Identity Day 2024

3 Oktober 2024
Inspirerande talare
7A Posthuset, Vasagatan 28
Eventet är fullbokat

Identity day 2024

Missa inte årets mest inspirerande evenemang inom Identity Security!

Identity Day är eventet där branschens främsta experter samlas för att dela kunskap, insikter och verktyg för att skydda din organisation mot cyberattacker och dataintrång.

Lyssna till inspirerande föreläsningar och ta del av de senaste trenderna, kommande utmaningar och lär dig vilka verktyg och strategier som är mest effektiva för att skydda din organisation.

Dyk in i spännande breakout sessions för att fördjupa dig inom områden som IAM, IGA, PAM, AM och flera andra viktiga delar inom Identity Security.

Utöver detta får du chans att nätverka med branschfolk och njuta av god mat och dryck.

Identity Day är helt kostnadsfritt. Eventet hålls på svenska med vissa presentationer på engelska.

Boka din plats redan nu!

Anmälan

Eventet är fullbokat

Dagen bjuder på

Talare i världsklass

Branschledande experter delar erfarenheter & framtidsspaningar.

Inspiration

Lär dig nya saker och få verktyg att ta med tillbaka till dina kollegor.

Nätverkande

Knyt nya kontakter med andra i branschen och bygg ditt nätverk.

Inspirerande miljö

Vi ses i trevliga och inspirerande lokaler på Posthuset 7A i Stockholm.

Överraskning

Förutom inspiration så bjuder dagen på ett par överraskningar.

God mat och dryck

Välsmakande mat och dryck serveras under hela dagen och kvällen.

Årets talare

Sören Pettersson & Tobias Ljunggren

"IAM Beyond the Identity Fabric"

IAM är en konstant resa, men vad blir nästa steg inom identitets- och åtkomsthantering efter Identity Fabric? OpenText berättar om vad som finns idag, och hur vi fortsätter resan inom IAM vidare från Identity Fabric till IAM Fabric.

Sören and Tobias bring over 40 years of combined experience in Identity and Access Management (IAM), specializing in Identity Lifecycle Management, Identity Governance, and Zero Trust Architectures. Today working as Principal Solutions Consultants.

Läs mer

Rudy de Sousa

"Identity Security Today & Tomorrow – From Important to Absolutely Essential"

Increasingly organisations and individuals are aware of the importance of Identity Security. In this session we will look at 2 emerging technologies and how the impact of these technologies will take the importance of Identity Security to another level. Where the need for us as Identity professionals to stay ahead of those looking to compromise systems, data, identities becomes existential. And why the combination of AI plus the extent and type of data available today, will amplify the impact of Identity Security success or failure beyond our imagination.

Rudy de Sousa has over 15 years consulting, solution design and technical experience in Identity. He works with some of the largest organisations world-wide, with particular focus in Europe, Middle East and Africa, to help organisations achieve successful and efficient Identity outcomes.

Läs mer

Karsten Nohl

"Ransomware front report: How to be prepared"

Ransomware has been a major cyber challenge for a decade with no signs of criminals ever running out of exploitable issues. Do we keep waiting for technology vulnerabilities to somehow disappear, or is it time to claim back territory?

Karsten is a cyber entrepreneur. He has been building and challenging security teams since 2010. As the Founder and Chief Scientist of SRLabs & Autobahn Security in Berlin, Karsten helps a hundred global clients increase hacking resilience and built a dozen security teams.

Läs mer

Sandra Barouta Elvin

"Securing a digital society"

With the constant flow of new reports of cyberattacks targeting people and businesses, is it safe to continue to digitalize? In this session Sandra Barouta Elvin, National Security Officer at Microsoft, will review the cyber threat landscape and trends in the context of societal evolution and what can be done to impact the current trends.

Sandra Barouta Elvin works as a national security manager for Microsoft with responsibility for security policy and security issues. She has over 20 years of experience working with IT and information security both strategically and operationally in both the public and private sectors.

Läs mer

Johanna Samuelson

Moderator

Vår proffsiga moderator för dagen.

Johanna Samuelson är en proffsig och engagerad programledare, moderator, konferencier, innehållsskapare och komiker. Med sitt sinne för humor och erfarenhet från teater- och standup-scenerna är hon en mästare på att få publiken att skratta.

Läs mer

Ingvar Johansson

"Why is ownership of identity so important for an organization?"

Everyone agrees that identity is the security perimeter. This introduces challenges in world where all business data and infrastructures no longer resides in the organization's own data centers and identity ownership is becoming more important for organizations on their digitalization journey.

