008 Grand Hotel Finalagenda
 
Agenda Security Stockholm 15okt2009
Agenda Security Stockholm 15okt2009Agenda Security Stockholm 15okt2009
Agenda Security Stockholm 15okt2009
 
Agenda Security Oslo 1okt2009
Agenda Security Oslo 1okt2009Agenda Security Oslo 1okt2009
Agenda Security Oslo 1okt2009
 

Dernier

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Dernier (20)

Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 

Agenda Security Helsinki 29okt2009

  • 1. Security 2009 RISK CONTROL SECURITY SECURING BUSINESS & IT Stockholm • Helsinki • Oslo CONFERENCE PROGRAM Hilton Kalastajatorppa, Helsinki – October 29th Br NE you in TW r g NEW FOR 2009 OR bus KI in NG es Security 2009 focuses on moving security from cost centre to enabler ZO sca NE rd • Business continuity and 24/7 security – the show must go on! • Security Awareness – Securing data with remote users and portable devices s • Protecting your organisation against cybercrime and hackers Security 2009 is all about best practice and networking opportunities This years speakers include: ® Goldpartner Silverpartner Partners ® Organiserad av: www.eurosecforum.com
  • 2. SECURITY 2009 Hilton Kalastajatorppa • Helsinki • October 29th 08.30 Registration and breakfast 11.25 A real life crisis and a real life recovery 09.00 Security 2009 welcome those in attendance and declare the In May 2009 Finavia had an information security incident with conference open. one of our outsourced services. The incident made the Finnish national news. Since it's been in the news already, there's no rea- 09.05 Challenges in the Financial sector – threats and son not to give a presentation on it. Here you will learn about the possibilities specific incident in depth and also examples to illustrate vendor- related risks, the importance of risk management in projects and CISO’s current challenges in the Financial Sector are many. New outsourcing from a "lessons learned" point of view. business evolutions introduce new challenges within the security area. Almost all transactions are online, computers are networked Topi Ylinen, Finavia and data shared – as are the threats! In this presentation you will get to know your enemy and learn who you are against– and 11.55 - 12.55 Lunch why. Erkki Räsänen, CISO, OP Pohjola Group 12.55 - 13.55 NETWORKING ZONE 09.35 Protect Data and Services with End Point security as the strategic asset Delegates are invited to participate in these informal sessions to share their thoughts When User mobility, device variety and multiple connectivity is a and experiences with peers and benchmark against similar challenges and projects. threat to your companies assets – what do you do? Gain insight The networking zone is an excellent opportunity to make new contacts, leverage on to the challenge of weak and expensive or affordable best-of- experience and drive the discussion on security. class security. Understand why End Point security is a simple and easy solution to your security challenges. 12.55 Table A, Table B, table C and table D Peter Lönnqvist, Sales Manager, Data Security - Nordic, Check Point Software Technologies 10.05 The Distributed Enterprise - a new era of A B C D connectivity and security The traditional enterprise model based on headquarters and Table A: satellite branches is over. Today’s enterprise footprint extends far beyond the corporate headquarters to globally distributed Identity and Access Management locations. Remote and flexible working means all work centers • Evaluating IAM requirements are now business-critical and require consistent, secure and • Leveraging IAM to simplify user management improve organisational efficiency high-performance IT-networking services. In this presentation, • Evaluating access control and best practices for implementation you’ll learn all about securing The Distributed Enterprise. Trevor Dearing, Head of Enterprise Marketing, EMEA Juniper Table B: Information Security 10.05 - 10.35 Getting to know everyone morning break • Best practices for managing Information Security • Regulatory compliance requirements 10.35 Identity and Access Management. What, why and • Governance, risk and compliance how? Table C: Identity and Access Management, the puzzle word which is some sort of myth to organizations and especially for management Mobile Security – erasing the network perimeter who are responsible for it. This presentation contains the set • Mitigating the cost and complexity of securing a mobile workforce of industry best practices, practical experiences and principles • Managing the threat of confidential data loss how Identity and Access management can be implemented in a • How will future threats evolve with the growth of mobile working? complex, multiplatform and heterogeneous IT system landscape. Get examples what organizations need to consider when imple- Table D: menting or improving Identity and Access Management systems and processes related to those. Also get ideas how to organize, Securing a virtual world streamline processes and considerations whether to centralize or • How real are the security threats to virtualization? decentralize user administration. • What are the main security considerations and requirements for a virtualized Tuomas Kivinen, IT Security Specialist, Nordea environment and how do they compare with physical server security? • Adapting existing security products to virtualized Systems 10.55 Application Security - Do you have control of all applications running through your network? At a time where services move into the cloud and more and more applications are running through the webbrowser, how do you maintain control and security? What applications should we allow inside our network and how should we protect them? Is it safe to outsource certain information and applications to the cloud? Can we trust that this information is safe and free of malicious code? Fortinet will present how to regain control over your business ® critical applications running in your network. Matias Cuba, Regional Director Northern Europe, Fortinet www.eurosecforum.com
