NordicCISOSummit 2020 Oct. 21, 2020 to Oct. 21, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote: Protecting People: the New Perimeter | Ryan Rose | As 2020 changes the way we live and work, cyber criminals are adapting as well. ... | |
Data Governance as a Business Enabler | Johan Örtholm | Data governance and security is an unquestionably crucial exercise for every organisation, especially in an ... | |
Securing Cloud Transformation | Karen Aamurusko | N/A | |
Optimizing Security Operations | Lars-gunnar Marklund , Palle Challet | Outsource? Insource? A hybrid model? Finding the right design for an effective security operations center ... | |
Security Awareness in the Modern Era | Magnus Solberg , Ola Andersson , Thomas Zakarias | For many information security leaders, it’s not technology, but people, that form the weakest link ... | |
The Next-Generation CISO | Antero Päivänsalo , Christoffer Åkesson , Harri Gröning | While it may be hard to imagine in today’s digital world, the CISO didn’t always ... | |
Meynote: The Root Causes of Cyber Security Vulnerabilities | Pontus Johnson | This talk takes a step back to consider the root causes of cyber security vulnerabilities. ... | |
Securing Telenor’s Critical Assets – a Global Cyber Security Transformation | André Årnes | In this keynote presentation, André Årnes, Telenor Group’s Chief Security Officer, will tell the story ... | |
Recruiting, Developing and Retaining Talent | Torben Voigt Olsen | In a field often described as having “negative unemployment,” CISOs are in a constant battle ... | |
Actionable intelligence – Keeping Pace with Threats | Thomas Zuliani , Mihály Veres , Fredrik Jormin | Efficiently employing actionable threat intelligence is key to staying ahead of the next wave of ... | |
Adopting Emerging Technologies – The Secure Way | Thomas Bindslev | As significant technological advances are being made across information communications technology and Artificial Intelligence, these ... | |
Managing Third-Party Risk with First-Rate Partnership | Mirela Bergdahl | In an era of cloud computing, software-as-a-service and outsourcing, some CISOs have noted that it ... | |
The New Language of Risk | Ross Winther | From front-line employees to top-level directors, CISO must be able to communicate cyber risk in ... |