Arctic Conference - April 21-23, 2021

DUE TO THE SITUATION WITH COVID19, THE ARCTIC CONFERENCE HAS BEEN POSTPONED!

ISACA Chapters Norway, Sweden and Finland welcome you all to the very first Arctic Conference! Set on the polar island of Svalbard at 78 degrees north, this is to our knowledge the northernmost cybersecurity conference ever - and that to a place where polar bears outnumber the human population. Did anyone say Risk assessment?

Being Svalbard things aren't as they usually are, given the very remote location. We have secured about 100 rooms for delegates, where all of them are twins (two separate beds). As we ISACAns know more is always merrier, so for those of you who could cope with sharing room with a professional colleague, friend or competitor(?) for a couple of nights, we are happy to provide a very nice price of €899 per person for the whole conference. Should you require the room to yourself that's also possible, but then the price will increase to €1.249.

Attendance includes:
- 2 nights accommodation in top quality 3-4 star hotels (no 5 stars on Svalbard - sorry!)
- 2 breakfasts
- 2 buffet lunches
- 1 Five-course Gala dinner with exclusive wine pairings
- 11 lectures and 1 workshop from top-rated, international speakers!
- Wilderness Evening excursion: https://hurtigrutensvalbard.com/en/activities/wilderness-evening/arctic-wilderness-evening 
- Tons of fun and an unforgettable experience from the island of Svalbard. -And the worlds first, true Arctic Cybersecurity conference!

Sponsorships are available and include space for a booth in the break area, as well as company logo on the event website, banners and all communication and marketing material distributed with the conference. The fee also include participation for one delegate i a single room, and are set at €2.999/ €5.999(Platinum). Limted to 10 sponsorships (2 of these being Platinum), these will be sold on a first come, first serve basis. For any inqueries, contact the event director at: pp@isaca.no 

About 20% of the rooms sold out before we turned the new year, and given as space is limited we urge all of you to go ahead and reserve your seat straight away.

Sponsors:
Big shoutout to our sponsors for making the Arctic Conference possible at the current price point. You're a key player in making this memorable event happen, and we could not have done it without you. Scroll to the bottom of the website to read more about our Platinum and Gold sponsors!

Platinum Sponsors
Gold Sponsors





Conference Agenda

Wednesday, April 15th

15:00-15:15
Welcome

Conference introduction by the arrangement committee.

15:15-16:00

Living in the Digital Ecosystem - How to Survive and Prosper
Much has been said and written about the global digital transformation. In Europe in particular, some scepticism exists, and there is concern about what the digital ecosystem will bring. This keynote session will highlight new developments and the way forward in the global digital age. It will further outline how professional organizations - like ISACA - can and must move forward to meet the challenges of the new ecosystem.

Rolf von Rössing, Vice President of ISACA International Board of Directors

16:00-16:45
Quantum Computing: A Re-Evolution
Quantum Computing modifies many of things we take for granted in businesses today. The way we create and keep secret is challenged and quantum technologies disrupt different vertical, many sectors. Built on the theory of quantum physics, if quantum computers would exist they would represent a gigantic leap in computing power and the way we use technology.

But do they exist and what can we do with them? There are massive investments around the world in this discipline and, in the very same way that the space race and the fight for nuclear power have been instrumental in recent decades, we are experiencing now not an era of changes but the change of an era.

By attending this session attendees will understand the actual situation of quantum technologies and what they mean for organizations, the challenges we will encounter and, most importantly, the impact it has on the way we govern the Enterprise IT. Since quantum computing is not an evolution. It’s a Re-Evolution.

Ramses Gallego, Security, Risk & Governance Intl. Director with MicroFocus and former ISACA Board of Directors

16:45-17:15
Break
17:15-18:15
When Russian Trolls and Fake News become Security Threats - How to Counter Them
 Jessikka Aro is a Finnish journalist working for Finland's public service broadcaster Yle. In September 2014, she began to investigate pro-Russian Internet trolls, but became a victim of their activities herself.

