KNOWLEDGE HUB AT A GLANCE


08:45 CHAIRMAN´S OPENING: ELISE REVELL – INVENTOR, AUTHOR & SECURITY SPECIALIST

08:50 KEYNOTE: DONALD CAVENDER – SPECIAL AGENT CYBER CRIME, F.B.I

10:30 COFFEE & NETWORKING BREAK

10.50 VIP ROUND TABLE SESSIONS
MODERATOR:BOB FLORES – EX CTO OF C.I.A & JUNAID ISLAM – CTO & FOUNDER, VIDDER, CYBER SECURITY EXPERT
MODERATORS:DONALD CAVENDER – SPECIAL AGENT CYBER CRIME, FBI & DR. JONATHAN REICHENTAL – CTO/CIO OF PALO ALTO (SMART CITY, USA )
MODERATORS: ELISE REVELL – INVENTOR, AUTHOR AND SECURITY SPECIALIST & FILIP JOHNSSÉN – SENIOR LEGAL COUNSEL PRIVACY, KLARNA BANK AB

12:20 KEYNOTE: DR. JONATHAN REICHENTAL – CTO/CIO OF PALO ALTO (SMART CITY, USA )

12:50 LUNCH, MEETINGS & NETWORKING

13:20 PANEL: MEDIA
MICHELE HANSSON – CISO, NEWS UK
LOUIS GODDARD – DATA JOURNALIST – THE TIMES & THE SUNDAY TIMES UK
KJETIL STORMARK – EDITOR, ALDIMER.NO
DAGENS NYHETER – TBC

13:50 PANEL: DEFENSE & HOMELAND SECURITY 
DONALD CAVENDER – SPECIAL AGENT CYBER CRIME, FBI
BOB FLORES – EX CTO, CIA
ELISE REVELL – INVENTOR, AUTHOR & SECURITY EXPERT
SÄPO – TBC

14:20 KEYNOTE: FILIP JOHNSSÉN – SENIOR LEGAL COUNSEL PRIVACY, KLARNA BANK AB

14:50 COFFEE & NETWORKING BREAK

16:20 PANEL: RETAIL
ANTONIO GRASSO – CYBER SECURITY ADVISOR, SIEMENS
FILIP JOHNSSÉN – SENIOR LEGAL COUNSEL PRIVACY, KLARNA BANK AB

17:45 KEYNOTE – TBC

 

BUSINESS HUB 1 THEMES & TOPICS


09:40 COMPLIANCE & GOVERNANCE 
THE ESSENTIAL STEPS FOR  AN AUTOMATED COMPLIANCE

10:00 PUBLIC SECTOR
RISK BASED SECURITY PROGRAM

10:20 COFFEE & NETWORKING BREAK

11:00 IOT
SECURING DESIGNWARE IP FOR IOT

11:20 AI/ROBOTICS
ARE WE GOING TO LOSE CONTROL OF WHAT WE CREATE?

11:40 CYBER SECURITY
INFORMATION SECURITY POLICY: THE BENEFIT OF BEING THREAT-AGNOSTIC

12:00 DEFENSE/HOMELAND SECURITY
ADDRESSING THE CYBER-SECURITY AND CYBER-TERRORISM THREATS

12:20 LUNCH, MEETINGS & NETWORKING

15:00 BUSINESS CONTINUITY & INCIDENT RECOVERY
THE IMPORTANCE OF BUSINESS CONTINUITY AND INCIDENT RECOVERY PLAN

15:20 MEDIA
LESSONS FROM THE DARK NET – KNOW YOUR HACKING ENEMY

15:40 IDENTITY & ACCESS MANAGEMENT
HAVE YOUR EMPLOYEES BEEN PROTECTED?

16:00 DATA PROTECTION
SECURING BIG DATA – WHY SHOULD WE CARE?

16:20 MOBILE & CLOUD
ENHANCING MOBILE FORENSIC INVESTIGATION WITH DATA FROM THE CLOUD

 

 

BUSINESS HUB 2 THEMES & TOPICS


09:40 COMPLIANCE & GOVERNANCE 
STRENGTHEN COMPLIANCE & GOVERNANCE WITH DEFENSIVE CONTROLS AND FORENSIC ANALYSIS

10:00 PUBLIC SECTOR
A SECURITY-AWARE CULTURE IN A BORDERLESS SOCIETY

10:20 COFFEE & NETWORKING BREAK

11:00 IOT
CYBER SECURITY IN THE CONNECTED WORLD – IMPLICATIONS OF IOT WITH THE CONNECTED CITIZEN

11:20 AI/ROBOTICS
THE FRICTION BETWEEN HUMANITY & TECHNOLOGY

11:40 CYBER SECURITY
TRANSFORMING SECURITY POLICY MANAGEMENT: STAYING AGILE & SECURE 

12:00 DEFENSE/HOMELAND SECURITY
PUBLIC & PRIVATE – A DIALOGUE ON DEFENSE OF SOCIETY

12:20 LUNCH, MEETINGS & NETWORKING

15:00 BUSINESS CONTINUITY & INCIDENT RECOVERY
BEST PRACTICES FOR REDUCING YOUR ATTACK SURFACE: 3 STEPS TO SHRINKING YOUR WINDOW OF VULNERABILITY

15:20 MEDIA
DISINFORMATION – HOW TO STAY SECURE WHEN THE INFORMATION IS FAKE?

15:40 IDENTITY & ACCESS MANAGEMENT
PERSONAL CYBER SECURITY: HOW NOT TO BE A VICTIM

16:00 DATA PROTECTION
DO YOU KNOW WHERE YOUR DATA IS?

16:20 MOBILE & CLOUD
CLOUD OF CLOUDS – SECURING THE TWO WORLDS