Talare i världsklass
Branschledande experter delar erfarenheter & framtidsspaningar.
Missa inte årets mest inspirerande evenemang inom Identity Security!
Identity Day är eventet där branschens främsta experter samlas för att dela kunskap, insikter och verktyg för att skydda din organisation mot cyberattacker och dataintrång.
Lyssna till inspirerande föreläsningar och ta del av de senaste trenderna, kommande utmaningar och lär dig vilka verktyg och strategier som är mest effektiva för att skydda din organisation.
Dyk in i spännande breakout sessions för att fördjupa dig inom områden som IAM, IGA, PAM, AM och flera andra viktiga delar inom Identity Security.
Utöver detta får du chans att nätverka med branschfolk och njuta av god mat och dryck.
Identity Day är helt kostnadsfritt. Eventet hålls på svenska med vissa presentationer på engelska.
Boka din plats redan nu!
Branschledande experter delar erfarenheter & framtidsspaningar.
Lär dig nya saker och få verktyg att ta med tillbaka till dina kollegor.
Knyt nya kontakter med andra i branschen och bygg ditt nätverk.
Vi ses i trevliga och inspirerande lokaler på Posthuset 7A i Stockholm.
Förutom inspiration så bjuder dagen på ett par överraskningar.
Välsmakande mat och dryck serveras under hela dagen och kvällen.
"IAM Beyond the Identity Fabric"
IAM är en konstant resa, men vad blir nästa steg inom identitets- och åtkomsthantering efter Identity Fabric? OpenText berättar om vad som finns idag, och hur vi fortsätter resan inom IAM vidare från Identity Fabric till IAM Fabric.
Sören and Tobias bring over 40 years of combined experience in Identity and Access Management (IAM), specializing in Identity Lifecycle Management, Identity Governance, and Zero Trust Architectures. Today working as Principal Solutions Consultants.
"Identity Security Today & Tomorrow – From Important to Absolutely Essential"
Increasingly organisations and individuals are aware of the importance of Identity Security. In this session we will look at 2 emerging technologies and how the impact of these technologies will take the importance of Identity Security to another level. Where the need for us as Identity professionals to stay ahead of those looking to compromise systems, data, identities becomes existential. And why the combination of AI plus the extent and type of data available today, will amplify the impact of Identity Security success or failure beyond our imagination.
Rudy de Sousa has over 15 years consulting, solution design and technical experience in Identity. He works with some of the largest organisations world-wide, with particular focus in Europe, Middle East and Africa, to help organisations achieve successful and efficient Identity outcomes.
"Ransomware front report: How to be prepared"
Ransomware has been a major cyber challenge for a decade with no signs of criminals ever running out of exploitable issues. Do we keep waiting for technology vulnerabilities to somehow disappear, or is it time to claim back territory?
Karsten is a cyber entrepreneur. He has been building and challenging security teams since 2010. As the Founder and Chief Scientist of SRLabs & Autobahn Security in Berlin, Karsten helps a hundred global clients increase hacking resilience and built a dozen security teams.
"Securing a digital society"
With the constant flow of new reports of cyberattacks targeting people and businesses, is it safe to continue to digitalize? In this session Sandra Barouta Elvin, National Security Officer at Microsoft, will review the cyber threat landscape and trends in the context of societal evolution and what can be done to impact the current trends.
Sandra Barouta Elvin works as a national security manager for Microsoft with responsibility for security policy and security issues. She has over 20 years of experience working with IT and information security both strategically and operationally in both the public and private sectors.
Moderator
Vår proffsiga moderator för dagen.
Johanna Samuelson är en proffsig och engagerad programledare, moderator, konferencier, innehållsskapare och komiker. Med sitt sinne för humor och erfarenhet från teater- och standup-scenerna är hon en mästare på att få publiken att skratta.
"Why is ownership of identity so important for an organization?"
Everyone agrees that identity is the security perimeter. This introduces challenges in world where all business data and infrastructures no longer resides in the organization's own data centers and identity ownership is becoming more important for organizations on their digitalization journey.
Ingvar Johansson from One Identity. IT professional with more than 35 years in the IT industry. Ingvar has been focusing on Identity and Access Governance for the last 20+ years working for several leading IGA vendors.