This harassment led to three people being convicted in October 2018. In 2019 she was notified that she was to receive an International Women of Courage Award but this was rescinded just before the ceremony.

Jessikka Aro, awarded reporter and public speaker

18:15-19:00
Break - make sure you change into (warm) and comfortable clothing in preparation for..
19:00-22:00
Wilderness Evening - the Arctic Experience
Camp Barentz boasts an amazing location right below Mine 7, at the foot of the mountain Breinosa. One of the buildings at the camp, Barentz Hus, is a copy of the cabin that the discoverer of Svalbard, Willem Barentz, overwintered in on Novaya Zemlya in 1596. At Camp Barentz, one often see Svalbard reindeer, and even grouse and foxes if you are lucky, and the hosts are prepared in the unlikely event a polar bear should get close.

As we arrive at the cosy wooden cabins we will be met by the evening’s host. Good drinks and a delicious homemade reindeer stew will be served, together with campfire coffee and dessert. Welcome to a real Svalbard meal!

After a tasty dinner, it is time to learn more about the King of the Arctic. Whilst sitting around the bonfire, the host will share information and photos about our most famous residents. Here you’ll learn lots of new fun facts about polar bears.

We recommend wearing comfortable, warm outdoor clothing and warm shoes, since there can be a cold draught from the floor. Remember that we will spend some time outdoors also. Clothes may smell of smoke after the tour.

Thursday, April 16th
09:00-09:45
Human Intellingence and AI - What does this mean for security?
Artificial intelligence (AI) systems take inspiration from human intelligence, whose definition changes or fluctuates. While AI capabilities continue to improve, much remains unknown about human intelligence. Cybersecurity professionals are encouraged to “think like attackers,” yet much remains unknown about the cognitive processes that influence and impact decision-making. 

This suggests rather than “thinking like attackers” the real goal is to think holistically, encompassing strategic and tactical knowledge, knowing when to apply each type when. While AI continues to improve in many areas, many gaps still remain and that is where security exploitations occur. 

The purpose of this talk is to map out the various aspects of human intelligence and AI, applying to cybersecurity examples, to illustrate gap areas and the potential impact of overlooking the gaps.

Dr. Char Sample, Chief Research Scientist - Cybercore Division at Idaho National Laboratory 

09:45-10:30
Audit Committee - How to critically assess your current and future GRC strategic investment.
In the last century most of the boards could rely solely on management to oversee and manage risk, not directly dealing with risks involving social media, cyber security and other technology related matters, or risk management beyond financial risk. The nature of risk enterprises are facing today in everyday business means that boards must factor risk as an integral part of organizational strategy incorporating technology as well as other environmental factors.

In many of my assignments, executives and boards were facing challenges of “doing more with less”. Whilst managing complex business transactions, managers struggle to strike a balance between adding value while managing risks. The most common methodologies they wanted to see in the recommendations relate to productivity improvement, capacity building or employee engagement. However, these methodologies are not always an appropriate response.

If so, how do you critically assess your current and future GRC strategic investment? How can you develop your own insights and create pragmatic guidance for when to stop and when to accelerate in your digitalisation journey?

Today’s businesses operate with business complexities we have never managed before—facing operational risks that hold the potential to destroy them overnight. In this session we will cover one approach to developing the GRC strategy by strategic sorting of priorities.

Lilliana Grbic, VP Cloud Engagement & Communications at SAP

10:30-11:00
Break
11:00-11:45

How to break into any company: Tales from a (professional) hacker
Rob Shapland is an ethical hacker with 11 years of experience of planning and executing full-scale criminal attack simulations against all types of companies.

Rob specialises in dressing up as various different characters in order to break into buildings, and in this session will tell stories of how the attacks unfolded and teach valuable lessons on how you can protect your company.

