Para obter uma melhor experiência web, utilize o IE11+, Chrome, Firefox ou Safari.

First exclusive Swedish Identity Security Roundtable Lunch

First exclusive Identity Security Roundtable Lunch
Ao vivo

Oct.

15

  • Data:Oct. 15, 2024
  • Horário: 9:00 AM – 2:00 PM CEST
  • Localidade:Hotel Berns, Näckströmsgatan 8, 111 47 Stockholm
First exclusive Identity Security Roundtable Lunch

Invitation to the first exclusive Identity Security Roundtable Lunch
ITDR, Identity Security & Identity Management as Business Value

We are pleased to invite you to our first Identity Security Lunch in Sweden - a newly established platform & all about and practicing a lively & beneficial exchange between all of us while gaining experts insights. This first edition of our exclusive Lunch Event is all about Identity Security as a Business Value.  

10:30h 
Welcome

10:45h - 11:15h
Cybercrime - can you even protect yourself?

by Jan Olsson | Polismyndigheten, Nationellt It-brottscentrun (SC3), NOA
 

With each passing day, new and increasingly advanced cyberattacks are published. Pretty much every company and organization has had attacks from cyber criminals, and many don't even know about it. In a world that is painted more and more like an ongoing Armageddon, one wonders if there are even opportunities to protect oneself and one's business. The answer is that it is easy to significantly reduce risks of an attack and significantly minimize damage in the event of a completed attack.

What the consequences are of cybercrime, who is behind it, what are police and other actors doing, what is fast approaching regarding the new Modus Operandi and of course how to protect yourself.

We will dive into trends and crimes related to identities for individuals and organizations.

11:15h   - 11:30h

Discussion with Jan Olsson

11:30h   - 12:15h

Mastering Risk Management to Fuel Effective AD Security Investment
by Bastiaan Verdonk | Principal Technology Strategist at Quest Software

In this session we will explore the pivotal role of leveraging Risk Management components to justify investments in Gartner's Identity Threat Detection and Response (ITDR) alongside Active Directory Threat Detection and Response (AD TDR).

Using a ransomware event as an example, well review essential risk fundamentals, analyze the impact of technical vulnerabilities, and gain insights to justify your spend. This session will guide you in removing friction, enhancing your competitive edge, and staying ahead of both competitors and malicious actors in the cybersecurity landscape.

12:15h   - 13:30h
Lunch & Discussion  

Jan Olsson | Polismyndigheten, Nationellt It-brottscentrun (SC3), Noa
Jan is an internationally recognized expert in the field of Fraud since his time at the Police National Fraud Center, with 30 years of experience in police work and 14 years dedicated towards Fraud. Since 2018 Jan's focus moved more towards complex cybercrimes at the Swedish Cybercrime Center (SC3). He Lectures nationally and internationally on everything from Social Engineering complexity to Monetary threats and societal consequences of the laxity around Cybercrime and Fraud.

Bastiaan Verdonk | Principal Technology Strategist at Quest Software
Bastiaan is an avid computer expert with over 28 years in the IT industry, with a special focus on Active Directory and the evolving state of cyber security. He has a varied technology background working for organizations like Novell, Whitmann Hart and Netpro. Over his 18 years at Quest Software, he has travelled to customers around the globe sharing his experience and helping them implement and use Quest products in a wide variety of environments. He has also presented on numerous worldwide webinars and is a subject matter expert on the cyber security and resilience.

Por favor, aguarde...

triangle-down check
Ao fazer o download, você se inscreverá para receber nosso e-mail marketing. Para cancelar sua inscrição, siga as etapas descritas em nossa Política de Privacidade.

reCAPTCHA protege este site. Confira a Política de Privacidade e os Termos de Uso do Google.