"Convergence: a holistic approach to identity"
Converged identity is generating buzz, but just using a label doesn’t make it so. In this session we’ll discuss why convergence offers value and the nature of converged platforms. We’ll dig into how solutions can have a holistic approach, leading to more secure, efficient, and user-friendly digital environments. Join us to explore the future of identity management and discover how to leverage converged identity platforms to stay ahead in an increasingly digital world.
Paul is lead partner enablement in EMEA at Saviynt for and brings more than 20 years’ experience in identity management.
"Privileged Access Management for Cloud"
The public cloud has revolutionized how organizations function, how information technology runs and how businesses deploy services to their consumers. However, with the rapid ascent into the cloud and the ever-growing number and complexity of services, it’s easy for malicious actors to find identity-centric entry points and take over an entire public cloud environment. Keeping the cloud secure is vital to your organization's success.
Bart is an IT Security professional with 25 years of experience in IT Security solution architecture, pre-sales and consultancy.
"Identifying and Countering AI Threats in a New Era of Cybercrime"
The statement that “to know you is to love you” has never been more true or relevant as we face more and more challenges from synthetic identity and AI-driven threats. Identity is no longer just an IT security issue but a key business enabler as businesses work to delight their consumers, partners and employees with frictionless user experiences that also improves the security of access to the data and resources IT works to protect.
Alex Laurie serves as the SVP Global Sales Engineering and Go-To-Market Programs at Ping Identity. With over two decades in security and identity technology, Alex has worked with leading international organisations, government departments, and military and police forces.
"Ping Identity Deep Dive in Fraud Protection"
According to Forbes, 1 in 2 of us will be targeted by fraud. Whether it’s impersonation scams, loan fee fraud, APP fraud, parcel delivery scams, identity theft, ghost brokers or pension scams, the fraudsters are getting more determined and sophisticated. The demand to innovate customer experiences whilst reducing the risk of fraud, is an ever-increasing priority.
Tim strongly believes in growing a common set of products and tools, to facilitate enterprise solutions by enabling easier customization and decreasing one-time effort development. Tim has a background in solution architecture, server design and development with specific expertise in authentication, cryptography, smart cards and biometrics.
"Identity Game Changers: Transforming the Future of Identity Security"
In a world where governance fatigue and rubber stamping threaten the integrity of Identity Security, it’s time for a transformation. How can organizations ensure users make informed, high-quality decisions about access? Enter Large Language Models, bringing clarity and automation to the process. In this session, we’ll also tackle the critical divide between Identity Security and Privileged Access Management (PAM), and how SailPoint's Privileged Task Automation bridges this gap — offering precision over privilege. Finally, discover how machine learning and policy-based access controls can reduce role complexity, helping enterprises escape the traps of role explosion. Don't miss this deep dive into the future of Identity Security, where technology meets strategy for real security change.
Mikael Wikström works as a Cyber Security Technical Advisor covering the Nordic regions where he assists enterprises and organizations in defining the strategy and adoption of an integrated Identity Governance Platform. Mikael has more than 30 years’ experience in the Cyber Security software industry, where he has lead teams in the development and implementation of complex Cyber Security solutions with a focus on Identity Governance, Identity Management, Access Management in a wide range of organizations and enterprises” Linkedin https://www.linkedin.com/in/wicke/
"Enhance Your Non-Employee Security"
As businesses rely more on third parties, managing non-employee access and risks becomes critical. Strong Identity Security programs are essential for handling vendors, contractors, partners, and others, while aligning with NIS2 and DORA directives.
Identity professional since 2011 - Focus on Identity & Access Management with a special nag for Identity Governance. Currently working as a Solution Engineer at Sailpoint.
"NIS2 & DORA: Do they go far enough given the two recent global outages?"
In July 2024 we have seen two global IT outages that have had major impacts around the world. The outage of Azure was due to a cyber-attack that caused a global system lock-out, with the second one being the Crowd Strike update error that caused a global IT failure. These outages had very different causes and implications for users, and yet still had far reaching effects, with significant financial losses and economic impacts. The full costs are still not fully calculated. NIS2 & DORA, while addressing some elements of security, resiliency and business continuity were both conceived well before these global events, so do not specifically address the real world lessons coming from these global outages. There are deeper considerations companies and governments must be looking at beyond just the high level guidance of both NIS2 & DORA.
Amos has been advising clients in the various security domains since 1980. He has experienced shifts in technology that enable business objectives providing competitive advantages and securing resources across industry and public sectors in the network, device, and application security arenas.