Rob Shapland, Head of Cyber Services at Falanx Cyber 

11:45-12:30

Cybercrime - a real threat to society
Are we prepared for the escalating cyber threat?

Do we protect ourselves well enough, what are the costs of the cyberattacks for society and companies, what will be the social consequences of this evolution, is it possible to protect ourselves-in such cases how? 

Adressing these issues, there will also be presented some possible solutions.


Jan Olsson, Swedish Police Authority


12:30-13:30
Lunch
13:30-14:15

What does Project Managers need to know about Cybersecurity?
An organization can either incorporate security guidance into its general project management processes, or react to security failures. Whether implementing new ERP or moving your infrastructure to the cloud, effective project management is essential. But without cybersecurity knowledge, any project could open an organisation to exploitation. 

With the threat of cybercrime continue to boom and with GDPR introducing data privacy reform in 2018, the security of your projects is more important than ever. It’s crucial that project managers educate themselves on cybersecurity principles, so the organisation does not need to react to security failures, but rather avoid them altogether.

This talk will guide us through must-know cybersecurity essentials for project managers and go over practical protection measures that can be applied immediately by any organisations project management team.

Ausra Gustainiene, Head of PMO at McKesson Europe AG

14:15-15:00
Quantum Safe: Is your crypto prepared for quantum computing?
Large scale quantum computing is seen to pose a great threat to many important cryptographic schemes used today. Protecting against this is seen to require additional, or even replace controls. 

While there has been quite many tech forecasts on when each type of QC technology will be ripe enough to crack something worthwhile (the “quantum event”), the practical information security domain is less studied. The most hyped scenarios for the “quantum event” are not even clear what exactly the event is, and are based on the most pessimistic assumption. 

We will in this talk take a look at the more common use cases for cryptography (such as integrity-related services, like bitcoin; data-at-rest, etc.), and lay out the practical reasons why, when, and what to do when  the quantum threat seems ever more imminent.

Dr. Mikko Kiviharju, Research Manager at Finnish Defence Research Agency

15:00-15:30
Break
15:30-16:15
Protecting your enterprise with Human Risk Intelligence
With over 90% of information security incidents caused by human errors or behaviour, the effectiveness of cybersecurity culture program becomes paramount for a successful cybersecurity program. 

Improving cybersecurity culture is always challenging, as it is a long-term project that has to go beyond the classical Security Awareness. This session focuses on importance of using objective data to measure human risk and on how it can be used to unleash the power of your security culture program. It also covers available methods of measuring human security risk and most effective security culture program enablers.

Vadim Gordas, Head of IT & Cyber Risk at Zopa

16:15-17:15

H@cking for Everybody
Tobias Schrödel introduces his audience to the world of hackers and gives them a sneak peak into the dirty secrets of IT. In that, he uncovers various security gaps of personal computers and mobile phones that concern all of us – all while being entertaining. Not only are there many “aha“-moments, but at least equally as many “ahahaha“-moments.

Passwords are being cracked within seconds, discrediting information from the "darknet" is made public, information gathering is explained and a smartphone gets hacked aside all that.  All examples shown on stage are real and live, but anonymized. For information on risks and side-effects ask your data security officer - or Tobias Schrödel.

Tobias Schrödel, IT Comedian and professional speaker

17:15-20:00
Break - have a drink at the bar, and get your groove on in preparation for..
20:00-
Gala Dinner
A full, five course dinner, carefully paired with wine from the well renowned wine cellars of Svalbard will be served as we go into our last evening of the official program. Following the dinner, we might get lucky to see the sponsors have something planned at one of the few hot-spots of Longyearbyen..

During dinner, we'll be subject to these two interesting performances from the stage:

Robot Drone Hacking 
Old vulnerabilities have new consequences when code and hardware meet the physical world. In this session, Carsten from Transcendent Group, will demonstrate how wireless network vulnerabilities make a robotic drone vulnerable to hijacking while operating in the air. In addition, he will talk about how both toy drones and semi-professional robots can be vulnerable to manipulation and hacking.

