Våra talare 2024

Sören Pettersson & Tobias Ljunggren
"IAM Beyond the Identity Fabric"
IAM är en konstant resa, men vad blir nästa steg inom identitets- och åtkomsthantering efter Identity Fabric? OpenText berättar om vad som finns idag, och hur vi fortsätter resan inom IAM vidare från Identity Fabric till IAM Fabric.

Rudy de Sousa
"Identity Security Today & Tomorrow – From Important to Absolutely Essential"
Increasingly organisations and individuals are aware of the importance of Identity Security. In this session we will look at 2 emerging technologies and how the impact of these technologies will take the importance of Identity Security to another level. Where the need for us as Identity professionals to stay ahead of those looking to compromise systems, data, identities becomes existential. And why the combination of AI plus the extent and type of data available today, will amplify the impact of Identity Security success or failure beyond our imagination.

Karsten Nohl
"Ransomware front report: How to be prepared"
Ransomware has been a major cyber challenge for a decade with no signs of criminals ever running out of exploitable issues. Do we keep waiting for technology vulnerabilities to somehow disappear, or is it time to claim back territory?

Sandra Barouta Elvin
"Securing a digital society"
With the constant flow of new reports of cyberattacks targeting people and businesses, is it safe to continue to digitalize? In this session Sandra Barouta Elvin, National Security Officer at Microsoft, will review the cyber threat landscape and trends in the context of societal evolution and what can be done to impact the current trends.

Johanna Samuelson
Moderator
Vår proffsiga moderator för dagen.

Ingvar Johansson
"Why is ownership of identity so important for an organization?"
Everyone agrees that identity is the security perimeter. This introduces challenges in world where all business data and infrastructures no longer resides in the organization's own data centers and identity ownership is becoming more important for organizations on their digitalization journey.

Paul Squires
"Convergence: a holistic approach to identity"
Converged identity is generating buzz, but just using a label doesn’t make it so. In this session we’ll discuss why convergence offers value and the nature of converged platforms. We’ll dig into how solutions can have a holistic approach, leading to more secure, efficient, and user-friendly digital environments. Join us to explore the future of identity management and discover how to leverage converged identity platforms to stay ahead in an increasingly digital world.

Bart Bruijnesteijn
"Privileged Access Management for Cloud"
The public cloud has revolutionized how organizations function, how information technology runs and how businesses deploy services to their consumers. However, with the rapid ascent into the cloud and the ever-growing number and complexity of services, it’s easy for malicious actors to find identity-centric entry points and take over an entire public cloud environment. Keeping the cloud secure is vital to your organization's success.

Alex Laurie
"Identifying and Countering AI Threats in a New Era of Cybercrime"
The statement that “to know you is to love you” has never been more true or relevant as we face more and more challenges from synthetic identity and AI-driven threats. Identity is no longer just an IT security issue but a key business enabler as businesses work to delight their consumers, partners and employees with frictionless user experiences that also improves the security of access to the data and resources IT works to protect.

Tim Dobbelaere
"Ping Identity Deep Dive in Fraud Protection"
According to Forbes, 1 in 2 of us will be targeted by fraud. Whether it’s impersonation scams, loan fee fraud, APP fraud, parcel delivery scams, identity theft, ghost brokers or pension scams, the fraudsters are getting more determined and sophisticated. The demand to innovate customer experiences whilst reducing the risk of fraud, is an ever-increasing priority.

Mikael Wikström
"Identity Game Changers: Transforming the Future of Identity Security"
In a world where governance fatigue and rubber stamping threaten the integrity of Identity Security, it’s time for a transformation. How can organizations ensure users make informed, high-quality decisions about access? Enter Large Language Models, bringing clarity and automation to the process. In this session, we’ll also tackle the critical divide between Identity Security and Privileged Access Management (PAM), and how SailPoint's Privileged Task Automation bridges this gap — offering precision over privilege. Finally, discover how machine learning and policy-based access controls can reduce role complexity, helping enterprises escape the traps of role explosion. Don't miss this deep dive into the future of Identity Security, where technology meets strategy for real security change.

Rasmus Schewenius Lund
"Enhance Your Non-Employee Security"
As businesses rely more on third parties, managing non-employee access and risks becomes critical. Strong Identity Security programs are essential for handling vendors, contractors, partners, and others, while aligning with NIS2 and DORA directives.