Ingvar Johansson from One Identity. IT professional with more than 35 years in the IT industry. Ingvar has been focusing on Identity and Access Governance for the last 20+ years working for several leading IGA vendors.

Läs mer

Paul Squires

"Convergence: a holistic approach to identity"

Converged identity is generating buzz, but just using a label doesn’t make it so. In this session we’ll discuss why convergence offers value and the nature of converged platforms. We’ll dig into how solutions can have a holistic approach, leading to more secure, efficient, and user-friendly digital environments. Join us to explore the future of identity management and discover how to leverage converged identity platforms to stay ahead in an increasingly digital world.

Paul is lead partner enablement in EMEA at Saviynt for and brings more than 20 years’ experience in identity management.

Läs mer

Bart Bruijnesteijn

"Privileged Access Management for Cloud"

The public cloud has revolutionized how organizations function, how information technology runs and how businesses deploy services to their consumers. However, with the rapid ascent into the cloud and the ever-growing number and complexity of services, it’s easy for malicious actors to find identity-centric entry points and take over an entire public cloud environment. Keeping the cloud secure is vital to your organization's success.

Bart is an IT Security professional with 25 years of experience in IT Security solution architecture, pre-sales and consultancy.

Läs mer

Alex Laurie

"Identifying and Countering AI Threats in a New Era of Cybercrime"

The statement that “to know you is to love you” has never been more true or relevant as we face more and more challenges from synthetic identity and AI-driven threats. Identity is no longer just an IT security issue but a key business enabler as businesses work to delight their consumers, partners and employees with frictionless user experiences that also improves the security of access to the data and resources IT works to protect.

Alex Laurie serves as the SVP Global Sales Engineering and Go-To-Market Programs at Ping Identity. With over two decades in security and identity technology, Alex has worked with leading international organisations, government departments, and military and police forces.

Läs mer

Tim Dobbelaere

"Ping Identity Deep Dive in Fraud Protection"

According to Forbes, 1 in 2 of us will be targeted by fraud. Whether it’s impersonation scams, loan fee fraud, APP fraud, parcel delivery scams, identity theft, ghost brokers or pension scams, the fraudsters are getting more determined and sophisticated. The demand to innovate customer experiences whilst reducing the risk of fraud, is an ever-increasing priority.

Tim strongly believes in growing a common set of products and tools, to facilitate enterprise solutions by enabling easier customization and decreasing one-time effort development. Tim has a background in solution architecture, server design and development with specific expertise in authentication, cryptography, smart cards and biometrics.

Läs mer

Mikael Wikström

"Identity Game Changers: Transforming the Future of Identity Security"

In a world where governance fatigue and rubber stamping threaten the integrity of Identity Security, it’s time for a transformation. How can organizations ensure users make informed, high-quality decisions about access? Enter Large Language Models, bringing clarity and automation to the process. In this session, we’ll also tackle the critical divide between Identity Security and Privileged Access Management (PAM), and how SailPoint's Privileged Task Automation bridges this gap — offering precision over privilege. Finally, discover how machine learning and policy-based access controls can reduce role complexity, helping enterprises escape the traps of role explosion. Don't miss this deep dive into the future of Identity Security, where technology meets strategy for real security change.

Mikael Wikström works as a Cyber Security Technical Advisor covering the Nordic regions where he assists enterprises and organizations in defining the strategy and adoption of an integrated Identity Governance Platform. Mikael has more than 30 years’ experience in the Cyber Security software industry, where he has lead teams in the development and implementation of complex Cyber Security solutions with a focus on Identity Governance, Identity Management, Access Management in a wide range of organizations and enterprises” Linkedin https://www.linkedin.com/in/wicke/

Läs mer

Rasmus Schewenius Lund

"Enhance Your Non-Employee Security"

As businesses rely more on third parties, managing non-employee access and risks becomes critical. Strong Identity Security programs are essential for handling vendors, contractors, partners, and others, while aligning with NIS2 and DORA directives.

Identity professional since 2011 - Focus on Identity & Access Management with a special nag for Identity Governance. Currently working as a Solution Engineer at Sailpoint.

Läs mer

Amos Green

"NIS2 & DORA: Do they go far enough given the two recent global outages?"