Finally, the audience will have the opportunity to hack a robot drone live on stage. If you want to hack, you need a mobile phone with the following app installed (the winner gets the drone!):
iOS: https://itunes.apple.com/us/app/tello/id1330559633?mt=8 
Android: https://play.google.com/store/apps/details?id=com.ryzerobotics.tello&hl=en (and optionally a mac with macOS or PC with Linux.)

Friday, April 17th
09:00-09:45

Can’t change the Cyber-security Game? Change Its Structure.

Within companies, cybersecurity has a finite setup; with procedures, protocols, plans and structures all taking up capacity and time. When created, these setups align with available cycles. Today, however, with agile development cycles, we must adjust and align the update cycles with testing cycles. No longer does “one-size-fit-all” work. Recognizing this requirement is the first step - and not being aware is a recipe for disaster.


In this session you will learn:

- How an elite army of global ethical hackers with infinite creativity and tools can help you overcome these challenges.

- How these vetted hackers can support you in your fight against hackers with malicious intentions.

- And how to let them help you win the infinite game you are up against.

Rijk Vonk, Sales Director, SynAck


Out of Control – how the adtech industry is systematically exploiting users mnemonic

As we move around on the internet and in the real world, we are continually tracked and profiled for the purpose of showing targeted advertising. But what kind of information is actually being collected about us? Who is it being shared with? What are they using my consumer profile for? Are app developers truthful in how they are handling personal data? And perhaps most importantly – are app users even aware this data is being collected in the first place? 

Together with the Norwegian Consumer Council, mnemonic investigated 10 popular Android apps to answer these exact questions. We dove into the dark ecosystem of digital advertising and emerged with staggering results - app developers and third party advertisers are systematically violating GDPR and sharing personal information with hundreds of shadowy companies in the adtech industry about our interests, habits and behaviours.

The findings from the report spread globally and were reported on by over 750 news agencies, including the New York Times, BBC, NRK, Forbes, TechCrunch, amongst others, have resulted in GDPR violation complaints being filed against national data protection authorities and Grindr being suspended from Twitter’s MoPub advertising platform.

Andreas led the security assessment of the apps in question, and in this session he will run through how the apps were tested, what he found, and the fallout from the report.

Read the report here: https://www.forbrukerradet.no/out-of-control/ 

Andreas Claesson - Senior Security Consultant, mnemonic

Workshop: COBIT - Transition into 2019.

Released way back in 2012, COBIT 5  was finally uptdated again to it latest version - COBIT 2019. The 2018 winner of John Kuyers award for best speaker, Bruno Horta Soares, will through this workshop take us through the major changes coming with this latest version, and how to best adapt the new framework to governance of IT in todays digital businesses.

Bruno Horta Soares, President ISACA Lisbon Chapter

09:45-10:30

DevSecOps: So what else is new?

This presentation will give an alternative view on how continuous development, operation and security works hand in hand, and show that the DevSecOps we in the IT industry have “invented” actually have been best practice in other industries for ages.

Esten Hoel, SVP Quality & Security, Basefarm

Sponsor talk: Watchcom

10:30-10:45
Break
10:45-11:30

Sponsor talk: TBA

Sponsor talk: TBA

11:30
Conference ends.

* program might be subject to change up until the start of the conference, due to unforeseen events.



Speakers
Dr. Char Sample
Chief Research Scientist - Cybercore Division at Idaho National Laboratory

Dr. Char Sample is the Chief Research Scientist for the Cybercore division at Idaho National Laboratory. Dr. Sample is a visiting academic at the University of Warwick, Coventry, UK and a guest lecturer at Bournemouth University, Rensselaer Polytechnic University and Royal Holloway University. Dr. Sample has over 20 years experience in the information security industry.

