Special guest speaker

James Snow, Trust Product Strategist, Google for Works

Advisory Board

Troels Oerting, Head of European Cybercrime Centre, Europol
Anne-Marie Eklund Löwinder, Head of Security, .SE

Paolo Balboni, Founding Partner of ICT Legal Consulting & Scientific Director of the European Privacy Association

Mika Kataikko, Director, Cyber Security Jyväskylä Regional Development Company Jykes Ltd

Ulf Bergund, M.Sc, CISM, President, Cloud Security Alliance Sweden

A note from the editor

As organizations rely more and more on IT systems, as the workforce gets more and more mobile, as services become more and more intertwined with products, and as devices get more and more connected to the internet, the security of an organization’s IT infrastructure becomes more and more critical.

Last year, we saw over 200 participants and 52 partners join us in Stockholm to discuss issues related to IT Security in the Nordics. This year’s Nordic IT Security will take place on November 5th, 2014 in Stockholm and will, yet again, gather senior IT security professionals from across the Nordics and industry verticals to cover key areas of concerns for organizations from both public and private sector.

Key topics that will be addressed:
  • Building a comprehensive security architecture framework that aligns with business strategies
  • Automating the compliance, risk and governance process
  • Addressing and understanding security issues in cloud environments
  • Authentication tools and solutions for secure access controls
Over the course of one day, you will experience recent case studies, insightful demos, dedicated roundtables, in-depth workshops, technological lightning talks, and plenty of networking opportunities to give you greater insight on strategic implementations of the latest technology showcased in the Exhibition Hall.

Do not miss this unique opportunity to network with your peers from across the Nordic! I look forward to meeting you this November in Stockholm.


Thomas Igou, The Editor - Nordic IT Security 2014


Cloud Security The Next Generation of Cloud Security: Best Practices for Fending off Hackers in Remote Access Make your move to the cloud a safe one With the rise in popularity of cloud services has come a wave of new malware threats aimed at compromising the identities of users attempting to access information remotely. Cloud providers should look to offer security solutions for the end-user or organization utilizing the cloud, including services that ensure that end-users can use the solution in an effective and secure way. Link to download: www.smspasscode.com/resources/whitepapers/cloud-security-wp/
Hidden Dangers of "Good Enough" Authentication Solutions A step-by-step guide to avoid the common pitfalls when choosing an authentication solution Recent high-profile hacks have made it clear: user names and passwords do a terrible job of protecting data. In response, the market is flooded with multi-factor authentication solutions claiming that they’ve got what it takes to secure access to login-based systems. Link to download: www.smspasscode.com/resources/whitepapers/hidden-dangers-wp/

Partner Nordic IT Security 2014

IT Total
Digital bee
24 Solutions
SMS Passcode
Kaspersky Lab
Secure Envoy
Panda Security
Security Solutions Watch
Virus Bullitin
Global Security Mag
The Register