In July 2024 we have seen two global IT outages that have had major impacts around the world. The outage of Azure was due to a cyber-attack that caused a global system lock-out, with the second one being the Crowd Strike update error that caused a global IT failure. These outages had very different causes and implications for users, and yet still had far reaching effects, with significant financial losses and economic impacts. The full costs are still not fully calculated. NIS2 & DORA, while addressing some elements of security, resiliency and business continuity were both conceived well before these global events, so do not specifically address the real world lessons coming from these global outages. There are deeper considerations companies and governments must be looking at beyond just the high level guidance of both NIS2 & DORA.

Amos has been advising clients in the various security domains since 1980. He has experienced shifts in technology that enable business objectives providing competitive advantages and securing resources across industry and public sectors in the network, device, and application security arenas.

Läs mer

Martin Sandren

"#DID and #ITDR and how to use them to protect your company"

The IAM industry loves acronyms and two of the latest entries is Defence in Depth (#DID) and Identity Threat Detection and Response (#ITDR) In a risk environment where the attacker logs in instead of hacks in it is becoming increasingly important to detect compromised identities, stop privilege escalation and lateral movement and take back control of the compromised assets. This talk discusses why ITDR and DID are relevant in today's enterprise security environment and how you can leverage the concepts to protect your company.

In my role as IAM lead at Inter Ikea I am responsible for creating an IAM system that enables our coworkers to deliver a better everyday life for the many people as well as ensuring smooth delivery of meatballs and billys across the world. Martin Sandren is a board member of the IdNext foundation, founder of the Digital Identity Amsterdam meetup and active within IDPro and IdentityBeer.

Läs mer

Kim Freskgård

"Dynamic Authentication API"

Don’t compromise on security for excellent user experience or vice versa. The Hypermedia Authentication API (HAAPI) allows your UX team complete control over the user interface during authentication. At the same time, security experts maintain control over which login methods are allowed or if specific workflows should be executed as part of the authentication. This decoupling allows for separate release cycles between the app and the identity platform, stays on top of security with server-side control and enables ideal user experience with app-rendered screens.

Kims is a presales Engineer at Curity and as worked in IT security for many years. He has broad technical experience, having worked as a developer, been the head of development at Nexus, and now as a presales engineer. In his role at Curity, he helps organizations of all types and sizes secure their APIs in the most effective ways possible, whether they’re large banks or tech startups.

Läs mer

Paul Walker

"The AI paradox in IGA – are you ready for it?"

In this session, Paul Walker, Field Strategist at Omada, will guide you through the various technologies that enable the application of AI for IGA. This can help to drive significant improvements in workflow decision-making and accelerate your IGA journey towards an identity-first architecture. But who is ready to use what and where should you start? And how can your data quality impact your results? What questions do you need to consider asking suppliers?

With over 25 years of global experience in cybersecurity and a focus on Identity & Access Management, Paul Walker is a seasoned professional known for his exceptional communication and problem-solving skills. Currently serving as a Field Strategist at Omada, he brings a wealth of expertise in value selling, product growth, and IAM solution evangelism.

Läs mer

Ford Merrill

”Compromised Credentials”

We will show off a real-time phishing example from the Chinese actor related to global package redelivery phishing scams (~2-3 minute video), and then follow-up with a demonstration of the Compromised Cards and Credentials services that show how we’re able to provide stolen credentials and cards our research team recovers related to phishing threats and also more generally.

With a foundational career spanning over a decade as a Senior Architect securing Linux and BSD systems within datacenter and hosting environments, Ford contributed notably to the defense of the American Financial sector during 'Operation Ababil' between 2012-2013. His efforts in disseminating live attack data and insights greatly benefited the security community and culminated in a pivotal presentation at ISOI 11 in Burbank. In 2014, Ford embraced a move from Texas to pursue a dedicated cybersecurity research role at CSIS Security Group in Copenhagen, Denmark, continuing deeper research into DDoS actors, malware, brand infringement, phishing, and conducting incident response activities. Notably, Ford was the principal developer behind the technology stack that powers the CSIS Anti-Phishing service, phishdb.

Läs mer

Niklas Fredengren

"Demo av Entra Private access"

Our session will be a live demo of Microsoft Entra Private Access. Microsoft Entra Private Access is part of Microsoft's Security Service Edge (SSE) solution and ensures user connectivity to private resources and applications, reducing the operational complexity and risk associated with legacy VPN solutions. This solution modernizes how your organization's users access private apps and resources without needing a VPN, using the Global Secure Access Client. Entra Private Access offers two ways to configure the private resources to be tunneled through the service: Quick Access and Global Secure Access app.