Her research focuses on deception, and the role of cultural values in cybersecurity events. More recently she has begun researching the relationship between human cognition and machines. Presently Dr. Sample is continuing research on modeling cyber behaviors by culture, other areas of research are data resilience, cyber-physical systems and industrial control systems.

She is internationally recognized as the leading expert in quantitative cultural cyber threat intelligence. Publications include both academic and industry conferences and journals. 

Ramses Gallego
Security, Risk & Governance International Director at Micro Focus

With an MBA and Law education, Ramsés is a +20 year security professional with deep expertise in the Risk Management and Governance areas. Ramsés is Strategist & Evangelist at Symantec and holds the following professional accreditations: CISM, CGEIT, CISSP, SCPM, CCSK, ITIL and COBIT Foundations.

An internationally recognized public speaker Ramses has visited numerous countries in his carreer, and has been awarded ‘Best Speaker’ many times. 

He is also a Six Sigma Black Belt professional and former International Vice President for ISACA’s Board of Directors, and President of the Barcelona Chapter.

Rolf von Rössing
Vice President with ISACA International Board of Directors 

Rolf von Roessing, CISA, CISM, CGEIT is partner and CEO at Forfa Consulting AG and chairman of Forfa Holding AG. He brings more than 25 years of experience in governance, risk management and compliance; security and business continuity; and crisis management in a range of sectors, including banking and finance, insurance, wholesale and retail, automotive, and healthcare.

He has also been teaching as a senior lecturer in M. Sc. courses at Donau-Universität Krems since 2005 and is a member of the Academic Council for M. Sc. Management and IT, M. Sc. Information Security Management, and M. Sc. Cybersecurity.

In the more than 20 years that von Roessing has been an ISACA member, he has served on a number of ISACA committees. and is currently the International Vice President.

Tobias Schrödel
 IT-Security expert, TV personality and the world’s first Comedyhacker® 

A well-known computer magazine once wrote that Tobias Schrödel is the „first IT-comedian“. And really, he explains technical vulnerabilities and correlations in a way everybody can understand while not letting the fun miss out.

As a qualified IT-specialist, Tobias worked many years as a consultant for one of the biggest world-wide IT- and telecommunications corporations – so he knows what he is talking about.

Since 2011 he has been the face, whenever IT-security and -technology stories are aired in the German TV-show „stern TV“. Schrödel explains various technical topics for everyone to understand.

Rob Chapland, BSc (Hons), OSCP, OSWP
Head of Cyber Services at Falanx Cyber 

Rob Shapland is an ethical hacker, specialising in simulating advanced cyber attacks against companies, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques. 

He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser.



Jan Olsson
Swedish Police Authority

Jan Olsson is an expert in crimes relating to fraud. At the time working at the Police's National Fraud Center, he has 27 years of experience in police work with 10 years dedicated to Fraud.

Since autumn 2018 Olsson is also connected to the Swedish Cybercrime Center (SC3). He lectures nationally and internationally on everything from the social engineering complexity to monetary threats and societal consequences of the laxity around cybercrime and fraud.



Dr. Mikko Kiviharju
Research Manager at Finnish Defence Research Agency

Dr. Mikko Kiviharju works as a principal scientist and cryptographer in the Finnish Defence Research Agency (FDRA). He has wide background in cyber defence lasting some 15 years now, and ranging from tactical principles in cyber operations to hardware security and theoretical cryptography. He is involved in both national and international governmental cryptographic standardization efforts. Currently, his research interests involve quantum-resistant cryptography, and cryptographic solutions intended for sparsely connected, heterogenous networks in high-risk environments.

Kiviharju holds an MSc in computer science and a PhD in cryptology. His dissertation on cryptology addressed access control models enforced with next-generation public-key cryptography. This line of work can also be used for a concept called data-centric security, which is one proposed solution to tackle IoT security.

