Cyber Security Nordic – a new digital security event

The international event will be organized for the first time in September 26-27, 2017. Venue is Messukeskus Helsinki, Expo and Convention Centre, the biggest exhibition and congress arena in Finland.

Cyber Security Nordic is aimed at top executives and board members of companies.

Conference and Exhibition

In addition to the conference, an event is open to all security specialists. Exhibitors present their solutions to business decision-makers.

On the first day of the two-day program, there is a pay-per-view conference with its international top speakers. The second day program consists of various case examples for digital security.


Cyber Security Nordic: the business opportunity, what you cannot pass?

“Global cyber-arming race is accelerating. The statements of the world leaders’ are getting more aggressive and nationalism grows all around world. At same time, the world is more global than ever. Digitalization is a necessity in the process of globalization for everyone, and it is not possible without cyber security.

Cyber security can be one of your biggest future business advantage. Cyber Security Nordic offers the holistic understanding of cyber security business opportunities and how it relates to new cooperation possibilities with the public sector. Cyber security is a part of everyone’s life today, more essential tomorrow.”

Juha Remes, Entrepreneur and CEO Finnish Information Security Cluster

CSN_banneri

Cyber as a Game Changer

“The rise of a highly interconnected world, involving all walks of life from international politics and global economy to individual citizens, has already proven to be a strategic game changer. Physical world limitations, including the structures and principles that support it, are still in place, but the rules of the cyber domain are bending the old barriers of time and space, and changing the structures and the rules of the road. Thus, it can be said that the unfolding world of cyber is very different from the physical world as we know it now.

The targets of cyber-attacks are round the whole society. Therefore it is of utmost important to raise the awareness of the importance of cyber security among the all the key stakeholders in Finland and in the Nordics. We are also delighted to welcome some of the leading cyber experts from the U.S and Israel to this event and grateful of their willingness to share their highly valuable experiences in building more resilient societies. ”

Aapo Cederberg, Associate Fellow, GCSP


Registration Exhibition both days and program Wed, 27 Registration Conference Tue, 26 (190€)

Accenture SecurityAccenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its regional Cyber Fusion Centers, global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organization’s valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.

Cisco logoCisco is building truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology, services and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and

cgi logo

Founded in 1976, CGI is one of the world’s largest IT and business process services providers, helping clients transform into digital enterprises end to end. We are Finland’s only full service cybersecurity provider with local presence of 70+ experts. You have prepared operating models and 1400+ experts globally at your disposal whenever necessary. Our global network transmits threat information from around the world that helps our clients to prepare and protect themselves. Visit cgi.com and cgi.fi/kyber to learn more.

cysec_ice_wall-logoNetwork Data Vault™ (NDV™, a proprietary application of CySec Ice Wall Oy) gives a new visibility to the network data in the event of a data breach.

With a months long autonomous storaging of all network data NDV™ creates an audit-trail-evidence to cybercrime forensic investigations and liability analyses at an affordable cost.

checkpoint-logoCheck Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats.

Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.

rugged_logoRugged Tooling provides powerful tools for ensuring the cyber security of IP networks.

Our tools emulate DDoS attacks, to test your cyber defenses. Testing helps you to gain awareness of your cyber resilience and prepare for an attack, test recovery processes and improve your network configuration.

Our upcoming monitoring platform secures your live network from threats. It enables cyber security monitoring and threat filtering at real live network.

Learn more about us at www.ruggedtooling.com

granite-logo

Granite takes risk and cyber security management into practice. Forget complicated spreadsheets, manual reporting and manual follow-up. Granite provides an agile and customizable GRC – Governance, Risk, Compliance – online solution that’s easy to use. Risk and security assessments, ISO27001 and EU GDPR compliance, incident management and security awareness to whole organization are the key elements of Granite.

www.granite.fi

vtt-logoVTT Technical Research Centre of Finland Ltd is the leading research and technology company in the Nordic countries. We use our research and knowledge to provide expert services for our domestic and international customers and partners, and for both private and public sectors.  We use 4,000,000 hours of brainpower a year to develop new technological solutions.

jetico-logo

Jetico provides complete endpoint data protection software for sensitive and mission-critical data throughout the lifecycle. Jetico’s BestCrypt software for whole disk encryption is in the process of being certified by FICORA for EU authorities handling classified information.

Jetico products are trusted by government and military agencies, all the top 10 U.S. defense contractors, many national laboratories, as well as various other enterprises and a wide global base of home and small business users in over 100 countries.

Founded in 1995, Jetico is privately held and headquartered in the Otaniemi Science Park in Helsinki, Finland.
www.jetico.com

Instas_logo

Insta Group, having 800 employees and 100 million euros turnover, is a Finnish, privately owned company with the mission of building and maintaining a safe and competitive society. Insta DefSec’s cyber security unit provides IT security products, services and customized solutions for demanding customers, such as defense, authorities, operators, system integrators and network infrastructure providers with 30 years of experience.

Our key competence areas include secure identity and PKI, network security and log management and SIEM. In addition, our offering includes IT security consulting and engineering services. Insta’s solutions and services are trusted e.g. by Nokia, Finnish Defence Forces, Nordic banks and Finnish state administration. Our security solutions and services are used in over 40 countries.

Nixu_CyberSecurity_logo

Nixu Corporation is a cybersecurity company. We work to improve our clients’ cybersecurity in solution areas of Corporate IT, Digital Business and Industrial Internet. Our clients trust Nixu in projects where developing, implementing or assessing of information security is a must. We ensure the confidentiality of our clients’ data, business continuity and ease-of-access to digital services through planning and mitigation of cybersecurity risks.

 

Huginn-logo

Huginn challenges the belief that cybersecurity is technology with little if any business benefits. On the contrary, we claim cybersecurity can be interesting to business development and needs to have a business upside with tangible business benefits! Huginn serves this purpose by creating visibility and control to your complex yet critical business processes like purchase-to-pay and efficiently removes high risks of outside perpetrators or inside actors of manipulating the process or its vital business information’s integrity.

We have taken cybersecurity to where it should be – in the business interests of the management – come and have a chat, how our novel approach serves your needs the best!

bittium_logoBittium specializes in the development of reliable, secure communications and connectivity solutions leveraging its 30 year legacy of expertise in advanced radio communication technologies. Bittium provides innovative products and services, customized solutions based on its product platforms, R&D services, and information security solutions for mobile devices and portable computers. http://www.bittium.com/