Amos Green
"NIS2 & DORA: Do they go far enough given the two recent global outages?"
In July 2024 we have seen two global IT outages that have had major impacts around the world. The outage of Azure was due to a cyber-attack that caused a global system lock-out, with the second one being the Crowd Strike update error that caused a global IT failure. These outages had very different causes and implications for users, and yet still had far reaching effects, with significant financial losses and economic impacts. The full costs are still not fully calculated. NIS2 & DORA, while addressing some elements of security, resiliency and business continuity were both conceived well before these global events, so do not specifically address the real world lessons coming from these global outages. There are deeper considerations companies and governments must be looking at beyond just the high level guidance of both NIS2 & DORA.

Martin Sandren
"#DID and #ITDR and how to use them to protect your company"
The IAM industry loves acronyms and two of the latest entries is Defence in Depth (#DID) and Identity Threat Detection and Response (#ITDR) In a risk environment where the attacker logs in instead of hacks in it is becoming increasingly important to detect compromised identities, stop privilege escalation and lateral movement and take back control of the compromised assets. This talk discusses why ITDR and DID are relevant in today's enterprise security environment and how you can leverage the concepts to protect your company.

Kim Freskgård
"Dynamic Authentication API"
Don’t compromise on security for excellent user experience or vice versa. The Hypermedia Authentication API (HAAPI) allows your UX team complete control over the user interface during authentication. At the same time, security experts maintain control over which login methods are allowed or if specific workflows should be executed as part of the authentication. This decoupling allows for separate release cycles between the app and the identity platform, stays on top of security with server-side control and enables ideal user experience with app-rendered screens.

Paul Walker
"The AI paradox in IGA – are you ready for it?"
In this session, Paul Walker, Field Strategist at Omada, will guide you through the various technologies that enable the application of AI for IGA. This can help to drive significant improvements in workflow decision-making and accelerate your IGA journey towards an identity-first architecture. But who is ready to use what and where should you start? And how can your data quality impact your results? What questions do you need to consider asking suppliers?

Ford Merrill
”Compromised Credentials”
We will show off a real-time phishing example from the Chinese actor related to global package redelivery phishing scams (~2-3 minute video), and then follow-up with a demonstration of the Compromised Cards and Credentials services that show how we’re able to provide stolen credentials and cards our research team recovers related to phishing threats and also more generally.

Niklas Fredengren
"Demo av Entra Private access"
Our session will be a live demo of Microsoft Entra Private Access. Microsoft Entra Private Access is part of Microsoft's Security Service Edge (SSE) solution and ensures user connectivity to private resources and applications, reducing the operational complexity and risk associated with legacy VPN solutions. This solution modernizes how your organization's users access private apps and resources without needing a VPN, using the Global Secure Access Client. Entra Private Access offers two ways to configure the private resources to be tunneled through the service: Quick Access and Global Secure Access app.

Emil Petersson
Service Owner, Identity and Access Management på Schibsted Media
Emil kommer att delta i vår spännande kundpanel för att svara på branschrelaterade och högaktuella frågor. Missa inte chansen att ta del av hans insikter och kunskap.

Mangnus Johansson
Domänarkitekt, IAM, på Max Burgers
Mangnus kommer att delta i vår spännande kundpanel för att svara på branschrelaterade och högaktuella frågor. Missa inte chansen att ta del av hans erfarenheter och kunskap från ett spännande företag.
Agenda för 2024
Rum Spyware

Välkommen
Registrering och frukostVälkommen
Vi inleder dagen med frukost och nätverkande.
Rum Ransomeware

Johanna Samuelsson
ModeratorIntroduktion av dagen
Vår inspirerande moderator inleder dagen tillsammans med Jens Björkman, VD för ID North & Fredrik Åström, VD för Arctic Group.
Rum Ransomeware

Alex Laurie
SVP Global Sales Engineering & Go-To-Market Programs, Ping"Identifying and Countering AI Threats in a New Era of Cybercrime"
The statement that “to know you is to love you” has never been more true or relevant as we face more and more challenges from synthetic identity and AI-driven threats. Identity is no longer just an IT security issue but a key business enabler as businesses work to delight their consumers, partners and employees with frictionless user experiences that also improves the security of access to the data and resources IT works to protect.
Rum Ransomeware

