James Snow, Compliance Product Strategist, Google for Work Security
Troels Oerting, Head of European Cybercrime Centre, Europol Anne-Marie Eklund Löwinder, Head of Security, .SE Paolo Balboni, Founding Partner of ICT Legal Consulting & Scientific Director of the European Privacy Association Mika Kataikko, Director, Cyber Security Jyväskylä Regional Development Company Jykes Ltd Ulf Bergund, M.Sc, CISM, President, Cloud Security Alliance Sweden Per Thorsheim, Security Adviser, God Praksis AS
A note from the editor
As organizations rely more and more on IT systems, as the workforce gets more and more mobile, as services become more and more intertwined with products, and as devices get more and more connected to the internet, the security of an organization’s IT infrastructure becomes more and more critical.
Last year, we saw over 200 participants and 52 partners join us in Stockholm to discuss issues related to IT Security in the Nordics. This year’s Nordic IT Security will take place on November 5th, 2014 in Stockholm and will, yet again, gather senior IT security professionals from across the Nordics and industry verticals to cover key areas of concerns for organizations from both public and private sector.
Key topics that will be addressed:
Building a comprehensive security architecture framework that aligns with business strategies
Automating the compliance, risk and governance process
Addressing and understanding security issues in cloud environments
Authentication tools and solutions for secure access controls
Over the course of one day, you will experience recent case studies, insightful demos, dedicated roundtables, in-depth workshops, technological lightning talks, and plenty of networking opportunities to give you greater insight on strategic implementations of the latest technology showcased in the Exhibition Hall.
Do not miss this unique opportunity to network with your peers from across the Nordic!
I look forward to meeting you this November in Stockholm.
Sincerely, Thomas Igou, The Editor - Nordic IT Security 2014
Karen Lawrence Öqvist, CEO of Dgtlb Information Security AB
The Next Generation of Cloud Security: Best Practices for Fending off Hackers in Remote Access
Make your move to the cloud a safe one
With the rise in popularity of cloud services has come a wave of new malware threats aimed at compromising the identities of users attempting to access information remotely.
Cloud providers should look to offer security solutions for the end-user or organization utilizing the cloud, including services that ensure that end-users can use the solution in an effective and secure way.
Link to download:www.smspasscode.com/resources/whitepapers/cloud-security-wp/Hidden Dangers of "Good Enough" Authentication Solutions
A step-by-step guide to avoid the common pitfalls when choosing an authentication solution
Recent high-profile hacks have made it clear: user names and passwords do a terrible job of protecting data. In response, the market is flooded with multi-factor authentication solutions claiming that they’ve got what it takes to secure access to login-based systems.
Link to download:www.smspasscode.com/resources/whitepapers/hidden-dangers-wp/