"#DID and #ITDR and how to use them to protect your company"
The IAM industry loves acronyms and two of the latest entries is Defence in Depth (#DID) and Identity Threat Detection and Response (#ITDR) In a risk environment where the attacker logs in instead of hacks in it is becoming increasingly important to detect compromised identities, stop privilege escalation and lateral movement and take back control of the compromised assets. This talk discusses why ITDR and DID are relevant in today's enterprise security environment and how you can leverage the concepts to protect your company.
In my role as IAM lead at Inter Ikea I am responsible for creating an IAM system that enables our coworkers to deliver a better everyday life for the many people as well as ensuring smooth delivery of meatballs and billys across the world. Martin Sandren is a board member of the IdNext foundation, founder of the Digital Identity Amsterdam meetup and active within IDPro and IdentityBeer.
"Dynamic Authentication API"
Don’t compromise on security for excellent user experience or vice versa. The Hypermedia Authentication API (HAAPI) allows your UX team complete control over the user interface during authentication. At the same time, security experts maintain control over which login methods are allowed or if specific workflows should be executed as part of the authentication. This decoupling allows for separate release cycles between the app and the identity platform, stays on top of security with server-side control and enables ideal user experience with app-rendered screens.
Kims is a presales Engineer at Curity and as worked in IT security for many years. He has broad technical experience, having worked as a developer, been the head of development at Nexus, and now as a presales engineer. In his role at Curity, he helps organizations of all types and sizes secure their APIs in the most effective ways possible, whether they’re large banks or tech startups.
"The AI paradox in IGA – are you ready for it?"
In this session, Paul Walker, Field Strategist at Omada, will guide you through the various technologies that enable the application of AI for IGA. This can help to drive significant improvements in workflow decision-making and accelerate your IGA journey towards an identity-first architecture. But who is ready to use what and where should you start? And how can your data quality impact your results? What questions do you need to consider asking suppliers?
With over 25 years of global experience in cybersecurity and a focus on Identity & Access Management, Paul Walker is a seasoned professional known for his exceptional communication and problem-solving skills. Currently serving as a Field Strategist at Omada, he brings a wealth of expertise in value selling, product growth, and IAM solution evangelism.
”Compromised Credentials”
We will show off a real-time phishing example from the Chinese actor related to global package redelivery phishing scams (~2-3 minute video), and then follow-up with a demonstration of the Compromised Cards and Credentials services that show how we’re able to provide stolen credentials and cards our research team recovers related to phishing threats and also more generally.
With a foundational career spanning over a decade as a Senior Architect securing Linux and BSD systems within datacenter and hosting environments, Ford contributed notably to the defense of the American Financial sector during 'Operation Ababil' between 2012-2013. His efforts in disseminating live attack data and insights greatly benefited the security community and culminated in a pivotal presentation at ISOI 11 in Burbank. In 2014, Ford embraced a move from Texas to pursue a dedicated cybersecurity research role at CSIS Security Group in Copenhagen, Denmark, continuing deeper research into DDoS actors, malware, brand infringement, phishing, and conducting incident response activities. Notably, Ford was the principal developer behind the technology stack that powers the CSIS Anti-Phishing service, phishdb.
"Demo av Entra Private access"
Our session will be a live demo of Microsoft Entra Private Access. Microsoft Entra Private Access is part of Microsoft's Security Service Edge (SSE) solution and ensures user connectivity to private resources and applications, reducing the operational complexity and risk associated with legacy VPN solutions. This solution modernizes how your organization's users access private apps and resources without needing a VPN, using the Global Secure Access Client. Entra Private Access offers two ways to configure the private resources to be tunneled through the service: Quick Access and Global Secure Access app.
Niklas Fredengren is a seasoned Technical Specialist at Microsoft, specializing in digital security. With extensive experience in addressing security issues, Niklas has been instrumental in helping organizations safeguard their digital environments. His role involves helping customers finding robust security measures. With almost 27 years of experience, he is providing several perspectives on solutions, that exceeds the normal security discussion.
Service Owner, Identity and Access Management på Schibsted Media
Emil kommer att delta i vår spännande kundpanel för att svara på branschrelaterade och högaktuella frågor. Missa inte chansen att ta del av hans insikter och kunskap.
Emil leads IAM initiatives at Schibsted Media, ensuring secure and efficient access management across digital platforms. He focuses on aligning security with business goals, enhancing user authentication, identity governance, and driving innovative solutions in the identity space.