Rudy de Sousa
EMEA Presales Director, One Identity"Identity Security Today & Tomorrow – From Important to Absolutely Essential"
Increasingly organisations and individuals are aware of the importance of Identity Security.
In this session we will look at 2 emerging technologies and how the impact of these technologies will take the importance of Identity Security to another level.
Where the need for us as Identity professionals to stay ahead of those looking to compromise systems, data, identities becomes existential.
And why the combination of AI plus the extent and type of data available today, will amplify the impact of Identity Security success or failure beyond our imagination.
Rum Ransomeware

Rasmus Schewenius Lund
Senior Solution Engineer, SailPoint"Enhance Your Non-Employee Security"
As businesses rely more on third parties, managing non-employee access and risks becomes critical. Strong Identity Security programs are essential for handling vendors, contractors, partners, and others, while aligning with NIS2 and DORA directives.
Rum Trojan

Amos Green
Senior Systems Engineer, RSA"NIS2 & DORA: Do they go far enough given the two recent global outages?"
In July 2024 we have seen two global IT outages that have had major impacts around the world. The outage of Azure was due to a cyber-attack that caused a global system lock-out, with the second one being the Crowd Strike update error that caused a global IT failure. These outages had very different causes and implications for users, and yet still had far reaching effects, with significant financial losses and economic impacts. The full costs are still not fully calculated. NIS2 & DORA, while addressing some elements of security, resiliency and business continuity were both conceived well before these global events, so do not specifically address the real world lessons coming from these global outages.
Rum Spyware

Fika
Mingel och fikaPaus
Välsmakande fika som sponsras av RSA.
Passa på att besöka Speakers Corner under pausen.
Speakers Corner

Kim Freskgård
Presales Engineer, Curity"Dynamic Authentication API"
Don’t compromise on security for excellent user experience or vice versa. The Hypermedia Authentication API (HAAPI) allows your UX team complete control over the user interface during authentication. At the same time, security experts maintain control over which login methods are allowed or if specific workflows should be executed as part of the authentication. This decoupling allows for separate release cycles between the app and the identity platform, stays on top of security with server-side control and enables ideal user experience with app-rendered screens.
Rum Ransomeware

Bart Bruijnesteijn
Solutions Engineering Director, CyberArk"Privileged Access Management for Cloud"
The public cloud has revolutionized how organizations function, how information technology runs and how businesses deploy services to their consumers. However, with the rapid ascent into the cloud and the ever-growing number and complexity of services, it’s easy for malicious actors to find identity-centric entry points and take over an entire public cloud environment. Keeping the cloud secure is vital to your organization's success.
Rum Ransomeware

Paneldebatt
Experter på scenSpännande diskussioner
Ta del av insikter och kunskap från framstående bolag när Emil Petersson från Schibsted, Mangnus Johansson från MAX Burgers & Martin Sandren från IKEA tar plats på scen.
Rum Spyware

Lunch
Njut av god matPaus
Lunchen sponsras av CyberArk & Saviynt.
Passa på att besöka Speakers Corner under lunchen.
Speakers corner

Ford Merill
Senior Director of the Cyber Intelligence Business Unit at CSIS Security Group”Compromised Credentials”
Ford will show off a real-time phishing example from the Chinese actor related to global package redelivery phishing scams (~2-3 minute video), and then follow-up with a demonstration of the Compromised Cards and Credentials services that show how we’re able to provide stolen credentials and cards our research team recovers related to phishing threats and also more generally.
Rum Ransomeware

Tim Dobbelaere
Solution Architect & Manager in Northern Europe, Ping Identity"Ping Identity Deep Dive in Fraud Protection"
According to Forbes, 1 in 2 of us will be targeted by fraud. Whether it’s impersonation scams, loan fee fraud, APP fraud, parcel delivery scams, identity theft, ghost brokers or pension scams, the fraudsters are getting more determined and sophisticated. The demand to innovate customer experiences whilst reducing the risk of fraud, is an ever-increasing priority.
Rum Trojan

Ingvar Johansson
Presales Enginer, One Identity"Why is ownership of identity so important for an organization?"
Everyone agrees that identity is the security perimeter. This introduces challenges in world where all business data and infrastructures no longer resides in the organization's own data centers and identity ownership is becoming more important for organizations on their digitalization journey.
Rum Ransomeware