  • 3. SECURITY 2009 Hilton Kalastajatorppa • Helsinki • October 29th 13.25 Table E, Table F, Table G and table H 13.55 - 14.30 Afternoon break 14.30 Social media – a new generation forming trust and evaluating security E F G H They are here to stay. If you cannot fight it – befriend it. Social media is teaching and shaping generation how to decide who, what and when to get involved and interact with a system, a per- son – another party. Listen to how the bases of trust formation and security evaluation are currently changing and learn what users Table E: seem to be up to in the social media. Educating users – Kristiina Karvonen, Future Internet Research Programme Manager, HIIT Security policy and control • The balance between users’ needs and IT department security concerns 15.00 Information Security • Using compliance to maintain security awareness across the organisation • Web 2.0 - security vulnerabilities with social networking and collaboration Mika has been head of enterprise risk and management services at KPMG Oy and vice president, operational risk specialist at Nordea Table F: Bank. Today he is head of operational risk and information at Aktia Plc. Listen to experiences from a broad number of evaluated risk Digital Forensics scenarios and walk away with first hand advice. • Security testing - threat protection and intrusion prevention • The legal and technical issues of fraud and corporate investigations Mika Linna, Head of Operational Risk & Information Security, • The challenges in tracing cyber attacks Aktia • Data recovery techniques 15.25 Using IT Security Process Automation to Table G: Operationalize IT Security The only way to meet the complexity of threats to data, to Securing the datacentre reduce the risk of insider attack, and to drive down costs at the • Managing physical access with RFID technology, smart cards and biometrics same time, is to integrate and automate security and compli- • Defining data centre policy: Visitor guidelines, unsecured computers, mobile ance solutions. Automation of day-to-day tasks will allow you to device operationalise your IT Security and introduce greater efficiency to • Key security considerations for outsourcing data centre operations your organization. This session will give you the practical steps to building automated security event management. You will learn how Table H: to reduce your compliance costs and more closely align security operations with your business goals, assess configurations against Business continuity and incident recovery • Rapid recovery from incidents with minimum disruption industry best-practices, regulatory requirements and organizational • Scalable recovery planning policies and much more. • Continuous data protection, secure storage, data backup and remote storage Gunnar Eld, Sales Engineer, NetIQ, a business unit of Attachmate 15.45 PANEL DEBATE What do industries have in common and what sets them apart. Listen and learn when benchmarking between financial and non financial industries. Ask questions and participate in the debate! 16.20 Incident recovery after a cyber attack With the European threats coming closer, hostile situation are being managed and crisis avoided or in worst case scenario – handled. One thing is to be able to handle the technical side of recovery but how to really handle the continuity and social side of continuity within the working society? Listen to real life situations and how they were managed; learn from incident recovery and business continuity for real. Tommi Nyström, Director, OTSO palvelut Oy 16.55 Getting the final business cards mingle with drinks www.eurosecforum.com www.eurosecforum.com
  • 4. Sender: Eurosec Forum C/O Midfield Media Gamla Brog. 23b 111 20 Stockholm Sweden New for 2009 Hilton Kalastajatorppa Helsinki – October 29th More Networking Options Round Table Clinics Exciting Panel Debates Who Will Attend Oslo • Helsinki • Stockholm Security 2009 Researched and designed for: IT Manager CISO IT Security Manager CTO Network Manager Data Security Administrator Infrastructure Manager IT Communications Manager IT Architect Security Manager CSO Data Security Analyst Personnel Manager Information Technology Specialist Risk Manager IT Security Engineer – CISSP, CISA etc. Facility Manager IT Administrator Technical Support Manager Systems Manager Securing Business & IT Operations Manager Midfield Media is a leading provider of events and executive forums for the IT, financial and telecommunications markets. Midfield Media has built up a reputation of reliability and success in delivering outstanding and high-impact events for IT and business executives. We provide the key insights into the opportunities and challenges facing businesses today with the latest on future trends and market developments. It is our mission to help you achieve your objectives and generate results with our commitment to providing excellent forums for networking, contact building and lead generation. www.midfieldmedia.com SPEAKING AND EXHIBITION OPPORTUNITIES Sponsorship opportunities that include speaking and exhibition options are limited. 5 easy ways to register To find out more about how your company can be a part of the most important security event of the year, contact: Adam Spritzman, Project Manager Phone: +46 8 676 01 70 www.midfieldmedia.com Adam.spritzman@midfieldmedia.com CONTACT INFO Anna Näsmark, program manager Phone: +46 8 676 01 80 info@midfieldmedia.com anna.nasmark@midfieldmedia.com Yes! I am an end-user and pay only Euro 690, excl. tax. Fax: +46-8-441 07 93 Yes! I am a vendor and pay Euro 1.190, excl. tax. Phone: +46-8 -65 00 270 Yes! I want the Finanasforum newsletter Mail to: Eurosec Forum Yes! I want to attend the free “Demo” theater! C/O Midfield Media Gamla Brogatan 23b, Yes! Contact me, I am interested in Sponsorship- and exhibitioninfo! 111 20 Stockholm, Sweden Cancellation & Substitution policy You may substitute a delegate at any time. For cancellations received in writing more than 5 business days prior to the event, a €120 (+VAT) administrative fee will be charged and a credit memo for the remaining amount will be issued. Credit memos may be used at any Midfield Media conference within one year of issuance.