Niklas Fredengren is a seasoned Technical Specialist at Microsoft, specializing in digital security. With extensive experience in addressing security issues, Niklas has been instrumental in helping organizations safeguard their digital environments. His role involves helping customers finding robust security measures. With almost 27 years of experience, he is providing several perspectives on solutions, that exceeds the normal security discussion.

Läs mer

Emil Petersson

Service Owner, Identity and Access Management på Schibsted Media

Emil kommer att delta i vår spännande kundpanel för att svara på branschrelaterade och högaktuella frågor. Missa inte chansen att ta del av hans insikter och kunskap.

Emil leads IAM initiatives at Schibsted Media, ensuring secure and efficient access management across digital platforms. He focuses on aligning security with business goals, enhancing user authentication, identity governance, and driving innovative solutions in the identity space.

Läs mer

Mangnus Johansson

Domänarkitekt, IAM, på Max Burgers

Mangnus kommer att delta i vår spännande kundpanel för att svara på branschrelaterade och högaktuella frågor. Missa inte chansen att ta del av hans erfarenheter och kunskap från ett spännande företag.

Mangnus Johansson jobbar som Domänarkitekt och TPO IAM med fokus på strategier, processer, implementation och stöd rörande våra identiteter och identitetssäkerhet för Max AB.

Läs mer

Agenda för 2024

08.00-08.45
Rum Spyware

Välkommen

Registrering och frukost

Välkommen

Vi inleder dagen med frukost och nätverkande.

08.45-09.00
Rum Ransomeware

Johanna Samuelsson

Moderator

Introduktion av dagen

Vår inspirerande moderator inleder dagen tillsammans med Jens Björkman, VD för ID North & Fredrik Åström, VD för Arctic Group.

09.00-09.45
Rum Ransomeware

Alex Laurie

SVP Global Sales Engineering & Go-To-Market Programs, Ping

"Identifying and Countering AI Threats in a New Era of Cybercrime"

The statement that “to know you is to love you” has never been more true or relevant as we face more and more challenges from synthetic identity and AI-driven threats. Identity is no longer just an IT security issue but a key business enabler as businesses work to delight their consumers, partners and employees with frictionless user experiences that also improves the security of access to the data and resources IT works to protect.

09.45-10.15
Rum Ransomeware

Rudy de Sousa

EMEA Presales Director, One Identity

"Identity Security Today & Tomorrow – From Important to Absolutely Essential"

Increasingly organisations and individuals are aware of the importance of Identity Security.
In this session we will look at 2 emerging technologies and how the impact of these technologies will take the importance of Identity Security to another level.
Where the need for us as Identity professionals to stay ahead of those looking to compromise systems, data, identities becomes existential.
And why the combination of AI plus the extent and type of data available today, will amplify the impact of Identity Security success or failure beyond our imagination.

10.20-10.50
Rum Ransomeware

Rasmus Schewenius Lund

Senior Solution Engineer, SailPoint

"Enhance Your Non-Employee Security"

As businesses rely more on third parties, managing non-employee access and risks becomes critical. Strong Identity Security programs are essential for handling vendors, contractors, partners, and others, while aligning with NIS2 and DORA directives.

10.20-10.50
Rum Trojan

Amos Green

Senior Systems Engineer, RSA

"NIS2 & DORA: Do they go far enough given the two recent global outages?"

In July 2024 we have seen two global IT outages that have had major impacts around the world. The outage of Azure was due to a cyber-attack that caused a global system lock-out, with the second one being the Crowd Strike update error that caused a global IT failure. These outages had very different causes and implications for users, and yet still had far reaching effects, with significant financial losses and economic impacts. The full costs are still not fully calculated. NIS2 & DORA, while addressing some elements of security, resiliency and business continuity were both conceived well before these global events, so do not specifically address the real world lessons coming from these global outages.

10.50-11.15
Rum Spyware

Fika

Mingel och fika

Paus

Välsmakande fika som sponsras av RSA.

Passa på att besöka Speakers Corner under pausen.

10.55-11.10
Speakers Corner

Kim Freskgård

Presales Engineer, Curity

"Dynamic Authentication API"

Don’t compromise on security for excellent user experience or vice versa. The Hypermedia Authentication API (HAAPI) allows your UX team complete control over the user interface during authentication. At the same time, security experts maintain control over which login methods are allowed or if specific workflows should be executed as part of the authentication. This decoupling allows for separate release cycles between the app and the identity platform, stays on top of security with server-side control and enables ideal user experience with app-rendered screens.

