Skip Ribbon Commands
Skip to main content

NNIT Cybersecurity Seminar

November 1st 8.30-12.30 | Søborg
November 6th 8.30-12.30 | Århus

As organizations and work processes are being digitalized, a range of vulnerabilities are being exposed. It is a great challenge to handle security incidents and protect oneself against these vulnerabilities. This is especially the case for regulated industries, due to far-reaching consequences following inadequate security measures. 

The main cause of the challenges is typically that the security infrastructure is outdated in comparison to the increasingly sophisticated attacks. On top of that, are the regulations with increasing demands to the people responsible for securing the organization's cyber defense.

Therefore, it is crucial to have the right emergency preparedness in place that can predict when and where the attacks strike, to secure the proper defense and, should the incident occur, make sure the organization is able to continuously function and reestablish inaccessible systems as fast as possible.

Participate in this seminar and learn more about digital defense in a world in transformation.

Agenda
8.30-9.00 Breakfast & registration

9.00-9.30 Welcome

9.10-9.55 Security in the digital organization, Lars Koch Hviid, Senior Security Architect 

Cloud, IoT, personal data and automation have been some of the focus areas in 2018. This has lead to an increased attention on topics such as AI, machine learning and blockchain. We are aware that the world is undergoing a digital transformation, but how do you make sure that security is part of this transformation?

9.55-10.40 The digital emergency preparation, Christian Dinesen, Ethical Hacker & Senior Security Architect

It's no longer a question of whether hackers are able to enter your organization but rather a question of when. This is why the defense plays a key role in digital security to ensure that breaches will be discovered and dealt with in time. Christian Dinesen shares experiences from NNIT's Cyber Defense Center.

10.40-10.55 Break

10.55-11.40 People, Process, Technology - The three most important elements of a cyber defense. Helge Djernes, CISM

The key to a successful cyber defense is a combination of technological and organizational measures. Helge Djernes have many years of experience helping organizations with uncovering threats, prioritization of security precautions and adaptation of organizational structure and routines.

11.40-11.50 Summary

11.50-12.30 Lunch and Networking

Time and Place: 

Søborg: Thursday, November 1st, 2018 from 8.30-12.30 at Østmarken 3A, 2860 Søborg.

Århus: Tuesday, November 6th, 2018 from 8.30-12.30 at Hedeager 1, 8200 Århus

Contact:

If you have any questions, contact Nicoline Liu Poulsen at nlpo@nnit.com

 

 

Nicoline Liu Poulsen+45 3077 8562nlpo@nnit.comMarketing Consultanthttp://www.linkedin.com/in/nicoline-liu-poulsenNicoline Liu Poulsen

 

 

Cloud Securityhttps://www.nnit.com/cybersecurity/Pages/Cloud-Security.aspxCloud Security
Managed Securityhttps://www.nnit.com/cybersecurity/Pages/Managed-Security.aspxManaged Security
VR Cybersecurity Traininghttps://www.nnit.com/cybersecurity/Pages/VR-Cybersecurity-Training.aspxVR Cybersecurity Training
NNIT Security Insightshttps://www.nnit.com/cybersecurity/Pages/security-insights.aspxNNIT Security Insights
Identity & Access Managementhttps://www.nnit.com/cybersecurity/Pages/iam.aspxIdentity & Access Management
Cybersecurity Consultinghttps://www.nnit.com/cybersecurity/Pages/security-advisory.aspxCybersecurity Consulting
Digital Work Placehttps://www.nnit.com/advisory-services/NNIT_Academy/Pages/Digital-Work-Place.aspxDigital Work Place
How scammers attack your company using CEO fraudhttps://www.nnit.com/cybersecurity/Pages/How-scammers-attack-your-company-using-CEO-fraud.aspxHow scammers attack your company using CEO fraud
One Year with GDPR – Continuous Compliance is still a Challengehttps://www.nnit.com/cybersecurity/Pages/gdpr-one-year-on.aspxOne Year with GDPR – Continuous Compliance is still a Challenge
Application Security Health Check Servicehttps://www.nnit.com/cybersecurity/Pages/Application-Security-Health-Check-Service.aspxApplication Security Health Check Service