{"id":722,"date":"2018-09-11T08:23:05","date_gmt":"2018-09-11T08:23:05","guid":{"rendered":"http:\/\/logichunt.net\/demo\/wordpress\/emeet\/?page_id=722"},"modified":"2024-12-12T10:35:15","modified_gmt":"2024-12-12T08:35:15","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/security-leadership-sweden\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"
[vc_row css=”.vc_custom_1576017595207{padding-top: 30px !important;}”][vc_column][vc_row_inner][vc_column_inner]
\r\n

<\/h2>\r\n

Lead the Way to Business Resilience<\/h3> \r\n <\/div>[vc_column_text css=””]The programme consists of various keynotes and break-out sessions coveringtopics such as human factor, resilience. risk management, stakeholder management. AI and more. The conference programme starts at 09:15 AM and ends at 16:00 PM.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1636712355727{padding-top: 30px !important;}” el_class=”custom-programma”][vc_column][vc_tta_tabs style=”outline” active_section=”1″][vc_tta_section title=”Programme” tab_id=”1601370013447-27a45615-432f”][vc_row_inner el_class=”custom-programma” el_id=”2″][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”6359″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Welcome and registration<\/h2>\r\n

<\/h3> \r\n <\/div>[\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_btn title=”8:45 – 9:15″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n
\r\n
\r\n \r\n \"Magnus\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/div>\r\n
\r\n

Magnus Aschan<\/a><\/h3>\r\n

Chairman<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Opening by chairman of the day<\/h2>\r\n

Magnus Aschan, Journalist, moderator, and keynote speaker of Teknikministeriet AB<\/h3> \r\n <\/div>[vc_column_text css=””]Chairman of the day, Magnus Aschan will open the day and walk you trough todays programme.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_btn title=”9:15 – 9:30″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n
\r\n
\r\n \r\n \"Laura\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Laura Koetzle<\/a><\/h3>\r\n

Vice President, General Manager of Forrester Research B.V.<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

To Excel, Recognise Which Type Of CISO Your Business Needs Now<\/h2>\r\n

Laura Koetzle, Vice President of Forrester Research<\/h3> \r\n <\/div>[vc_column_text css=””]Forrester\u2019s research into the role of the CISO has led us to define six CISO archetypes:<\/p>\n
    \n
  1. The transformational CISO;<\/li>\n
  2. The post-breach CISO;<\/li>\n
  3. The tactical\/operational expert;<\/li>\n
  4. The compliance guru;<\/li>\n
  5. The steady-state CISO;<\/li>\n
  6. The customer-facing evangelist.<\/li>\n<\/ol>\n

    By identifying your desired CISO type, you can then seek out opportunities where your strengths and interests match the needs of the company, so that you can be the optimal fit for the company\u2019s strategy.\u00a0 This session will give you the framework to do two key things:<\/p>\n

      \n
    1. Determine the best CISO-type for a business\u2019s goals; and<\/li>\n
    2. Select the optimal type of CISO role for you.<\/li>\n<\/ol>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”7392″ img_size=”” css=””][vc_btn title=”9:45 – 10:10″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n
      \r\n
      \r\n \r\n \"Dr.\r\n <\/a>\r\n\r\n
      \r\n
      \r\n <\/i><\/a> <\/div>\r\n
      \r\n

      Dr. Leila Taghizadeh<\/a><\/h3>\r\n

      Global Head of Cyber Risk & CISO IberoLatAm of Allianz<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
      \r\n

      Keynote: The Dual Power of Cyber Risk and Compliance<\/h2>\r\n

      DR. LEILA TAGHIZADEH, Global Head of Cyber Risk & CISO IberoLatAm of Allianz Group<\/h3> \r\n <\/div>[vc_column_text]In today\u2019s rapidly evolving digital landscape, most if not all organisations face increasing cyber threats that put their (sensitive) information and (critical) systems at risk. Therefore, organisations must take the necessary steps towards understanding and managing their cyber risk. This can only be achieved by implementing an effective risk management framework. By building a risk framework and governance around it, organisations can ensure resilience and security as they will get a clearer view of their organisation\u2019s risks, as it will involve all layers of their organisations, and it will allow senior management to have a clear overview of the organization\u2019s exposure. Join us as we explore the importance of balancing regulation and cyber risk management in the era of cyber threats.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”7254″ img_size=””][vc_btn title=”10:10 – 10:35″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”6358″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]
      \r\n

      Coffee break at the networking plaza<\/h2>\r\n

      <\/h3> \r\n <\/div>[\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_btn title=”10:35 – 11:15″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n
      \r\n
      \r\n \r\n \"Rikard\r\n <\/a>\r\n\r\n
      \r\n
      \r\n <\/div>\r\n
      \r\n

      Rikard Lindkvist<\/a><\/h3>\r\n

      Senior Sales Engineer of CommVault<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
      \r\n

      Protecting data must look different!<\/h2>\r\n

      Rikard Lindkvist, Senior Sales Engineer of CommVault<\/h3> \r\n <\/div>[vc_column_text css=””]\n

      Protecting data must look different!\u00a0To safeguard data from emerging threats, today\u2019s businesses need comprehensive and multi-faceted tools that transcend traditional \u2018backup\u2019 for holistic protection, compliance, and recoverability.\u00a0A new way is needed that focuses on the security, durability, and the recovery of data for organizations to remain resilient and survive.\u00a0One that is progressive, meets threats head-on with advanced capabilities that safeguard entire data estates without sacrifice.\u00a0Commvault has been a Gartner Magic Quadrant leader for 12 years. More than safeguards more than 100,000 organizations around the world rely on Commvault and they secure 3 EB of cloud data and have a unique FedRAMP High cyber resilience platform.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”7327″ img_size=”” css=””][vc_btn title=”11:15 – 11:40″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=”custom-programma”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n

      \r\n
      \r\n \r\n \"Thomas\r\n <\/a>\r\n\r\n
      \r\n
      \r\n <\/div>\r\n
      \r\n

      Thomas Berglund<\/a><\/h3>\r\n

      Director, Technical Account Management of Tanium UK Limited<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
      \r\n

      The Endpoint Lifecycle: Strategies for Cyber Resilience<\/h2>\r\n

      Thomas Berglund, Director Technical Account Management of Tanium<\/h3> \r\n <\/div>[vc_column_text css=””]This presentation delves into the fascinating world of endpoints \u2013 the devices at the heart of our digital landscape.\u00a0 Thomas Berglund, Director, Technical Account Management at Tanium will explore their lifecycle, from initial provisioning to ongoing security measures.<\/p>\n

      By understanding the Life of an Endpoint, we can:<\/p>\n