Martin Sandren
Security Architect and Product Lead, IKEA"#DID and #ITDR and how to use them to protect your company"
The IAM industry loves acronyms and two of the latest entries is Defence in Depth (#DID) and Identity Threat Detection and Response (#ITDR) In a risk environment where the attacker logs in instead of hacks in it is becoming increasingly important to detect compromised identities, stop privilege escalation and lateral movement and take back control of the compromised assets. This talk discusses why ITDR and DID are relevant in today's enterprise security environment and how you can leverage the concepts to protect your company.
Rum Trojan

Sören Pettersson & Tobias Ljunggren
Principal Solutions Consultants, OpenText"IAM Beyond the Identity Fabric"
IAM är en konstant resa, men vad blir nästa steg inom identitets- och åtkomsthantering efter Identity Fabric? OpenText berättar om vad som finns idag, och hur vi fortsätter resan inom IAM vidare från Identity Fabric till IAM Fabric.
Rum Ransomeware

Mikael Wikström
Team Lead & Technical Sales, SailPoint"Identity Game Changers: Transforming the Future of Identity Security"
In a world where governance fatigue and rubber stamping threaten the integrity of Identity Security, it’s time for a transformation. How can organizations ensure users make informed, high-quality decisions about access? Enter Large Language Models, bringing clarity and automation to the process. In this session, we’ll also tackle the critical divide between Identity Security and Privileged Access Management (PAM), and how SailPoint's Privileged Task Automation bridges this gap — offering precision over privilege. Finally, discover how machine learning and policy-based access controls can reduce role complexity, helping enterprises escape the traps of role explosion. Don't miss this deep dive into the future of Identity Security, where technology meets strategy for real security change.
Rum Ransomeware

Sandra Barouta Elvin
Nationell säkerhetschef, Microsoft"Securing a digital society"
With the constant flow of new reports of cyberattacks targeting people and businesses, is it safe to continue to digitalize? In this session Sandra Barouta Elvin, National Security Officer at Microsoft, will review the cyber threat landscape and trends in the context of societal evolution and what can be done to impact the current trends.
Rum Spyware

Fika
Mingel och fikaPaus
Välsmakande fika som sponsras av Opentext.
Passa på att besöka Speakers Corner under pausen.
Speakers corner

Niklas Fredengren
Technical Specialist på Microsoft"Demo av Entra Private access"
Our session will be a live demo of Microsoft Entra Private Access. Microsoft Entra Private Access is part of Microsoft's Security Service Edge (SSE) solution and ensures user connectivity to private resources and applications, reducing the operational complexity and risk associated with legacy VPN solutions. This solution modernizes how your organization's users access private apps and resources without needing a VPN, using the Global Secure Access Client. Entra Private Access offers two ways to configure the private resources to be tunneled through the service: Quick Access and Global Secure Access app.
Speakers corner

Paul Walker
Field Strategist, Omada"The AI paradox in IGA – are you ready for it?"
In this session, Paul Walker, Field Strategist at Omada, will guide you through the various technologies that enable the application of AI for IGA.
This can help to drive significant improvements in workflow decision-making and accelerate your IGA journey towards an identity-first architecture. But who is ready to use what and where should you start? And how can your data quality impact your results? What questions do you need to consider asking suppliers?
Rum Ransomeware

Paul Squires
Lead Partner Enablement EMEA, Saviynt"Convergence: a holistic approach to identity"
Converged identity is generating buzz, but just using a label doesn’t make it so. In this session we’ll discuss why convergence offers value and the nature of converged platforms. We’ll dig into how solutions can have a holistic approach, leading to more secure, efficient, and user-friendly digital environments.
Rum Ransomeware

Paneldebatt
Experter på scenSpännande diskussioner
Paneldiskussion med våra experter, Alex Laurie från Ping Identity, Rudy de Sousa från One Identity,Rasmus Lund från SailPoint, Paul Squires från Saviynt, Bart Bruijnestejin från CyberArk, Amos Green från RSA & Tobias Ljunggren från Opentext. Paneldebatten leds av vår moderator Johanna Samuelsson.
Rum Ransomeware

Karsten Nohl
Founder & Chief Scientist, SRLabs & Autobahn Security"Ransomware front report: How to be prepared"
Ransomware has been a major cyber challenge for a decade with no signs of criminals ever running out of exploitable issues. Do we keep waiting for technology vulnerabilities to somehow disappear, or is it time to claim back territory?
Rum Spyware

Middag, mingel & Musik
Njut av god mat & dryckMingelmiddag
Njut av god mat och dryck tillsammans med de andra deltagarna och alla årets sponsorer.