Bruno Horta Soares, CISA, CGEIT, CRISC, PMP, COBIT 5/2019
Executive Senior Advisor at GOVaaS

Bruno is the founder and President of ISACA's Lisbon Chapter. He started his career at Deloitte Consulting, worked for Information Risk Management area at KPMG and for Enterprise Risk Services area at Deloitte. In 2012 he founded GOVaaS - Governance Advisors as-a-service, where he is currently Senior Advisor, and since then he actively collaborates with an ecosystem of local and international partners, particularly IDC Portugal where since 2015 he is Leading Executive Senior Advisor for Digital Transformation, Governance, Strategy and Security related areas.

He has a 5 years degree in Management and Computer Science, from ISCTE and an Executive Program in Project Management, from ISLA. He teaches in different Executive Programs in several universities at Portugal and Angola, he’s a LEGO® SERIOUS PLAY® Facilitator, member of several professional associations, and keynote speaker at various local and international conferences and seminars. In 2019 he was selected as the recipient of the ISACA Global Achievment - John Kuyers Award for Best Speaker. 

Vadim Gordas, CISA, CRISC, CISSP, CIPP/E, 27001 LA
Head of IT & Cyber Risk at Zopa

Vadim is an Information Risk Management Specialist with over 15 years’ experience in information security, data protection and compliance frameworks. He is currently Head of IT & Cyber Risk at Zopa, providing oversight of first-line IT, Information security and Data Privacy teams. 

Prior to joining Zopa, Vadim worked in various senior InfoSec management roles. He holds a GCHQ-certified MSc in Information Security from ISG Royal Holloway, University of London and various industry certifications.

Ausra Gustainiene
Head of PMO at McKesson Europe AG

Ausra is a Senior IT Professional with extensive international experience in complex SAP implementations, Program Management and IT Governance. Currently running very large IT Transformation program for Business at a Telecommunications provider TELIA, where SAP is being implemented using Agile methodology.

Previous experience include CIO for LIDL Lithuania, Global SAP Project Delivery roles and IT Advisory at Ernst & Young. Ausra was also a long time member of the Board of Directors with ISACA Lithuania Chapter.

Lilliana Grbic, CISA, CRISC
VP Cloud Engagement & Communications at SAP

VP Cloud Engagement & Communications at SAP, global subject matter expert in area of Governance, Risk and Compliance. 35 years of operational managerial and governance specialist experience for a wide range of enterprise: small as well as global, domestic as well as international, public and commercial.

Came to SAP from Corporate Audit at Ericsson and now responsible in Nordics for SAP GRC advisory with focus on operational and organizational business transformation.

Jessikka Aro
Awarded reporter and public speaker

 Jessikka Aro is a Finnish journalist working for Finland's public service broadcaster Yle. In September 2014, she began to investigate pro-Russian Internet trolls, but became a victim of their activities herself.

This harassment led to three people being convicted in October 2018. In 2019 she was notified that she was to receive an International Women of Courage Award but this was rescinded just before the ceremony.

* Participating at the conference earns 15 CPE credits.


Platinum Sponsors
TRANSCENDENT GROUP
Built on a foundation of solid values and a strong entrepreneurial drive, unconstrained by formal hierarchy.

At Transcendent Group we are experts in making the complex straightforward. We are specialists in Governance, Risk and Compliance (GRC) and we tailor make solutions to fit our client's situations and circumstances. Our services provide security and enable new opportunities for our clients in the public and private sectors, including government agencies, businesses and other organisations in a variety of industries.

For more information - see our website at: www.transcendentgroup.com 
or send us an email at: info@transcendentgroup.com 



FORTINET
Security-Driven Networking for a Hyperconnected World.

Fortinet’s mission is to deliver the most innovative, highest-performing network security fabric to secure and simplify your IT infrastructure. We are a leading global provider of network security appliances for carriers, data centers, enterprises, and distributed offices.

