Search

Welcome to Orange Cyberdefense Live 2024 in Gothenburg

Navigating Cybersecurity’s Evolution and Maturity

Join us at Orange Cyberdefense Live on April 25th and explore the dynamic landscape of cybersecurity when we bring together industry leaders, cybersecurity experts, specialists and analysts to embark on a journey through the evolving realm of cyber threats, cyber resilience and proactive cyberdefense.

Through keynote speeches, expert presentations and interesting breakout sessions you will be able to delve into world recognized threat intelligence research, current cybersecurity trends and emerging technologies, threat detection strategies, and the maturation of cybersecurity practice.

This will provide you with unique and valuable insights on how to navigate in the ever-changing cyber environment that constantly force you to develop mature security practices, and harnessing innovation to safeguard your digital infrastructure, secure your organization and futureproof your business.

Keynote speakers:

Kåre Nordström 
Managing director Orange Cyberdefense

Experienced and inspirational manager with more than 20 years of successful leadership, now with the vision to lead the company into making the world a safer place and a mission to build a safer digital society.

Peter Larsson
CTO, speaker and senior advisor.

Peter has a total of 30 years of experience from the IT industry and has held several leading positions, the majority as a CIO in the business world. With his knowledge Peter is an expert within his field of understanding business requirements and operational implementation of sustainable cyber security.

 

Grant Paling
Product Manager Global Service Lines.

Senior advisor cyber threat intelligence and threat detection. With expertise in developing and educating the market about new and existing global cyber security services.

Jan Arild Sigvartsen
Senior Executive advisor

With a background in a mix of C-level, entrepreneur and leadership combined with deep understanding of technology, content creation and communication. Helping companies and individuals to do things they've never done before within the digital space.

 

Andreas Andersson
Solution Architeict specialist endpoint security

Background in IT-forensic and information security. Previous experience in working as a cyber security analyst with responsibilities in threat monitoring, log-and malware analysis. Today Andreas is a solution architect working with customers as an trusted advisor.

Richard Meeus
EMEA Director of Security Technology and Strategy, Akamai

With more than 20 years of experience, Richard is responsible for designing and building secure solutions for some of the world’s most influential organisations.

Richard is an industry expert in cloud computing, enterprise software, and network security. During his time at Akamai, Mirapoint, and Prolexic, Richard has had held strategic roles across a broad range of projects, including the deployment of DDoS solutions for multinational organizations to protect critical infrastructure and sensitive data. Additionally, Richard is a chartered member of the BCS and a CISSP.

 

Agenda

Keynote topics

State of the cyber threat landscape

Current trends and future predictions in an era of cyber extorsion, supply-chain attacks  and geopolitical hacktivism  

 

A crucial role in detecting, preventing, and responding to phishing attacks

Strategies employed for understanding the attack surface

The landscape of hacktivist DDoS attacks

 

Securing tomorrows innovation

Harnessing AI for Enhanced Security  

 

Thinking outside the box: The importance of tracking your digital risk 

Sharing multiple stories from the field about brand exploitation, as well as effective strategies in digital risk protection and advice on how to play your part in creating a safer digital society.

Breakout sessions - 12:45-13:25

Fortifying Critical Infrastructures

Securing Operational Technology (OT): 

The essentials of OT security for protecting critical infrastructure and ensuring the reliable and safe operation of industrial systems in today's interconnected world. Pros and cons to tackle the challenge's rooted in practical understanding.

 

Moving from “we told you so” to “we’re telling you so”: intelligence-led security in action

We analyze the key strategic information from the cyber security threat landscape and present it each year in our Security Navigator.  We also make predictions.  Sometimes they even come true.

Of course, having actionable intelligence in real-time is important also.  Intelligence-led security is about using intelligence to drive actions but how does it work in practice?  We will work through some real-life examples and share our vision on how we see this area developing in the coming years.

Navigating regulatory landscapes in cybersecurity

Compliance, Governance, and Cyber Resilience

We'll delve into the dynamic world of regulations and ongoing developments. In this session, we'll provide a comprehensive overview and our perspective of the regulatory landscape, including recent movements and key updates.
European Union Cybersecurity Certification (EUCC),  EUCS and EU5G on its implication, and a brief flyover around the AI Act. Providing a snapshot of its objectives, scope, and implications for organizations operating within the EU regulatory framework.

Breakout sessions - 13:35 - 14:10

The Future of Network Security Architecture

Secure Access Service Edge (SASE) Implementation

Why reframing your Secure Access Service Edge (SASE) journey for risk-based value realization is the only option for the enterprise today. The path to successful SASE integration lies in the outcome-focused strategies, rather then a technology focused approach. SASE is a discipline that needs continuous monitoring, detection and respons driven by constantly evolving threat intelligence

The need of simplifying Application & API security at scale

There´s no doubt that applications are one of the most vulnerable pieces of infrastructure out there.

Now with the introduction of multi-site delivery strategies, adding cloud functionality and services not only intensify the challenges – it may seem almost overwhelming. To combat this complexity, reduce fragmentation and tool-sprawl, new strategies for application delivery and security need to be top of mind.

Deal with - interdependence that lie at the heart of cyberspace

Supply chain “risk mitigation” 


By adopting a proactive approach to supply chain security, organizations can navigate the complexities of the digital ecosystem with greater confidence and resilience. There are many needs to manage both before, during and after a commitment as well as the connection to both business processes and adjacent support processes - including the regulatory landscape but also the risk process.

Speakers

Johan Nelén

GRC Manager with a background as CISO/CSO with risk, compliance, and crisis management as expert areas.
Acting as strategic advisors in building a holistic approach for information security.
 

 

Aastha Rohilla

OT/ICS Security Consultant with experience in Network Administration, Telecommunications Technologies, and Information Security.

 

 

Andreas Jacobsson 

OT Solution Architect with experience from being a production manager in the heat of IT/OT convergence.

 

Daniel Haglund

Senior Advisor OT Security, Experienced OT, IT and Information Security Specialist with a demonstrated history of working in the private and public sector. 

 

Anton Gyllenhammar

Sr. Solutions Engineer for F5 Networks. Previous developer with specialist competency in Application & API Security, Cloud and Automation.

 

Tony Jörgensen

Presale expert with extensive experience from networking and security convergence. Part of the European SASE expert team at Orange Cyberdefense.

 

Mats Lindblad

GRC Manager with a background as CISO/CSO with risk, compliance, and crisis management as expert areas.
Acting as strategic advisors in building a holistic approach for information security.

 

Sign up here!

When registering, you will choose which tracks you would like to attend. If you change your mind and want to pick another track you can do so by updating your registration. 

Registration takes place via the Confetti tool, confirmation email comes from noreply@confetti.events

Nordic Tour, register to secure your spot!

 

This event is a part of the Orange Cyberdefense Live 2024 - Nordic Tour. We will visit three countries and six cities during the year. The tour will start in April and end in September. See you there!

 

 

Register and read more about the Nordic Tour

Partners:

Incident Response Hotline

Facing cyber incidents right now?

Contact our 24/7/365 world wide service incident response hotline.