A snapshot of Nordic IT Security 2014
Special guest speakerJames Snow, Compliance Product Strategist, Google for Work Security
Advisory BoardTroels Oerting, Head of European Cybercrime Centre, Europol
Anne-Marie Eklund Löwinder, Head of Security, .SE
Paolo Balboni, Founding Partner of ICT Legal Consulting & Scientific Director of the European Privacy Association
Mika Kataikko, Director, Cyber Security Jyväskylä Regional Development Company Jykes Ltd
Ulf Bergund, M.Sc, CISM, President, Cloud Security Alliance Sweden
Per Thorsheim, Security Adviser, God Praksis AS
A note from the editorAs organizations rely more and more on IT systems, as the workforce gets more and more mobile, as services become more and more intertwined with products, and as devices get more and more connected to the internet, the security of an organization’s IT infrastructure becomes more and more critical.
Last year, we saw over 200 participants and 52 partners join us in Stockholm to discuss issues related to IT Security in the Nordics. This year’s Nordic IT Security will take place on November 5th, 2014 in Stockholm and will, yet again, gather senior IT security professionals from across the Nordics and industry verticals to cover key areas of concerns for organizations from both public and private sector.
Key topics that will be addressed:
- Building a comprehensive security architecture framework that aligns with business strategies
- Automating the compliance, risk and governance process
- Addressing and understanding security issues in cloud environments
- Authentication tools and solutions for secure access controls
Do not miss this unique opportunity to network with your peers from across the Nordic! I look forward to meeting you this November in Stockholm.
Thomas Igou, The Editor - Nordic IT Security 2014
Karen Lawrence Öqvist, CEO of Dgtlb Information Security AB
DownloadCloud Security The Next Generation of Cloud Security: Best Practices for Fending off Hackers in Remote Access Make your move to the cloud a safe one With the rise in popularity of cloud services has come a wave of new malware threats aimed at compromising the identities of users attempting to access information remotely. Cloud providers should look to offer security solutions for the end-user or organization utilizing the cloud, including services that ensure that end-users can use the solution in an effective and secure way. Link to download: www.smspasscode.com/resources/whitepapers/cloud-security-wp/
Hidden Dangers of "Good Enough" Authentication Solutions A step-by-step guide to avoid the common pitfalls when choosing an authentication solution Recent high-profile hacks have made it clear: user names and passwords do a terrible job of protecting data. In response, the market is flooded with multi-factor authentication solutions claiming that they’ve got what it takes to secure access to login-based systems. Link to download: www.smspasscode.com/resources/whitepapers/hidden-dangers-wp/