We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique Security Fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.  The Fortinet Security Fabric delivers a unified approach that is broad, integrated, and automated. Reduce and manage the attack surface through integrated broad visibility, stop advanced threats through integrated AI-driven breach prevention, and reduce complexity through automated operations and orchestration.

For more information, visit our website at: www.fortinet.com



Gold Sponsors
SYNACK
Zero Compromise Crowdsourced Security

Synack, the most trusted crowdsourced security platform, delivers comprehensive and continuous penetration testing with actionable results. The company combines the world's most skilled and trusted ethical hackers with AI-enabled technology to create a scalable, effective security solution.

The Synack platform delivers data-driven insights to help organizations understand their risk from a hacker's perspective and then mitigate that risk with a hacker's help. These insights secure critical infrastructure and leading brands and businesses around the world.

Headquartered in Silicon Valley with regional offices around the world, Synack protects leading global banks, federal agencies, DoD classified assets, and close to $1 trillion in Fortune 500 revenue. Synack was founded in 2013 by former NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO.

For more information, please visit our website at: www.synack.com 

Speaker: Rijk Vonk, Sales Director

Rijk Vonk is the Synack Sales Director for Nordics and Benelux. After several years in IT sales roles, noticing that security wasn’t part of standard security processes, he moved to a cybersecurity position at Synack. Feeling the pain that many companies struggle with regarding cybersecurity for their digital assets, Rijk has chosen to spend his time helping companies protect this area of their assets. As he says, “I demand my digital assets are protected. It should be a 2-way street”.

Prior to Synack Rijk held roles at HP, Avnet, and Cannon.  Rijk has an International Finance Management degree from Hogeschool van Amsterdam.


MNEMONIC
Securing your business.

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

Our expert team of security consultants, product specialists, threat researchers, incident responders and ethical hackers, combined with our Argus security platform ensures we stay ahead of advanced cyberattacks and protect our customers from evolving threats.

Acknowledged by Gartner as a notable vendor in delivering Managed Security Services, threat intelligence and advanced targeted attack detection, we are among the largest IT security service providers in Europe, the preferred security partner of the region’s top companies and a trusted source of threat intelligence to Europol and other law enforcement agencies globally.

With intelligence-driven managed security services, 200+ security experts and partnerships with leading security vendors, mnemonic enables businesses to stay secure and compliant while reducing costs.

For more information, see our website at: www.mnemonic.no

Speaker: Andreas Claesson, Senior Security Consultant

Andreas Claesson is a Senior Security Consultant for mnemonic. When he’s not looking at pictures of cats, he spends his days hunting for security vulnerabilities in web applications, mobile apps and cloud environments.

WATCHCOM - COMBITECH
Your partner in Cybersecurity.

Watchcom is a reputable provider of security services, with high expertise in security monitoring, security awareness, security testing and training. Together with our majority owner Combitech, we are the Nordic region's leading cyber security consultancy.

We offer a unique expertise, breadth and capacity within the area. Watchcom complements and extends Combitech's service portfolio in information security, emergency preparedness & crisis management, and risk management.

Watchcom is headquartered in Oslo. Read more on our website, at: www.watchcom.no 


BASEFARM
Pålitelig partner for IT-drift, datasentertjenester og digital innovasjon

Basefarm er eksperter på administrasjon av virksomhetskritiske applikasjoner. Vi kjører arbeidsbelastningene som underbygger kundenes virksomhet der kun minutter med nedetid går ut over lønnsomheten, tjenestene eller omdømmet til kundenes merkevarer.  

Enten kundene trenger webtjenester, applikasjoner, databaser, håndtering av IoT-enheter eller tilpassede løsninger, kan vi drifte og overvåke kundenes tjenester slik at de er tilgjengelige døgnet rundt, hele året.

Speaker: Esten Hoel, SVP Quality & Security

Esten Hoel is the SVP of Quality and Security at basefarm, and part of the management team.






The registration deadline has passed or the event is fully booked