Download the latest agenda in PDF format

Download the latest agenda >

Agenda för ISW 2019 i Stockholm


Learn more about the latest cybersecurity concepts

Listen to NTT Security specialists and our leading security partners present their solutions and join us in the networking breaks to speak with peers and representatives from NTT Group companies and partner organizations.

The agenda below is updated regularly, so please check back for more information.


08:00 - 09:00
Registration, coffee and expo

09:00 - 09:20
Fredrik Olsson, Regional Director Nordics, NTT | Welcome and introduction

09:20 - 09:50
Jolina Pettersson, Enterprise Security Architect, Consulting Services, NTT and Simona Selmer, Security Consultant, Consulting Services, NTT
Incident Response – Make the first 24 hours count
When you discover a security incident the clock starts ticking. Are your first 24 hours focused on stopping the incident, identifying the root cause and preventing it from happening again – or are these valuable hours spent on locating resources and tools and setting up processes and contracts due to lack of good preparation? We are here to help you get ready for game day by understanding the importance of proactive Incident Response.

09:50 - 10:20
Guest speaker: Rune Carlsen, CISO KLP
The password hell –  how to magically survive!
No matter what arena we are at, work or private, we have the same challenges for passwords. They may need to be complex, long and unique for all the services you use. What is a password, how many passwords do we have, how to hack a password and how can we easily and securely maintain a good and safe password once and for all? This lecture is suitable for all target groups - management, employees and technologists and will be a thought for everyone - with a magical solution!

10:20 - 10:50
Networking coffee break and expo

10:50 - 11:20
Break-out sessions – Gold partners

- Fredrik Möller, Regional Manager, Nordics and Baltics, Proofpoint, Inc. 
The confidence game: How attackers exploit people, and how to stop them
Phishing and social engineering are the ways most organisations get compromised. However, most organisations have very little idea which of their people receive sophisticated threats, targeted threats or even large volumes of threats. We call these targets VAPs (Very Attacked People), and they may not be who you would expect. In this session, you will:

  • Learn how to identify who’s being attacked in your organisation
  • Discuss how to leverage data to better understand your adversaries
  • Learn how to tailor a protection plan for your most at risk people

Jean Diarbakerli, Sales Engineer, Trend Micro 
Hack a Tesla, Win a Tesla
Trend Micro Research covers a wide range of areas within the threat and computing landscape. Through the Zero Day Initiative, the world's largest vendor-agnostic bug bounty program, Trend Micro encourages the responsible reporting of zero-day vulnerabilities through financial incentives.

Starting in 2007, the Pwn2Own hacking competition, organized by the Zero Day Initiative, has grown into the world's premier hacking contest. It has become an industry-leading contest that encourages new areas of vulnerability research on today's most critical platforms. This year's contest included an entirely new automotive category, through a partnership with Tesla. The reward for successfully exploiting a vulnerability? A brand-new Model 3.

Jonas Herner, Channel Sales Manager Nordic, Thales
Cloud – Who is in control? 
There is no cloud…it is just someone else’s computer! So how to implement a zero trust approach to protect your sensitive assets hosted by someone else ? The cloud shared responsibility model is endorsed by the cloud industry, including AWS, Azure and the Cloud Security Alliance.
Designed for CISOs, IT Managers, Security Architects, Application Owners, this session will explore this model and how to achieve compliance and prevent security breaches for IaaS, PaaS, containers and SaaS from multi cloud, with high assurance asset-centric security, beyond the corporate IT perimeter. Join this session and learn:

  • What is the cloud shared responsibility model and an illustration with AWS
  • What practical security risks exist in cloud computing and how to cover them

11:20 - 11:50
Keynote speaker:  Claudia Olsson, Technology Expert, Business Leader and Speaker with a background in engineering and economics 
Leadership for a smart society 
Claudia speaks about how exponential technologies and the proliferation of connected devices is shaping a new smart society. In her presentation, she highlights the leadership needed to address the challenges and opportunities of a fully connected world. She also shares experiences from her work with Stellar Capacity, the World Economic Forum and Singularity University as well as the conclusions from her work co-authoring the vision for Industry 2030 for the European Commission.

11:50 - 12:20
Aamir Lakhani, Senior Security Strategy, Fortinet – Platinum partner
4 minutes to Save the World
It takes approximately 4 minutes or less for an attacker to gain remote access to a system with the right exploits, yet it sometimes takes over 6 months for organizations to recognize an actual data breach. Windows bugs are the least of your worries in a hyperconnected world of 5G, drones, and IoT. Let us examine attack techniques hackers are using to bypass your sophisticated security products. Let’s examine how we can recognize and stop attacks while they are occurring use threat intelligence techniques, the MITRE [email protected] Framework, and FortiGuard Threat Intelligence. You have 4 minutes to save your world, do you accept the challenge?