Domänarkitekt, IAM, på Max Burgers
Mangnus kommer att delta i vår spännande kundpanel för att svara på branschrelaterade och högaktuella frågor. Missa inte chansen att ta del av hans erfarenheter och kunskap från ett spännande företag.
Mangnus Johansson jobbar som Domänarkitekt och TPO IAM med fokus på strategier, processer, implementation och stöd rörande våra identiteter och identitetssäkerhet för Max AB.
Vi inleder dagen med frukost och nätverkande.
Vår inspirerande moderator inleder dagen tillsammans med Jens Björkman, VD för ID North & Fredrik Åström, VD för Arctic Group.
The statement that “to know you is to love you” has never been more true or relevant as we face more and more challenges from synthetic identity and AI-driven threats. Identity is no longer just an IT security issue but a key business enabler as businesses work to delight their consumers, partners and employees with frictionless user experiences that also improves the security of access to the data and resources IT works to protect.
Increasingly organisations and individuals are aware of the importance of Identity Security.
In this session we will look at 2 emerging technologies and how the impact of these technologies will take the importance of Identity Security to another level.
Where the need for us as Identity professionals to stay ahead of those looking to compromise systems, data, identities becomes existential.
And why the combination of AI plus the extent and type of data available today, will amplify the impact of Identity Security success or failure beyond our imagination.
As businesses rely more on third parties, managing non-employee access and risks becomes critical. Strong Identity Security programs are essential for handling vendors, contractors, partners, and others, while aligning with NIS2 and DORA directives.
In July 2024 we have seen two global IT outages that have had major impacts around the world. The outage of Azure was due to a cyber-attack that caused a global system lock-out, with the second one being the Crowd Strike update error that caused a global IT failure. These outages had very different causes and implications for users, and yet still had far reaching effects, with significant financial losses and economic impacts. The full costs are still not fully calculated. NIS2 & DORA, while addressing some elements of security, resiliency and business continuity were both conceived well before these global events, so do not specifically address the real world lessons coming from these global outages.
Välsmakande fika som sponsras av RSA.
Passa på att besöka Speakers Corner under pausen.
Don’t compromise on security for excellent user experience or vice versa. The Hypermedia Authentication API (HAAPI) allows your UX team complete control over the user interface during authentication. At the same time, security experts maintain control over which login methods are allowed or if specific workflows should be executed as part of the authentication. This decoupling allows for separate release cycles between the app and the identity platform, stays on top of security with server-side control and enables ideal user experience with app-rendered screens.
The public cloud has revolutionized how organizations function, how information technology runs and how businesses deploy services to their consumers. However, with the rapid ascent into the cloud and the ever-growing number and complexity of services, it’s easy for malicious actors to find identity-centric entry points and take over an entire public cloud environment. Keeping the cloud secure is vital to your organization's success.
Ta del av insikter och kunskap från framstående bolag när Emil Petersson från Schibsted, Mangnus Johansson från MAX Burgers & Martin Sandren från IKEA tar plats på scen.
Lunchen sponsras av CyberArk & Saviynt.
Passa på att besöka Speakers Corner under lunchen.
Ford will show off a real-time phishing example from the Chinese actor related to global package redelivery phishing scams (~2-3 minute video), and then follow-up with a demonstration of the Compromised Cards and Credentials services that show how we’re able to provide stolen credentials and cards our research team recovers related to phishing threats and also more generally.
According to Forbes, 1 in 2 of us will be targeted by fraud. Whether it’s impersonation scams, loan fee fraud, APP fraud, parcel delivery scams, identity theft, ghost brokers or pension scams, the fraudsters are getting more determined and sophisticated. The demand to innovate customer experiences whilst reducing the risk of fraud, is an ever-increasing priority.
Everyone agrees that identity is the security perimeter. This introduces challenges in world where all business data and infrastructures no longer resides in the organization's own data centers and identity ownership is becoming more important for organizations on their digitalization journey.
The IAM industry loves acronyms and two of the latest entries is Defence in Depth (#DID) and Identity Threat Detection and Response (#ITDR) In a risk environment where the attacker logs in instead of hacks in it is becoming increasingly important to detect compromised identities, stop privilege escalation and lateral movement and take back control of the compromised assets. This talk discusses why ITDR and DID are relevant in today's enterprise security environment and how you can leverage the concepts to protect your company.
