Skip Ribbon Commands
Skip to main content

NNIT Cybersecurity Summit 2019

November 7 | Søborg

A Tangible Approach to Cybersecurity

Getting your arms around the elephant – one bite at a time

The role of cybersecurity in organizations is rapidly increasing and becoming a concern and focus point for not only the IT-security department but also in other units - and rightfully so. While cybersecurity has for a long time been viewed as a nuisance, its role as a value add to the organization is getting increasing attention.

As the security challenges are increasing, organizations are still finding themselves in the difficult situation of getting their arms around the daunting security elephant. Therefore, in this seminar NNIT will present four tangible approaches to get inspiration from. The four presentations are each selected due to their fundamental role in common security setups.

  • Get insight into the who, when and why of IAM – this is your license to operate
  • The speed of application development puts security under pressure – how do you tackle the problem?
  • If you do not have insight into what is hitting you – then you cannot react. Learn how to build a Detect and Respond strategy and how to implement it.

 

SIGN UP HERE:

AGENDA:

​8.30-9.00​Breakfast and registration
​9.00-9.10​Welcome​Alice Leth Sørensen, Security Director, NNIT
​9.10-9.40​Danish Council for Digital Security's work and insight into the government's initiatives​Anna Damholt, Sekretariatschef, Rådet for Digital Sikkerhed
​9.40-10.25Get Insight with Identity Governance and AdministrationKuno K. Larsen, IAM Subject Matter Expert, NNIT
​10.25-11.00Are Your Applications Ready to Go Live?Thomas L. Erichsen, Principal IT Security Architect, NNIT
​11.00-11.15​Coffee break
​11.15-12.00Successful Detect and Respond Strategies to Mitigate Security RisksEbbe B. Petersen, Managing Consultant – Cybersecurity, NNIT
​12.00-12.30Detect and Respond – On Prem and in CloudChristian Dinesen, Senior Security Architect & Ethical Hacker, NNIT
​12.30-12.40Wrap-upAlice Leth Sørensen, Security Director, NNIT
​12.40-13.30​Lunch and learn: Try out NNIT's VR Cybersecurity Training

PRESENTATION DESCRIPTIONS:

 

Danish Council for Digital Security's work and insight into the government's initiatives

Anna Damholt, Sekretariatschef, Rådet for Digital Sikkerhed

Anna Damholt will give an overview of where cyber- and information security is included in the government's strategies. Anna will dive into the different competencies focused initiatives such as development of awareness material and education material in security for various types of public employees. 

 

Get Insight with Identity Governance and Administration

Kuno K. Larsen, IAM Subject Matter Expert, NNIT

Identity and Access Management can help the organization by giving the employee access to the organization's systems in an effective manner, while being secure and compliant. Along with GDPR, it has become even more critical to get the organization's data in place.

But how does an IAM project start and is the business ready for the implementation? In the presentation NNIT will share experiences with implementation of IAM systems and the challenges that the project needs to be aware of.

 

Are Your Applications Ready to Go Live?

Thomas L. Erichsen, Principal IT Security Architect, NNIT

There is an increasing pressure on organizations to deliver digital solutions faster and on new platforms. But are your development teams on top of security and privacy in the solutions that are developed? Or are unaddressed risks hidden? What does the your gut tell you - are you applications ready to go into production?

This presentation goes through best-practice within application security and suggests how your organization can get started with a risk-based approach and prepare your applications for "ready to go live".

 

Successful Detect and Respond Strategies to Mitigate Security Risks

Ebbe B. Petersen, Managing Consultant – Cybersecurity, NNIT

Performing continuous incident detection and response increases the organization's ability to rapidly detect and respond to cybersecurity incidents in a timely manner to minimize business impact.

Ebbe will in this presentation give some general implementation guidance based on best practice and his many years of experience in detecting and tracking hackers/intruders. For targeted cyber intrusions of higher sophistication, he will explain how NNIT assists organizations with responding. This includes developing a strategic plan to contain and eradicate the intrusion and providing guidance to improve the organization's cybersecurity posture in preparation for adversaries attempting to regain access to the organization's computers.

 

Detect and Respond – On Prem and in Cloud

Christian Dinesen, Senior Security Architect & Ethical Hacker, NNIT

Detecting and Responding to the emerging threats on companies on prem or cloud assets has become even more important and complex. Companies are either getting hit with targeted attacks or as innocent bystanders in the ever increasing threats. Knowing what to act on and what to prioritize when responding has evolved the market the last years.

Christian will share an agnostics view on the different technologies to protect on prem (by some called legacy) and the different ways to utilize cloud technologies – this seen both from an asset protection perspective and a utilizations.

 

PRACTICALITIES:

Date and time: Thursday, November 7, 8.30-13.30

Place: NNIT, Østmarken 3A, 2860 Søborg

Contact: Do you have any questions? Please contact Nicoline Liu Poulsen at nlpo@nnit.com

 

 

Nicoline Liu Poulsen+45 3077 8562nlpo@nnit.comMarketing Consultanthttp://www.linkedin.com/in/nicoline-liu-poulsenNicoline Liu Poulsen

 

 

VR Cybersecurity Traininghttps://www.nnit.com/cybersecurity/Pages/VR-Cybersecurity-Training.aspxVR Cybersecurity Training
The Fine Art of Aligning Business Strategy and Information Security Strategyhttps://www.nnit.com/OfferingsAndArticles/Pages/The-Fine-Art-of-Aligning-Business-Strategy-and-Information-Security-Strategy.aspxThe Fine Art of Aligning Business Strategy and Information Security Strategy
​​​Building a sustainable defence: How to secure your operational technology (OT) environment​https://www.nnit.com/OfferingsAndArticles/Pages/BuildingSustainableDefence.aspx​​​Building a sustainable defence: How to secure your operational technology (OT) environment​
Breach Preparednesshttps://www.nnit.com/OfferingsAndArticles/Pages/Breach Preparednes.aspxBreach Preparedness
Digital Work Placehttps://www.nnit.com/advisory-services/NNIT_Academy/Pages/Digital-Work-Place.aspxDigital Work Place
Control Your Security & Privacy in the Cloudhttps://www.nnit.com/OfferingsAndArticles/Pages/Control-Your-Security-Privacy-in-the-Cloud.aspxControl Your Security & Privacy in the Cloud
Cloud Securityhttps://www.nnit.com/cybersecurity/Pages/Cloud-Security.aspxCloud Security
Managed Securityhttps://www.nnit.com/cybersecurity/Pages/Managed-Security.aspxManaged Security
NNIT Security Insightshttps://www.nnit.com/cybersecurity/Pages/security-insights.aspxNNIT Security Insights
Identity & Access Managementhttps://www.nnit.com/cybersecurity/Pages/iam.aspxIdentity & Access Management