12:20 - 13:20
Networking lunch and expo

13:20 - 13:50
Break-out sessions – Gold partners

- Darren Gale, Senior Director EMEA, Vectra AI
Using AI to Detect and Hunt Advanced Attackers
A motivated and skilled adversary will always find a way to breach the perimeter defences. That's why it's so important to also detect and respond to active threats inside your environment, in real-time so you can stop attackers in their tracks before they steal, destroy or manipulate your digital assets.

AI is an increasing feature within our cybersecurity arsenal, to defend, detect, and automate incident response. But with Cybersecurity providers everywhere liberally adding claims about the Artificial Intelligence inside their products how can you separate what's real, and what works from the hype?

In this session we’ll examine a high-profile breach to understand the steps the attackers took to become successful. We’ll then look at how we can build and apply AI to the detection and response to such attacks.

- Staffan Truvé, CTO, Recorded Future
Threat Intelligence, Third Party Risk Assessment and Threat Prediction - Building Cyber Threat Analyst Centaurs Using AI and Machine Learning  
This presentation discusses how digital transformation is leading to increasing digital risk exposure, and how intelligence is the best way to mitigate that risk. This includes not only threats against our own organization, but all organizations to which we connect our systems - this is what we call third party risk.  We discuss how AI/Machine Learning is necessary for managing the speed and scale of information that needs to be processed by analysts, and introduce  the concept of Threat Analysts Centaurs - man and machine working together to meet the need to collect, prioritize, and analyze threat intelligence. Specific techniques used in this analysis chain are presented.  

- Mikael Rosander, Sales Engineer, Tenable
OT challenges  

OT and IT no longer operate independently. Increasingly, we see them blending together.
• Legacy process controllers are being replaced with standards-based commercial hardware and software, such as Windows machines and virtualization infrastructure.
• OT operators use mobile devices to remotely monitor and manage processes.
• OT data is being analyzed in corporate data centers.
• Supervisory applications, historical data, and IIoT sensor data is migrating to the cloud, where it is often analyzed by expert systems.
We probably all are aware of attacks that have exploited the security gaps between IT and OT. The exploits can originate in either IT or OT and then pivot into the other area. This calls for enterprise-wide cyber security governance with common control objectives and policies.

13:50 - 14:20
Christoffer Callender, Senior Manager, Security Engineering, Nordics, Symantec  – Platinum partner
Security as an enabler of digital transformation

For most organizations, a fully functional cyber security system should give their brand a differentiator by being known as secure and easy to use; be it an airline, bank, energy provider or retail website. Organizations undergoing digital transformation are ones that are going through significant change. It is crucial for CISOs, therefore, to take the opportunity to ensure a cultural change around security. All the cyber security in the world will not be effective without making the organization more mindful about security and an ingrained understanding of security risk.

14:20 - 14:50
Panel discussion: Enrico Piccini, Technical Authority Instrumentation, BWOffshore and Magnus Carling, CISO, Stena AB | Moderator: Arnt Ove Nedrebø, NTT
Building the right OT security model for your business in a connected world
Industry 4.0 is introducing connectivity to previously isolated networks and the  digital transformation will continue to connect OT into IT-networks. What is the best way to manage this challenge protecting infrastructure from cyber threats and what is the responsibility for OT placed in relation to the CISO and CIO? 

14:50 - 15:20
Networking coffee break and expo

15:20 - 15:50
John André Bjørkhaug, Principal Security Consultant, Offensive Security, NTT
Live Hack Demo
Insecure Security - Hack all the things part 1

15:50 - 16:20
Jan Olsson, Police Superintendent, Swedish CyberCrime Center SC3 / National IT Crime Center (NOA) | Cybercrime – How do the cyber criminals act? How to protect yourselves and what to do if it still happens.

16:20 - 17:05
Keynote speaker: Fredrik Reinfeldt, Former Prime Minister in Sweden 2006-2014, speaker and advisor
How can collaboration make the smart society more secure?
At the same rate as companies and societies are being digitized, risks in the form of vulnerabilities (in connected systems) and cybercrime also increase.
Around the world, authorities and companies are starting to work closer together to share information, intelligence and experiences about cyber threats and crime.
Fredrik shares his thoughts on why collaboration must increase to fight cybercrime and preserve citizens’ and customers' trust and what this might look like.

17:05 - 17:20
Summary and close | Fredrik Olsson

17:20 - 20:00
Networking drinks and expo, entertainment