11.15-11.45
Rum Ransomeware

Bart Bruijnesteijn

Solutions Engineering Director, CyberArk

"Privileged Access Management for Cloud"

The public cloud has revolutionized how organizations function, how information technology runs and how businesses deploy services to their consumers. However, with the rapid ascent into the cloud and the ever-growing number and complexity of services, it’s easy for malicious actors to find identity-centric entry points and take over an entire public cloud environment. Keeping the cloud secure is vital to your organization's success.

11.45-12.30
Rum Ransomeware

Paneldebatt

Experter på scen

Spännande diskussioner

Ta del av insikter och kunskap från framstående bolag när Emil Petersson från Schibsted, Mangnus Johansson från MAX Burgers & Martin Sandren från IKEA tar plats på scen.

12.30-13.30
Rum Spyware

Lunch

Njut av god mat

Paus

Lunchen sponsras av CyberArk & Saviynt.

Passa på att besöka Speakers Corner under lunchen.

13.00-13.15
Speakers corner

Ford Merill

Senior Director of the Cyber Intelligence Business Unit at CSIS Security Group

”Compromised Credentials”

Ford will show off a real-time phishing example from the Chinese actor related to global package redelivery phishing scams (~2-3 minute video), and then follow-up with a demonstration of the Compromised Cards and Credentials services that show how we’re able to provide stolen credentials and cards our research team recovers related to phishing threats and also more generally.

13.30-13.50
Rum Ransomeware

Tim Dobbelaere

Solution Architect & Manager in Northern Europe, Ping Identity

"Ping Identity Deep Dive in Fraud Protection"

According to Forbes, 1 in 2 of us will be targeted by fraud. Whether it’s impersonation scams, loan fee fraud, APP fraud, parcel delivery scams, identity theft, ghost brokers or pension scams, the fraudsters are getting more determined and sophisticated. The demand to innovate customer experiences whilst reducing the risk of fraud, is an ever-increasing priority.

13.30-13.50
Rum Trojan

Ingvar Johansson

Presales Enginer, One Identity

"Why is ownership of identity so important for an organization?"

Everyone agrees that identity is the security perimeter. This introduces challenges in world where all business data and infrastructures no longer resides in the organization's own data centers and identity ownership is becoming more important for organizations on their digitalization journey.

14.00-14.20
Rum Ransomeware

Martin Sandren

Security Architect and Product Lead, IKEA

"#DID and #ITDR and how to use them to protect your company"

The IAM industry loves acronyms and two of the latest entries is Defence in Depth (#DID) and Identity Threat Detection and Response (#ITDR) In a risk environment where the attacker logs in instead of hacks in it is becoming increasingly important to detect compromised identities, stop privilege escalation and lateral movement and take back control of the compromised assets. This talk discusses why ITDR and DID are relevant in today's enterprise security environment and how you can leverage the concepts to protect your company.

14.00-14.20
Rum Trojan

Sören Pettersson & Tobias Ljunggren

Principal Solutions Consultants, OpenText

"IAM Beyond the Identity Fabric"

IAM är en konstant resa, men vad blir nästa steg inom identitets- och åtkomsthantering efter Identity Fabric? OpenText berättar om vad som finns idag, och hur vi fortsätter resan inom IAM vidare från Identity Fabric till IAM Fabric.

14.30-15.00
Rum Ransomeware

Mikael Wikström

Team Lead & Technical Sales, SailPoint

"Identity Game Changers: Transforming the Future of Identity Security"

In a world where governance fatigue and rubber stamping threaten the integrity of Identity Security, it’s time for a transformation. How can organizations ensure users make informed, high-quality decisions about access? Enter Large Language Models, bringing clarity and automation to the process. In this session, we’ll also tackle the critical divide between Identity Security and Privileged Access Management (PAM), and how SailPoint's Privileged Task Automation bridges this gap — offering precision over privilege. Finally, discover how machine learning and policy-based access controls can reduce role complexity, helping enterprises escape the traps of role explosion. Don't miss this deep dive into the future of Identity Security, where technology meets strategy for real security change.

15.00-15.20
Rum Ransomeware

Sandra Barouta Elvin

Nationell säkerhetschef, Microsoft

"Securing a digital society"

With the constant flow of new reports of cyberattacks targeting people and businesses, is it safe to continue to digitalize? In this session Sandra Barouta Elvin, National Security Officer at Microsoft, will review the cyber threat landscape and trends in the context of societal evolution and what can be done to impact the current trends.

15.20-16.10
Rum Spyware

Fika

Mingel och fika

Paus

Välsmakande fika som sponsras av Opentext.

Passa på att besöka Speakers Corner under pausen.