IAM är en konstant resa, men vad blir nästa steg inom identitets- och åtkomsthantering efter Identity Fabric? OpenText berättar om vad som finns idag, och hur vi fortsätter resan inom IAM vidare från Identity Fabric till IAM Fabric.
In a world where governance fatigue and rubber stamping threaten the integrity of Identity Security, it’s time for a transformation. How can organizations ensure users make informed, high-quality decisions about access? Enter Large Language Models, bringing clarity and automation to the process. In this session, we’ll also tackle the critical divide between Identity Security and Privileged Access Management (PAM), and how SailPoint's Privileged Task Automation bridges this gap — offering precision over privilege. Finally, discover how machine learning and policy-based access controls can reduce role complexity, helping enterprises escape the traps of role explosion. Don't miss this deep dive into the future of Identity Security, where technology meets strategy for real security change.
With the constant flow of new reports of cyberattacks targeting people and businesses, is it safe to continue to digitalize? In this session Sandra Barouta Elvin, National Security Officer at Microsoft, will review the cyber threat landscape and trends in the context of societal evolution and what can be done to impact the current trends.
Välsmakande fika som sponsras av Opentext.
Passa på att besöka Speakers Corner under pausen.
Our session will be a live demo of Microsoft Entra Private Access. Microsoft Entra Private Access is part of Microsoft's Security Service Edge (SSE) solution and ensures user connectivity to private resources and applications, reducing the operational complexity and risk associated with legacy VPN solutions. This solution modernizes how your organization's users access private apps and resources without needing a VPN, using the Global Secure Access Client. Entra Private Access offers two ways to configure the private resources to be tunneled through the service: Quick Access and Global Secure Access app.
In this session, Paul Walker, Field Strategist at Omada, will guide you through the various technologies that enable the application of AI for IGA.
This can help to drive significant improvements in workflow decision-making and accelerate your IGA journey towards an identity-first architecture. But who is ready to use what and where should you start? And how can your data quality impact your results? What questions do you need to consider asking suppliers?
Converged identity is generating buzz, but just using a label doesn’t make it so. In this session we’ll discuss why convergence offers value and the nature of converged platforms. We’ll dig into how solutions can have a holistic approach, leading to more secure, efficient, and user-friendly digital environments.
Paneldiskussion med våra experter, Alex Laurie från Ping Identity, Rudy de Sousa från One Identity,Rasmus Lund från SailPoint, Paul Squires från Saviynt, Bart Bruijnestejin från CyberArk, Amos Green från RSA & Tobias Ljunggren från Opentext. Paneldebatten leds av vår moderator Johanna Samuelsson.
Ransomware has been a major cyber challenge for a decade with no signs of criminals ever running out of exploitable issues. Do we keep waiting for technology vulnerabilities to somehow disappear, or is it time to claim back territory?
Njut av god mat och dryck tillsammans med de andra deltagarna och alla årets sponsorer.
Arctic Group är Nordens ledande experter på Identitetssäkerhet & Cybersäkerhet. Vi är din långsiktiga partner i din digitaliseringsresa - vår spetskompetens hjälper dig att säkra för framtiden. Var säker tillsammans med oss!
ID North är experter på Identity Security & IAM. Vi skyddar din och dina kunders data. Genom en fullständig överblick och kontroll över alla användare minimerar vi risken för cyberintrång, vilket ger dig värdefulla konkurrensfördelar. Bygg digitalt förtroende med oss!
Även om eventet är kostnadsfritt, vill vi gärna påminna om att det krävs en föranmälan för att delta den 3 oktober. Vi ser verkligen fram emot att välkomna er och vill säkerställa att alla får en fantastisk upplevelse!
Då det är ett kostnadsfritt event har vi begränsat antal platser. Vi kommer inte kunna ta emot anmälningar på plats vid eventet, så säkra din plats redan idag!
Eventet är till för alla företag / organisationer som verkar i digitala miljöer. Arbetar ni med hybrida arbetsplatser? Har du en digital profil? Hanterar ni personliga uppgifter? Då är identitetssäkerhet av högsta relevans.
Självklart, se bara till att anmäla er så rätt mängd mat och platser finns. Bjud med en vän eller en kollega och anmäl er idag.
Nätverk, mat & mingel. På plats under dagen och kvällen kommer du även ha möjlighet att knyta kontakter inom branschen, underhållas och äta gott.
Eventet är på svenska med inslag av presentationer som hålls på engelska.