15.30-15.45
Speakers corner

Niklas Fredengren

Technical Specialist på Microsoft

"Demo av Entra Private access"

Our session will be a live demo of Microsoft Entra Private Access. Microsoft Entra Private Access is part of Microsoft's Security Service Edge (SSE) solution and ensures user connectivity to private resources and applications, reducing the operational complexity and risk associated with legacy VPN solutions. This solution modernizes how your organization's users access private apps and resources without needing a VPN, using the Global Secure Access Client. Entra Private Access offers two ways to configure the private resources to be tunneled through the service: Quick Access and Global Secure Access app.

15.45-16.00
Speakers corner

Paul Walker

Field Strategist, Omada

"The AI paradox in IGA – are you ready for it?"

In this session, Paul Walker, Field Strategist at Omada, will guide you through the various technologies that enable the application of AI for IGA.
This can help to drive significant improvements in workflow decision-making and accelerate your IGA journey towards an identity-first architecture. But who is ready to use what and where should you start? And how can your data quality impact your results? What questions do you need to consider asking suppliers?

16.10-16.40
Rum Ransomeware

Paul Squires

Lead Partner Enablement EMEA, Saviynt

"Convergence: a holistic approach to identity"

Converged identity is generating buzz, but just using a label doesn’t make it so. In this session we’ll discuss why convergence offers value and the nature of converged platforms. We’ll dig into how solutions can have a holistic approach, leading to more secure, efficient, and user-friendly digital environments.

16.40-17.20
Rum Ransomeware

Paneldebatt

Experter på scen

Spännande diskussioner

Paneldiskussion med våra experter, Alex Laurie från Ping Identity, Rudy de Sousa från One Identity,Rasmus Lund från SailPoint, Paul Squires från Saviynt, Bart Bruijnestejin från CyberArk, Amos Green från RSA & Tobias Ljunggren från Opentext. Paneldebatten leds av vår moderator Johanna Samuelsson.

17.20-18.00
Rum Ransomeware

Karsten Nohl

Founder & Chief Scientist, SRLabs & Autobahn Security

"Ransomware front report: How to be prepared"

Ransomware has been a major cyber challenge for a decade with no signs of criminals ever running out of exploitable issues. Do we keep waiting for technology vulnerabilities to somehow disappear, or is it time to claim back territory?

18.00-22.00
Rum Spyware

Middag, mingel & Musik

Njut av god mat & dryck

Mingelmiddag

Njut av god mat och dryck tillsammans med de andra deltagarna och alla årets sponsorer.

Våra sponsorer presenteras löpande

Diamond

Platinum

Gold

Silver

Brons

Från förra årets Identity Day

Identity day presenteras av

Arctic Group är Nordens ledande experter på Identitetssäkerhet & Cybersäkerhet. Vi är din långsiktiga partner i din digitaliseringsresa - vår spetskompetens hjälper dig att säkra för framtiden. Var säker tillsammans med oss!

ID North är experter på Identity Security & IAM. Vi skyddar din och dina kunders data. Genom en fullständig överblick och kontroll över alla användare minimerar vi risken för cyberintrång, vilket ger dig värdefulla konkurrensfördelar. Bygg digitalt förtroende med oss!

Frågor & Svar

Krävs en anmälan?

Även om eventet är kostnadsfritt, vill vi gärna påminna om att det krävs en föranmälan för att delta den 3 oktober. Vi ser verkligen fram emot att välkomna er och vill säkerställa att alla får en fantastisk upplevelse!

Kan jag anmäla mig på plats?

Då det är ett kostnadsfritt event har vi begränsat antal platser. Vi kommer inte kunna ta emot anmälningar på plats vid eventet, så säkra din plats redan idag!

Gäller eventet endast personer inom IT?

Eventet är till för alla företag / organisationer som verkar i digitala miljöer. Arbetar ni med hybrida arbetsplatser? Har du en digital profil? Hanterar ni personliga uppgifter? Då är identitetssäkerhet av högsta relevans.

Jag är anmäld, kan jag bjuda med en vän?

Självklart, se bara till att anmäla er så rätt mängd mat och platser finns. Bjud med en vän eller en kollega och anmäl er idag.

Vad kan jag förvänta mig mer än talare & panel?

Nätverk, mat & mingel. På plats under dagen och kvällen kommer du även ha möjlighet att knyta kontakter inom branschen, underhållas och äta gott.

Vilket språk hålls eventet på?

Eventet är på svenska med inslag av presentationer som hålls på engelska.